Cisco Trustsec: Security Solution Overview
Cisco Trustsec: Security Solution Overview
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Agenda
Anyone
Any Device
Borderless
Networks An approved Device
Anywhere
In The Right Way
Anytime
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Introducing Cisco TrustSec
Enables Business
Productivity
Remote Wireless VPN User Devices Devices
VPN User User
Posture SGTs
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
What is TrustSec?
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Why Identity Is Important
Authentication
Who are you?
Keep the Outsiders
1 802.1X (or supplementary method) Out
authenticates the user
3
Authorization
What service level to you receive?
The user can be given per-user
Personalize the
Network
services (ACLs today, more to come)
Accounting
Increase Network
4 The user’s identity and location can Visibility
be used for tracking and accounting
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
What does Identity allow you to do?
Ensure that only allowed types of user and machine connect to key resources
Provide guest network access in a controlled and specific manner
Deliver differentiated network services to meet security policy needs, for
examples like:
Ensure compliance requirements (PCI, etc.) for user authentication are met
Ensure that only employees with legitimate devices access classified systems
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Why 802.1X?
Industry-standard Most secure Complements Provides foundation
approach to user/machine other switch Easier to for additional
identity authentication security features deploy services (e.g.,
solution posture)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8
How Does 802.1X Work?
Authenticator
Switch, router, WAP
Identity Store/Management
Active directory, LDAP
Layer 3
Layer 2
Request for Service Back-End Authentication Identity Store
(Connectivity) Support Integration
Authentication Server
RADIUS server
Supplicant
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Who (or What) Can Be Authenticated?
User Authentication Device Authentication
alice
host\XP2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Various Authorization Mechanisms
• 802.1X provides various authorization
mechanisms for policy enforcement.
• Three major enforcement / segmentation
mechanisms:
• Dynamic VLAN assignment – Ingress
• Downloadable per session ACL – Ingress
• Security Group Access Control List
(SGACL) - Egress
• Three different enforcement modes:
• Monitor Mode
• Low Impact Mode (with Downloadable
ACL)
• High-Security Mode
• Session-Based on-demand authorization:
• Change of Authorization (RFC3576
RADIUS Disconnect Messages)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Cisco Switches with 802.1X
• A Systems Approach:
Fully Planned, Tested, and Vetted
SYSTEM for identity
The many business units have all worked Multi-Auth
together to form a full System-Based approach
to ensure the most capable / fully functional &
proven identity system in the industry.
Deployment
Modes
• Consistent across all switch platforms!
Pre-Emptive
Pre-Emptive Dead
Dead
Same Features Server
Server Detection
Detection
Same Code
Critical Vlan
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
MACsec (802.1AE) Overview
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Quick Review of MACsec (802.1AE)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Confidentiality and Integrity
Securing Data Path with MACSec
Media Access Control Security (MACSec)
Network Intelligence
Hop-by-hop encryption enables the network to
inspect, monitor, mark and forward traffic
according to your existing policies.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Cisco TrustSec
• Security Group Tags
Unique 16 bit (65K) tag assigned to unique role
Represents privilege of the source user, device, or entity
Tagged at ingress of TrustSec domain
Provides topology-independent policy
Flexible and scalable policy based on user role
Centralized policy management for dynamic policy provisioning
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Layer 2 SGT Frame Format
Authenticated
Encrypted
DMAC SMAC 802.1AE Header 802.1Q CMD ETYPE PAYLOAD ICV CRC
CMD EtherType Version Length SGT Opt Type SGT Value Other CMD Options
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Identity Services Engine (ISE)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Policy-Based Access
Identity Services Engine Delivers “Business Policy”
X
X Policy extends to all access
Finance
Manager
SalesForce. types (wired, wireless, VPN)
com
Personal iPad
Lifecycle Services Integration –
guest, profiling, posture
Optional encryption-based
Policies for Security-
conscious users
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Identity Services Engine
ISE: Policies for people and devices
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
A Practical Example of Policies
“Employees should be able to
access everything but have Internet
limited access on personal
devices”
“Everyone’s traffic
should be encrypted” Internal
Resources
Campus
Network
“Printers should only Cisco
ever communicate Switch
internally”
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Let’s Start With What We Know
Previous Cisco TrustSec Solution Portfolio
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Introducing Identity Services Engine
Next Generation Solution Portfolio
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Benefits of Identity Services Engine
Consolidated Services, Visibility Flexible Service
Software Packages Deployment
Simplify Deployment & Admin Track Active Users & Devices Optimize Where Services Run
Manage Guests & Sponsors Keep Existing Logical Design Consolidate Data, Three-Click
Drill-In
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Identity & Context-Awareness
Leveraging your Infrastructure Network
Authorized Users
Consistent identity features supported
802.1X on all Catalyst switch models
Cisco® authenticates authorized users
IP Phones
Catalyst® Switch (802.1X), devices (MAB/profiling) and
MAB & Network guests (Web Auth)
Profiling Device
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
ISE Lifecycle Services
ISE Posture Ensures Endpoint Health before Network Access
Wired, wireless,
Non-Compliant
VPN user
Employee Policy:
• Microsoft patches updated
• McAfee AV installed, running, and
current
• Corp asset checks
• Enterprise application running
Temporary Limited
Network Access until
remediation is
complete
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
ISE Lifecyle Services
ISE Guest Service for managing guests
Guest Policy:
• Wireless or wired access
• Internet-only access Report: On all aspects of
guest accounts
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Identity and Context-Awareness
ISE Profiling for Non-Authenticating Devices
“What is on my Network”
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ISE Device Profiling Capabilities
Smart
Phones
Minimum
Confidence for a
Match
Multiple
Rules to Establish
Confidence Level
Gaming
Consoles
Workstations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
ISE Device Profiling Example - iPad
ISE
Apple iPad
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Cisco ISE Provides Policy for Wired and
Wireless LANs
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
TrustSec Deployment Options
Monitor Mode Low Impact Mode High Security Mode
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Deployment Overview
Planning Typical TrustSec deployment Scenario
Plan in advance and keep user
Proof of Concept experience impact as minimum as possible
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Why Cisco TrustSec Architecture
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Trustsec.cisco.com
www.cisco.com/go/trustsec
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
802.1x Resources
• http://www.cisco.com/en/US/products/
ps6662/products_ios_protocol_option_home.html
• http
://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns171/CiscoIBNS-Tech
nical-Review.
pdf
• http://en.wikipedia.org/wiki/IEEE_802.1X
• http://www.networkworld.com/news/2010/0506whatisit.html
• http://www.ieee802.org/1/pages/802.1x.html
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
MACsec Resources
• http
://www.cisco.com/en/US/partner/docs/switches/lan/catalyst3750x_3560x/softw
are/release/15.0_1_se/configuration/guide/swmacsec.
html
• https
://videosharing.cisco.com/vportal/VideoPlayer.jsp?ccsid=C-9323e79a-0395-47
5c-9c65-27f6e6afff3b:1
#
• http://en.wikipedia.org/wiki/IEEE_802.1AE
• http://www.ieee802.org/1/pages/802.1ae.html
• http://www.networkworld.com/details/7593.html
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38