Title: Network Access Control: What is NAC
1Network Access ControlWhat is NAC?
- Joel M Snyder
- Senior Partner
- Opus One
- jms_at_opus1.com
2Agenda Defining NAC
- Why are we thinking about NAC?
- What is a definition of NAC?
- What are the four key components of NAC?
- What are the industry NAC architectures?
- Authentication, Environment, and Enforcement in
Depth
3Security Management Is Moving Towards the End User
- Last Year
- Poke holes in the firewall for specific IP
addresses and specific services - Create IPsec remote access solutions that give
broad network access
- Next Year
- Determine security policy by who is connection
not where they are connection from - Create remote access solutions that focus on the
end-user, not the network
4While You Were Out We Dissolved Your Perimeter!
mail
dns
web
5Clearly, Perimeter-based Security Wont Work All
the Time
So what do we do?
- Defense in Depth
- Authenticate and Authorize all Network Users
- Deploy VLANs for traffic separation and
coarse-grained security - Use stateful firewalls at the port level for
fine-grained security - Place encryption throughout the network
- Detect and remediate threats to network integrity
- Include end-point security in policy enforcement
- Re-Perimeterize
- Re-create micro-perimeters where you can
- Use NAC (network access control) on the LAN
- Use touch-down points (like tunnel servers) to
re-establish controls NAC on the VPN
6Re-perimeterize Means Creating Virtual
Perimeters
A hole has definite characteristics that make a
defendable border
mail
dns
web
VPNs touch down in a device thats a virtual
perimeter!
7Network Access Control Wraps a Perimeter Around
the Network
At the access point (wireless, wired, SSL or
IPsec VPN), NAC comes into play
1 Who are you?2 What do I know about you?3
Does your end-point comply to policy?
8Lets Define NACUser-Focused Network-Based
Access Control
9OK, wait a second. Isnt Access Control what a
firewall does?
You shall not pass!
Internet
Absolutely! The difference is in the decision!
10NAC Is Firewalling, but With a Difference
Common Firewall Decision Elements Source IP and
portDestination IP and port Position Between
two networks
Common NAC Decision Elements Username,
GroupAccess method, DestinationEnd-point
security status Position Between user and network
11The Marketing View of NAC
?
?
?
12NAC Has Four Components
- Authentication of the user
End users are authenticated before getting
network access
Authenticate
13Environmental Information Modifies Access or
Causes Remediation
- Authentication of the user
Authenticate
Where is the user coming from ? When is the
access request occurring? What is the End Point
Security posture of the end point?
2. Use environmental information as part of
policy decision making
Environment
14Access Controls Define Capabilities and Restrict
the User
- Authentication of the user
3. Control usage based on capabilities of
hardware and security policy
Authenticate
Access Control
Allow or deny access. Put the user on a
VLAN. Send user to remediation. Apply ACLs or
firewall rules.
2. Use environmental information as part of
policy decision making
Environment
15Management of Policy is the Weak Link in most NAC
Solutions
- Authentication of the user
3. Control usage based on capabilities of
hardware and security policy
2. Use environmental information as part of
policy decision making
4. Manage it all
Usable management and cross-platform NAC
normalization
16An Architecture Helps to Understand NAC Better
?
?
?
NAC Policy Server
17Lots of NAC Products but Only a Few Good
Architectures
Network Endpoint Assessment Client
Network Endpoint Assessment Server
PostureValidator
PostureCollector
ClientBroker
ServerBroker
NetworkEnforcementPoint
NetworkAccessRequestor
NetworkAccessAuthority
These are the IETF terms for each piece.
TCG/TNC, Microsoft, and Cisco all have their own
similar ones
18PostureValidator
PostureCollector
ClientBroker
ServerBroker
NetworkEnforcementPoint
NetworkAccessRequestor
NetworkAccessAuthority
19PostureValidator
PostureCollector
ClientBroker
ServerBroker
NetworkEnforcementPoint
NetworkAccessRequestor
NetworkAccessAuthority
20PostureValidator
PostureCollector
ClientBroker
ServerBroker
NetworkEnforcementPoint
NetworkAccessRequestor
NetworkAccessAuthority
http//www.networkworld.com/research/2006/040306-n
ac-overview.html
21How Does the Authentication Actually Work?
?
- Three options are commonly used
- 802.1X
- Web-based Authentication
- Proprietary Client
NAC Policy Server
22802.1X is Preferred and the Most Secure Approach
Corporate Net
NAC Policy Server
? User brings up link (or associates with AP)
? AP/Switch starts 802.1X (EAP) for
authentication
? User authenticates to central policy server
? If authentication (and other stuff) is
successful, policy server instructs edge device
to grant appropriate access. User gets IP
address.
23Web Authentication is Easy to Do
Corporate Net
NAC Policy Server
? User gets on network gets IP address
? User opens web browser and is trapped by portal
? User authenticates to central policy server
? If authentication (and other stuff) is
successful, portal lets traffic through or
reconfigures network to get out of the way
24Proprietary Clients can do it either way (or both)
Corporate Net
NAC Policy Server
? User connects and gets IP address
? Client magically authenticates to NAC device
? If authentication (and other stuff) is
successful, user is allowed on network
25Lets Look at Environment Briefly
Authenticate
Access Control
Environment
Management
26This is the (and other stuff) part
Corporate Net
NAC Policy Server
For some, this is the main reason to want NAC!
? User associates with AP
? AP starts authentication
? User authenticates
? If authentication (and other stuff) is
successful, user is given appropriate network
access
27Environmental Information Can Include Lots of
Things
- Pure Environment
- Access Method (wired, wireless, VPN)
- Time of Day/Day of Week/Date within Limits
- Client Platform (Mac, Windows, etc.)
- Authentication Method (user/pass, MAC, etc.)
- End Point Security
- Does the device comply to my policy regarding
- Security Tools (A/V, FW)
- Applications (running/not)
- Patch Level
- Corporate signature
28Key Concept Access Is a Function of
Authentication and Environment
Who You Are
What you can do
Where You Are Coming From
How Well You Comply with Policy
Darn We just summarized NAC in one slide. What
else is there to talk about?
29Lets Look atAccess Control Briefly
Authenticate
Access Control
Environment
Management
30Access Control Enforcement Has Two Main
Attributes to Understand
- Control Granularity
- On/Off the network
- VLAN-level assignment
- Packet filters
- Stateful firewall
- Control Location
- On the client itself
- At the edge of the network
- A barrier between user and network
- Deep within the network core
- At the server itself
31Granularity is a Spectrum Largely Determined by
Hardware
Joels Fantasy of How Secure Networks Are Run
Stateful Full Firewall
Basic Packet Filters
VLAN Assignment
Go/No-Go Decision
Typical Current Approach (and likely SMB approach
in future)
Likely Reality for Next Few Years
32Weve Just Grazed the Surface of NAC
- NAC needs to be on your radar
- Tools like 802.1X should be part of your short
and long range plans anyway - Dont jump into a proprietary solution without
considering the emerging standard architectures
33Thanks!
- Joel Snyder
- Senior Partner
- Opus One
- jms_at_opus1.com