1 / 20

WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR

WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR. May 30, 2009. Problem Overview. Corporate governance for wireless, wired access, and intranet security used to be governed separately, however, it can no longer be so for the following two reasons:.

jacie
Download Presentation

WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WIRELESS SECURITYDEFENSET-BONE & TONIC:ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, 2009

  2. Problem Overview Corporate governance for wireless, wired access, and intranet security used to be governed separately, however, it can no longer be so for the following two reasons: Security threats need to be addressed on an enterprise wide-level Mobility is a critical component of IT infrastructure access today

  3. Increase in Corporate Mobility Figure 2 Figure 1 F

  4. Proposed Solution • Cisco Wireless and Network Security Integration • Provides the architectural, design, and implementation framework in deploying the Cisco Unified Network • Enables an enterprise to deploy and enforce a common network security policy • Consistent end-to-end policy enforcement as well as a highly effective threat detection and mitigation capability • WLAN/LAN integrated and layered security protocol solution

  5. Integration Points

  6. Why use a Layered Approach? • 802.1x is the IEEE standard that provides the layered approach • Initiate protection at layer 2 switches and layer 3 routers • Secure authentication of Wireless Access Points with solid protocols such as WPA2-ENT with EAP-TLS • Use a secure server to authenticate authorized users with Access Control Servers (Cisco, RADIUS) • Educate users and administrators on properly securing the network

  7. Why Cisco? • Cisco is unique in occupying 3 industry spaces: • Core Wired Networking products • Wireless Communications • Network Security

  8. The Cisco Unified Network Cisco Unified Network is the marriage of the following 3 Cisco components: • Cisco Secure Wireless Architecture • Cisco Campus Architecture • Cisco Branch Architecture

  9. Cisco Secure Wireless Architecture

  10. Cisco Secure Wireless Architecture • Cisco Unified Wireless Network • Cisco Security Agent (CSA) • Cisco Network Admission Control (NAC) Appliance • Cisco Firewall • Cisco IPS • CS-MARS

  11. CS-MARS • Cisco Security Monitoring, Analysis, and Reporting • Hardened Linux server that monitors the network using SNMP, SSH, Telnet, Layer 2 & 3 switches and routers • Gathers 15,000 events per second • Cisco ContextCorrelation – Cisco defined rules that monitor for events • Provides visualizations of network topology and “hot-spots” • Presents administrators with timely per-device commands so that threats can be contained quickly • Identifies “chokepoint” devices that can be used to isolate threats

  12. CS-MARS Visualization

  13. NAC – Network Access Control • 4 Main Capabilities • Securely Identify Devices and Users • Enforce Consistent Policy • Quarantine and Remediate • Configure and Manage • Access is controlled from all entry points to the network – LAN, WLAN, VPN, Internet, Guest • Can be used to tier access levels • Be careful with quarantine policies, isolate as much as possible • Uses Cisco Trust Agent and Cisco Security Agent to verify “security posture”

  14. NAC - Overview

  15. CTA & CSA • Cisco Trust Agent Components • Network clients • Network Access Devices • ACS – Secure Access Control Server • Provides Posture Token – Healthy, Infected, Unknown, etc. • Posture Validation Servers – Third Party – Optional • Cisco Security Agent • Installed on Network Clients • Limits network access until user and device is validated • Provides access to remediation areas only

  16. CSA – End User View

  17. Cisco Campus Architecture • Provision proper network access to: • Data Centers • Servers • User Devices • Provide the necessary internal routing and switching capabilities

  18. Campus - Illustrated

  19. Cisco Branch Architecture • Branch Architecture ties together the different infrastructure, application and computing resources across various organizational divisions and hierarchies.

  20. Branch - Illustrated

More Related