200 likes | 295 Views
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR. May 30, 2009. Problem Overview. Corporate governance for wireless, wired access, and intranet security used to be governed separately, however, it can no longer be so for the following two reasons:.
E N D
WIRELESS SECURITYDEFENSET-BONE & TONIC:ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, 2009
Problem Overview Corporate governance for wireless, wired access, and intranet security used to be governed separately, however, it can no longer be so for the following two reasons: Security threats need to be addressed on an enterprise wide-level Mobility is a critical component of IT infrastructure access today
Increase in Corporate Mobility Figure 2 Figure 1 F
Proposed Solution • Cisco Wireless and Network Security Integration • Provides the architectural, design, and implementation framework in deploying the Cisco Unified Network • Enables an enterprise to deploy and enforce a common network security policy • Consistent end-to-end policy enforcement as well as a highly effective threat detection and mitigation capability • WLAN/LAN integrated and layered security protocol solution
Why use a Layered Approach? • 802.1x is the IEEE standard that provides the layered approach • Initiate protection at layer 2 switches and layer 3 routers • Secure authentication of Wireless Access Points with solid protocols such as WPA2-ENT with EAP-TLS • Use a secure server to authenticate authorized users with Access Control Servers (Cisco, RADIUS) • Educate users and administrators on properly securing the network
Why Cisco? • Cisco is unique in occupying 3 industry spaces: • Core Wired Networking products • Wireless Communications • Network Security
The Cisco Unified Network Cisco Unified Network is the marriage of the following 3 Cisco components: • Cisco Secure Wireless Architecture • Cisco Campus Architecture • Cisco Branch Architecture
Cisco Secure Wireless Architecture • Cisco Unified Wireless Network • Cisco Security Agent (CSA) • Cisco Network Admission Control (NAC) Appliance • Cisco Firewall • Cisco IPS • CS-MARS
CS-MARS • Cisco Security Monitoring, Analysis, and Reporting • Hardened Linux server that monitors the network using SNMP, SSH, Telnet, Layer 2 & 3 switches and routers • Gathers 15,000 events per second • Cisco ContextCorrelation – Cisco defined rules that monitor for events • Provides visualizations of network topology and “hot-spots” • Presents administrators with timely per-device commands so that threats can be contained quickly • Identifies “chokepoint” devices that can be used to isolate threats
NAC – Network Access Control • 4 Main Capabilities • Securely Identify Devices and Users • Enforce Consistent Policy • Quarantine and Remediate • Configure and Manage • Access is controlled from all entry points to the network – LAN, WLAN, VPN, Internet, Guest • Can be used to tier access levels • Be careful with quarantine policies, isolate as much as possible • Uses Cisco Trust Agent and Cisco Security Agent to verify “security posture”
CTA & CSA • Cisco Trust Agent Components • Network clients • Network Access Devices • ACS – Secure Access Control Server • Provides Posture Token – Healthy, Infected, Unknown, etc. • Posture Validation Servers – Third Party – Optional • Cisco Security Agent • Installed on Network Clients • Limits network access until user and device is validated • Provides access to remediation areas only
Cisco Campus Architecture • Provision proper network access to: • Data Centers • Servers • User Devices • Provide the necessary internal routing and switching capabilities
Cisco Branch Architecture • Branch Architecture ties together the different infrastructure, application and computing resources across various organizational divisions and hierarchies.