ieee 802 1
play

IEEE 802.1 Port-based Network Access Control Jeff Hayes Product - PowerPoint PPT Presentation

IEEE 802.1 Port-based Network Access Control Jeff Hayes Product Manager - Xylan jeff.hayes@xylan.com 1 2 June 1999 - 802.1 - Coeur dAlene Network Access Control What? $XWKHQWLFDWHG $XWKHQWLFDWHG 8VHUV 8VHUV distributed


  1. IEEE 802.1 Port-based Network Access Control Jeff Hayes Product Manager - Xylan jeff.hayes@xylan.com 1 2 June 1999 - 802.1 - Coeur d’Alene

  2. Network Access Control • What? $XWKHQWLFDWHG $XWKHQWLFDWHG 8VHUV 8VHUV – distributed security – authenticate users at the switch port switch – once authenticated, operates at LAN speed – leverage common authentication systems • RADIUS • DIAMETER • LDAP compliant $XWKHQWLFDWLRQ $XWKHQWLFDWLRQ 6HUYHU directory servers 6HUYHU • NOS 2 2 June 1999 - 802.1 - Coeur d’Alene

  3. Network Access Control • Why? – Perimeter security • access control at the edge – Not all users created equal • trust all; really trust only a few – Not all networks created equal • some require extra access control measures 3 2 June 1999 - 802.1 - Coeur d’Alene

  4. Network Access Control • Applications – distributed user Authenticated Authenticated authentication Users Users • not device switch • edge access control – user mobility with campus setting – leveraged by single switch switch sign-on systems • one ID/pswd, entered one-time Authentication Authentication Server Server 4 2 June 1999 - 802.1 - Coeur d’Alene

  5. Network Access Control • Market Demand – user authentication in enterprises • key departments (HR, Finance) • open computing environments (partners, visitors) – network ingress security • access control distributed to the edge – key verticals are ideal for switch access control • security conscience environments • mobile users • semi-public work environments 5 2 June 1999 - 802.1 - Coeur d’Alene

  6. Key Vertical: University Goal – authenticated open Goal – authenticated open computing computing ��������� • Broad facilities $XWKHQWLFDWLRQ – central campus, satellites & 6HUYHU dorms &DPSXV • Different user types 'HSDUWPHQWDO %DFNERQH 6XEQHWV – students - dorms, classrooms & library – faculty - offices & classes $FFHVV &RQWURO – admin - offices • IP addressing - DHCP ,QWHUQHW 6DWHOOLWH &DPSXV • Filter between private nets 6 2 June 1999 - 802.1 - Coeur d’Alene

  7. Key Vertical: Medical Goal – patient & research Goal – patient & research Patient Records & Accounting confidentiality confidentiality • Facilities – in/out patient hospital – research labs • Users – MDs, nurses, admins Hospital – research Phds & techs • Policy – authenticate into key subnets – filter / firewall internal Research traffic 7 2 June 1999 - 802.1 - Coeur d’Alene

  8. Key Vertical: Carrier Goal – secure, multi-layer secure, multi-layer Goal Internet access Internet access • users connect to network – via DSL or cable DSL or Cable • users authenticate at the ��� NSP’s POP – RADIUS – multiple authorities – one user per switch port • access multiple out- sourced services ISP 1 ISP 2 ISP 3 – separate billing 8 2 June 1999 - 802.1 - Coeur d’Alene

  9. Key Administration Issues • Ethernet-only ingress; any egress interface – No authentication needed for inter-switch ports • Configurable on a per port basis – not all switch ports must be authenticated ports • Log-off, aging and inactivity timer options – re-authenticate according to policy • Transparent to authentication server type – authenticator can request more information before determining the mechanism – smart cards, Kerberos, PKI, 1-time pswd, etc. 9 2 June 1999 - 802.1 - Coeur d’Alene

  10. Key Administration Issues • Multiple VLAN membership options – some want a MAC-based option = more control – authenticate into authorized VLAN = choice – client does DHCP after authentication • Mobility – same look & feel regardless of campus location – mixed vendor enviro=common user experience – many users need both non-auth access and auth access, depending on local port 10 2 June 1999 - 802.1 - Coeur d’Alene

  11. Other possible considerations • Core spec for the authentication process • Section/Appendix for port-based authentication – all or nothing / open or closed • Section/Appendix for MAC-based authentication – VLAN membership control (IP unicast, IP multicast, IPX, AT, etc.) 11 2 June 1999 - 802.1 - Coeur d’Alene

  12. Summary • Xylan believes a standards-based switch access authentication method is required • Key verticals markets have expressed a definite need for this capability – extra layer of security at the network edge • Although port based access may be easier to implement, do not discount the control layer-2 mechanisms offer • Xylan will support the approved spec 12 2 June 1999 - 802.1 - Coeur d’Alene

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend