Table of Contents

Introduction

Part I: The Host Security Landscape

Chapter 1. The Weakest Link: Internal Network Security

Security Is a Weakest-Link Problem

Hard Outer Shell with a Chewy Inside: Dealing with Internal Security Risks

The Software Update Race: Staying Ahead of Viruses, Worms, and Spyware

Summary

Chapter 2. Introducing Cisco Network Admission Control Appliance

Cisco NAC Approaches

NAC as an Appliance

NAC as an Embedded Solution

Cisco NAC Integrated Implementation

Cisco NAC Appliance Overview

Cisco NAC Return on Investment

Summary

Part II: The Blueprint: Designing a Cisco NAC Appliance Solution

Chapter 3. The Building Blocks in a Cisco NAC Appliance Design

Cisco NAC Appliance Solution Components

Cisco NAC Appliance Manager

Cisco NAC Appliance Server

Cisco Clean Access Agent

Cisco NAC Appliance Network Scanner

Cisco NAC Appliance Minimum Requirements

Cisco NAC Appliance Manager and Server Requirements

Cisco Clean Access Agent Requirements

Scalability and Performance of Cisco NAC Appliance

Summary

Chapter 4. Making Sense of All the Cisco NAC Appliance Design Options

NAC Design Considerations

Single-Sign-On Capabilities

In-Band Versus Out-of-Band Overview

Layer 2 Versus Layer 3 Client Adjacency Overview

Virtual Gateway Versus Real IP Gateway Overview

Deployment Options

How to Choose a Client/Server Adjacency Mode

Layer 2 Mode

Layer 3 Mode

Layer 2 Strict Mode for Clean Access Agent

How to Choose a Network Mode

Virtual Gateway Mode

Real IP Gateway Mode

In-Band Mode

The Certification Process in In-Band Mode

Certification Steps for Host with Clean Access Agent

Steps for Client to Acquire an IP Address

Clean Access Agent Authentication Steps

Clean Access Agent Host Security Posture Assessment Steps

Clean Access Agent Network Scanner Steps

Agent Post-Certification Steps

Login Steps for Host Using Web Login (No Clean Access Agent)

Web Login Authentication Steps

Web Login Network Scanning Steps

Post–Web Login Steps

Advantages of Using In-Band Mode

Disadvantages of Using In-Band Mode

Where You Can Use In-Band Mode

Out-of-Band Mode

How the Adjacency Mode Affects Out-of-Band Operation

Layer 3 Out-of-Band Traffic Control Methods

How the Network Mode Affects Out-of-Band Operation

Login Steps with OOB in L2 Adjacency, Virtual Gateway Mode

Initial Steps for OOB Clients

Clean Access Agent Authentication Steps in OOB

Agent Host Security Posture Assessment Steps for OOB

Agent Post-Certification Steps for OOB

Login Steps for OOB in L3 Adjacency, Real IP Mode

Initial Client Steps for L3 OOB

Steps to Obtain an IP Address in L3 OOB

Client Authentication and PBR Steps in L3 OOB

Client Certification and Post-Certification Steps in L3 OOB

Advantages of Using Out-of-Band Mode

Disadvantage of Using Out-of-Band Mode

Where You Can Use Out-of-Band Mode and Where You Cannot

Switches Supported by NAC Appliance Out-of-Band

Clean Access Agent and Web Login with Network Scanner

Summary

Chapter 5. Advanced Cisco NAC Appliance Design Topics

External Authentication Servers

Mapping Users to Roles Using Attributes or VLAN IDs

MAC Address Authentication Filters

Single Sign-On

Active Directory SSO

Active Directory SSO Prerequisites

How Active Directory SSO Works

VPN SSO

VPN SSO Prerequisites

How VPN SSO Works

Cisco Wireless SSO

Cisco Wireless SSO Prerequisites

How Cisco Wireless SSO Works

NAC Appliance and IP Telephony Integration

IP Telephony Best Practices for In-Band Mode

IP Telephony Best Practices for Out-of-Band Mode

High Availability and Load Balancing

High Availability

Stateful Failover of NAC Appliance Manager

Stateful Failover of NAC Appliance Server

Fallback Feature on NAC Appliance Server

Spanning Tree N+1

Load Balancing

Cisco Content Switching Module or Standalone Content Services Switch

NAC Appliance Server Load Balancing Using Policy-Based Routing

Summary

Part III: The Foundation: Building a Host Security Policy

Chapter 6. Building a Cisco NAC Appliance Host Security Policy

What Makes Up a Cisco NAC Appliance Host Security Policy?

Host Security Policy Checklist

Involving the Right People in the Creation of the Host Security Policy

Determining the High-Level Goals for Host Security

Common High-Level Host Security Goals

Defining the Security Domains

Understanding and Defining NAC Appliance User Roles

Built-In User Roles

Unauthenticated Role

Normal Login Role

Temporary Role

Quarantine Role

Commonly Used Roles and Their Purpose

Establishing Acceptable Use Policies

Checks, Rules, and Requirements to Consider

Sample HSP Format for Documenting NAC Appliance Requirements

Common Checks, Rules, and Requirements

Method for Adding Checks, Rules, and Requirements

Research and Information

Establishing Criteria to Determine the Validity of a Security Check, Rule, or Requirement in Your Organization

Method for Determining Which User Roles a Particular Security Requirement Should Be Applied To

Method for Deploying and Enforcing Security Requirements

Defining Network Access Privileges

Enforcement Methods Available with NAC Appliance

Commonly Used Network Access Policies

Summary

Part IV: Cisco NAC Appliance Configuration

Chapter 7. The Basics: Principal Configuration Tasks for the NAM and NAS

Understanding the Basic Cisco NAC Appliance Concepts

NAM Overview

NAM Hardware Installation Requirements

NAM Software Installation Requirements

How to Connect NAM

Performing Initial NAM Configurations

NAC Licensing

NAM GUI Description

NAS Overview

NAS Hardware Installation Requirements

NAS Software Installation Requirements

NAS Software License Requirement

How to Connect NAS

Performing Initial NAS Configurations

NAS GUI Description

Configuring NAS Deployment Mode

In-Band Deployment Options

Out-of-Band Deployment Options

Understanding NAS Management Within the NAM GUI

Global Versus Local Settings

Global Settings

Local NAS Settings

Adding Additional NAS Appliances

Summary

Chapter 8. The Building Blocks: Roles, Authentication, Traffic Policies, and User Pages

Configuring User Roles

Creating Custom Roles

Editing or Deleting a Custom Role

Configuring Role Assignment

Creating a Local User and Assigning a Role

Assigning a Role by VLAN

Assigning a Role by MAC and IP Address

Assigning a Role by Subnet

Assigning a Role by External Authentication Source Attributes

Role Mapping Summary

Configuring Authentication

Creating Admin Users and Groups

Creating an Admin Group

Creating an Admin User

Adding External Authentication Sources

Adding a RADIUS External Authentication Source

Adding an LDAP/AD External Authentication Source

Configuring and Creating Traffic Policies

IP-Based Traffic Control Policy

Host-Based Traffic Control Policy

Bandwidth Policies

Customizing User Pages and Guest Access

Login Pages

Guest Access

API for Guest Access

Summary

Chapter 9. Host Posture Validation and Remediation: Cisco Clean Access Agent and Network Scanner

Understanding Cisco NAC Appliance Setup

Cisco NAC Appliance Updates

General Setup

Web Login

Agent Login

Certified Devices

Certified List

Add Exempt Device

Add Floating Device

Timer

Cisco Clean Access Agent

Agent Installation Process

Sample Agent Installation

Agent Distribution

Alternative Agent Installation Methods

Agent Policy Enforcement

Requirements, Rules, and Checks

Creating and Enforcing a Requirement

Creating Checks

Creating a Custom Rule

Network Scanning

Nessus Plug-Ins

Scanning Setup

Vulnerability Handling

User Agreement Configuration

Testing the Scanning Setup

Summary

Chapter 10. Configuring Out-of-Band

Out-of-Band Overview and Design

User Access Method

Switch Support

Central Deployment Mode or Edge Deployment Mode

Layer 2 or Layer 3

Gateway Mode for NAC Appliance Server

Simple Network Management Protocol Trap to Trigger the NAC Process

Port-Based VLAN Assignment or User Role–Based VLAN Assignment

Sample Design and Configuration for Layer 2 Out-of-Band Deployment

Step 1: Configuring the Switch

Configuring VLAN Trunking Protocol and VLANs

Configuring SVIs

Configuring the Switch as a DHCP Server

Configuring Fa1/0/1—The Interface Connecting the NAC Appliance Manager eth0 Port

Configuring Fa1/0/3—The Interface Connecting the Trusted Port (eth0) of NAC Appliance Server

Configuring Fa1/0/4—The Interface Connecting the Untrusted Port (eth1) of NAC Appliance Server

Configuring Fa1/0/5—The Interface Connecting the Host

Configuring Simple Network Management Protocol

Step 2: Configuring NAC Appliance Manager

Step 3: Configuring NAC Appliance Server

Step 4: Logging In to NAC Appliance Manager

Step 5: Adding NAC Appliance Server to NAC Appliance Manager

Step 6: Editing Network Settings on NAC Appliance Server

Step 7: Configuring VLAN Mapping

Step 8: Configuring Managed Subnets

Step 9: Configuring a Switch Group

Step 10: Configuring a Switch Profile

Step 11: Configuring a Port Profile

Step 12: Configuring the SNMP Receiver

Step 13: Adding a Switch to NAC Appliance Manager

Step 14: Configuring Ports to Be Managed by NAC

Step 15: Configuring User Roles

Step 16: Configuring User Authentication on the Local Database

Step 17: Testing Whether OOB and User Role–Based VLAN Assignment Works

Sample Design and Configuration for Layer 3 Out-of-Band Deployment

Step 1: Configuring the Switches

Configuring the Central Switch

Configuring the Edge Switch

Step 2: Configuring NAC Appliance Manager

Step 3: Configuring NAC Appliance Server

Step 4: Logging In to NAC Appliance Manager

Step 5: Adding NAC Appliance Server to NAC Appliance Manager

Step 6: Editing Network Settings on NAC Appliance Server

Step 7: Configuring Static Routes

Step 8: Configuring a Switch Group

Step 9: Configuring a Switch Profile

Step 10: Configuring a Port Profile

Step 11: Configuring the SNMP Receiver

Step 12: Adding the Switch to NAC Appliance Manager

Step 13: Configuring Ports to Be Managed by NAC Appliance

Step 14: Configuring User Roles

Step 15: Configuring User Authentication on the Local Database

Step 16: Changing the Discovery Host

Step 17: Configuring the Web Login Page

Step 18: Testing Whether OOB and User Role–Based VLAN Assignment Works

Additional Out-of-Band Considerations

Summary

Chapter 11. Configuring Single Sign-On

Active Directory Single Sign-On Overview

Supported Devices for AD SSO

Basic AD SSO Configuration Steps

Configuring Single Sign-On for Windows AD

NAM Configuration

NAS Configuration

Layer 3 3550 Core Switch Configuration

3500XL Edge Layer 2 Switch Configuration

Active Directory or Domain Controller Configuration

Beginning Overall Setup

Adding an AD Server as an AD SSO Auth Server

Configuring Traffic Policies and Ports in the Unauthenticated Role for AD Authentication

Configuring AD SSO Settings in NAS

Configuring the AD Server and Running the ktpass Command

Enabling Agent-Based Windows AD SSO

Enabling GPO Updates

(Optional) Adding LDAP Lookup Server to Map Users to Multiple Roles

LDAP Browser (Not Required but Very Helpful)

Configuring LDAP Lookup Server in NAM

User Attributes in Active Directory

Enabling DHCP in NAS

Enabling User Login Pages in NAM

NAC Agent Download and Login

Configuring Single Sign-On for VPN

ACS Setup

ASA-5510 VPN Setup

Configuring NAS to Support VPN SSO

Configuring Single Sign-On for Cisco Wireless LAN Controller

ACS Server Setup

WLC Setup

NAM/NAS Setup

Summary

Chapter 12. Configuring High Availability

High Availability on NAC Appliance Manager

High Availability on NAC Appliance Server

Example of a High Availability Configuration for NAC Appliance Manager and Server

Adding NAC Appliance Managers in High Availability Mode

Adding a CA-Signed Certificate to the Primary NAC Appliance Manager

Generating a Self-Signed Temporary Certificate on the Primary NAC Appliance Manager

Adding a Certificate to the Secondary NAC Appliance Manager

Configuring High Availability for NAC Appliance Managers

Adding NAC Appliance Servers in High Availability Mode

Configuring the eth2 Interfaces

Configuring the Primary Server for High Availability

Configuring the Secondary Server for High Availability

Setting Up DHCP Failover on NAC Appliance Servers

Troubleshooting HA

Summary

Part V: Cisco NAC Appliance Deployment Best Practices

Chapter 13. Deploying Cisco NAC Appliance

Pre-Deployment Phase

Executive Summary

Scope

Vision

NAC Appliance Overview (Diagram)

Host Security Policy

Business Drivers for Deployment

Deployment Schedule

Resources

New Equipment

Support Plan

Communication Plan

Cisco NAC Appliance Training

Deployment Plan Overview

Proof of Concept Phase

Pilot Phase

Production Deployment Phases

Production Deployment Phase 1: Initial Introduction to User Community

Production Deployment Phase 2: Implementing Host Security Policy Checks Without Enforcement

Production Deployment Phase 3: Host Security Policy Enforcement

Summary

Part VI: Cisco NAC Appliance Monitoring and Troubleshooting

Chapter 14. Understanding Cisco NAC Appliance Monitoring

Understanding the Various Monitoring Pages and Event Logs

Summary Page

Discovered Clients and Online Users Pages

Discovered Clients Page

Online Users Page

Event Logs

Understanding and Changing Logging Levels of NAC Appliance

SNMP

Understanding Monitoring of Web Login and Clean Access Agents

Clean Access Agent Reports

Certified List

Manually and Automatically Clearing the Certified List

Requiring Certification for Every Login

Summary of the Behavior of the Certified List

Monitoring the Status of NAC Appliance Manager and NAC Appliance Servers

Manager and Server Monitoring Using the Linux CLI

Manager and Server Monitoring Using the Web GUI

Summary

Chapter 15. Troubleshooting Cisco NAC Appliance

Licensing Issues

Adding NAS to NAM

Policy Issues

Agent Issues

Out-of-Band Issues

Single Sign-On Issues

AD SSO

VPN and Wireless SSO

High Availability Issues

Useful Logs

NAM Logs

NAS Logs

Additional Logs

Common Issues Encountered by the Help Desk in the First 30 Days

Users Not Being Able to Get a Web Login Page, or the NAC Appliance Agent Not Popping

Users Not Being Able to Authenticate

Users Getting Stuck in the Quarantine or Temporary Role

Users Not Being Put in the Correct VLAN or Not Getting Access to Certain Resources

Summary

Appendix. Sample User Community Deployment Messaging Material

Sample NAC Appliance Requirement Change Notification E-Mail

Sample NAC Appliance Notice for Bulletin Board or Poster

Sample NAC Appliance Letter to Students

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset