802.1x Port Authentication via TACACS+ or RADIUS

Download Report

Transcript 802.1x Port Authentication via TACACS+ or RADIUS

802.1x Port Authentication
via RADIUS
By Oswaldo Perdomo
cs580 Network Security
What is 802.1x ?
Defined by IEEE and designed to
provide port-based network access.
 802.1x authenticates network clients
using information unique to the client
and with credentials known only to
the client.


Service known as port-level
authentication
Benefits of 802.1x
802.1x is a LAN access control.
 802.1x introduces the ability to
provide Authentication,
Authorization, and Accounting (AAA)
for LAN access using a standard
approach.

802.1x Framework

The framework is defined by 3
authentication processes:
1.
The supplicant
•
2.
The authenticator
•
3.
Possibly a standalone device or an end user,
such as a remote user.
A device to which the supplicant directly
connects and through which the supplicant
obtains network access permission
The authentication server
•
The authenticator acts as a gateway to the
authentication server, which is responsible for
actually authenticating the supplicant.
What is EAP ?

EAP




Extensible Authentication Protocol
A flexible protocol used to carry arbitrary authentication
information
Typically rides on top of another protocol such as 802.1x or
RADIUS/TACACS+, etc.
EAP Messages

Request
• Sent to supplicant to indicate a challenge

Response
• Supplicant reply message

Success
• Notification to supplicant of success

Failure
• Notification to supplicant of failure
Benefits of EAP-TLS
Authentication




Password’s are not used at all.
Instead TLS public key is used.
AAA Server authenticates client, but client
can also authenticate AAA Server
AAA Server receives certification from
client, verifies authenticity of certification
using CA public key, then verifies bearer
identity using TLS handshake
EAP over 802.1x Frame
Format
Diagram of EAP-TLS
Authentication
Benefits 802.1x with Cisco
Secure ACS



Flexible authentication options using public
key infrastructure (PKI), tokens, smart
cards, and in the future, biometrics.
Flexible policy assignment, such as per-user
session quotas, time of day, and virtual LAN
(VLAN) assignment
Identity-based session accounting and
auditing, which enables tracking of client
network usage.
Configuring the Switch for
802.1x Port Authentication





















GV-Rack1>s2
Translating "s2"
Trying s2 (1.1.1.1, 2015)... Open
Rack1S2>enable
Rack1S2#config t
Enter configuration commands, one per line. End with CNTL/Z.
Rack1S2(config)#hostname mytest
mytest(config)#aaa new-model
mytest(config)#aaa authentication dot1x default group radius
mytest(config)#interface fastethernet0/1
mytest(config-if)#dot1x port-control auto
mytest(config-if)#radius-server host 10.252.252.252 auth-port 1812 key cisco
mytest(config)#end
mytest#s
12:06:37: %SYS-5-CONFIG_I: Configured from console by console
mytest#show dot1x
Sysauthcontrol
= Disabled
Supplicant Allowed In Guest Vlan = Disabled
Dot1x Protocol Version
=1
Dot1x Oper Controlled Directions = Both
Dot1x Admin Controlled Directions = Both












































Catalyst 3550 series
Configuration File
mytest#show running-config
Building configuration...
Current configuration : 2267 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname mytest
!
aaa new-model
aaa authentication dot1x default group radius
!
ip subnet-zero
!
no ip domain-lookup
!
spanning-tree mode pvst
spanning-tree extend system-id
!
interface FastEthernet0/1
switchport mode dynamic desirable
dot1x port-control auto
spanning-tree portfast
!!
interface Vlan1
no ip address
shutdown
!
ip classless
ip http server
!
radius-server host 10.252.252.252 auth-port 1812 acct-port 1813 key cisco
radius-server retransmit 3
!
line con 0
exec-timeout 0 0
logging synchronous
line vty 5 15
!
!
end
The Network
EAP Port Configuration
EAP-TLS Configuration
Configure Authentication
Server Authorization Policy
Install ACS Certificate
Install ACS Certificate Cont.
Configure Authenticator &
Authentication Server
Configure Supplement &
Authorization Policy
Configure Supplement &
Authorization Policy Cont.
Configuring The Logging
Scheme
Any Questions ?