Building and Managing a Secure BYOD Environment
Download
Report
Transcript Building and Managing a Secure BYOD Environment
Break-1659 – Building and Managing
a Secure BYOD Environment
Tuesday, Mar 12, 9:45 AM - 10:45 AM
Timothy Guy- Solutions Architect
Brad Garczynski -Systems Engineer
Building and Managing a Secure BYOD Environment
One to one initiatives have flooded k-12 classrooms with
new devices. The cost associated with these devices
continues to pose a large financial burden.
It is widely thought that allowing students to bring his or
her device into the classroom (BYOD) would dramatically
reduce this burden.
The challenge is to incorporate a management solution that
provides a secure and effective BYOD environment
• Discussion Topics:
– How to properly secure a BYOD environment
– How to deliver educational content across various
devices
– Allowing secure device access to district applications
How did we get here?
3
Topics
– How did we get here Story
– Right Priority, Unpopular Message
– Identity Service Engine (ISE) 101
– Live ISE Demo of ISE - Dynamic ACL/Dynamic
Vlans/Web Auth/Reporting/User Integration
– Mobile Device Management Solutions (MDM)
– Live CX Next Generation of firewalls for
applications
– Questions
Right Priority, Unpopular Message
1. Solid, switched, virtualized network
2. Pervasive RF in all areas where students will be
focused, with Central Web Authorization
3. Internet capacity to allow consumption without
frustration & ensure filtering is accurate
4. High capacity virtualized server environment for
applications
5. Add Identity Services posture and profile services to
Authorization with NCS Prime for Management
6. Utilize an MDM for rapid deployment
ISE 101
6
7
Solutions Overview
9
1
1
1
1
1
What we have done so far….
Start
Here
Single
Service
no
Access-Reject
yes
Access-Accept
1
What is the flow of a Policy in ISE…
Start Here
Registered
Guest
No
Student
No
Access-Reject
Yes
Yes
i-Device
Yes
No
Registered
Device
No
Yes
Access-Accept
Internet Only
1
Live Demo of ISE
– Dynamic ACL
– Dynamic Vlans
– Web Authentication
– Reporting
– User Integration
ISE Deep Dive
1
ISE Personas
Administration Node
– Interface to configure policies
Monitoring Node
– Interface for logging and report data
Policy Service Node (PSN)
– Engine that makes policy decisions
Network Access Device (NAD)/Inline Posture Node
– Interface that queries Policy Service node and enforces policy
External Attribute Stores
– Interface to retrieve policy or policy information
Basic 2-Node ISE Deployment
(Redundant)
Maximum endpoints – 2000
Redundant sizing - 2000
ISE Node
Primary
Admin
ISE Node
Admin
Admin
Secondary
Admin
Monitoring
Monitoring
Primary
Monitoring
Policy
Service
Policy
Service
Secondary
Monitoring
Distributed Deployment
•Administration + Monitoring on same
appliance; Policy Service on dedicated
appliance
• 2 x Admin+Monitor
• Max 5 PSNs
• Max 10k endpoints
Admin
Mon
Admin
Mon
Policy
Svcs
Policy
Svcs
Policy
Svcs
Policy
Svcs
Policy
Svcs
Typical ISE Deployment
Example Small School District
A/S Admin, Monitoring,
Policy Service nodes
AD/LDAP
(External ID/
Attribute Store)
HA Inline Posture
Nodes
Campus A
ASA VPN
WLC
802.1X
Switch
802.1X
AP
Branch B
Branch A
AP
Switch
802.1X
AP
Switch
802.1X
Typical ISE Deployment
Example Medium 2 Building Campus
A/S Admin +
Monitoring
nodes
Policy Service Cluster
AD/LDAP
(External ID/
Attribute Store)
Distributed Policy
Service node
HA Inline Posture
Nodes
Campus A
Campus B
ASA VPN
Distributed Inline
Posture Node
WLC
Switch
802.1X
WLC
Switch
802.1X
AP
AP
Branch B
Branch A
AP
Switch
802.1X
AP
Switch
802.1X
Mobile Device Management
2
Cisco
Prime
Infrastructure
Mobility
Services Engine
w/ Assurance
(MSE)
Catalyst
Switches
Mobile Device
Management
Identity
Services Engine
(ISE)
Cisco
WLC
Cisco
AnyConnect
Wired Network
Wireless Network
Remote Access
Network
2
ISE & MDM Are Complimentary
Mobile + PC
Classification/
Profiling
Secure Network Access
(Wireless, Wired, VPN)
AUP
Registration
User <-> Device
Ownership
Cert + Supplicant
Provisioning
Context-Aware Access Control
(Role, Location, etc.)
= Network Enablement (ISE)
Enterprise Software
Distribution
Management
(Backup, Remote Wipe,
etc.)
Policy Compliance
(Jailbreak, Pin Lock, etc.)
Secure Data
Containers
Inventory
Management
= Mobile Device Management
2
Mobile Device Management Flow
Multi Context NG Firewall
2
Multiple Context’s -One Firewall
BYOD
Segments
Student
Wired
Segments
Guest
Segments
Closing discussion
– Topics to take away and respond to
Leave you with these questions
• What is your BYOD policy?
• Where are your BYOD roadmap?
• How do you know what is on your network any given
time? And what they are doing?
• How do you allow contractors access to your network?
• How do you profile devices?
• How do you ensure data loss prevention in devices?
• How would you minimize the risk of your rollout of
802.1X implementation without risking outages?
• How would you segment data center access?
Reference Slides
Solution: Cisco TrustSec
Remote VPN
User
Wireless User
VPN User
Devices
Devices
VLANs
Guest Access
Profiling
Posture
Identity-Enabled
Infrastructure
dACLs
SGTs
Scalable Enforcement
Policy-Based Access
and Services:
Identity Services
Engine (ISE)
Data Center Intranet
Internet
Security
Zones
Netech
Demo at
End of
Presentation
Device Profiling – 1st defense
• Allows different access levels to be
automatically applied to different devices,
even when using the same credentials.
– For example:
• Mobile devices = Internet + AirPlay
• Laptops allowed full access with posture assessment
– No need for certificates, etc.
– Can isolate or deny access to certain device types
as well
Posture assessment – 2nd defense
• Performs additional checks to verify the
workstation is yours before allowing full
network access
– Can validate just about anything on the device
before allowing network access
Inline Posture Node High Availability
Remote Access Example
ISE Inline
ACTIVE
ASA HA: A/S or
VPN Cluster
VLAN 11
eth1
Internet
Router
VPN Client HA: VPN
to single ASA HA IP
or VPN Cluster IP
External
Switch
eth2 (HB Link)
VLAN 12
ASA
vpn
outside
inside
ISP A
VLAN 15
L3 Switch
VLAN 14
FO
Link
Internet
VPN
User
eth0
Inline
Service IP
eth1
State
Link
Trunk:
VLANs
11-15
Inline
Service IP
eth0
Internal
Network
ISP B
inside
outside
Internet
Router
VLANS
• VLAN 11: (ASA VPN; Inline node untrusted)
• VLAN 12: (Inline node trusted)
• VLAN 13: (Inline Heartbeat Link)
• VLAN 14: (ASA Inside)
• VLAN 15: (Internal Network)
External
Switch
ASA
vpn
L3 Switch
eth1
VLAN 12
eth0
eth2 (HB Link)
VLAN 11
ASA Redundant
Links
ISE Inline
STANDBY
School Issues Addressed by CS
School Issue
Student
Mobile Device Management on Cloud
• For Cloud Based Solutions, Bandwidth and Latency will
need to be considered.
• Scalability = 30 Calls per second.
• Survivability:
– If the MDM is not available, the rule will not match.
– Will (by default) stick the user in the “Register with MDM”
state.
• Ability for administrator and user in ISE to issue remote
actions on the device through
– the MDM server (eg: remote wiping the device)
• MyDevices Portal
– Endpoints Directory in ISE
Mobile Device Management API
• With the API, we can query on:
–
–
–
–
–
–
General Compliant or ! Compliant (Macro level) -orDisk encryption is one
Pin lock
Jail broken
Bulk re-check against the MDM every 4 hours.
But we are not using the cached data in the AuthZ
• If result of Bulk Re-check shows that a device is
no longer compliant – we will send a CoA Change
of Authorization to terminate session.
• Works same with all 4 vendors.
Mobile Device Management Solutions
– Cisco Published Specs to 4 vendors
•
•
•
•
AirWatch 6.2
Mobile Iron 5.0
ZenPrise 7.1
Good Version 2.3
– Require API to be open
– Only one MDM at a time
Local LAN Auth Example
Monitoring - Distributed Log
Collection
•
•
•
•
ISE supports distributed log collection across all nodes to optimize local data
collection , aggregation, and centralized correlation and storage.
Each ISE node collects logs locally from itself; Policy Service nodes running Profiler
Services may also collect log (profile) data from NADs.
Each node buffers and transports collected data to each Monitoring node as Syslog
NADs may also send Syslog directly to Monitoring node on UDP/20514 for activity
logging, diagnostics, and troubleshooting.
NADs
HTTP SPAN,
DHCP
SPAN/Helper/Proxy
Policy Service
Nodes
Netflow,
SNMP Traps,
RADIUS
Syslog
(UDP/20514),
Profiler Syslog
(UDP/30514)
Monitoring
Nodes
External Log
Servers
Alarm-triggered
Syslog
External Log Targets: Syslog (UDP/20514)
Syslog (UDP/20514)
Administration HA and Synchronization
• Changes made via Primary Administration DB are automatically synced to
Secondary Administration and all Policy Service nodes.
Policy Service
Node
Admin Node
(Secondary)
Policy Sync
Policy Service
Node
Admin Node
(Primary)
Policy Sync
Policy Service
Node
Admin
User
Logging
Monitoring
Node (Primary)
Monitoring
Node (Secondary)