Implementing 8021x Authentication
Implementing 8021x Authentication
Implementing 8021x Authentication
1X Authentication
Deniz Kaya Microsoft, Cisco, Ironport Trainer CCSI, CCNP, MCT, MCSE, ICSI, ICSP, CPTS
Teleworker
Cable Provider
VPN Head-End
Partner/Vendor
Airport
Library
One physical network, must accommodate multiple logical networks (user groups) each with own rules.
Unauthorized Users/Devices
Authorized Users/Devices
Equivalent to placing a Security Guard at each Switch Port Only Authorized users can get Network Access Unauthorized users can be placed into Guest VLANs Prevents unauthorized APs
Authentication Server
AAA/RADIUS Server
802.1x Header
EAP Payload
What is RADIUS?
RADIUS The Remote Authentication Dial In User Service A protocol used to communicate between a network device and an authentication server or database. Allows the communication of login and authentication information. i.e.. Username/Password, OTP, etc. Allows the communication of arbitrary value pairs using Vendor Specific Attributes (VSAs).
UDP Header RADIUS Header
EAP Payload
Actual Authentication Conversation Is between Client and Auth Server Using EAP; the Switch Is Just a Middleman, but Is Aware of Whats Going on
RADIUS acts as the transport for EAP, from the authenticator (switch) to the authentication server (RADIUS server) RADIUS is also used to carry policy instructions back to the authenticator in the form of AV pairs.
VLAN 10
Active Directory
Login and Certificate Services
User logon
User credentials available (use user credentials)
User authentication success User authentication failure
User logoff
Why do we care?
Pre-802.1x this worked under the assumption that network connectivity was a given. Post-802.1x the blocking of network access prior to 802.1x authentication breaks the machine based group policy model UNLESS the machine can authenticate using its own identity in 802.1x .
Same for wired and wireless Provides control over computer and guest authentication EAP method setting
What is EAP?
EAP The Extensible Authentication Protocol A flexible protocol used to carry arbitrary authentication information.
EAP
PEAP
MS-CHAPv2 TLS
TLS
MD5
IKE
GSS_API
Kerberos
method layer
EAP
EAP layer
PPP
802.3
802.5
802.11
Other
media layer
Random challenge
R = MD5(password,challenge)
Uses both user and computer certificates Certificates deployed through autoenrollment, Web enrollment, certificate import, or manual request using the Certificates snap-in Local computer store is always available The user store (for a current user) is only available after a successful user logon
Managing user certificates stored on local hard drives can be difficult, and some users may move among computers.
Password-based authentication not all networks have a PKI deployment. Single sign-on (SSO). Enables both machine and user authentication. Windows logon credentials can be automatically used (default setting), or credentials can be provided by user.
Solaris
7920
Apple
Windows XP Yes Windows 2000 Yes (SP3 + KB) Linux Yes HP-UX Yes Solaris - Yes HP Printers Yes Windows 98 Limited Windows NT4 Limited Apple yes IP Phones yes WLAN APs yes .
IP Phones
WLAN APs
Pocket PC
802.1x
Port based network access control
Falls under 802.1 NOT 802.11 This is a NETWORK standard, not a wireless standard Is PART of the 802.11i draft Provides Network Authentication, NOT encryption