SlideShare a Scribd company logo
Holistic identity-
based networking
security approach

An irreducible
dichotomy between
reality and
expectations

  Gaweł Mikołajczyk
  gmikolaj@cisco.com
What this session is about

Holistic - a. Emphasizing the importance of the whole and the interdependence
  of its parts.


Identity-Based Networking Security (IBNS) – concepts including 802.1X,
CPS, CTS, IBNS, NAC, NPF, NAC Framework, NAC Appliance, OneNAC, NAC-
RADIUS, having goal of authenticating the user and machine, allowing access
into the network and providing some more advanced functions


dichotomy between reality and expectations happens when you cannot
achieve what you would like to have. Usually results in pain.
Fundamental IBNS Problem statement

I have a LAN/WAN/WLAN/VPN network,


I would like to authenticate users and their machines connecting to it.


Yeah, it’s been solved 10+ years ago.


But seriously,
...did you try to deploy it (except for WLAN, hands-up please)?
...and succeeded?


        No, but why?
What we were lacking, really?

Usability and phased deployment options
  Open, Low Impact, High Security, IP Telephony, dACL, dVLAN, MDA,
  unmanaged device, Critical, WoL, EAP methods of choice (w/PKI)
Flexible wired/wireless authentication options and ordering of those.
  MAC Authentication Bypass (MAB), 802.1X, Web Authentication (WebAuth)?
  Guests? Provision. Bridge them to the Internet. Segment and AUP control.
System-level testing.
  OS-1 + Supplicant-2 + Switch-3 + RADIUS Server-4
  Funny/Scary, it is totally enough to create a massive DoS + bonus RGE.
  Vendor should prove it works as documented (and is documented)
Guest Deployment and Path Isolation

                                                                     Internet
 Isolation at access layer (port, SSID)
 Layer 2 path isolation:                                                    Outside


     CAPWAP & VLANs for wireless                     Corporate          DMZ                       Firewall
                                                       Intranet
     L2 VLANs for wired                                                 Inside
                                                                                         Guest
                                                                                         DMZ

 Layer 3 isolation: VRF (Virtual
  Routing and Forwarding) to Firewall
                                                                      L3 Switches with VRF
  guest interface

                                                WLC

                                           CAPWAP



                               Corporate
                                                      Corporate
                                                      Access Layer
                                                                                       Guest VRF
                                                                                   Employee VRF
                                                                                        Global
What about context-awareness at ingress?


             User   Device   Place   Posture   Time   Access method   Other
Profiling: The Art of Device Classification

Why Classify?
    Originally: identify the devices that cannot authenticate and automagically build the
       MAB list.
        i.e.: Printer = Bypass Authentication
    Today: Now we also use the profiling data as part of an authorization policy.
        i.e.: Authorized User + i-device = Internet Only
What is performing the data collection and what can be collected?
    Dedicated collection devices or existing infrastructure? Must traffic pass inline?
    CDP/LLDP? SNMP data? DHCP? RADIUS? Packet capture for deeper analysis?
    HTTP user-agent?
    Active Polling/Scanning. NMAP?
Profiler conditions to build your policies upon
      NMAP          DHCP             LLDP          CDP




                                                  Netflow
                                    RADIUS
                    SNMP
     IP
Distributed Profiling: IOS Sensor
    Switch Device Sensor Cache




                                                                     Cisco IP Phone 7945



                                                                     SEP002155D60133



                                                                     Cisco Systems, Inc. IP Phone CP-7945G

                                                                     SEP002155D60133
ISE Profiling result
Profiler Library you can extend and tune




                                           Cont ….
Ingress control is just the beginning

„I have authenticated an endpoint coming to my network.”
It is in the proper VLAN, has (d)ACL applied. I have provided enforcement.
   (BTW. It is easy to overrun hardware ACL TCAM switch resources.)


I want to do with the traffic much more:
   Provide differentiated treatment from the security point of view.


I want to make use of the context in the whole network.
Make all my devices (switches, routers, firewalls...) context-aware.
How to propagate the context information in the network?
Bright idea: looking at IEEE standarization

MACSec is a Layer 2 encryption mechanism (Ratified in 2006)
   802.1AE defines the use of AES-GCM-128 as the encryption cipher.
   Cisco is working to extend to AES-GCM-256
Builds on 802.1X for Key Management, Authentication, and Access Control
802.1X-2010 defines the use of MACSec, MACSec Key Agreement (MKA)
  (Previously 802.1AF), and 802.1AR (Ratified in 2010)
Authenticated Encryption with Associated Data (AEAD)
HW implementations run are very efficient
   1G and 10G line rate crypto currently deployed
Intel AES-NI support in CPU (FIPS 140-2 Validated)
Encrypting everything Hop-by-Hop

Physical MiTM into the access link is
  a feasible attack using very small
  factor PC and others
The attacks have been demonstrated
  (DEFCON19 – A Bridge Too Far).
802.1X EAP authentication phase is
  used to derive the 802.1AE
  session key for encryption.
Encryption can be done in software
  and in hardware on the endpoint.
Switch crypto support in hardware
  is necessary
Massively Scalable Encrypted DataCenter Interconnect
Dual Access with EoMPLS Connectivity
               DC-1                                 DC-2


                   PE Device           PE Device




                vPC                                vPC


                               MPLS



                  PE Device            PE Device
Using 802.1AE for data-plane context (SGT) transport


                                     Authenticated
                                                         Encrypted
   DMAC     SMAC       802.1AE Header    802.1Q    CMD       ETYPE     PAYLOAD        ICV        CRC



       CMD EtherType      Version   Length    SGT Opt Type       SGT Value   Other CMD Options

       Cisco Meta Data
                                                                                   Ethernet Frame field


        802.1AE Header       CMD       ICV       are the 802.1AE + Context (SGT) overhead
    Frame is always tagged at ingress port of Context-(SGT)-capable device
    Tagging process prior to other L2 service such as QoS
    No impact IP MTU/Fragmentation
    L2 Frame MTU Impact:
         ~ 40 bytes, less than baby giant frame (~1600 bytes | 1552 bytes MTU)
How to impose SGT at ingress?

A Role-Based TAG:

1. A user (or device) logs into network
   via 802.1X

2. ISE is configured to send a TAG in
   the Authorization Result – based on
   the “ROLE” of the user/device

3. The Switch Applies this TAG to the
   users traffic.
Data-plane SGT Enforcement with SGACL
                                                                          SGACL allows topology independent
   User A                                     User C
                                                                          access control

                                                                   Even another user accesses on same VLAN as
             10                          30                         previous example, his traffic is tagged differently

                                        Packets are tagged         If traffic is destined to restricted resources, packet will
 Campus Access                          with SGT at ingress         be dropped at egress port of Context-Aware hardware
                                              interface             devices domain



                  Context Hardware                                                    Server A         Server B            Server C
                                                                       SRC DST
                  Enabled Network                                                      (111)            (222)               (333)
                                           SGACL-D is applied         User A (10)     Permit all        Deny all           Deny all
                                              SQL = OK
                                              SMB = NO                User B (20)     SGACL-B          SGACL-C             Deny all

 Data Center                                                          User C (30)     Deny all         Permit all          SGACL-D


                                                                                          SGACL-D
                                                  RADIUS Server                           permit tcp src dst eq 1433
                                                                                          #remark destination SQL permit
                                                                                          permit tcp src eq 1433 dst
  Server A        Server B   Server C      Directory                                      #remark source SQL permit
                                           Service                                        permit tcp src dst eq 80
    111           222         333                                                         # web permit
                                                   SQL traffic                            permit tcp src dst eq 443
                                                   SMB traffic                            # secure web permit
                                                   SGACL                                  deny all
How SGACL Simplifies Access Control
                Security Group           Security Group
       User        (Source)               (Destination)   Servers

                                 SGACL                        D1
      S1           MGMT A                                     D2
                   (SGT 10)
                                           Sales SRV
                                           (SGT 500)
      S2
                   MGMT B                                     D3
                   (SGT 20)

      S3                                    HR SRV            D4
                                           (SGT 600)
                 HR Rep (SGT
                     30)
      S4                                                      D5

                                          Finance SRV
                   IT Admins                                  D6
                                           (SGT 700)
                    (SGT 40)



    This abstracts the network topology from the policy
    Reduces the number of policy rules necessary for the admin
    to maintain
    Allows to overcome traditional access switches TCAM limits
Control-plane (SGT) context transport

Problem statement:
   Not all devices are capable of 802.1AE and SGT
   But, remember the session title – holistic


We need to provide a way to transport context information
   Endpoint IP address to SGT binding


This needs to be separated, it is SecOps world –
   Let’s call this SXP – SGT eXchange Protocol
Security Group Firewalling (SGFW) WAN use case
                                                        SGFW
                                                     Enforcement on
                                                       a headend        SGACL Policies
                                              SXP



                                    Campus
                                    Network

                           SGFW
   IP Address     SGT   Enforcement on
                            a router                                                         Data Center
   10.1.10.1      10
                                                                             SGACL
                                                                 SXP        Enforcement on
                                                                               a switch


                Consistent Classification/enforcement between SGFW and switching.
                SGT allows more dynamic classification in the branch and DC WAN edge
                Valid deployment model on devices lacking hardware MACSec/SGT support
                Scales to thousands of branches
Security Group Firewalling (SGFW) Data Center use case

  Extends the context-awareness Concept to the firewall
  Use Security-Group Tags (SGTss) in your Firewall Policy
  Removes concern of ACE explosion on DC Firewalls


                    Ingress Enforcement                                       Finance (SGT=4)
                                          SGT=100




    802.1X/MAB/Web Auth




  I’m an employee      HR SGT = 100
  My group is HR                                                     Egress Enforcement
                                                                                 HR (SGT=100)
                                               S-IP   User   S-SGT    D-IP   D-SGT   DENY
Context-aware firewalling DC use case



       Source SGT                                 Destination SGT




    Think of making context-aware other network security services:
      intrusion prevention, load-balancing, web security,
      web/file/database application firewalling
Applying Context-awareness to VDI

                                                                                                      Campus Access


• User logs into VM which triggers 802.1x
  authentication
                                                                                                      User A

• Authentication succeeds. Authorization                              RDP
  assigns the SGT for the user.

• Traffic hits the egress enforcement point                       Connection Broker


                                                                                          Auth=OK            Data Center
• Only permitted traffic path (source SGT                                                   SXP
  to destination SGT) is allowed                                        802.1x            SGT=10

                                                   Pools of VMs

                                                                                         WEB Server

                                                                                      Cat4500
                                                                                                               Directory
                           File       Web Server                                                               Service
          SRC  DST
                        Server(111)     (222)
          User A (10)    Permit all    Deny All
                                                                   File Server    WEB Server    SQL Server   ISE
          User B (20)    Deny all     SGACL-C
BYO* – stretching the NetOps and SecOps

  You need to think it over.
  Give the users flexibility to:
     maintain their devices.
     self-provision, register and delete
  They will love you.

 Corp Asset?               AuthC Type            Profile   AuthZ Result

• AD                     • Machine         •   i-Device    • Full Access
  Member?                  Certs?          •   Android     • i-Net only
• Static List?           • User Certs?     •   Windows     • VDI + i-Net
• MDM?                   • Uname/Pwd       •   Other
• Certificate?
Final thoughts – Holistic Context-aware Security



Overlay security, which is network infrastructure-independent
   Confidentiality
   Enforcement and segmentation
   Scale
   Deployment flexibility
   Meaningful use cases
   Maturity


Cisco system-level solution implementation is called Cisco TrustSec..
   For more info, http://cisco.com/go/trustsec
THANK YOU.

More Related Content

PDF
Understanding senetas layer 2 encryption
PDF
Datacryptor Ethernet Layer 2 Rel 4.5
PDF
Elephant & mice flows
PPTX
Openstack@ebay.pptx
PDF
Places in the network (featuring policy)
PDF
PPTX
Nads 2012 itec2012 innovationshowcase 22 may 2012
Understanding senetas layer 2 encryption
Datacryptor Ethernet Layer 2 Rel 4.5
Elephant & mice flows
Openstack@ebay.pptx
Places in the network (featuring policy)
Nads 2012 itec2012 innovationshowcase 22 may 2012

What's hot (17)

PDF
Software Defined Data Centers - June 2012
PDF
SG Security Switch Brochure
PDF
Ieee 802.11 wlan
PDF
Regulatory compliant cloud computing rethinking web application architectures...
PDF
AMTELCO RED ALERT AVAYA Integration
PDF
Apc series product overview may 2012
PDF
Xen summit 2010 extending xen into embedded
PPTX
3com H3 C Solutions
PDF
Security & Virtualization in the Data Center
PPTX
Juniper Wireless Competitive Deep Dive
PDF
Ap6532 spec sheet
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PDF
19080432 rrc-procedures-in-lte-comments-v1
PDF
Security and Virtualization in the Data Center
PPTX
Tns data center presentation
PDF
PDF
Sakar jain
Software Defined Data Centers - June 2012
SG Security Switch Brochure
Ieee 802.11 wlan
Regulatory compliant cloud computing rethinking web application architectures...
AMTELCO RED ALERT AVAYA Integration
Apc series product overview may 2012
Xen summit 2010 extending xen into embedded
3com H3 C Solutions
Security & Virtualization in the Data Center
Juniper Wireless Competitive Deep Dive
Ap6532 spec sheet
Virtual sharp cloud aware bc dr up 2012 cloud
19080432 rrc-procedures-in-lte-comments-v1
Security and Virtualization in the Data Center
Tns data center presentation
Sakar jain
Ad

Similar to Gaweł mikołajczyk. holistic identity based networking approach – an irreducible dichotomy between reality and expectations (20)

PDF
Contrail Enabler for agile cloud services
PPTX
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
PPSX
Service Chaining - Cloud Network Services at Scale
PPTX
OpenStack and OpenFlow Demos
PDF
5G transformation with Open Source (on ONF)
PPTX
14.) wireless (hyper dense wi fi)
PPT
從INTEL技術談網路卡
PPT
Avaya VoIP on Cisco Best Practices by PacketBase
PDF
Building the SD-Branch using uCPE
PPT
Deploying Carrier Ethernet features on ASR 9000
PPT
Deploying Carrier Ethernet Features on Cisco ASR 9000
PDF
Simplifying the secure data center
PDF
10209
PDF
Multi fabric sales motions jg v3
PDF
Securing Millions of Devices
PPTX
Cisco Virtualized Network Services
PDF
Acme Packet Presentation Materials for VUC June 18th 2010
PDF
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
PDF
Virtual firewall framework
PPTX
Netsft2017 day in_life_of_nfv
Contrail Enabler for agile cloud services
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Service Chaining - Cloud Network Services at Scale
OpenStack and OpenFlow Demos
5G transformation with Open Source (on ONF)
14.) wireless (hyper dense wi fi)
從INTEL技術談網路卡
Avaya VoIP on Cisco Best Practices by PacketBase
Building the SD-Branch using uCPE
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
Simplifying the secure data center
10209
Multi fabric sales motions jg v3
Securing Millions of Devices
Cisco Virtualized Network Services
Acme Packet Presentation Materials for VUC June 18th 2010
Challenges of L2 NID Based Architecture for vCPE and NFV Deployment
Virtual firewall framework
Netsft2017 day in_life_of_nfv
Ad

More from Yury Chemerkin (20)

PDF
YURY_CHEMERKIN__NullCon_2013_Conference.pdf
PDF
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
PDF
YURY_CHEMERKIN__I-Society-2013_Proceedings.pdf
PDF
YURY_CHEMERKIN__CYBER_CRIME_FORUM_2012.pdf
PDF
YURY_CHEMERKIN__CONFidence_2013_Conference.pdf
PDF
Security_Compliance_Challenges_On_Clouds.pdf
PDF
DefCamp_2017_Conference_Chemerkin_Yury_-_full.pdf
PDF
YURY_CHEMERKIN__ICITST_2012_Conference.pdf
PDF
YURY_CHEMERKIN__AthCon_2013._Conference.pdf
PDF
YURY_CHEMERKIN_InfoSecurityRussia_2012.pdf.pdf
PDF
YURY_CHEMERKIN__ICITST-2012_Proceedings.pdf
PDF
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
PDF
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
PDF
DefCamp_2015_Conference_Chemerkin_Yury.pdf
PDF
InfoSecurityRussia-_2014_Conferences.pdf
PDF
YURY_CHEMERKIN_NotaCon_2014_Conference.pdf
PDF
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
PDF
Mobile_Security_Challenges_On_Compliance.pdf
PDF
Mobile_Security_From_The_BYOD_Viewpoint.pdf
PDF
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf
YURY_CHEMERKIN__NullCon_2013_Conference.pdf
YURY_CHEMERKIN__ITA_2013_Proceedings.pdf
YURY_CHEMERKIN__I-Society-2013_Proceedings.pdf
YURY_CHEMERKIN__CYBER_CRIME_FORUM_2012.pdf
YURY_CHEMERKIN__CONFidence_2013_Conference.pdf
Security_Compliance_Challenges_On_Clouds.pdf
DefCamp_2017_Conference_Chemerkin_Yury_-_full.pdf
YURY_CHEMERKIN__ICITST_2012_Conference.pdf
YURY_CHEMERKIN__AthCon_2013._Conference.pdf
YURY_CHEMERKIN_InfoSecurityRussia_2012.pdf.pdf
YURY_CHEMERKIN__ICITST-2012_Proceedings.pdf
DefCamp_2016_Chemerkin_Yury_--_publish.pdf
OWASP_Russia_2016_-_Yury_Chemerkin_--_run.pdf
DefCamp_2015_Conference_Chemerkin_Yury.pdf
InfoSecurityRussia-_2014_Conferences.pdf
YURY_CHEMERKIN_NotaCon_2014_Conference.pdf
YURY_CHEMERKIN_HackMiami_2014_Conference.pdf
Mobile_Security_Challenges_On_Compliance.pdf
Mobile_Security_From_The_BYOD_Viewpoint.pdf
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
Programs and apps: productivity, graphics, security and other tools

Gaweł mikołajczyk. holistic identity based networking approach – an irreducible dichotomy between reality and expectations

  • 1. Holistic identity- based networking security approach An irreducible dichotomy between reality and expectations Gaweł Mikołajczyk gmikolaj@cisco.com
  • 2. What this session is about Holistic - a. Emphasizing the importance of the whole and the interdependence of its parts. Identity-Based Networking Security (IBNS) – concepts including 802.1X, CPS, CTS, IBNS, NAC, NPF, NAC Framework, NAC Appliance, OneNAC, NAC- RADIUS, having goal of authenticating the user and machine, allowing access into the network and providing some more advanced functions dichotomy between reality and expectations happens when you cannot achieve what you would like to have. Usually results in pain.
  • 3. Fundamental IBNS Problem statement I have a LAN/WAN/WLAN/VPN network, I would like to authenticate users and their machines connecting to it. Yeah, it’s been solved 10+ years ago. But seriously, ...did you try to deploy it (except for WLAN, hands-up please)? ...and succeeded? No, but why?
  • 4. What we were lacking, really? Usability and phased deployment options Open, Low Impact, High Security, IP Telephony, dACL, dVLAN, MDA, unmanaged device, Critical, WoL, EAP methods of choice (w/PKI) Flexible wired/wireless authentication options and ordering of those. MAC Authentication Bypass (MAB), 802.1X, Web Authentication (WebAuth)? Guests? Provision. Bridge them to the Internet. Segment and AUP control. System-level testing. OS-1 + Supplicant-2 + Switch-3 + RADIUS Server-4 Funny/Scary, it is totally enough to create a massive DoS + bonus RGE. Vendor should prove it works as documented (and is documented)
  • 5. Guest Deployment and Path Isolation Internet  Isolation at access layer (port, SSID)  Layer 2 path isolation: Outside  CAPWAP & VLANs for wireless Corporate DMZ Firewall Intranet  L2 VLANs for wired Inside Guest DMZ  Layer 3 isolation: VRF (Virtual Routing and Forwarding) to Firewall L3 Switches with VRF guest interface WLC CAPWAP Corporate Corporate Access Layer Guest VRF Employee VRF Global
  • 6. What about context-awareness at ingress? User Device Place Posture Time Access method Other
  • 7. Profiling: The Art of Device Classification Why Classify? Originally: identify the devices that cannot authenticate and automagically build the MAB list. i.e.: Printer = Bypass Authentication Today: Now we also use the profiling data as part of an authorization policy. i.e.: Authorized User + i-device = Internet Only What is performing the data collection and what can be collected? Dedicated collection devices or existing infrastructure? Must traffic pass inline? CDP/LLDP? SNMP data? DHCP? RADIUS? Packet capture for deeper analysis? HTTP user-agent? Active Polling/Scanning. NMAP?
  • 8. Profiler conditions to build your policies upon NMAP DHCP LLDP CDP Netflow RADIUS SNMP IP
  • 9. Distributed Profiling: IOS Sensor Switch Device Sensor Cache Cisco IP Phone 7945 SEP002155D60133 Cisco Systems, Inc. IP Phone CP-7945G SEP002155D60133 ISE Profiling result
  • 10. Profiler Library you can extend and tune Cont ….
  • 11. Ingress control is just the beginning „I have authenticated an endpoint coming to my network.” It is in the proper VLAN, has (d)ACL applied. I have provided enforcement. (BTW. It is easy to overrun hardware ACL TCAM switch resources.) I want to do with the traffic much more: Provide differentiated treatment from the security point of view. I want to make use of the context in the whole network. Make all my devices (switches, routers, firewalls...) context-aware. How to propagate the context information in the network?
  • 12. Bright idea: looking at IEEE standarization MACSec is a Layer 2 encryption mechanism (Ratified in 2006) 802.1AE defines the use of AES-GCM-128 as the encryption cipher. Cisco is working to extend to AES-GCM-256 Builds on 802.1X for Key Management, Authentication, and Access Control 802.1X-2010 defines the use of MACSec, MACSec Key Agreement (MKA) (Previously 802.1AF), and 802.1AR (Ratified in 2010) Authenticated Encryption with Associated Data (AEAD) HW implementations run are very efficient 1G and 10G line rate crypto currently deployed Intel AES-NI support in CPU (FIPS 140-2 Validated)
  • 13. Encrypting everything Hop-by-Hop Physical MiTM into the access link is a feasible attack using very small factor PC and others The attacks have been demonstrated (DEFCON19 – A Bridge Too Far). 802.1X EAP authentication phase is used to derive the 802.1AE session key for encryption. Encryption can be done in software and in hardware on the endpoint. Switch crypto support in hardware is necessary
  • 14. Massively Scalable Encrypted DataCenter Interconnect Dual Access with EoMPLS Connectivity DC-1 DC-2 PE Device PE Device vPC vPC MPLS PE Device PE Device
  • 15. Using 802.1AE for data-plane context (SGT) transport Authenticated Encrypted DMAC SMAC 802.1AE Header 802.1Q CMD ETYPE PAYLOAD ICV CRC CMD EtherType Version Length SGT Opt Type SGT Value Other CMD Options Cisco Meta Data Ethernet Frame field  802.1AE Header CMD ICV are the 802.1AE + Context (SGT) overhead  Frame is always tagged at ingress port of Context-(SGT)-capable device  Tagging process prior to other L2 service such as QoS  No impact IP MTU/Fragmentation  L2 Frame MTU Impact: ~ 40 bytes, less than baby giant frame (~1600 bytes | 1552 bytes MTU)
  • 16. How to impose SGT at ingress? A Role-Based TAG: 1. A user (or device) logs into network via 802.1X 2. ISE is configured to send a TAG in the Authorization Result – based on the “ROLE” of the user/device 3. The Switch Applies this TAG to the users traffic.
  • 17. Data-plane SGT Enforcement with SGACL SGACL allows topology independent User A User C access control  Even another user accesses on same VLAN as 10 30 previous example, his traffic is tagged differently Packets are tagged  If traffic is destined to restricted resources, packet will Campus Access with SGT at ingress be dropped at egress port of Context-Aware hardware interface devices domain Context Hardware Server A Server B Server C SRC DST Enabled Network (111) (222) (333) SGACL-D is applied User A (10) Permit all Deny all Deny all SQL = OK SMB = NO User B (20) SGACL-B SGACL-C Deny all Data Center User C (30) Deny all Permit all SGACL-D SGACL-D RADIUS Server permit tcp src dst eq 1433 #remark destination SQL permit permit tcp src eq 1433 dst Server A Server B Server C Directory #remark source SQL permit Service permit tcp src dst eq 80 111 222 333 # web permit SQL traffic permit tcp src dst eq 443 SMB traffic # secure web permit SGACL deny all
  • 18. How SGACL Simplifies Access Control Security Group Security Group User (Source) (Destination) Servers SGACL D1 S1 MGMT A D2 (SGT 10) Sales SRV (SGT 500) S2 MGMT B D3 (SGT 20) S3 HR SRV D4 (SGT 600) HR Rep (SGT 30) S4 D5 Finance SRV IT Admins D6 (SGT 700) (SGT 40) This abstracts the network topology from the policy Reduces the number of policy rules necessary for the admin to maintain Allows to overcome traditional access switches TCAM limits
  • 19. Control-plane (SGT) context transport Problem statement: Not all devices are capable of 802.1AE and SGT But, remember the session title – holistic We need to provide a way to transport context information Endpoint IP address to SGT binding This needs to be separated, it is SecOps world – Let’s call this SXP – SGT eXchange Protocol
  • 20. Security Group Firewalling (SGFW) WAN use case SGFW Enforcement on a headend SGACL Policies SXP Campus Network SGFW IP Address SGT Enforcement on a router Data Center 10.1.10.1 10 SGACL SXP Enforcement on a switch Consistent Classification/enforcement between SGFW and switching. SGT allows more dynamic classification in the branch and DC WAN edge Valid deployment model on devices lacking hardware MACSec/SGT support Scales to thousands of branches
  • 21. Security Group Firewalling (SGFW) Data Center use case Extends the context-awareness Concept to the firewall Use Security-Group Tags (SGTss) in your Firewall Policy Removes concern of ACE explosion on DC Firewalls Ingress Enforcement Finance (SGT=4) SGT=100 802.1X/MAB/Web Auth I’m an employee HR SGT = 100 My group is HR Egress Enforcement HR (SGT=100) S-IP User S-SGT D-IP D-SGT DENY
  • 22. Context-aware firewalling DC use case Source SGT Destination SGT Think of making context-aware other network security services: intrusion prevention, load-balancing, web security, web/file/database application firewalling
  • 23. Applying Context-awareness to VDI Campus Access • User logs into VM which triggers 802.1x authentication User A • Authentication succeeds. Authorization RDP assigns the SGT for the user. • Traffic hits the egress enforcement point Connection Broker Auth=OK Data Center • Only permitted traffic path (source SGT SXP to destination SGT) is allowed 802.1x SGT=10 Pools of VMs WEB Server Cat4500 Directory File Web Server Service SRC DST Server(111) (222) User A (10) Permit all Deny All File Server WEB Server SQL Server ISE User B (20) Deny all SGACL-C
  • 24. BYO* – stretching the NetOps and SecOps You need to think it over. Give the users flexibility to: maintain their devices. self-provision, register and delete They will love you. Corp Asset? AuthC Type Profile AuthZ Result • AD • Machine • i-Device • Full Access Member? Certs? • Android • i-Net only • Static List? • User Certs? • Windows • VDI + i-Net • MDM? • Uname/Pwd • Other • Certificate?
  • 25. Final thoughts – Holistic Context-aware Security Overlay security, which is network infrastructure-independent Confidentiality Enforcement and segmentation Scale Deployment flexibility Meaningful use cases Maturity Cisco system-level solution implementation is called Cisco TrustSec.. For more info, http://cisco.com/go/trustsec