Challenges Implementing Network Access Control
Challenges Implementing Network Access Control
ll
Fu
GIAC GCIA Gold Certification
ns
ai
Author: Joseph F. Matthews, [email protected]
Advisor: Dave Hoelzer
et
Accepted: August 23rd 2017
rR
ho
ut
Abstract
,A
te
itu
Network Access Control had always offered the hope of solving so many network
st
In
security problems but has proven quite difficult to implement. NAC was to solve the
NS
issues of visibility, control, and compliance enforcement. This paper seeks to demonstrate
through research and implementation an effective and practical way for small to medium-
SA
sized businesses to move to NAC and take advantage of the security benefits of a 3-6
e
gh
Ri
1. Introduction
ll
Fu
1.1. NAC Explained
ns
Designed to improve security on networks, Network Access Control, also known
ai
as NAC, restricts access and resource availability to only authorized devices. Many
et
companies use NAC to manage guest and contractor access. NAC provides data and
rR
resource restriction aiding in meeting compliance requirements. Additionally, NAC
ho
pushes organizations to have a complete device inventory for asset management
ut
("Network access control: Security advice for enterprise CIOs," n.d.).
,A
The basis of this paper, including the research and the elements presented, is
te
based on real-life testing and Proof of Concept (POC) implementation within a singular
itu
environment with long-term planned deployment across the company. The POC will
st
determine the feasibility of implementing each proposed NAC solution. The scope of this
In
environment, to show why these decisions for a NAC implementation might be beneficial
SA
elsewhere. Where possible and practical, implementation steps and instructions will be
included to aid in successful duplication and implementation of the NAC technology.
e
Th
NAC was originally just an authentication technology solution and now has
20
Evolution of Network Access Control,” states that NAC has evolved into a broader
Security Automation and Orchestration (SA&O) solution. Companies are facing stronger
regulatory requirements such as HIPAA, SEC/SOX, PCI DSS, and others. These
requirements include strict network access control and data protection. Companies must
secure all endpoints or possibly face hefty fines that can reach millions of dollars per
violation; this can be achieved through the utilization of NAC. Figure 1 below, shows the
evolution of NAC graphically. NAC 1.0's focus was the onboarding of company owned
devices. NAC 2.0 focused on network protection while allowing the use of BYOD (Bring
Your Own Device). NAC's current phase of evolution into an SA&O now coordinates
endpoint visibility, control, and automated response to reduce threat response time.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 3
gh
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
The new SA&O systems verify the user and device identity and check the system
SA
for risk. Then, the systems will assign network rights based on predefined policies as
shown in Figure 2. The four levels shown are No Access, Guest Access, Restricted
e
Th
Access and Unrestricted access. The SA&O system periodically re-verifies the risk level
and automatically adjusts the devices access level based on the risk.
17
20
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 4
gh
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
st
integrator solution. BYOD and IOT have forced the growth and the need for automation
SA
2. Implementation
17
2.1. Requirements
20
The Center for Internet Security (CIS) Critical Security Controls Version 6.1’s,
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 5
gh
Ri
ll
Fu
ns
ai
et
rR
Figure 3: Critical Security Control #1
ho
ut
The requirements for the Proof of Concept NAC implementation include:
,A
• 100% view of all devices on the network, or ones attempting to connect to the
te
network
itu
2.2. Vendors
20
The three vendors picked for evaluation are Portnox, Cisco and Bradford Networks.
©
Each vendor offers differing approaches to the Network Access Control problem and
represents different quadrants of the Gartner Magic Quadrant report as shown in Figure 4
below from 2014. The Gartner Magic Quadrant report is based Gartner's research and
ranks businesses based on "Completeness of Vision" and their "Ability to Execute" their
proposed solution.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 6
gh
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
17
2.2.1. Portnox:
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 7
gh
Ri
IOS, Android, and macOS. Clear includes an onboard configuration for 802.1X
supplicants. A supplicant is software required on endpoints that allow them to participate
ll
Fu
in the 802.1X authentication process. It also calculates a risk score for devices based on
attributes, including applications, encryption, open ports, and updates. Clear operates as a
ns
standard/simple app and not an MDM profile; it allows administrators to identify the
ai
et
device, its owner, its compliance status. Clear also allows administrators to see all visited
rR
Wi-Fi networks. The Core solution can also enforce NAC policies in wired, wireless
VPN, VMware environments. Core monitors and graphically represents the number of
ho
VMs in use, as well as policy enforcement for these VMs by blocking or allowing access
ut
to virtual switches. Portnox Clear and Core support visibility, control and management of
,A
all devices and users in the network. (Neiva & Orans, 2017)
te
itu
required, fewer device resources are utilized. Portnox Core Solution creates a template of
NS
each item and aligns it to a signature. Therefore, 802.1x is not a requirement for their
proposed solution. The licensing model of the Core product is determined by the number
SA
WMI calls. Core requires an account with enough rights to collect WMI information. An
17
additional requirement is the Portnox Core manager must have access to all computer
20
systems to extract the compliance information. The Portnox Dashboard shown below in
figure 5 is the initial information screen within Portnox Core. The dashboard contains
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 8
gh
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
Figure 5: Portnox Dashboard View
itu
2.2.2. Cisco:
st
(http://www.cisco.com/c/en/us/products/security/identity-services-
NS
available on two platforms hardware appliances and virtual servers. Their profile feed
17
Cisco ISE uses the pxGrid framework, allowing ISE to integrate with Cisco’s
©
security products and third-party technologies. Cisco packages its NAC posture agent
with baseline capabilities in its AnyConnect endpoint bundle. The agent aids in the
unification of additional capabilities, such as VPN, NetFlow, MACsec, Supplicant, Cisco
Umbrella and Advanced Malware Protection (AMP). Certificate authority ability and
Active Directory multi-domain are new capabilities within ISE. (Neiva & Orans, 2017).
Cisco’s offering of ISE is very complex and robust; companies can add modules
and additional integration points to enhance the product. As with most Cisco products,
each additional items or additional functionality added requires an additional license.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 9
gh
Ri
Their “Base” license allows device authorization to utilize ISE. For printers that do not
support a supplicant the addition of a "Plus" license is a Cisco license requirement. For
ll
Fu
endpoint compliance, the initial "Base" license and an additional "Apex" license is a
Cisco requirement. Below is Cisco ISE's console view, it contains several items including
ns
a system summary, endpoint breakdown, how many authentications are occurring and
ai
et
how many network devices ISE is managing. The view is customizable per user; this
rR
allows a network admin to tailor their view differently than an incident response team
member.
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
17
20
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
0
Ri
includes Automated response workflow. Bradford Networks’ also offers a mobile
application that can perform limited mobile device management (MDM) capabilities. It
ll
Fu
includes jailbreak, device and OS detection.
ns
Bradford added integration with Tenable in 2016. The integration with Tenable
ai
allows sharing of vulnerability data with Network Sentry’s correlation engine. The
et
integration helps by increasing the number of trust factors and assigns priority to enforce
rR
policy-based threat containment. Sentry and Cyphort are integrated, which enables
ho
automated malware analysis, and threat triage and response. Network Sentry’s security
ut
parser supports many third-party security solutions. Bradford Networks is securing
,A
network and facilities infrastructure devices on top of a myriad of vendor network
switching environments. (Neiva & Orans, 2017).
te
itu
switches is one requirement. Network Sentry polls and collects connection information
In
via SNMP. To manage and control port access, Network Sentry uses Secure Shell
NS
Version 2 (SSH2) and Command Line Interface (CLI). Endpoint inventory and
SA
classification occurs by fingerprinting the devices. MDM, AD, LDAP integration for
additional device information is available. The more information and classification points
e
used, the harder it becomes for an attacker to spoof a device. Bradford also offers a
Th
dissolvable agent for BYOD devices. The dissolvable agent is temporarily installed from
17
a web portal; it performs user and device authentication and additional checks. Once the
20
dissolvable agent performs all necessary checks, it uninstalls. No agent or software is left
©
in place on the users BYOD device. Dissolvable agents are used in place of the
permanent agent recommended by Cisco, or the WMI calls utilized by Portnox. Bradford
Networks Sentry can also collect compliance information by utilization of their
executable at login. The executable call integrates into in a login script. Execution time is
minimal during the login process. Bradford's use of the login script gives them a slight
advantage over Portnox and Cisco because they do not require a known username and
password like Portnox and do not require and additional client installation as Cisco does.
Below is the Dashboard view for Bradford's Network Sentry. The dashboard contains
alarms, network and host summaries and performance information, giving a quick
consolidated view of the environment.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
1
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
3. NAC Challenges
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
2
Ri
3.2. Implementation Approach
Companies and organizations should consider which implementation approach is
ll
Fu
the best for their particular environments by answering the following questions: Will a
full implementation of NAC or a phased implementation be the best approach? Would it
ns
be best to start with the Guest environment and then gradually bring in other areas, or
ai
et
would it be best to implement fully across the environment? What are the benefits of
rR
each? What are the drawbacks of each? What impact will it have on the network and the
user base?
ho
ut
Portnox's getting started guide, version 2.5, recommends that regardless of the
,A
size and breadth of the network to separate the deployment into several steps. It does not
te
matter if the network is small and composed of just a few switches and a router or if it is
itu
a larger enterprise network. The network can be a standard LAN, wireless LAN, or
st
WAN. It could be using public and private cloud or other external services. Virtual
In
servers or VoIP enabled, it does not matter, break it into steps, start with a representative
NS
environment. After initial data collection, classification of the devices that are connected
would occur then the configuration of pre-connect rules followed by configuration of post
17
connect rules. Signature/behavior based activity triggers the post network connect
20
All three vendors recommend a phased approach that has minimal impact on the
user base. The only drawback would be the time delay in completing each phase. Based
on the information and recommendation from all three vendors, a full implementation
from day one with full lockdown would create significant disruption to the environment
and offer no benefit except an accelerated deployment timeline. Therefore, the best
approach is a phased implementation.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
3
Ri
a. Out-of-band
b. In-line
ll
Fu
c. Appliance
ns
ai
Out-of-band devices do not sit directly inline with network traffic. The out-of-
et
band device eliminates the worry of taking the network down when the device becomes
rR
overloaded. Another benefit of out-of-band is there is no chance the device will start
ho
blocking traffic based on a false positive.
ut
In-line devices sit directly in line. They must be able to handle the maximum
,A
throughput of the network segment. One advantage of in-line is no traffic passes without
te
first being inspected. The primary concern with in-line is it can take the network segment
itu
Appliances can be either out-of-band or in-line. They can also be a hybrid of both.
The advantage of an appliance deployment is the vendor will pre-configure all settings
NS
and ship the appliance to the customer. The customer must connect the device to their
SA
Below are three examples of each of the implementation methods available with
Th
the solution. CMU's main concern was placing a device inline and possibly disrupting
access for their students and faculty.
Ball State University went with a different approach. They chose a software-based
solution and utilized Microsoft Network Access Protection (NAP). NAP comes as a
feature of Windows Server 2008 since Ball State is already a Microsoft shop, so the only
costs incurred were setting up five new servers. Ball State estimates a savings of about
$75,000 per year in support and maintenance.
The University of San Francisco chose a hybrid NAC solution. They deployed an
in-line NAC solution from Cisco for their dorms. Later Pereira's team expanded the
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
4
Ri
deployment, adding an out-of-band system for the dorms. Their primary concern was that
the dorms have the highest network traffic and potentially the most infected computers.
ll
Fu
They are now using the original inline system on their wireless network. ("Network
access control: Security advice for enterprise CIOs," n.d.)
ns
ai
The three vendors that were chosen and reviewed for this research all now offer
et
Virtual Machine (VM) solutions that are out-of-band. Either the vendor can provide a
rR
VM image, or as Portnox suggests, the company can create their own VM and install the
ho
Core application. The VM’s use SNMP and CLI to control the switches in a network
ut
environment. Mirror or Span ports are no longer required. By directly communicating
,A
with the switches, this eliminates the possibility of a bottleneck slowing network traffic.
All three vendors provided the same advice, to utilize their virtualized solutions.
te
itu
st
4. Portnox POC
In
4.1. Preparation
NS
In preparation for the POC a server, meeting the minimum specs shown
SA
previously in Figure 4, had to be set up and configured. The next step was to configure
the test switch to output SNMP traps to the static IP address configured on the server.
e
Th
17
20
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
5
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
e
After the pre-configuration steps, the next procedure is to start the software setup.
20
The software had several prerequisites; these are on the ISO provided and installed
©
automatically. After installation of the prerequisites, the system required a reboot before
continuing the installation process. During the installation, the technician should record
the administrator password and the ports utilized. Installation is straightforward and
relatively quick. The systems required another reboot.
After installation, utilize the Portnox monitor to confirm that all services are
running as shown in Figure 9. Then it is time to define the first switch and start device
identification.
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
6
Ri
ll
Fu
ns
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
7
Ri
Figure 11 shows the switch view; each port is clickable to go directly to the
configuration and management page for the specific port. Information includes the details
ll
Fu
of the device and whether it passed or failed the compliance check. Granting access for
failed devices to meet specific needs occurs at the port management page.
ns
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
5. Conclusion
©
Research and review of three vendors and their premiere solutions Portnox Core,
Cisco Identity Services Engine and Bradford Networks Network Sentry occurred. The
vendors were compared and evaluated based on the POC and NAC implementation
requirements specified below. Each of the three vendors quickly scheduled
demonstrations after initial contact. Each vendor received the requirements for the POC
and NAC implementation. These include:
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
8
Ri
• Central management of the NAC solution
Ease of use through automation
ll
•
Fu
• The solution cannot be labor intensive
ns
• Granular rule enforcement and control
ai
• Automatic onboarding of new systems and guests
et
• Confirm compliance control of company owned equipment
rR
• Must be able to handle printers, IOT, BYOD, VoIP, etc.
ho
ut
Chart 1 below shows a side by side comparison of how each vendor rated based
,A
on the requirements. te
Portnox Cisco Bradford Networks
itu
Core ISE Sentry
3, Cisco depends on
from the switches, any connection from the switches, any connection
or attempting to connect to the network its supplicant
or attempted connection is known or attempted connection is known
In
Ease of use through automation 5, Fully automatable 5, Fully automatable 5, Fully automatable
The solution cannot be labor intensive rules can trigger any event ruleset is limited to rules can trigger any event
Th
Granular rule enforcement and control Management roles are very Management roles are very
Management roles are limited.
granular. granular.
20
After reviewing all three vendors, Portnox was the vendor chosen to perform the
POC based on cost, integration, usability, and manageability. Their product is very
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 1
gh
9
Ri
simple to acquire, deploy, configure and start auditing. After the initial phase, policies are
required to utilize enforcement. Portnox is very granular in the ability to perform almost
ll
Fu
any task after triggering a rule or alert. Initial NAC implementation is possible in a large
environment in less than 30 days with Portnox. Achieving full policy and compliance
ns
enforcement within 60 days is possible.
ai
et
rR
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
17
20
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 2
gh
0
Ri
References
ll
Andrus, F. (2012, July 7). Understanding the Difference Between 802.1x and NAC |
Fu
Bradford Networks. Retrieved from
ns
https://www.bradfordnetworks.com/understanding-the-difference-between-802-
ai
1x-and-nac/
et
Boscolo, C. (2008). How to implement network access control. Retrieved from
rR
http://www.computerweekly.com/opinion/How-to-implement-network-access-
ho
control
ut
Center for Internet Security. (2016, August 31). Retrieved from
,A
https://www.cisecurity.org/critical-controls.cfm
te
Cisco Network Admission Control (NAC) Solution Data Sheet - Cisco. (2017, January
itu
http://www.cisco.com/c/en/us/products/collateral/security/nac-appliance-clean-
In
access/product_data_sheet0900aecd802da1b5.html
NS
Hickey, A. R. (2006, November 3). Network access control: Should you implement now?
SA
http://www.cisco.com/en/US/solutions/ns340/ns394/ns171/ns466/ns617/net_desig
17
n_guidance0900aecd8040bbd8.pdf
20
Neiva, C., & Orans, L. (2017, May 9). Market Guide for Network Access Control.
©
Retrieved from
https://www.gartner.com/doc/3708117?ref=SiteSearch&sthkw=market%20guide
%20for%20network%20access%20control&fnl=search&srcId=1-3478922254
Network access control -- More than endpoint security. (n.d.). Retrieved from
http://searchnetworking.techtarget.com/report/Network-access-control-More-
than-endpoint-security?offer=briefcase
Network access control: Security advice for enterprise CIOs. (n.d.). Retrieved from
http://searchcio.techtarget.com/Network-access-control-Security-advice-for-
enterprise-CIOs
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.
ts
Challenges to Implementing Network Access Control 2
gh
1
Ri
Network Admission Control Software Configuration Guide - Cisco Systems. (n.d.).
Retrieved from
ll
Fu
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_configuration_g
uide09186a00805764fd.html
ns
ai
et
Snyder, J. (2010, May 24). NAC: What went wrong? | Network World. Retrieved from
rR
http://www.networkworld.com/article/2209345/security/nac--what-went-wrong-
.html
ho
Snyder, J. (2010, May 24). Cisco's NAC goes off track, customers taken aback | Network
ut
World. Retrieved from
,A
http://www.networkworld.com/article/2209367/security/cisco-s-nac-goes-off-
te
track--customers-taken-aback.html
itu
https://www.pluralsight.com/blog/it-ops/switchport-security-configuration
In
https://www.pluralsight.com/blog/it-ops/switchport-security-concepts
SA
e
Th
17
20
©
Matthews, Joseph
© 2017 The SANS Institute Author retains full rights.