+ All Categories
Home > Documents > Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless...

Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless...

Date post: 04-Jun-2018
Category:
Upload: buikhue
View: 222 times
Download: 1 times
Share this document with a friend
29
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco TrustSec & Identity Services Engine: Securely Enabling Your Business with Policy based access control Atif Azim Product Marketing Manager Dec 2011 Cisco Confidential
Transcript
Page 1: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1Cisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1

Cisco TrustSec & Identity Services Engine:Securely Enabling Your Business with Policy based access control

Atif AzimProduct Marketing Manager

Dec 2011

Cisco Confidential

Page 2: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

Agenda

• Industry Transformations and Business Drivers

• Introduction to Cisco TrustSec

• The Cisco TrustSec Advantage

• High Level Design Overview

• Deployment Best Practices

• Call to Action

Page 3: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

How do I control who and what access the network?

Page 4: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

The Evolving Workplace Landscape

Our Users Have New Expectations

OLD SCHOOL

EXECUTIVE

EMPLOYEE

IT

• Anywhere, anytime,

any device usage

• Work is a function—

globally dispersed, mixed device ownership

• Change in IT control and management

paradigm—granularity

beyond device

• Enterprise provided

mobile devices

• Work is a place you

go to—limited off

campus access

• IT visibility and control

into user devices and

applications

NEW SCHOOL

Page 5: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

The Challenge with Access Control

BUSINESS IMPERATIVES

SECURITY IMPERATIVES

―Who and what is on my network?‖

―I need to segment network and DC

assets to limit the scope of compliance

―I need to onboard consumerized

IT devices to enable new services‖

―I need to enable a productive global and

mobile workforce

―We must be compliant with regulations

and able to show it‖

―Can I Manage the Risks of BYOD‖

Page 6: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

Network Engineer• How do I troubleshoot

Access problems?

• How do I separate

device issues from network

and policy issues?

• How do I ensure user

experience?

Applications Team• How do I ensure consistent experience on all devices?

• How to troubleshoot App vs Network vs Device issues?

• How do we ensure Application interoperability?

Security Ops • How do I secure my data

as it moves to the cloud?

• How do I secure my

virtual desktops?

• How do I implement

multiple security policies

per user, device?

Compliance Ops• How do I ensure compliance

with SOX, HIPAA, etc?

• How do I monitor real time

usage for full accountability

Network Ops• What devices are on my

networks?

• Which users are using

what devices?

• How do I support guests on

my network?

The Burden Falls on IT

Endpoint Team• How and what do I support?

• How do I ensure my

endpoints are compliant?

Page 7: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

The Ultimate Access Control Solution

INTELLIGENT

EFFICIENT

SECURE

Comprehensive Contextual Awareness

of the Who, What, Where, When, How

Centralized Secure Access Services

and Scalable Enforcement

Complimenting Your Network

Secures access to your critical resources,

mitigating risk and ensuring compliance

Lower Total Cost of Ownership

Page 8: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

Introducing Cisco TrustSec

Effective

Management

Exceptional

Control

Comprehensive

Visibility

IP DevicesRemote VPN User

Wireless / Guest User Employee VM Client

Data Center

Identity and

Context aware infrastructure

Intranet

Scalable Enforcement

InternetSecurity Zones

Securely Enables Your Business with Policy based access control

Page 9: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

Cisco TrustSec Architecture

WHENWHAT

WHERE

HOWWHO

Identity

Security Policy Enforcement

Monitoring and Reporting

Application Controls

Security Policy

Attributes

Centralized Policy Engine

Business-Relevant

Policies

User and Devices

Dynamic Policy & Enforcement

Identity and Context Centric Security

Page 10: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

Cisco TrustSec Solution Portfolio

Policy Information

Policy Administration

Policy Decision

Policy EnforcementCisco 2900/3560/3700/4500/6500 and Nexus 7000

switches, Wireless and Routing InfrastructureCisco ASA, ISR, ASR 1000

Identity Access Policy System

Identity Services Engine (ISE)

NAC Agent

No-Cost Persistent and Temporal Clients for

Posture, and Remediation

Web AgentAnyConnect or

OS-Embedded Supplicant

802.1x Supplicant

Identity-Based Access Is a Feature of the Network

Spanning Wired, Wireless, and VPN

TrustSec Powered

TrustSec Powered

Page 11: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Comprehensive VisibilityIdentity and Context Awareness

Ide

ntity

an

d C

on

text

Aw

are

Info

rma

tio

n

Context

LocationUser Type PostureAccess TypeDevice Type

Identity

Cisco Switches, Routers, Wireless Access Points

Guest Access

Profiling

Posture

802.1X

MAB

WebAuth

Vicky Sanchez

Employee, Marketing

Wireline

3 p.m.

Frank Lee

Guest

Wireless

9 a.m.

Security Camera G/W

Agentless Asset

Chicago Branch

Francois Didier

Consultant

HQ—Strategy

Remote Access

6 p.m.

Identity (802.1X)-Enabled Network

Personal iPad

Employee Owned

Wireless HQ

Page 12: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

Authentication Methods

Identity AwarenessLeveraging your Infrastructure Network

Network Device

802.1X

IP PhonesAuthorized Users

Cisco®

Catalyst® Switch

Guests

MAB and

Profiling

Web Auth

Flexible Authentication

Multiple methods

Configurable order and priority of

methods

Monitor Mode

IEEE 802.1x MAC Auth Bypass Web Authentication

Co

mp

rehe

nsiv

e V

isib

ility

Standard for link layer authentication and access control

Components: supplicant (client), authenticator (switch), and AAA server

Uses Extensible Authentication Protocol (EAP) to transport authentication info.

Authenticate using the client’s MAC address

For devices that don’t support 802.1X(no supplicant), such as printers.

For clients that don’t support 802.1X(no supplicant), but are capable for interactive HTTP authentication

Page 13: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

CDPLLDP

DHCP

MAC

CDPLLDP

DHCP

MAC

DEVICE CLASSIFICATION

PRINTER Video Phone

Printer Policy

[place on VLAN X]

Video Phone Policy

[restricted access]

ISE

POLICY

Collection—Switch

collects device related data and sends report to ISE

Classification—ISE

classifies device, collects flow information and provides device usage report

Authorization—ISE

executes policy based on user and device

Deployment Scenario with Cisco Device ProfilingEfficient Device

Classification Leveraging

Infrastructure

Context Awareness : Device ProfilingAutomated Device Classification using Cisco Infrastructure

Access

Point

Profiling for both wired and wireless devices

Co

mp

rehe

nsiv

e V

isib

ility

Page 14: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

Context Awareness: Posture AssessmentISE Posture Ensures Endpoint Health before Network Access

Temporary Limited

Network Access Until Remediation Is

Complete

Non-Compliant

Wired, Wireless,

VN User

Sample Employee Policy:

• Microsoft patches updated

• McAfee AV installed, running, and current

• Corp asset checks

• Enterprise application running

Co

mp

rehe

nsiv

e V

isib

ility

Page 15: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

Context Awareness: Guest ManagementISE Guest Service for managing guests

Provision: Guest Accounts via

Sponsor Portal

Notify: Guests of Account

Details by Print, Email, or SMS

Manage: Sponsor Privileges, Guest Accounts and Policies, Guest Portal

Report: On All Aspects of Guest Accounts

Guests

Web Authentication

Guest Policy:

• Wireless or wired access

• Internet-only access

Internet

Co

mp

rehe

nsiv

e V

isib

ility

Page 16: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

DevicesRemote

VPN UserWireless

UserVPN User Devices

Delivers Policy-based Enforcement

Exceptional Control

Policy-Based Access ControlScalable Enforcement

VLANs

Access Control Lists

Secure Group Tags

Data Center Intranet InternetSecurity Zones

MACSec Encryption

X

X

X

X

X

Page 17: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

TrustSec Authorization and Enforcement

DACL or Named ACL Security Group

Access

VLANS

ContractorGuest

VLAN 4

Employee

VLAN 3

Remediation

Employees

IP Subnet

IP Any

Security Group Access – SXP,

SGT, SGACL, SGFW

Exce

ption

al C

on

tro

l

Flexible Enforcement Mechanisms in your infrastructure

Range of options available to customer

Page 18: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

Policy Enforcement Through the NetworkSource Group Access

Employee

Partner

Group users

independent of IP

address and location

Packets are

tagged based on context

(i.e. location, posture,

device, user)

Scalable Enforcement

independent of

network topology

Tag assigned at

first network egress

point

The Solution

Confidential

Unrestricted for

Employees/Partners

Guest

Internet

Scalable and simplified

management with a

single policy per group

Exce

ption

al C

on

tro

l

Page 19: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

CORPORATE RESOURCES

MACSec Encryption Data Protection with Policy-Based Encrypted Access

Visibility into the flows for Security

and QoS policy enforcementData Confidentiality

with Visibility

Hop by Hop L2

encryption

The Solution Typical Deployment Scenario

Cipher DataIn the Clear

Cipher Data

802.1AE Encrypted

802.1AE Encrypted

Decrypt OnIngress Interface

Encrypt On

Egress Interface

Flows visible

for policy

enforcement

Security Group Tag

integrity

Exce

ption

al C

on

tro

l

Page 20: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

Effective ManagementUnified (Wired, Wireless, Policy) Management

• Converged Security and Policy

Monitoring

Contextual status and monitoring dashboards

• Centrally organizes Day 1-to-n

management tasks

Instructional configuration workflows

• Reduces the time to troubleshoot

Integration with Cisco NCS Prime

Eff

ec

tive

Ma

na

ge

me

nt

Page 21: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

TrustSec Packaging and Licensing

New TrustSec Features in

Existing Switch Packaging:

Campus (Cat 3K/4K):

• LAN Base – 802.1X, SXP, IOS sensor, MACSec

• IP Base – SGT, SGACL

Aggregation (Cat 6K):

• IP Base – 802.1X, SXP, SGT, SGACL

Router (ASR 1K/ISR):

• Base packaging –SXP• Advanced/Security – SG FW

Data Center (Nexus):

• Advanced LAN License → Base

Package

Optional Client

Anyconnect

Built into

Headend

Optional

client

Appliance Platforms

Are my endpoints authorized?

Are my endpoints compliant?

• Authentication / Authorization

• Guest Provisioning

• Link Encryption Policies

• Device Profiling

• Host Posture

• Security Group Access

Small 3315/1121 | Medium 3355 | Large 3395 | Virtual Appliance

ISE Base License ISE Advanced License

Base + Advanced

• All Base Services

• All Advanced Services

ISE Wireless License

Note: Advanced License does not include Base

Perpetual Licensing 3 / 5 Year Term Licensing 5 Year Term Licensing

Page 22: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

TrustSec Advantages:Different from Competitors

One Policy for Wired, Wireless and VPN

Integrated Lifecycle Services (Posture, Profiling, Guest)

Differentiated Identity Features (Multiple Auth Methods, Flexible

Sequencing Auth)

Phased Approach to Deployments—i.e. Monitor Mode

Flexible and Scalable Authorization Options

Encryption to Protect Communications and SGT Tags

Page 23: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

ISE Nodes and Personas

TrustSec Deployment

Persona – One or

more of the

following:

• Administration

• Monitoring

• Policy Service

Single ISE Node

(appliance or VM)

OR

ISE

ISE

Inline Posture

PolicyService

MonitoringAdmin

Single Inline

Posture Node

(appliance only)

Page 24: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Centralized Deployment

All ISE Persona’s deployed in a single site

ISE Persona’s deployed across multiple sites

Distributed Deployment

Page 25: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

Services

Planning

Proof of Concept

Pilot Deployment (Size: 1 segment or 1 floor)

No Enforcement (Monitor Mode)

Enforcement (Low Impact Mode)

Supplicant Provisioning RADIUS Setup Switch Setup

Expansion

Review & Adjust

Review & Adjust

(Size: Multi-Floor, Bldg.)

Typical TrustSec deployment Scenario

Plan in advance and keep user experience impact as minimum as possible

Deployment Overview

Page 26: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

TrustSec Project involves Network Team, Security Team, and Desktop Team

Planning Phase Discussions:

What to manage (Managed/Unmanaged Device)

Policy Definition: Security Level, Trade-offs

HA design, Disaster Recovery Plan

Phase Goal, Max Endpoint

Device Type, OS Type, Supplicant Type, Authentication Methods, current credential store Type (backend DB type)

Project Overview and Organizational Ownership

OS Type, Supplicant Choice, Auth Type and other application restriction

Network Device

AAA Infrastructure

Current directory service

Service Requirement

“Project starts with Network / Infra team. Later on, security team is involved. And at last we realized we needed to talk with Desktop team in first place…”

Getting Ready for Your Deployment

Page 27: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

TrustSec™– Securely Enables Your Business with Policy based access control

―Visibility and Control‖

―ISE Advanced + Base‖

Offer

―BYOD–Bring Your

Own Device‖

―ISE Wireless‖ Offer,

Expand to Wired

Secure Access to Your Network Now!

―Secure Data Center‖

Identity/SGA +

ISE Advanced

Page 28: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

Thank you.

Page 29: Cisco TrustSec & Identity Services Engine · ―We must be compliant with regulations ... Wireless and Routing Infrastructure Cisco ASA, ... Context Aware Policy ct lc c l rk Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

Management Services Partners

Application Programming Interfaces

Secure

Endpoin

t

Secure

Virtu

al and C

loud

Cisco Infrastructure

ControlVisibility Con text

Network

CloudIn tegrated Overlay

Context Aware Enforcement

Context Aware Policy

Acce

ss C

on

tro

l

Acce

ss C

on

tro

l

Tru

stS

ec

Tru

stS

ec

AnyC

onnect

Nexus 1

K a

nd C

loud

Connecte

d N

etw

ork

Cisco Secure Intelligence Operations (SIO) Threat Intelligence


Recommended