ptg7481339 Cisco Network Admission Control, Volume II: NAC Network Deployment and Troubleshooting Jazib Frahim, CCIE No. 5459, Omar Santos, David White, Jr., CCIE No. 12021 ptg7481339 Cisco Press Cisco Press 201 West 103rd Street Indianapolis, IN 46290 USA ii Cisco Network Admission Control, Volume II NAC Framework Deployment and Troubleshooting Jazib Frahim, CCIE No. 5459, Omar Santos, David White, Jr., CCIE No. 12021 Copyright © 2007 Cisco Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without writ- ten permission from the publisher, except for the inclusion of brief quotations in a review. Library of Congress Catalog Card Number: 2004114756 Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 First Printing November 2006 ISBN: 1-58705-225-3 Warning and Disclaimer ptg7481339 This book is designed to provide information about the Cisco NAC Framework. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco. Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital- ized. Cisco Press or Cisco cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e-mail at [email protected]. Please make sure to include the book title and ISBN in your message. We greatly appreciate your assistance. iii Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information please contact: U.S. Corporate and Government Sales 1-800-382-3419 [email protected] For sales otuside the U.S. please contact: International Sales [email protected] Publisher Paul Boger Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Executive Editor Brett Bartow Production Manager Patrick Kanouse Development Editor Andrew Cupp Project Editor Tonya Simpson Copy Editor Krista Hansing Editorial Services, Inc. Technical Editors Darin Miller John Stuppi Publishing Coordinator Vanessa Evans Book Designer Louisa Adair Cover Designer Louisa Adair Composition Carlisle Publishing Services Proofreader Chrissy White Indexer Julie Bess ptg7481339 iv About the Authors Jazib Frahim,CCIE No. 5459, has been with Cisco Systems for more than seven years. With a Bache- lor’s degree in computer engineering from Illinois Institute of Technology, he started out as a TAC engi- neer with the LAN Switching team. He then moved to the TAC Security team, where he acted as a technical leader for the security products. He led a team of 20 engineers as a team leader in resolving complicated security and VPN technologies. Jazib is currently working as a Senior Network Security Engineer in the Worldwide Security Services Practice of Cisco’s Advanced Services for Network Secu- rity. He is responsible for guiding customers in the design and implementation of their networks, with a focus in network security. He holds two CCIEs, one in Routing and Switching and the other in Security. He also authored the Cisco Press book Cisco ASA: All-in-one Firewall, IPS, and VPN Adaptive Security Appliance (ISBN: 1-58705-209-1). Additionally, Jazib has written numerous Cisco online technical documents and has been an active member on Cisco’s online forum, NetPro. He has presented at Net- workers on multiple occasions and has taught many onsite and online courses to Cisco customers, part- ners, and employees. Jazib is currently pursuing a Master of Business Administration (MBA) degree from North Carolina State University. Omar Santos is a Senior Network Security Consulting Engineer in the Worldwide Security Services Practice of Cisco’s Advanced Services for Network Security. He has more than 12 years of experience in secure data communications. Omar has designed, implemented, and supported numerous secure net- works for Fortune 500 companies and the U.S. government, including the United States Marine Corps ptg7481339 (USMC) and Department of Defense (DoD). He is also the author of the Cisco Press book Cisco ASA: All-in-one Firewall, IPS, and VPN Adaptive Security Appliance(ISBN: 1-58705-209-1) and many Cisco online technical documents and configuration guidelines. Prior to his current role, he was a technical leader of Cisco’s Technical Assistance Center (TAC), where he taught, led, and mentored many engi- neers within the organization. He is an active member of the InfraGard organization, a cooperative undertaking between the Federal Bureau of Investigation and an association of businesses, academic institutions, state and local law-enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructures of the United States of America. Omar has also delivered numerous technical presentations to Cisco customers, partners, and other organizations. David White, Jr., CCIE No. 12021, has more than ten years of networking experience with a focus on network security. He is currently an Escalation Engineer in the Cisco TAC, where he has been for more than six years. In his role at Cisco, he is involved in new product design and implementation and is an active participant in Cisco documentation, both online and in print. David holds a CCIE in Security and is also NSA IAM certified. Before joining Cisco, David worked for the U.S. government, where he helped secure its worldwide communications network. He was born and raised in St. Petersburg, Florida, and received his Bachelor’s degree in computer engineering from the Georgia Institute of Technology. v About the Technical Reviewers Darrin Miller is an engineer in Cisco's security technology group. Darrin is responsible for system- level security architecture. He has worked primarily on policy-based admission and incident response programs within Cisco. Previous to that Darrin conducted security research in the areas of IPv6, SCADA, incident response, and trust models. This work has included protocol security analysis and security architectures for next-generation networks. Darrin has authored and contributed to several books and whitepapers on the subject of network security. He has also spoken around the world at lead- ing network security conferences on a variety of topics. Before his eight years at Cisco, Darrin held var- ious positions in the network security community. John Stuppi, CCIE No. 11154, is a Network Consulting Engineer for Cisco Systems. John is responsi- ble for creating, testing, and communicating effective techniques using Cisco product capabilities to provide protection and mitigation options to Cisco customers facing current or expected security threats. John also advises Cisco customers on incident readiness and response methodologies and assists them in DoS and worm mitigation and preparedness. John is a CCIE and a CISSP, and he holds an Informa- tion Systems Security (INFOSEC) professional certification. In addition, John has a BSEE from Lehigh University and a Master of Business Administration degree from Rutgers University. John lives in Ocean Township, New Jersey, with his wife, Diane, and his two wonderful children, Thomas and Allison. Dedications ptg7481339 I would like to dedicate this book to my parents, Frahim and Perveen, who support and encourage me in all of my endeavors. I would also like to dedicate it to my siblings, including my brother, Shazib; my sisters, Erum and Sana; my sister-in-law, Asiya; and my cute nephew, Shayan; and my newborn niece, Shiza, for their patience and understanding during the development of this book. —Jazib I would like to dedicate this book to my lovely wife, Jeannette, and my two beautiful children, Hannah and Derek, who have inspired and supported me throughout the development of this book. I would also like to dedicate this book to my parents, Jose and Generosa. Without their knowledge, wisdom, and guidance, I would not have achieved many of my goals. —Omar I would like to dedicate this book to my wife, Holly, who has patiently put up with me (or the lack of me) during this writing process. And to our newborn son, Blake, who reminds us every day how much joy can be found in small things. I would also like to dedicate this to my loving parents, David and Connie, who have always supported me and pushed me to strive for perfection and to be the best I can be. And to my sister, Patricia, who is a true genius and someone I have always looked up to. Finally, I would not be the person I am without the strong influence that Jimmy Collins, Art and Shirley Cheek, and Brenda Markland have had on my life. To each, I am eternally grateful. —David vi Acknowledgments Wewould like to thank the technical editors, John Stuppi and Darrin Miller, for their time and technical expertise. They verified our work and provided recommendations on how to improve the quality of this manuscript. Special thanks go to Jay Biersbach for reviewing this book before final editing. We would like to thank the Cisco Press team, especially Brett Bartow and Andrew Cupp, for their patience, guidance, and consideration. Their efforts are greatly appreciated. Additionally, special thanks go to the NAC product and development teams, especially to Russell Rice, Jason Halpern, David Anderson, Thomas Gary Howard, and Darrin Miller for their unlimited support. Many thanks to our managers, William Beach, Ken Cavanagh, Mike Stallings, and Joe Dallatore, for their continuous support throughout this project. Finally, we would like to acknowledge the Cisco TAC. Some of the best and brightest minds in the net- working industry work there, supporting our customers often under very stressful conditions and work- ing miracles daily. They are truly unsung heroes, and we are all honored to have had the privilege of working side by side with them in the trenches of the TAC. This Book Is Safari Enabled The Safari® Enabled icon on the cover of your favorite technology book ptg7481339 means the book is available through Safari Bookshelf. When you buy this book, you get free access to the online edition for 45 days. Safari Bookshelf is an electronic reference library that lets you easily search thousands of technical books, find code samples, download chapters, and access technical information whenever and wherever you need it. To gain 45-day Safari Enabled access to this book: • Go to http://www.ciscopress.com/safarienabled • Complete the brief registration form • Enter the coupon code KICN-3ZJD-SDBH-RUD6-TDNM If you have difficulty registering on Safari Bookshelf or accessing the online edition, please e-mail [email protected]. vii Contents at a Glance Part I NAC Overview 3 Chapter 1 NAC Solution and Technology Overview 5 Part II Configuration Guidelines 27 Chapter 2 Cisco Trust Agent 29 Chapter 3 Cisco Secure Services Client 91 Chapter 4 Configuring Layer 2 NAC on Network Access Devices 123 Chapter 5 Configuring Layer 3 NAC on Network Access Devices 155 Chapter 6 Configuring NAC on Cisco VPN 3000 Series Concentrators 175 Chapter 7 Configuring NAC on Cisco ASA and PIX Security Appliances 211 Chapter 8 Cisco Secure Access Control Server 241 Chapter 9 Cisco Security Agent 323 Chapter 10 Antivirus Software Integration 343 Chapter 11 Audit Servers 355 ptg7481339 Chapter 12 Remediation 381 Part III Deployment Scenarios 393 Chapter 13 Deploying and Troubleshooting NAC in Small Businesses 395 Chapter 14 Deploying and Troubleshooting NAC in Medium-Size Enterprises 419 Chapter 15 Deploying and Troubleshooting NAC in Large Enterprise 451 Part IV Managing and Monitoring NAC 479 Chapter 16 NAC Deployment and Management Best Practices 481 Chapter 17 Monitoring the NAC Solution Using the Cisco Security Monitoring, Analysis, and Response System 497 Part V Appendix 543 Appendix A Answers to Review Questions 545 viii Contents Foreword xxi Introduction nxxii Part I NAC Overview 3 Chapter 1 NAC Solution and Technology Overview 5 Network Admission Control 5 NAC: Phase I 7 NAC: Phase II 9 Periodic Revalidation 11 NAC Agentless Hosts 11 NAC Program Participants 12 Components That Make Up the NAC Framework Solution 12 Cisco Trust Agent 12 Cisco Security Agent 14 Network-Access Devices 15 Cisco IOS Router 16 Cisco Catalyst Switch Running Cisco IOS or CAT OS 17 Cisco VPN 3000 Series Concentrator 20 Cisco ASA 5500 Series Adaptive Security Appliance and PIX 500 Series ptg7481339 Security Appliance 21 Cisco Wireless Devices 21 Cisco Secure Access Control Server 22 Event Monitoring, Analysis, and Reporting 23 Summary 24 Review Questions 24 Part II Configuration Guidelines 27 Chapter 2 Cisco Trust Agent 29 Preparing for Deployment of CTA 30 Supported Operating Systems 31 Minimum System Requirements 32 Installation Packages and Files 32 Deploying CTA in a Lab Environment 34 CTA Windows Installation 34 CTA Windows Installation with the 802.1X Wired Supplicant 35 Installing the CTA Admin 802.1X Wired Client 35 Creating a Customized Deployment Package 36 Installing the Customized CTA 802.1X Wired Windows Client 41 ix CTA Mac Installation 42 Extracting the Installation Disk Image 43 Installing CTA on Mac OS X Using the Installation Wizard 43 CTA Linux Installation 45 Installing the CA Certificate 46 Installing a CA Certificate (or ACS Self-Signed Certificate) on Windows 46 Installing a CA Certificate (or ACS Self-Signed Certificate) on Mac OS X 47 Installing a CA Certificate (or ACS Self-Signed Certificate) on Linux 47 Post-Certificate Installation Tasks 47 User Notifications 48 Customizing CTA with the Optional ctad.ini File 48 [main] Section 49 [EAPoUDP] Section 51 [UserNotifies] Section 51 [ServerCertDNVerification] Distinguished Name-Matching Section 53 [Scripting_Interface] Section 55 Example ctad.ini 55 CTA Scripting Interface 57 Requirements for Using the Scripting Interface 58 Step 1: Create a Posture Data File 58 ptg7481339 Step 2: Create an .inf File 60 Step 3: Add Attributes to ACS Dictionary 61 Executing the Scripting Interface 62 CTA Logging Service 63 Creating a ctalogd.ini File 64 Using the clogcli Utility 68 Deploying CTA in a Production Network 70 Deploying CTA on Windows 72 Deploying CTA on Mac OS X 75 Deploying CTA on Linux 76 Troubleshooting CTA 77 Installation Issues 77 Communication Issues 78 System Logs 80 CTA Client Fails to Receive a Posture Token 81 CTA 802.1X Wired Client 82 CTA Wired Client System Report Utility 82 Viewing the Client Logs and Connection Status in Real Time 85 Client Icon Does Not Appear in System Tray 85 Client GUI Does Not Start 85
Description: