Ibm Tivoli and Cisco Manual de usuario

Busca en linea o descarga Manual de usuario para Hardware Ibm Tivoli and Cisco. IBM Tivoli and Cisco User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 516
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
ibm.com/redbooks
Building a Network
Access Control Solution
with IBM Tivoli and Cisco Systems
Axel Buecker
Richard Abdullah
Markus Belkin
Mike Dougherty
Wlodzimierz Dymaczewski
Vahid Mehr
Frank Yeh
Covering Cisco Network Admission
Control Framework and Appliance
Automated remediation of
noncompliant workstations
Advanced security
compliance notification
Front cover
Vista de pagina 0
1 2 3 4 5 6 ... 515 516

Indice de contenidos

Pagina 1 - Access Control Solution

ibm.com/redbooksBuilding a NetworkAccess Control Solution with IBM Tivoli and Cisco SystemsAxel BueckerRichard AbdullahMarkus BelkinMike DoughertyWlo

Pagina 2

viii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTrademarksThe following terms are trademarks of the International Bu

Pagina 3 - January 2007

82 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshis credentials, the Cisco Secure ACS checks its local user database a

Pagina 4 - “Notices” on page vii

Chapter 4. Armando Banking Brothers Corporation 83Figure 4-3 on page 84 is representative of the ITSO Lab environment used for NAC Appliance deploym

Pagina 5 - Contents

84 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 4-3 Armando Banking Brothers network environment for NAC Appl

Pagina 6

Chapter 4. Armando Banking Brothers Corporation 854.2.3 Application security infrastructureGeneral management and the IT department are aware of th

Pagina 7 - Contents v

86 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe diagram in Figure 4-4 provides a high-level graphical overview of

Pagina 8

Chapter 4. Armando Banking Brothers Corporation 87cluster of IBM HTTP servers and WebSphere® Application Servers providing Internet banking and othe

Pagina 9

88 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the practice of IT security, it is possible to design an extremely

Pagina 10 - Trademarks

Chapter 4. Armando Banking Brothers Corporation 89Configure Security Compliance Manager posture policy.Ample thought time must always be provided fo

Pagina 11 - Admission Control

90 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstalling the Clean Access AgentHighlights the steps for installing t

Pagina 12

Chapter 4. Armando Banking Brothers Corporation 914.4 ConclusionArmando Banking Brothers Corporation (ABBC) is a company with a long history of lea

Pagina 13 - Preface xi

© Copyright IBM Corp. 2005, 2007. All rights reserved. ixPrefaceIn February of 2004, IBM® announced that it would be joining Cisco’s Network Admission

Pagina 14 - Become a published author

92 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 15 - Comments welcome

© Copyright IBM Corp. 2005, 2007. All rights reserved. 93Chapter 5. Solution designIn this chapter we describe the business objectives that drive the

Pagina 16

94 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsimplementation of part two is described in Chapter 7, “Network enforce

Pagina 17 - Summary of changes

Chapter 5. Solution design 955.1 Business requirementsAs described in Chapter 4, “Armando Banking Brothers Corporation” on page 77, Armando Banking

Pagina 18

96 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5.2 Functional requirementsIn this section, the business requirements

Pagina 19 - Architecture

Chapter 5. Solution design 975.2.3 Remediation requirementsExamining the operational maintenance related requirements we found that the following p

Pagina 20

98 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsallows us to warn users if any noncompliance is found and explain the

Pagina 21 - Business context

Chapter 5. Solution design 99ABBC will institute posture-based network admission. Systems deemed in noncompliance will be quarantined and allowed to

Pagina 22 - IBM Integrated

100 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The Security Compliance Manager client is armed with a remediation

Pagina 23 - Compliance & Remediation

Chapter 5. Solution design 101recommend that a process be in place for the normal notification and distribution of required workstation updates and

Pagina 24

x Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe team that wrote this redbookThis redbook was produced by a team of

Pagina 25

102 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsintegrated solution include the Security Compliance Manager client/se

Pagina 26

Chapter 5. Solution design 103with the Web Gateway component to allow for automated remediation at the workstation level without need of having Tivo

Pagina 27

104 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsEstablishing the policy collector parametersAt this point, we have to

Pagina 28 - 1.7 Conclusion

Chapter 5. Solution design 105Although the policy collector appears to be at a peer level with the posture collectors in Figure 5-5, it is actually

Pagina 29

106 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are several parameters of interest:򐂰 The POLICY_VERSION paramet

Pagina 30

Chapter 5. Solution design 107For ABBC we set the parameter to 60 seconds. Effectively this forces the posture status to refresh itself at every cha

Pagina 31 - Architecting the solution

108 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 The HANDLER_ATTRIBUTES parameter (Figure 5-9) establishes the URL w

Pagina 32 - 2.1.1 Architecture overview

Chapter 5. Solution design 109򐂰 The REMEDIATOR_JAR parameter (Figure 5-10 on page 108) tells the class loader where the JAR file is located for the

Pagina 33 - Network Admission Control

110 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfocus on how our posture policy, as established by the Tivoli Securit

Pagina 34

Chapter 5. Solution design 111In the posture validation policies, we check that a client has the correct minimum supported version of CTA installed

Pagina 35 - Security Compliance Manager

Preface xiRichard Abdullah is a Consulting Engineer with Cisco Systems Strategic Alliances. Prior to joining Cisco Systems in 2001, he worked in tec

Pagina 36

112 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsthose users that are in breach of these requirements, and how to reme

Pagina 37 - Compliance query

Chapter 5. Solution design 113Quarantine System Posture Token for a policy violation, he will be mapped to the Quarantine_Engineering_RAC (VLAN14).

Pagina 38 - Remediation handler

114 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Cisco Secure ACS evaluates each of the authorization rules in ord

Pagina 39 - Quarantined

Chapter 5. Solution design 115SVIs. Each Shared RADIUS Authorization Component had a corresponding ACL defined on the NAD. The example below shows t

Pagina 40 - Cisco NAC and IEEE 802.1x

116 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSee 8.4, “Building the remediation workflows” on page 417, for inform

Pagina 41 - Using Cisco terminology

Chapter 5. Solution design 117Compliance subsystemThe compliance subsystem has two major components: 򐂰 The IBM Security Compliance Manager server򐂰 T

Pagina 42 - Network identity provisioning

118 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe system used by ABBC for the Security Compliance Manager server is

Pagina 43 - Remediation process

Chapter 5. Solution design 119Operating system requirements for ACS V4.0 are:򐂰 Windows 2000 Server 򐂰 Windows 2000 Advanced Server with the following

Pagina 44

120 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC-enabled network deviceThe following Layer 2 and Layer 3 network d

Pagina 45 - Internet

Chapter 5. Solution design 121򐂰 Cisco 2600XM Series Router򐂰 Cisco 2691 Multiservice Platform򐂰 Cisco 2800 Series Router򐂰 Cisco 3640 Multiservice Plat

Pagina 46 - 2.3 Design process

xii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThanks to the following people for their contributions to this projec

Pagina 47

122 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemediation subsystemThe remediation subsystem has three components:򐂰

Pagina 48

Chapter 5. Solution design 123EAR file. This application must be installed on the same WebSphere Application Server as the Web Gateway component.Rem

Pagina 49 - Implementation

124 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 50 - 2.3.3 Solution objectives

© Copyright IBM Corp. 2005, 2007. All rights reserved. 125Chapter 6. Compliance subsystem implementationThis chapter describes the IBM Tivoli Security

Pagina 51 - Default network

126 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6.1 Tivoli Security Compliance Manager setupTivoli Security Complian

Pagina 52 - Performance controls

Chapter 6. Compliance subsystem implementation 1272. After a little while you are presented with the Welcome window, as shown in Figure 6-1. Click t

Pagina 53 - 2.4 Implementation flow

128 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The DB2 version selection is presented similar to the one shown in

Pagina 54

Chapter 6. Compliance subsystem implementation 1294. Next the welcome window is displayed, as presented in Figure 6-3. Click Next.Figure 6-3 Setup

Pagina 55 - 2.6 Conclusion

130 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. On the next dialog you are presented with the standard license agr

Pagina 56

Chapter 6. Compliance subsystem implementation 1316. In the Installation type selection window (Figure 6-5) leave all of the default values (which i

Pagina 57 - Component structure

Preface xiiiFind out more about the residency program, browse the residency index, and apply online at:ibm.com/redbooks/residencies.htmlComments wel

Pagina 58 - 3.1 Logical components

132 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. On the next dialog, shown in Figure 6-6, you are presented with th

Pagina 59 - Posture validation server

Chapter 6. Compliance subsystem implementation 1338. In the next window, shown in Figure 6-7, you must select the installation destination folder. M

Pagina 60 - Figure 3-2 ACS architecture

134 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next dialog, shown in Figure 6-8, you must provide user inf

Pagina 61 - Admission control client

Chapter 6. Compliance subsystem implementation 13510.In the next dialog, depicted in Figure 6-9, you are presented with the administration contact c

Pagina 62

136 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.In the next window, shown in Figure 6-10, you can modify the DB2 i

Pagina 63

Chapter 6. Compliance subsystem implementation 13712.As we do not need to use any DB2 tools on the next dialog, shown in Figure 6-11, click Next.Fig

Pagina 64 - 3.1.2 Compliance

138 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.In the next window, presented in Figure 6-12, you can provide the

Pagina 65

Chapter 6. Compliance subsystem implementation 13914.In the next window, shown in Figure 6-13, you are given a last chance to review your selected o

Pagina 66 - Compliance client

140 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The installation may take a few minutes depending on the configura

Pagina 67 - Posture collector

Chapter 6. Compliance subsystem implementation 1412. The usual language selection box is presented, as shown on Figure 6-15. Accept English and clic

Pagina 68

xiv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 69 - 3.1.3 Remediation

142 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In the next window, shown in Figure 6-17, specify the destination

Pagina 70 - 3.2 Physical components

Chapter 6. Compliance subsystem implementation 143Tivoli Security Compliance Manager server installation. This is a recommended option in large scal

Pagina 71

144 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. You are presented the e-mail Server configuration dialog, as shown

Pagina 72 - Network access device

Chapter 6. Compliance subsystem implementation 1457. In the next window, shown on Figure 6-20, the installation wizard asks for the communication po

Pagina 73

146 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. The Server Security Configuration window is displayed, as shown in

Pagina 74

Chapter 6. Compliance subsystem implementation 1479. In the next window, presented in Figure 6-22, select the location for your database. If you ins

Pagina 75

148 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.In the next dialog, provide the database configuration information

Pagina 76 - Network Access Profiles

Chapter 6. Compliance subsystem implementation 14911.In the next dialog, shown in Figure 6-24, you are asked whether the database should be created

Pagina 77

150 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The next dialog allows you to specify an administrator user ID and

Pagina 78

Chapter 6. Compliance subsystem implementation 15113.Finally you are presented with the installation selection summary, as shown in Figure 6-26. Cli

Pagina 79 - Remediation (flow 4)

© Copyright IBM Corp. 2005, 2007. All rights reserved. xvSummary of changesThis section describes the technical changes made in this edition of the bo

Pagina 80 - 3.3.1 Secure communication

152 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems14.The installation itself is very fast, but the database creation pr

Pagina 81 - 3.4 Component placement

Chapter 6. Compliance subsystem implementation 153򐂰 The user password settings on the client workstation have to be following the policy, which mean

Pagina 82 - Figure 3-8 Security zones

154 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe status of a posture element can be one of the following:PASS The

Pagina 83

Chapter 6. Compliance subsystem implementation 155remediation subsystem, such as a Tivoli Configuration Manager. After the remediation has been perf

Pagina 84 - Other networks

156 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. When the GUI pops up, as shown on Figure 6-28, log in with the cre

Pagina 85 - Branch office compliance

Chapter 6. Compliance subsystem implementation 1575. You are presented with the default Message of the day window, which by default contains only th

Pagina 86 - Campus internal enforcement

158 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Navigate to the sample_polices directory created in step 1 and sel

Pagina 87 - (Campus Ingress Enforcement)

Chapter 6. Compliance subsystem implementation 1599. In the next step the import wizard performs a validation of the signatures of the collectors in

Pagina 88 - (PAT access protection)

160 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.Now the actual policy installation is performed. Depending on the

Pagina 89 - Extranet compliance

Chapter 6. Compliance subsystem implementation 16111.After the wizard is closed you will see the imported policy in the Administrative Console, as s

Pagina 90 - Lab compliance

xvi Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 91 - Data Center protection

162 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsmust be evaluated on each client workstation. This is the reason why

Pagina 92 - 3.5 Conclusion

Chapter 6. Compliance subsystem implementation 1632. In the right pane click the Collectors tab and select the Symantec Antivirus collector, as show

Pagina 93 - Customer

164 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe different conditions are:– Version of the Symantec Antivirus Soft

Pagina 94

Chapter 6. Compliance subsystem implementation 165To adjust the parameters to your need modify the operational parameters, selecting the appropriate

Pagina 95 - Corporation

166 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are six parameters regulating the behavior of the collector, wh

Pagina 96 - 4.1 Company profile

Chapter 6. Compliance subsystem implementation 167When you are done editing click Save.5. The next policy we customize is the one that checks for th

Pagina 97 - 4.2 Current IT architecture

168 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. The parameters for the collector nac.win.any.oslevel.PostureOSLeve

Pagina 98 - NAC Framework

Chapter 6. Compliance subsystem implementation 169The operational parameters listed above accept multiple values, so edit the appropriate parameters

Pagina 99

170 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsBack at the list of the collectors right-click the Windows Hotfixes c

Pagina 100 - NAC Appliance

Chapter 6. Compliance subsystem implementation 1718. The next policy we configure checks whether the personal firewall is installed and running. Sin

Pagina 101

© Copyright IBM Corp. 2005, 2007. All rights reserved. 1Part 1 Architecture and designIn this part we discuss the overall business context of the IBM

Pagina 102

172 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNO_KEY_RULE Operational Used to determine the status of the registry

Pagina 103

Chapter 6. Compliance subsystem implementation 173The way this collector works depends on the data you have provided as parameters.It first checks f

Pagina 104 - Firewall

174 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRulesRules are used to evaluate the detected registry value and deter

Pagina 105

Chapter 6. Compliance subsystem implementation 175There are some limitations on numeric context evaluations. The collector initially receives all va

Pagina 106 - Project overview

176 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 VALUE equal to InstallDirectory.򐂰 NO_KEY_RULE equal to FAIL.򐂰 NO_VA

Pagina 107

Chapter 6. Compliance subsystem implementation 177When you are done with editing the parameters for the nac.win.any.regkey.PostureRegKeyV2 collector

Pagina 108

178 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo configure the policy with the right service name check it in the S

Pagina 109 - 4.4 Conclusion

Chapter 6. Compliance subsystem implementation 179– SERVICE_RUNNING_WF equal to TCRZLSoftwareRunning– REQ_DISABLED not set– SERVICE_DISABLED_WF not

Pagina 110

180 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe new dialog is presented, as shown in Figure 6-47. Select the dest

Pagina 111 - Solution design

Chapter 6. Compliance subsystem implementation 181There cannot be two compliance queries with the same name in one policy, so the copy of the compli

Pagina 113 - 5.1 Business requirements

2 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 114 - 5.2 Functional requirements

182 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the following dialog modify the name value to Messenger Service Di

Pagina 115

Chapter 6. Compliance subsystem implementation 183Next select the Compliance SQL tab on the right pane and modify the violation message generated by

Pagina 116

184 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollector as well. Right-click the ZoneAlarm Firewall Active name und

Pagina 117 - Compliance

Chapter 6. Compliance subsystem implementation 185Now we must change the parameters for the new collector instance. Right-click the Messenger Servic

Pagina 118 - Remediation services

186 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsYou are presented with a warning that the changes will affect all of

Pagina 119

Chapter 6. Compliance subsystem implementation 187The steps are:1. When logged into the Tivoli Security Compliance Manager Administration Console wi

Pagina 120 - 5.3.1 Logical components

188 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Assign the policy to this new group. Select the group in the navig

Pagina 121

Chapter 6. Compliance subsystem implementation 1895. An informational dialog is displayed, as shown in Figure 6-59, showing the successful completio

Pagina 122

190 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbook we cover only the installation of the client on Windows. For oth

Pagina 123

Chapter 6. Compliance subsystem implementation 191The installation of the certificate that is required for secure communication with the Cisco Secur

Pagina 124

© Copyright IBM Corp. 2005, 2007. All rights reserved. 3Chapter 1. Business contextInformation Technology (IT) security is a vital component of busine

Pagina 125

192 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstallation of Cisco Trust Agent on WindowsThe Cisco Trust Agent ins

Pagina 126

Chapter 6. Compliance subsystem implementation 1933. The license agreement is presented, as shown in Figure 6-63. Select I accept the license agreem

Pagina 127 - Enforcing compliance criteria

194 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Accept the defaults (Figure 6-64) and click Next.Figure 6-64 Cis

Pagina 128 - Posture token

Chapter 6. Compliance subsystem implementation 1955. Accept the default depicted in Figure 6-65 and click Next.Figure 6-65 Cisco Trust Agent insta

Pagina 129

196 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Next (Figure 6-66).Figure 6-66 Ready to install the Cisco

Pagina 130

Chapter 6. Compliance subsystem implementation 1977. If the certificate file was copied into the Certs directory, the window in Figure 6-67 is prese

Pagina 131

198 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click Finish to close the installation, as shown in Figure 6-68.Fi

Pagina 132 - Healthy indicates that the

Chapter 6. Compliance subsystem implementation 199If the certificate has been successfully imported, the window shown in Figure 6-69 is displayed.Fi

Pagina 133 - Performing remediation

200 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Security Compliance Manager client installation requires the foll

Pagina 134 - 5.3.2 Physical components

Chapter 6. Compliance subsystem implementation 2012. The Security Compliance Manager welcome screen appears momentarily (Figure 6-71).Figure 6-71

Pagina 135 - Compliance subsystem

4 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPersonal computer workstations are used in the office, at home, or at a

Pagina 136 - Access Control Server

202 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Client Installation Utility window appears, as depicted in Fig

Pagina 137

Chapter 6. Compliance subsystem implementation 2034. The license agreement window is displayed (Figure 6-73). Select I accept the terms in the licen

Pagina 138 - Layer 3 devices

204 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Accept the default destination folder, shown in Figure 6-74, and c

Pagina 139 - Cisco Trust Agent

Chapter 6. Compliance subsystem implementation 2056. Accept the default client installation (Figure 6-75) and click Next.Figure 6-75 Setup type wi

Pagina 140 - Software Package Web Server

206 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the IBM Security Solution for Cisco Networks window (Figure 6-7

Pagina 141 - 5.4 Conclusion

Chapter 6. Compliance subsystem implementation 207Figure 6-77 Client connection window

Pagina 142

208 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The server communication configuration window, shown in Figure 6-7

Pagina 143

Chapter 6. Compliance subsystem implementation 20910.If you selected the DHCP option in the previous step, you will see the client DHCP configuratio

Pagina 144

210 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Finally, the installation summary window is displayed (Figure 6-80

Pagina 145

Chapter 6. Compliance subsystem implementation 21112.The Security Compliance Manager client is successfully installed. Click Finish to close the win

Pagina 146

Chapter 1. Business context 5concept that can protect all networks in this era. This IBM and Cisco integration, depicted in an overview in Figure 1-

Pagina 147

212 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.If you want to verify that the Security Compliance Manager posture

Pagina 148

© Copyright IBM Corp. 2005, 2007. All rights reserved. 213Chapter 7. Network enforcement subsystem implementationThis chapter contains detailed descri

Pagina 149

214 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.1 Configuring NAC Framework componentsThis section focuses on the

Pagina 150

Chapter 7. Network enforcement subsystem implementation 215Installing Cisco Secure ACSTo install Cisco Secure ACS Version 4.0 software on a machine

Pagina 151

216 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring the administrative interface to Cisco Secure ACSBy defaul

Pagina 152

Chapter 7. Network enforcement subsystem implementation 217– Network Access FilteringThis option enables the appearance of the network access filter

Pagina 153

218 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAllowing administrator access via HTTP (optional)If you want to confi

Pagina 154

Chapter 7. Network enforcement subsystem implementation 2192. Fill in the user name and password fields, and click Grant All to give all configurati

Pagina 155 - Figure 6-11, click Next

220 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco Secure ACS uses the certificate store that is built into the Wi

Pagina 156

Chapter 7. Network enforcement subsystem implementation 221To use a self-signed certificate, perform the following steps:1. Click Generate Self-Sign

Pagina 157

6 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt has become mandatory for businesses to comply with regulatory guidel

Pagina 158

222 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Restart the Cisco Secure ACS (Figure 7-7).Figure 7-7 Restart Cis

Pagina 159 - English and click Next

Chapter 7. Network enforcement subsystem implementation 2235. After completing the certificate setup process and installation, verify that the certi

Pagina 160

224 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo import Security Compliance Manager attributes, perform the followi

Pagina 161

Chapter 7. Network enforcement subsystem implementation 225filename is the name of the file in which you want CSUtil.exe to write all attribute defi

Pagina 162

226 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfilename is the file that the attributes will be written to. The Secu

Pagina 163

Chapter 7. Network enforcement subsystem implementation 227that you wish to include in the log file. Scroll down and change the file management sett

Pagina 164

228 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click the Log to CSV Failed Attempts report under Enable Logging.

Pagina 165

Chapter 7. Network enforcement subsystem implementation 2298. In the window in under Services Log File Configuration (Figure 7-12) change Level of D

Pagina 166

230 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt is possible to group the NADs into Network Device Groups (NDGs) fo

Pagina 167

Chapter 7. Network enforcement subsystem implementation 2312. Select Advanced Options (Figure 7-13 on page 230). Ensure that Network Device Groups i

Pagina 168

Chapter 1. Business context 7The IBM Integrated Security Solution for Cisco Networks checks every client’s workstation when it attempts to connect t

Pagina 169

232 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Select Network Configuration in the main menu. The screen in Figur

Pagina 170

Chapter 7. Network enforcement subsystem implementation 2336. From the Network Configuration screen, select the hyperlink under Network Device Group

Pagina 171 - 6.2.1 Posture collectors

234 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click Add Entry under AAA Clients to add any AAA clients to this p

Pagina 172 - 6.2.2 Policy collector

Chapter 7. Network enforcement subsystem implementation 2358. You should now see the newly defined AAA clients (Figure 7-18).Figure 7-18 AAA Clien

Pagina 173

236 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS attributesThe RADIUS attributes required for NAC m

Pagina 174

Chapter 7. Network enforcement subsystem implementation 2372. From the Interface Configuration menu, select RADIUS (Cisco IOS/PIX 6.0) (Figure 7-20)

Pagina 175

238 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsActive Directory, for example. To configure groups and vendor-specifi

Pagina 176

Chapter 7. Network enforcement subsystem implementation 239Configuring usersNow that the groups have been defined, we can create our users and then

Pagina 177 - Figure 6-34, click Next

240 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. You will be prompted for the user’s real name and description unde

Pagina 178

Chapter 7. Network enforcement subsystem implementation 241Global authentication setupThe Cisco Secure ACS supports many types of protocols for secu

Pagina 179

8 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsStandard reports that can be generated from the IBM Integrated Security

Pagina 180 - Figure 6-37 Policies view

242 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click EAP-FAST Configuration from the Global Authentication Setup

Pagina 181

Chapter 7. Network enforcement subsystem implementation 2436. Click Submit + Restart.Require client certificate for provisioning CheckedAllow Machin

Pagina 182

244 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring posture validationTo do this:1. Select Posture Validation

Pagina 183

Chapter 7. Network enforcement subsystem implementation 2452. Select Internal Posture Validation. The screen show in Figure 7-27 will be displayed.3

Pagina 184

246 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In this example, we have entered the name of the first policy as C

Pagina 185

Chapter 7. Network enforcement subsystem implementation 2475. Click Add Rule (Figure 7-29).Figure 7-29 Posture Validation for CTA

Pagina 186

248 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add Condition Set (Figure 7-30).Figure 7-30 Condition sets

Pagina 187

Chapter 7. Network enforcement subsystem implementation 2497. From the Attribute drop-down list (Figure 7-31), select Cisco:PA:PA-Version. The opera

Pagina 188

250 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Figure 7-32 shows that if this condition is satisfied, that an App

Pagina 189

Chapter 7. Network enforcement subsystem implementation 2519. Next we need to modify the default action, which is the action to be taken if the cond

Pagina 190

Chapter 1. Business context 9򐂰 Enable an automated remediation process that eases the process of regaining compliancy for all authorized users on th

Pagina 191

252 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The posture token remains Cisco:PA, however the posture token valu

Pagina 192 - Rule operators

Chapter 7. Network enforcement subsystem implementation 25311.Click Submit and you will find yourself back in the dialog shown in Figure 7-35.Figure

Pagina 193 - Rule format

254 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.Click Apply and Restart, as shown in Figure 7-36.Figure 7-36 CTA

Pagina 194

Chapter 7. Network enforcement subsystem implementation 25515.Click Add Policy (Figure 7-37).Figure 7-37 Repeating the process for Security Compli

Pagina 195

256 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.In this example, we use TSCM in the Name field and IBM Security Co

Pagina 196

Chapter 7. Network enforcement subsystem implementation 25717.After entering the name and description, click Submit and you will see the dialog show

Pagina 197

258 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems18.Click Add Rule to get to the screen shown in Figure 7-40.Figure 7-

Pagina 198

Chapter 7. Network enforcement subsystem implementation 25920.From the Attribute drop-down menu, select IBMCorporation:SCM:PolicyViolation. From the

Pagina 199

260 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Make sure that the posture token is set to IBMCorporation:SCM, and

Pagina 200

Chapter 7. Network enforcement subsystem implementation 26125.The posture token should be set to IBMCorporation:SCM (Figure 7-43) and the value shou

Pagina 201

10 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 1-2 depicts the relevant tasks in a life-cycle overview for end

Pagina 202

262 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems27.Click Done (Figure 7-44).Figure 7-44 Completed Security Complian

Pagina 203

Chapter 7. Network enforcement subsystem implementation 26328.Click Apply and Restart (Figure 7-45).Figure 7-45 Completed posture validation rules

Pagina 204

264 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS Authorization ComponentsIn this section we configu

Pagina 205

Chapter 7. Network enforcement subsystem implementation 2653. Click Add.4. To create the Healthy Sales RAC, in the Name field type Healthy_Sales_RAC

Pagina 206

266 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add next to Cisco IOS/PIX6.0, which brings you to Figure 7-4

Pagina 207 - TCMCLI utility policy

Chapter 7. Network enforcement subsystem implementation 26710.Repeat the same procedure for the IETF attributes, first selecting the relevant field

Pagina 208 - 6.3.1 Cisco Trust Agent

268 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.When completed, your Healthy Sales RAC should look like Figure 7-4

Pagina 209

Chapter 7. Network enforcement subsystem implementation 269Table 7-4 Quarantine Sales RAC attributesTable 7-5 Quarantine Engineering RAC attribu

Pagina 210

270 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIETF Termination-Action (29) RADIUS-Request(1)IETF Tunnel-Type (64) [

Pagina 211

Chapter 7. Network enforcement subsystem implementation 271Configuring Network Access ProfilesWe have now configured all of the individual component

Pagina 212

Chapter 1. Business context 11those mentioned in 1.2, “Why we need this” on page 5, mandate every organization to comply with regulatory acts. Keys

Pagina 213

272 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The newly created NAP is shown (Figure 7-51) with the three polici

Pagina 214 - 6. Click Next (Figure 6-66)

Chapter 7. Network enforcement subsystem implementation 2735. Click Authentication. Click the tab Populate from Global and ensure that Posture Valid

Pagina 215

274 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. From the screen shown in Figure 7-53, click Add Rule.Figure 7-53

Pagina 216

Chapter 7. Network enforcement subsystem implementation 27510.Under Condition → Required Credential Types, there is a list of available credentials.

Pagina 217

276 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Scrolling down the page to Action → Selected Internal Posture Vali

Pagina 218

Chapter 7. Network enforcement subsystem implementation 277An example of the CTA Healthy pop-up is shown in Figure 7-56.Figure 7-56 Example of CTA

Pagina 219 - (Figure 6-71)

278 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 7-58 CTA pop-up configuration14.Click Submit.Note: Steps 12

Pagina 220

Chapter 7. Network enforcement subsystem implementation 279Figure 7-59 Completed posture validation for NAC_IISSCN15.Click Done. This will take yo

Pagina 221

280 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.From the screen shown in Figure 7-51 on page 272, click Authorizat

Pagina 222

Chapter 7. Network enforcement subsystem implementation 28121.Click Submit (Figure 7-61).Figure 7-61 Healthy Sales SPT creation22.Repeat this proc

Pagina 223

Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsJanuary 2007International Technical Support OrganizationSG24-6678-01

Pagina 224

12 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 225

282 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems23.Your screen should look similar to that in Figure 7-62.Figure 7-62

Pagina 226

Chapter 7. Network enforcement subsystem implementation 283External User DatabaseOne of the most common methods of deploying an ACS is to use an ext

Pagina 227

284 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDownloadable Access Control ListsNAC L2/L3 IP uses EAPoUDP (EOU), whi

Pagina 228

Chapter 7. Network enforcement subsystem implementation 2855. Add a name and description in the Name and Description fields as appropriate (Figure 7

Pagina 229

286 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Enter the name of the ACL and the ACL definition (Figure 7-65).Fig

Pagina 230 - 6.4 Conclusion

Chapter 7. Network enforcement subsystem implementation 2878. Note that there is an option of binding the ACL just created to a network access filte

Pagina 231 - Network enforcement

288 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Repeat step 3 on page 265 to step 12 on page 268, using the values

Pagina 232

Chapter 7. Network enforcement subsystem implementation 289Configuring Network Access ProfilesWe have now configured all the individual components t

Pagina 233 - Installing Cisco Secure ACS

290 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. From the Downloadable ACL drop-down list, select Healthy_ACL (Figu

Pagina 234

Chapter 7. Network enforcement subsystem implementation 29112.For this scenario, we selected the Quarantine_L2IP_RAC and Quarantine_ACL as the Share

Pagina 235

© Copyright IBM Corp. 2005, 2007. All rights reserved. 13Chapter 2. Architecting the solutionIn this chapter we discuss the solution architecture of t

Pagina 236

292 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring Cisco 3750 switch for NAC L2 802.1xNew for NAC Phase 2 is

Pagina 237

Chapter 7. Network enforcement subsystem implementation 293!<output omitted>!interface FastEthernet1/0/5 description **Connected to CARE-SYSTE

Pagina 238

294 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess-list 140 deny ip any 192.168.11.0 0.0.0.255access-list 140 den

Pagina 239

Chapter 7. Network enforcement subsystem implementation 295allow Web access and DNS access in case of manual remediation requirements or access to t

Pagina 240

296 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis section describes how to configure a Cisco 3750 switch acting as

Pagina 241

Chapter 7. Network enforcement subsystem implementation 297 permit tcp any any eq domain deny ip any anyip access-list extended initial-acl permit

Pagina 242

298 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAudit Session ID : 000000005222BFF40000001BC0A80B33PostureToken

Pagina 243

Chapter 7. Network enforcement subsystem implementation 2992. Configuring Admission Control EOU3. Configuring an Exception List Configuration for Cl

Pagina 244 - Configuring logging

300 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis example causes traffic with a destination port 53 (domain) or po

Pagina 245

Chapter 7. Network enforcement subsystem implementation 301The Cisco Secure ACS then issues a token according to the group in which a user with the

Pagina 246

14 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.1 Solution architectures, design, and methodologiesOur objective fo

Pagina 247 - client

302 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Enabling the HTTP server is necessary for URL redirection. When UR

Pagina 248

Chapter 7. Network enforcement subsystem implementation 30310.3.3.30 FastEthernet0/0 EAP Healthy 1310.3.3.31 FastEthernet0

Pagina 249

304 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.2.1 Installing CCA AgentAt the time of writing this book, the late

Pagina 250

Chapter 7. Network enforcement subsystem implementation 3052. Accept the default installation folder and click Next, as shown in Figure 7-72.Figure

Pagina 251 - Figure 7-16 AAA clients

306 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click Finish to complete the installation (Figure 7-74).Figure 7-7

Pagina 252

Chapter 7. Network enforcement subsystem implementation 307The steps are:1. Open a Web browser and enter the IP address of the CAM. There is no spec

Pagina 253 - Figure 7-18 AAA Clients

308 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Clean Access Summary window will be displayed (Figure 7-76).Fi

Pagina 254 - Configuring RADIUS attributes

Chapter 7. Network enforcement subsystem implementation 3094. From the Main Menu, select Device Management → CCA Servers (Figure 7-77).Figure 7-77

Pagina 255 - Configuring groups

310 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Select New Server. Add the server IP address and server location,

Pagina 256 - Figure 7-21 Group Setup

Chapter 7. Network enforcement subsystem implementation 3117. The CAS should now be visible under List of Servers, shown in Figure 7-79.Figure 7-79

Pagina 257 - Configuring users

Chapter 2. Architecting the solution 15In general, the IBM Integrated Security Solution for Cisco Networks consists of three subsystems or logical c

Pagina 258 - Internal Database

312 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click the Manage icon for the CAS just added. This takes you to th

Pagina 259 - Global authentication setup

Chapter 7. Network enforcement subsystem implementation 3139. Select Device Management → CCA Servers → Network. Check that your screen resembles Fig

Pagina 260 - (Figure 7-24 on page 241)

314 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand non-trusted networks. The main subnet is added by default. For ea

Pagina 261 - 6. Click Submit + Restart

Chapter 7. Network enforcement subsystem implementation 31514.Click Add Mapping. Confirmation of the successful mapping will appear (Figure 7-83).Fi

Pagina 262 - To do this:

316 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Click Add. The VLAN ID should be an asterisk (*), the subnet infor

Pagina 263

Chapter 7. Network enforcement subsystem implementation 3172. Enter the group name and description (Figure 7-85).Figure 7-85 Switch Group creation

Pagina 264

318 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Verify your new switch group (Figure 7-86).Figure 7-86 Switch Gr

Pagina 265

Chapter 7. Network enforcement subsystem implementation 319Configuring a switch profileTo configure a switch profile follow these steps:1. From Swit

Pagina 266

320 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Click Add. A confirmation of the new profile will appear, as shown

Pagina 267

Chapter 7. Network enforcement subsystem implementation 321When a client connects to a controlled port, the port is assigned to the authentication V

Pagina 268 - Figure 7-33 on page 251

16 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsdevices seeking to access network computing resources, thereby limitin

Pagina 269 - (Figure 7-33)

322 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Under Options: Device Disconnect, check the box Remove out-of-band

Pagina 270

Chapter 7. Network enforcement subsystem implementation 3235. Click Add. The configured switch profiles will be displayed (Figure 7-91).Figure 7-91

Pagina 271 - 12.Click Done

324 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Complete as necessary, depending on the version of SNMP being used

Pagina 272

Chapter 7. Network enforcement subsystem implementation 325the IP address of the switch should be entered in the IP Address box, and a description e

Pagina 273

326 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. As seen in Figure 7-94, click the Ports icon.Figure 7-94 Managed

Pagina 274

Chapter 7. Network enforcement subsystem implementation 3276. Under Profile, use the drop-down list to configure the ports as appropriate. Our clien

Pagina 275

328 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Add the role name and role description as appropriate. Our example

Pagina 276

Chapter 7. Network enforcement subsystem implementation 3294. The new role should be visible under List Of Roles, depicted in Figure 7-97.Figure 7-9

Pagina 277

330 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. From the first drop-down menu, select the role you have created. I

Pagina 278

Chapter 7. Network enforcement subsystem implementation 3315. The action should be Allow and the protocol should be All (Figure 7-99).Figure 7-99

Pagina 279

Chapter 2. Architecting the solution 17Security Compliance ManagerIBM Tivoli Security Compliance Manager performs the functions of managing security

Pagina 280 - 27.Click Done (Figure 7-44)

332 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe completed ruleset should look like Figure 7-100.Figure 7-100 Un

Pagina 281

Chapter 7. Network enforcement subsystem implementation 3332. Add the user name, password, and description as appropriate. From the Role drop-down m

Pagina 282

334 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The user just created should be seen under List of Local Users, as

Pagina 283

Chapter 7. Network enforcement subsystem implementation 3352. Select the following options (Figure 7-103):– From the Check Category drop-down menu,

Pagina 284

336 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Value Name should be set to Version.– Value Data Type should be set

Pagina 285

Chapter 7. Network enforcement subsystem implementation 3376. These two checks should now be displayed (Figure 7-105).Figure 7-105 Rules check lis

Pagina 286

338 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click New Rule (Figure 7-106).Figure 7-106 New rule8. Enter the

Pagina 287

Chapter 7. Network enforcement subsystem implementation 33910.Repeat steps 7 and 8, entering the following information (Figure 7-107):Rule Name CCA_

Pagina 288

340 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The newly defined rules will be displayed (Figure 7-108).Figure 7-

Pagina 289 - Allow any Protocol

Chapter 7. Network enforcement subsystem implementation 34114.Click Requirements → New Requirements (Figure 7-109).Figure 7-109 Requirements15.Ent

Pagina 290 - Grant access

18 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPort details and communication flows between Security Compliance Manag

Pagina 291

342 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems17.Repeat steps 14 and 15, entering the following information (Figure

Pagina 292 - NAC_IISSCN_Posture_Profile

Chapter 7. Network enforcement subsystem implementation 34319.The Requirement List window should appear similar to Figure 7-111.Figure 7-111 Requi

Pagina 293

344 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Repeat steps 20 and 21, entering the following information (Figure

Pagina 294 - Healthy PA message:

Chapter 7. Network enforcement subsystem implementation 34525.From “Select requirements to associate with the role,” select both SCM_Service and CCA

Pagina 295

346 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDiscovered clientsTo check that the Clean Access Solution is working

Pagina 296

Chapter 7. Network enforcement subsystem implementation 347Logging on as a clientTo log on as a client follow these steps.1. Once the CCA Agent soft

Pagina 297

348 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click OK.5. If a client fails the compliance check, a Web page wil

Pagina 298

Chapter 7. Network enforcement subsystem implementation 3498. The user is advised of their temporary access (Figure 7-118), and clicks Continue.Figu

Pagina 299

350 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The Security Compliance Manager Compliance Report window pops up (

Pagina 300 - 24.Click Submit

Chapter 7. Network enforcement subsystem implementation 35113.The user clicks Close on the Security Compliance Manager Compliance Report window, whi

Pagina 301 - Clientless user

Chapter 2. Architecting the solution 19Tivoli Configuration ManagerIBM Tivoli Configuration Manager automates the manual provisioning and deployment

Pagina 302

352 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The end user is advised of successful login to the network (Figure

Pagina 303 - Figure 7-64 Naming of ACL

Chapter 7. Network enforcement subsystem implementation 353Example of interface configuration for CAM interface:interface FastEthernet1/0/18 descrip

Pagina 304 - 7. Click Submit

354 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExample of SNMP configuration:snmp-server community public RWsnmp-ser

Pagina 305 - Figure 7-66 Binding the ACL

© Copyright IBM Corp. 2005, 2007. All rights reserved. 355Chapter 8. Remediation subsystem implementationThis chapter describes the IBM Tivoli Configu

Pagina 306

356 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Installation of the software package utilities– Creating remediatio

Pagina 307

Chapter 8. Remediation subsystem implementation 3578.1 Automated remediation enablementTo enable automated remediation, the remediation handler tha

Pagina 308

358 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor Tivoli Configuration Manager package at the IBM Tivoli Security C

Pagina 309

Chapter 8. Remediation subsystem implementation 359򐂰 For Software Package Web Server component:The IISSCN enablement pack2 for Tivoli Configuration

Pagina 310

360 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPreparing for the installationTivoli Configuration Manager Web Gatewa

Pagina 311

Chapter 8. Remediation subsystem implementation 361The steps to install the minimal required version of Web infrastructure are:1. To start the insta

Pagina 312

20 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstables that contain data gathered by the collectors. In a generic Secu

Pagina 313

362 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The WebSphere Application Server Installation wizard is displayed,

Pagina 314

Chapter 8. Remediation subsystem implementation 3634. In the next window, the standard license agreement is presented, as shown in Figure 8-3. Accep

Pagina 315

364 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. In the next window shown in Figure 8-4 you must select the install

Pagina 316

Chapter 8. Remediation subsystem implementation 365This is shown in Figure 8-5. Click Next.Figure 8-5 Component selection dialogImportant: If you

Pagina 317

366 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next window, shown in Figure 8-6, you may specify the direc

Pagina 318

Chapter 8. Remediation subsystem implementation 3678. In the next window you must specify the node name and host name for the Application Server to

Pagina 319

368 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The next dialog (Figure 8-8) allows you to select whether you want

Pagina 320

Chapter 8. Remediation subsystem implementation 36910.The next window presented to you contains the installation options summary, as shown in Figure

Pagina 321 - Router#

370 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt may take a few minutes to complete the installation. Then you are

Pagina 322 - 7.2.1 Installing CCA Agent

Chapter 8. Remediation subsystem implementation 37112.Finally, there remain two open windows. One of them is the First Steps dialog you can just exi

Pagina 323

Chapter 2. Architecting the solution 21򐂰 If the client is not Security Compliance Manager policy–enabled, it is denied access to the corporate netwo

Pagina 324

372 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Make sure that the IBM HTTP server is not running (look for the Ap

Pagina 325 - The steps are:

Chapter 8. Remediation subsystem implementation 373b. The Install fix packs option is selected, as shown in Figure 8-13.Figure 8-13 Installation o

Pagina 326

374 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsc. The directory location provided for the fix packs is the fix packs

Pagina 327 - (Figure 7-77)

Chapter 8. Remediation subsystem implementation 375Now you can continue with the Tivoli Configuration Manager Web Gateway installation.Installation

Pagina 328

376 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The welcome window is presented (Figure 8-16). Click Next.Figure 8

Pagina 329

Chapter 8. Remediation subsystem implementation 3774. In the next window (Figure 8-17), the standard license agreement is shown. Accept the license

Pagina 330

378 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. The component selection is displayed, as shown in Figure 8-18. Mak

Pagina 331

Chapter 8. Remediation subsystem implementation 3796. The installation directory selection window is displayed (Figure 8-19). Accept the default pat

Pagina 332 - Figure 7-82 Managed subnets

380 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next dialog (Figure 8-20) most of the fields are already fi

Pagina 333 - Configure default login page

Chapter 8. Remediation subsystem implementation 3818. The Web infrastructure configuration window is displayed (Figure 8-21). Check whether the righ

Pagina 334 - Configuring a Switch Group

© Copyright International Business Machines Corporation 2005, 2007. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, dupli

Pagina 335 - 3. Click Add

22 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess, this is an acceptable solution. Users are authenticated and pl

Pagina 336

382 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIf your Tivoli Configuration Manager is a single node installation th

Pagina 337 - Configuring a switch profile

Chapter 8. Remediation subsystem implementation 38310.The Secure access configuration window is presented, as shown in Figure 8-23. Since we are not

Pagina 338 - Configuring Port Profile

384 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.The summary of the selected installation options is presented, as

Pagina 339

Chapter 8. Remediation subsystem implementation 38512.The installation can take a while depending on the configuration of your system. You can follo

Pagina 340

386 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshandler located on the workstation attempting to connect to the netwo

Pagina 341 - Configuring SNMP receiver

Chapter 8. Remediation subsystem implementation 3873. If you have followed the installation of WebSphere Application Server as described in this boo

Pagina 342 - Adding a managed switch

388 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. On the next page expand the Applications menu item in the left pan

Pagina 343 - IP Address box, and a

Chapter 8. Remediation subsystem implementation 3896. The Preparing for the application installation window is displayed (Figure 8-28). Accept the d

Pagina 344 - Figure 7-94 Managed switch

390 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Leave the defaults and click Next in the several next windows unti

Pagina 345 - Defining user roles

Chapter 8. Remediation subsystem implementation 3918. The installation may take a few seconds or few minutes depending on your server configuration.

Pagina 346

Chapter 2. Architecting the solution 23The IEEE 802.1x standard addresses the need to authenticate the user or client trying to connect to the parti

Pagina 347 - Creating traffic policies

392 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next window, shown in Figure 8-31, select Save to save the

Pagina 348

Chapter 8. Remediation subsystem implementation 39310.When you click the Enterprise Application link under Applications in the left pane you should

Pagina 349 - Access to TCM

394 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOpen the file using a text editor, and find the value of the WEB_SERV

Pagina 350 - Creating local users

Chapter 8. Remediation subsystem implementation 395This file contains the mapping between the remediation workflows and the posture collector parame

Pagina 351

396 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. You must initialize the package creation utility environment. Issu

Pagina 352 - Configure Clean Access Agent

Chapter 8. Remediation subsystem implementation 397In Example 8-2 and Example 8-3 we present the final content required for the files that must be c

Pagina 353

398 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess to corporate intranet resources). To avoid serious business di

Pagina 354

Chapter 8. Remediation subsystem implementation 399The checks defined by the particular compliance objects within the policy relate to the data gath

Pagina 355

400 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemspages would be in a subdirectory named pl_PL. The default language an

Pagina 356 - Figure 7-106 New rule

Chapter 8. Remediation subsystem implementation 401If none of these locations contain a valid page, the user interface falls back to the method used

Pagina 357

24 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 In the Cisco NAC solution, the EAP header is extended with posture d

Pagina 358 - Validity

402 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPosture element HTMLEach posture element has a unique name and status

Pagina 359 - Figure 7-109 Requirements

Chapter 8. Remediation subsystem implementation 403The wfattribute tagThe simplest variables are workflow attributes. When a posture collector perfo

Pagina 360

404 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTable 8-5 presents the field names that may be used when a posture it

Pagina 361

Chapter 8. Remediation subsystem implementation 405The attributes that are generated by the Security Compliance Manager client are always present, a

Pagina 362

406 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsinformation. For example, to enable the user interface to display the

Pagina 363 - 26.Click Update

Chapter 8. Remediation subsystem implementation 407The attributes will be listed each time a posture element is selected (they are not logged when a

Pagina 364 - Discovered clients

408 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems `--PostureElement

Pagina 365 - Logging on as a client

Chapter 8. Remediation subsystem implementation 4098.3.4 Creating HTML pages for ABBC policyFigure 8-34 summarizes the directory structure for the

Pagina 366

410 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFirst we create the default.html page describing these basic requirem

Pagina 367 - Continue

Chapter 8. Remediation subsystem implementation 411<div id="Logo"></div><div id="MajorTitle">Tivoli Network Ac

Pagina 368

Chapter 2. Architecting the solution 25This requirement can be fulfilled by providing each user with a unique identity and verifying it even before

Pagina 369

412 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbackground: #fff url("file:///C:/Progra~1/IBM/SCM/client/scripts

Pagina 370

Chapter 8. Remediation subsystem implementation 413To prepare separate descriptions for each of these conditions we create two subdirectories named

Pagina 371

414 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems</title></head><body><div id="Logo">

Pagina 372 - 7.3 Conclusion

Chapter 8. Remediation subsystem implementation 4153. Understanding the tags described in the previous step, we now build a more sophisticated HTML

Pagina 373

416 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems<div id="Logo"></div><div id="MajorTitl

Pagina 374

Chapter 8. Remediation subsystem implementation 417You can build similar pages for all of the compliance checks described in your policy. In the nex

Pagina 375

418 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsWhile editing our policy in 6.2, “Configuration of the compliance pol

Pagina 376 - 8.2.1 Prerequisites

Chapter 8. Remediation subsystem implementation 4192. In the next step we create the Windows script that will perform the actual job. We can reuse t

Pagina 377

420 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Next we create the configuration file for the sputil.sh utility co

Pagina 378

Chapter 8. Remediation subsystem implementation 421As a result you should see the output presented below:Region Disp Flags Port

Pagina 379

26 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.2 Definition of a Network Admission Control projectObjectives of a

Pagina 380

422 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTwo additional files are created in the $BINDIR/tcmremed/work directo

Pagina 381

Chapter 8. Remediation subsystem implementation 423The remediation process window is displayed and the proper software package block is downloaded a

Pagina 382

424 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfile. The live update process is initiated with the vpdn_lu.exe execu

Pagina 383

Chapter 8. Remediation subsystem implementation 4253. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Pagina 384

426 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Create the configuration file for sputil.sh utility containing the

Pagina 385

Chapter 8. Remediation subsystem implementation 427the missing hotfixes. As this policy checks for multiple hotfixes in parallel, the missing ones m

Pagina 386

428 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsHotfixId=KB896423TmfWebUIEndpoint=tcmweb4. This configuration file is

Pagina 387

Chapter 8. Remediation subsystem implementation 429If the package was created the result will look like below (the number in the middle of the resul

Pagina 388

430 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere is a small catch with this collector, as it is able to check fo

Pagina 389

Chapter 8. Remediation subsystem implementation 431AddRegistryValueBeforeExecData.arrayLength=2AddRegistryValueBeforeExecParentKey[0]=HKEY_LOCAL_MAC

Pagina 390

Chapter 2. Architecting the solution 27Figure 2-5 illustrates a possible NAC deployment scenario.Figure 2-5 NAC deployment scenarioTypical candida

Pagina 391

432 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareInstalledThe TCRZLSoftwareInstalled workflow is also ver

Pagina 392

Chapter 8. Remediation subsystem implementation 4333. Create the configuration file for the sputil.sh utility containing the instructions on how to

Pagina 393

434 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsworkflows installing or uninstalling software should use silent mode

Pagina 394 - Figure 8-16 Welcome window

Chapter 8. Remediation subsystem implementation 4354. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Pagina 395

436 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareDisabled directory and edit it with the text editor to m

Pagina 396

Chapter 8. Remediation subsystem implementation 437In order to remove the package for the TCRMessengerDisabled remediation workflow:1. Open a comman

Pagina 397

438 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 398

© Copyright IBM Corp. 2005, 2007. All rights reserved. 439Part 3 AppendixesIn the following two appendixes we take a closer look at these topics:򐂰 Gen

Pagina 399

440 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 400

© Copyright IBM Corp. 2005, 2007. All rights reserved. 441Appendix A. Hints and tipsThis appendix contains hints, tips, and other useful information t

Pagina 401 - is False) and click Next

28 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.3 Design processThe MASS methodology that we follow in this book in

Pagina 402

442 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDeployment overviewThe solution deployment starts with the registrati

Pagina 403

Appendix A. Hints and tips 443Figure A-1 TRC-specific objects and relationshipACS ServerExternal User DatabaseViolation CountTokenMandatory Creden

Pagina 404 - IISSCN Extension Pack2 for

444 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTop-level sequence of eventsThe NAC process starts when the client tr

Pagina 405

Appendix A. Hints and tips 445Figure A-2 ISSCN top-level sequence diagramRemediation Objects()PostureQuery()SCM Policy CollectorQuarantinePostureN

Pagina 406

446 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager and NAC compliance subsystemFigure A-3 sh

Pagina 407

Appendix A. Hints and tips 447Cisco NAC sequence of eventsThe NAC process is initiated by the network. Whenever access to a protected network is det

Pagina 408

448 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsattempts by the client to access a protected resource will also trigg

Pagina 409

Appendix A. Hints and tips 449then to determine the actual problem based on the expected behavior of the solution.Assuming that all of the software

Pagina 410

450 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollectors, at which time any state changes affected by the remediati

Pagina 411

Appendix A. Hints and tips 451Communication port usageTivoli Security Compliance Manager server and client communicate only with temporary connectio

Pagina 412

Chapter 2. Architecting the solution 292. Check control settings and compare to security policy.The audit team periodically checks the systems to be

Pagina 413

452 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco IOS Software routerOn a Cisco router running Cisco IOS Software

Pagina 414

Appendix A. Hints and tips 453TimeToNextReauth = 48Authentication Method = Dot1xPosture = HealthyAuthorized By = Authentication ServerVlan Policy =

Pagina 415

454 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager clientWhen the Security Compliance Manage

Pagina 416 - 8.3.1 Locating HTML

Appendix A. Hints and tips 455Client logging can be turned on by setting the debug property to true in the %SCM_HOME%\client\client.pref file. When

Pagina 417

456 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsassessment). It can also be deployed in Layer-2 mode (users are L2-ad

Pagina 418 - Posture item HTML

Appendix A. Hints and tips 457meantime, the Clean Access Manager provides port-level or role-level control by assigning ports to specific VLANs, ass

Pagina 419 - HTML pages example

458 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInterested parties can use this design and the prototypes of these co

Pagina 420 - Posture element HTML

Appendix A. Hints and tips 459A high-level overview of this design is depicted in Figure 8-42.Figure 8-42 High-level overviewIntegration component

Pagina 421 - The field Tag

460 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTSCMAgent.batThis script creates the compliance semaphore file in and

Pagina 422 - The remattribute tag

Appendix A. Hints and tips 461SchedulerA platform-specific task scheduler (EG Windows Task Scheduler or Cron on UNIX) is configured to run the Secur

Pagina 423

30 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe security compliance process for desktops and mobile clients can be

Pagina 424 - 8.3.3 Debug attributes

462 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsusing the example HTML form provided. It should be noted that default

Pagina 425 - Logging posture items

Appendix A. Hints and tips 463the old one. This will indicate that the special functionality of this prototype collector will be lost when the produ

Pagina 426 - Logging the HTML search path

464 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC Appliance ManagerA policy on the NAC Appliance Manager must be cr

Pagina 427

Appendix A. Hints and tips 465State mapping and scenariosOne way for the solution to approach a design is to consider all of the possible states tha

Pagina 428

466 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Security Compliance Manager Client:i. Runs compliance validation. I

Pagina 429

Appendix A. Hints and tips 467– Security Compliance Manager Client:• Runs compliance validation. In this case, no violations are found, so set semap

Pagina 430

468 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Remediation handler:• Since semaphore is -1, PopUp Remediation Inte

Pagina 431

Appendix A. Hints and tips 469Since scenarios 5 and 6 are the most complex, the sequence of events for these scenarios is depicted in Figure 8-43.Fi

Pagina 432

470 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Statuscheck.exe:• Requests rescan from Security Compliance Manager

Pagina 433

© Copyright IBM Corp. 2005, 2007. All rights reserved. 471Appendix B. Network Admission ControlIn this appendix we discuss the Network Admission Contr

Pagina 434

Chapter 2. Architecting the solution 31reason a policy cannot be complied with due to a particular business need, the situation has to be accepted a

Pagina 435

472 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExecutive summaryEmerging network security threats, such as viruses,

Pagina 436 - TCRNavScan workflow

Appendix B. Network Admission Control 473Dramatically improve network securityWhile most organizations use identity management and authentication, a

Pagina 437

474 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSome of the security policy compliance checks that NAC can perform in

Pagina 438

Appendix B. Network Admission Control 475support for a complex security implementation involving a number of security vendors, combined with a corpo

Pagina 439

476 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Network access by unmanaged computers (such as guests, contractors,

Pagina 440

Appendix B. Network Admission Control 477organizations have evolving needs, Cisco Clean Access product components that are installed now can be used

Pagina 441 - TCRNavVirusDefUpdate

478 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe next stepsLet us take a look at the next steps:1. Deploy Cisco Cl

Pagina 442

Appendix B. Network Admission Control 479NAC Framework componentsThe NAC Framework provides the following technology support:򐂰 Broad network device

Pagina 443 - TCRNavSoftwareInstalled

480 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Recommended components:– Cisco Security Agent– Cisco Security Monit

Pagina 444 - TCRMSPatchesInstallWinXP

© Copyright IBM Corp. 2005, 2007. All rights reserved. 481Appendix C. Additional materialThis redbook refers to additional material that can be downlo

Pagina 445

© Copyright IBM Corp. 2005, 2007. All rights reserved. iiiContentsNotices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 446 - HotfixId

32 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis means that for each desired change in the configuration settings,

Pagina 447

482 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUsing the Web materialThe additional Web material that accompanies th

Pagina 448

© Copyright IBM Corp. 2005, 2007. All rights reserved. 483Related publicationsThe publications listed in this section are considered particularly suit

Pagina 449

484 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOnline resourcesThese Web sites and URLs are also relevant as further

Pagina 450 - TCRZLSoftwareInstalled

Related publications 485Help from IBMIBM Support and downloadsibm.com/supportIBM Global Servicesibm.com/services

Pagina 451

486 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 452 - TCRZLSoftwareRunning

© Copyright IBM Corp. 2005, 2007. All rights reserved. 487IndexNumerics802.1x 16, 22, 26, 68, 81, 95, 265credentials 112Aaccess control list 34

Pagina 453 - TCRMessengerDisabled

488 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsphysical components 121pop-up notification 277posture plug-in 4

Pagina 454

Index 489service pack level collector 167service running collector 177Software Package Utilities 394Software Package Web Server 386switch co

Pagina 455 - 8.5 Conclusion

490 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIBM Tivoli Security Compliance Managersee Security Compliance Manager

Pagina 456

Index 491configuration in ACS 229network policy enforcement 60placement 67polling of posture status 61posture validation 59PostureQuery

Pagina 457 - Appendixes

Chapter 2. Architecting the solution 332.3.4 Network design discussionIn this section we discuss the following network design factors for the IBM I

Pagina 458

492 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstimers 301PostureNotification 447PostureQuery 444, 447PPPsee Po

Pagina 459 - Hints and tips

Index 493SSarbanes-Oxley Act 6scalability 35, 357scope of the project 27Secure Access Control Serversee Access Control Serversecure communicat

Pagina 460 - Deployment overview

494 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRMessengerDisabled workflow 435TCRMSPatchesInstallWinXP workflow

Pagina 461

Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 464

®SG24-6678-01 ISBN 0738489883INTERNATIONAL TECHNICALSUPPORTORGANIZATIONBUILDING TECHNICALINFORMATION BASED ONPRACTICAL EXPERIENCE IBM Redbooks are dev

Pagina 465 - Cisco NAC sequence of events

34 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the reference architecture described later in this book, there are

Pagina 466 - Fault isolation

Chapter 2. Architecting the solution 35revalidation process takes place too often, this pop-up window may become annoying and significantly lower th

Pagina 467

36 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsparticular security compliance concept is aimed at validating client a

Pagina 468 - SCM Push Client

Chapter 2. Architecting the solution 37Part 2, “Customer environment” on page 75, details a comprehensive deployment scenario.2.6 ConclusionIn this

Pagina 469 - Tools and tricks

38 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 470 - Cisco IOS Software switch

© Copyright IBM Corp. 2005, 2007. All rights reserved. 39Chapter 3. Component structureThis chapter introduces the logical and physical components of

Pagina 471 - Cisco Secure ACS server

40 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1 Logical componentsThe IBM Integrated Security Solution for Cisco

Pagina 472

Chapter 3. Component structure 41The logical components are:򐂰 Network Admission Control򐂰 Compliance򐂰 RemediationThe following sections provide funct

Pagina 473 - NAC Appliance details

iv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1.1 Network Admission Control. . . . . . . . . . . . . . . . . . .

Pagina 474 - In-band versus out-of-band

42 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor network devices and other services. The various components that co

Pagina 475 - NAC Appliance integration

Chapter 3. Component structure 43Policy enforcement deviceClients access enterprise resources via the network which makes it an effective point to v

Pagina 476 - Integration design

44 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-3 shows the Cisco Trust Agent architecture, followed by a bri

Pagina 477 - NAC Appliance Agent

Chapter 3. Component structure 45EAP methods Provide a mechanism to authenticate the application or device requesting the host credentials, and encr

Pagina 478 - Policy collector

46 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsClean Access Policy UpdatesThese are regular updates of pre-packaged p

Pagina 479 - Scheduler

Chapter 3. Component structure 47Figure 3-4 depicts Security Compliance Manager’s high-level component architecture, followed by a brief explanation

Pagina 480

48 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCompliance evaluation Consisting of Security Compliance Manager snapsh

Pagina 481 - Scheduler.bat

Chapter 3. Component structure 49The compliance client component (Figure 3-5) consists of the following modules:򐂰 Policy collector򐂰 Posture collecto

Pagina 482 - NAC Appliance Manager

50 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the IBM Integrated Security Solution for Cisco Networks, the collec

Pagina 483 - State mapping and scenarios

Chapter 3. Component structure 51Posture cacheThis component provides the caching area where posture collectors store the results of posture determi

Pagina 484

Contents v6.2.1 Posture collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1536.2.2 Policy collector . . . .

Pagina 485

52 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand any client components that would normally be installed on a Tivoli

Pagina 486

Chapter 3. Component structure 53Cisco Trust AgentThe Cisco Trust Agent is Cisco client software that is required to pass posture credentials and va

Pagina 487

54 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.2.2 Network access infrastructureAll users connect to enterprise re

Pagina 488 - Conclusion

Chapter 3. Component structure 55be deployed to the clients. The server is also used for administration and for providing reports about client compl

Pagina 489

56 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe flow consists of these process groups, depicted in Figure 3-6:1. P

Pagina 490 - The benefit of NAC

Chapter 3. Component structure 57remediation object should also be provided. Details of the policy creation and deployment process are discussed her

Pagina 491

58 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Cisco Secure ACS policy creation (1d)An ACS policy consists of rules

Pagina 492 - NAC implementation options

Chapter 3. Component structure 59Posture validation and policy enforcement (flow 3)This section contains details about how a client in a live enviro

Pagina 493 - The NAC Appliance

60 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Quarantine– Infected– Unknown򐂰 Posture notification (3f)After the AC

Pagina 494 - Investment protection

Chapter 3. Component structure 61Remediation (flow 4)Two cases should be considered for the remediation process: one where the organization has a Ti

Pagina 495

vi Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFault isolation . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 496 - NAC technology

62 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.3.1 Secure communicationThe components are designed to provide a hi

Pagina 497 - NAC Framework components

Chapter 3. Component structure 63NAC communicationDuring communication of the Cisco Trust Agent client with the Cisco Secure ACS, a secure PEAP sess

Pagina 498

64 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-8 shows the security zones and their classifications. Organiz

Pagina 499 - Additional material

Chapter 3. Component structure 65corporate network through what are considered external networks, such as the DMZ and intranet zones.Details of reso

Pagina 500 - Using the Web material

66 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Remote offices and branch offices can use the Internet as a primary

Pagina 501 - Related publications

Chapter 3. Component structure 673.4.2 Policy enforcement pointsThe IBM Integrated Security Solution for Cisco Networks employs the Cisco NAC solut

Pagina 502 - How to get IBM Redbooks

68 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAdvantages of this kind of deployment are:򐂰 Policy enforcement load di

Pagina 503 - Help from IBM

Chapter 3. Component structure 69Figure 3-11 Campus ingress enforcementSite-to-SiteVPN UsersInternetAAAAAABranch Office Compliance(Campus Ingress

Pagina 504

70 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSmall Office Home Office compliancePolicy enforcement can be used to p

Pagina 505 - Numerics

Chapter 3. Component structure 71Extranet complianceOrganizations could have WAN connections to share information with partners. This would require

Pagina 506

© Copyright IBM Corp. 2005, 2007. All rights reserved. viiNoticesThis information was developed for products and services offered in the U.S.A. IBM ma

Pagina 507

72 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsLab complianceOrganizations prefer having lab networks to test systems

Pagina 508

Chapter 3. Component structure 73Data Center protectionThe Data Center is the site where organizations host business-critical systems that require m

Pagina 509

74 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemote access protectionRemote access users use dial-up or VPN to conn

Pagina 510

© Copyright IBM Corp. 2005, 2007. All rights reserved. 75Part 2 Customer environmentPart 2 discusses how the IBM Integrated Security Solution for Cisc

Pagina 511

76 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Pagina 512

© Copyright IBM Corp. 2005, 2007. All rights reserved. 77Chapter 4. Armando Banking Brothers CorporationThis chapter provides an introduction to the o

Pagina 513

78 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4.1 Company profileArmando Brothers Banking Corporation (ABBC) is a f

Pagina 514

Chapter 4. Armando Banking Brothers Corporation 794.2 Current IT architectureThis section provides background information about the existing Armand

Pagina 515

80 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUncontrolled zone - InternetThe Internet has become a pivotal componen

Pagina 516

Chapter 4. Armando Banking Brothers Corporation 81Figure 4-2 is representative of the ITSO Lab Environment used for L2Dot1x NAC deployment.VLAN-11 H

Comentarios a estos manuales

Sin comentarios