rasmus kamper mathiasen - cisco.com · rasmus kamper mathiasen © 2011 cisco and/or its affiliates....

13
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Systems Engineer Cisco Danmark [email protected] Rasmus Kamper Mathiasen

Upload: vanbao

Post on 27-Aug-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 1

Systems Engineer

Cisco Danmark

[email protected]

Rasmus Kamper Mathiasen

Page 2: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

USER ENTITLEMENT

• Device freedom

• Work from anywhere

• Application of choice

IT BURDEN

•Securing any device

•Supporting any location

•Ensuring application quality

Page 3: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3

The TransformationNew Borderless Enterprise

Anyone Anything

AnytimeAnywhere

BorderlessExperience

Person / Device,

Device / Device

Information

Employee,

Partner,

Customer

Communities

Work, Home,

On the Go…

Always Works,

Instant Access,

Instant Response

Page 4: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

C97-654933-00 | © 2011 Cisco and/or its affiliates confidential. All rights reserved. Cisco Confidential 4Cisco Confidential 4

The RIGHT Person

An approved Device

In The Right Way

Anyone

Any Device

Anywhere

Anytime

Borderless Networks

Page 5: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

C97-654933-00 | © 2011 Cisco and/or its affiliates confidential. All rights reserved. Cisco Confidential 5

Non-User Devices

• How do I discover

non-user devices?

• Can I determine what

they are?

• Can I control their

access?

• Are they being spoofed?

ISE: Policies for people and devices

• Can I allow guests

Internet-only access?

• How do I manage guest

access?

• Can this work in wireless

and wired?

• How do I monitor guest

activities?

Guest Access

• How can I restrict access

to my network?

• Can I manage the risk of

using personal PCs,

tablets, smart-devices?

• Access rights on-prem,

at home, on the road?

• Devices are healthy?

Authorized Access

Page 6: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2010 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialC97-576463-00 6

Other Conditions

Identity Information

+Group:

Contractor

Group:

Full-TimeEmployee

Group:

Guest

Authentication and Authorization

Time and Date

Access Type

LocationPosture

Authorization (Controlling Access)

Broad Access

Limited Access

Guest/Internet

Deny Access

Quarantine

Access ComplianceReporting

Device Type

802.1x/Infrastructure

Vicky Sanchez

Employee, Marketing

Wireline

3 p.m.

Frank Lee

Guest

Wireless

9 a.m.

Security Camera G/W

Agentless Asset

MAC: F5 AB 8B 65 00 D4

Francois Didier

Consultant

HQ—Strategy

Remote Access

6 p.m.

Page 7: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2010 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialC97-576463-00 7

Access Policy: Guest Access

Provision: Guest accounts via sponsor portal

Notify: Guests of account details by print, email, or SMS

Manage: Sponsor privileges, guest accounts and policies, guest portal

Report: On all aspects of guest accounts

Page 8: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2010 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialC97-576463-00 8

Access Policy: Non-Authenticating Devices

Device Identification

Determine device type

Centralized device discovery and inventory

Uses network device tables and analyzes endpoint traffic

Many endpoint devices are undocumented and cannot authenticate to the network

Printers

Fax Machines

IP Cameras

Cash Registers

Alarm Systems

Video Conference

Turnstiles

HVAC Systems

Enterprises withoutVoIP Wired

Endpoints Distribution

Enterprises withVoIP Wired Endpoints

Distribution

33%PCs

33%IP

Phones

33%Other

50%PCs

50%Other

Control and Audit

Authorize based on device role

Monitor and audit to prevent spoofing

Page 9: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

http://en.wikipedia.org/wiki/Consumerization

Page 10: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2010 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialC97-576463-00 10

Cisco TrustSec Portfolio

Appliance Policy Components

NAC Profiler

Profiles Non-

Authenticating Devices

NAC Guest

Full-Featured Guest

Provisioning Server

OR +

OR

Infrastructure Components (Enforcement)

Cisco 2900/3560/3700/4500/6500 and Nexus 7000 switches, Adaptive

Security Appliance (ASA), Wireless and Routing Infrastructure

NAC ManagerAdmin, Reporting,

and Policy Store

NAC ServerPosture, Services,

and Enforcement

NAC Agent

No-Cost Persistent & Temporal Clients for

Authentication, Posture, & Remediation

Web AgentAnyConnect or OS-

Embedded Supplicant

802.1x Supplicant

Identity & 802.1x

Access Policy System

ACS

Endpoint Components (Optional)

ISE Identity Services Engine

Page 11: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

Endpoints

Introducing Identity Services Engine (ISE) and TrustSec 2.0

Policy RulesProfilingAuthentication Posture

Troubleshooting

Monitoring

Network Enforcement

TrustSec Planning and Design Service

Page 12: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

C97-654933-00 | © 2011 Cisco and/or its affiliates confidential. All rights reserved. Cisco Confidential 12

Internet

Campus

Network

“Printers should only

ever communicate

internally”

“Employees should be able to

access everything but have

limited access on personal

devices”

“Everyone’s traffic

should be encrypted” Internal

Resources

Cisco Wireless

LAN Controller

Cisco Access

Point

Cisco® Identity Services EngineCisco

Switch

Cisco

Switch

Page 13: Rasmus Kamper Mathiasen - cisco.com · Rasmus Kamper Mathiasen © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 USER ENTITLEMENT

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

Thank you.Thank you.