Ibm Tivoli and Cisco Manual do Utilizador Página 1

Consulte online ou descarregue Manual do Utilizador para Hardware Ibm Tivoli and Cisco. IBM Tivoli and Cisco User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 516
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
ibm.com/redbooks
Building a Network
Access Control Solution
with IBM Tivoli and Cisco Systems
Axel Buecker
Richard Abdullah
Markus Belkin
Mike Dougherty
Wlodzimierz Dymaczewski
Vahid Mehr
Frank Yeh
Covering Cisco Network Admission
Control Framework and Appliance
Automated remediation of
noncompliant workstations
Advanced security
compliance notification
Front cover
Vista de página 0
1 2 3 4 5 6 ... 515 516

Resumo do Conteúdo

Página 1 - Access Control Solution

ibm.com/redbooksBuilding a NetworkAccess Control Solution with IBM Tivoli and Cisco SystemsAxel BueckerRichard AbdullahMarkus BelkinMike DoughertyWlo

Página 2

viii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTrademarksThe following terms are trademarks of the International Bu

Página 3 - January 2007

82 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshis credentials, the Cisco Secure ACS checks its local user database a

Página 4 - “Notices” on page vii

Chapter 4. Armando Banking Brothers Corporation 83Figure 4-3 on page 84 is representative of the ITSO Lab environment used for NAC Appliance deploym

Página 5 - Contents

84 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 4-3 Armando Banking Brothers network environment for NAC Appl

Página 6

Chapter 4. Armando Banking Brothers Corporation 854.2.3 Application security infrastructureGeneral management and the IT department are aware of th

Página 7 - Contents v

86 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe diagram in Figure 4-4 provides a high-level graphical overview of

Página 8

Chapter 4. Armando Banking Brothers Corporation 87cluster of IBM HTTP servers and WebSphere® Application Servers providing Internet banking and othe

Página 9

88 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the practice of IT security, it is possible to design an extremely

Página 10 - Trademarks

Chapter 4. Armando Banking Brothers Corporation 89Configure Security Compliance Manager posture policy.Ample thought time must always be provided fo

Página 11 - Admission Control

90 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstalling the Clean Access AgentHighlights the steps for installing t

Página 12

Chapter 4. Armando Banking Brothers Corporation 914.4 ConclusionArmando Banking Brothers Corporation (ABBC) is a company with a long history of lea

Página 13 - Preface xi

© Copyright IBM Corp. 2005, 2007. All rights reserved. ixPrefaceIn February of 2004, IBM® announced that it would be joining Cisco’s Network Admission

Página 14 - Become a published author

92 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 15 - Comments welcome

© Copyright IBM Corp. 2005, 2007. All rights reserved. 93Chapter 5. Solution designIn this chapter we describe the business objectives that drive the

Página 16

94 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsimplementation of part two is described in Chapter 7, “Network enforce

Página 17 - Summary of changes

Chapter 5. Solution design 955.1 Business requirementsAs described in Chapter 4, “Armando Banking Brothers Corporation” on page 77, Armando Banking

Página 18

96 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5.2 Functional requirementsIn this section, the business requirements

Página 19 - Architecture

Chapter 5. Solution design 975.2.3 Remediation requirementsExamining the operational maintenance related requirements we found that the following p

Página 20

98 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsallows us to warn users if any noncompliance is found and explain the

Página 21 - Business context

Chapter 5. Solution design 99ABBC will institute posture-based network admission. Systems deemed in noncompliance will be quarantined and allowed to

Página 22 - IBM Integrated

100 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The Security Compliance Manager client is armed with a remediation

Página 23 - Compliance & Remediation

Chapter 5. Solution design 101recommend that a process be in place for the normal notification and distribution of required workstation updates and

Página 24

x Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe team that wrote this redbookThis redbook was produced by a team of

Página 25

102 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsintegrated solution include the Security Compliance Manager client/se

Página 26

Chapter 5. Solution design 103with the Web Gateway component to allow for automated remediation at the workstation level without need of having Tivo

Página 27

104 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsEstablishing the policy collector parametersAt this point, we have to

Página 28 - 1.7 Conclusion

Chapter 5. Solution design 105Although the policy collector appears to be at a peer level with the posture collectors in Figure 5-5, it is actually

Página 29

106 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are several parameters of interest:򐂰 The POLICY_VERSION paramet

Página 30

Chapter 5. Solution design 107For ABBC we set the parameter to 60 seconds. Effectively this forces the posture status to refresh itself at every cha

Página 31 - Architecting the solution

108 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 The HANDLER_ATTRIBUTES parameter (Figure 5-9) establishes the URL w

Página 32 - 2.1.1 Architecture overview

Chapter 5. Solution design 109򐂰 The REMEDIATOR_JAR parameter (Figure 5-10 on page 108) tells the class loader where the JAR file is located for the

Página 33 - Network Admission Control

110 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfocus on how our posture policy, as established by the Tivoli Securit

Página 34

Chapter 5. Solution design 111In the posture validation policies, we check that a client has the correct minimum supported version of CTA installed

Página 35 - Security Compliance Manager

Preface xiRichard Abdullah is a Consulting Engineer with Cisco Systems Strategic Alliances. Prior to joining Cisco Systems in 2001, he worked in tec

Página 36

112 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsthose users that are in breach of these requirements, and how to reme

Página 37 - Compliance query

Chapter 5. Solution design 113Quarantine System Posture Token for a policy violation, he will be mapped to the Quarantine_Engineering_RAC (VLAN14).

Página 38 - Remediation handler

114 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Cisco Secure ACS evaluates each of the authorization rules in ord

Página 39 - Quarantined

Chapter 5. Solution design 115SVIs. Each Shared RADIUS Authorization Component had a corresponding ACL defined on the NAD. The example below shows t

Página 40 - Cisco NAC and IEEE 802.1x

116 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSee 8.4, “Building the remediation workflows” on page 417, for inform

Página 41 - Using Cisco terminology

Chapter 5. Solution design 117Compliance subsystemThe compliance subsystem has two major components: 򐂰 The IBM Security Compliance Manager server򐂰 T

Página 42 - Network identity provisioning

118 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe system used by ABBC for the Security Compliance Manager server is

Página 43 - Remediation process

Chapter 5. Solution design 119Operating system requirements for ACS V4.0 are:򐂰 Windows 2000 Server 򐂰 Windows 2000 Advanced Server with the following

Página 44

120 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC-enabled network deviceThe following Layer 2 and Layer 3 network d

Página 45 - Internet

Chapter 5. Solution design 121򐂰 Cisco 2600XM Series Router򐂰 Cisco 2691 Multiservice Platform򐂰 Cisco 2800 Series Router򐂰 Cisco 3640 Multiservice Plat

Página 46 - 2.3 Design process

xii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThanks to the following people for their contributions to this projec

Página 47

122 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemediation subsystemThe remediation subsystem has three components:򐂰

Página 48

Chapter 5. Solution design 123EAR file. This application must be installed on the same WebSphere Application Server as the Web Gateway component.Rem

Página 49 - Implementation

124 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 50 - 2.3.3 Solution objectives

© Copyright IBM Corp. 2005, 2007. All rights reserved. 125Chapter 6. Compliance subsystem implementationThis chapter describes the IBM Tivoli Security

Página 51 - Default network

126 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6.1 Tivoli Security Compliance Manager setupTivoli Security Complian

Página 52 - Performance controls

Chapter 6. Compliance subsystem implementation 1272. After a little while you are presented with the Welcome window, as shown in Figure 6-1. Click t

Página 53 - 2.4 Implementation flow

128 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The DB2 version selection is presented similar to the one shown in

Página 54

Chapter 6. Compliance subsystem implementation 1294. Next the welcome window is displayed, as presented in Figure 6-3. Click Next.Figure 6-3 Setup

Página 55 - 2.6 Conclusion

130 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. On the next dialog you are presented with the standard license agr

Página 56

Chapter 6. Compliance subsystem implementation 1316. In the Installation type selection window (Figure 6-5) leave all of the default values (which i

Página 57 - Component structure

Preface xiiiFind out more about the residency program, browse the residency index, and apply online at:ibm.com/redbooks/residencies.htmlComments wel

Página 58 - 3.1 Logical components

132 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. On the next dialog, shown in Figure 6-6, you are presented with th

Página 59 - Posture validation server

Chapter 6. Compliance subsystem implementation 1338. In the next window, shown in Figure 6-7, you must select the installation destination folder. M

Página 60 - Figure 3-2 ACS architecture

134 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next dialog, shown in Figure 6-8, you must provide user inf

Página 61 - Admission control client

Chapter 6. Compliance subsystem implementation 13510.In the next dialog, depicted in Figure 6-9, you are presented with the administration contact c

Página 62

136 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.In the next window, shown in Figure 6-10, you can modify the DB2 i

Página 63

Chapter 6. Compliance subsystem implementation 13712.As we do not need to use any DB2 tools on the next dialog, shown in Figure 6-11, click Next.Fig

Página 64 - 3.1.2 Compliance

138 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.In the next window, presented in Figure 6-12, you can provide the

Página 65

Chapter 6. Compliance subsystem implementation 13914.In the next window, shown in Figure 6-13, you are given a last chance to review your selected o

Página 66 - Compliance client

140 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The installation may take a few minutes depending on the configura

Página 67 - Posture collector

Chapter 6. Compliance subsystem implementation 1412. The usual language selection box is presented, as shown on Figure 6-15. Accept English and clic

Página 68

xiv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 69 - 3.1.3 Remediation

142 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In the next window, shown in Figure 6-17, specify the destination

Página 70 - 3.2 Physical components

Chapter 6. Compliance subsystem implementation 143Tivoli Security Compliance Manager server installation. This is a recommended option in large scal

Página 71

144 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. You are presented the e-mail Server configuration dialog, as shown

Página 72 - Network access device

Chapter 6. Compliance subsystem implementation 1457. In the next window, shown on Figure 6-20, the installation wizard asks for the communication po

Página 73

146 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. The Server Security Configuration window is displayed, as shown in

Página 74

Chapter 6. Compliance subsystem implementation 1479. In the next window, presented in Figure 6-22, select the location for your database. If you ins

Página 75

148 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.In the next dialog, provide the database configuration information

Página 76 - Network Access Profiles

Chapter 6. Compliance subsystem implementation 14911.In the next dialog, shown in Figure 6-24, you are asked whether the database should be created

Página 77

150 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The next dialog allows you to specify an administrator user ID and

Página 78

Chapter 6. Compliance subsystem implementation 15113.Finally you are presented with the installation selection summary, as shown in Figure 6-26. Cli

Página 79 - Remediation (flow 4)

© Copyright IBM Corp. 2005, 2007. All rights reserved. xvSummary of changesThis section describes the technical changes made in this edition of the bo

Página 80 - 3.3.1 Secure communication

152 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems14.The installation itself is very fast, but the database creation pr

Página 81 - 3.4 Component placement

Chapter 6. Compliance subsystem implementation 153򐂰 The user password settings on the client workstation have to be following the policy, which mean

Página 82 - Figure 3-8 Security zones

154 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe status of a posture element can be one of the following:PASS The

Página 83

Chapter 6. Compliance subsystem implementation 155remediation subsystem, such as a Tivoli Configuration Manager. After the remediation has been perf

Página 84 - Other networks

156 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. When the GUI pops up, as shown on Figure 6-28, log in with the cre

Página 85 - Branch office compliance

Chapter 6. Compliance subsystem implementation 1575. You are presented with the default Message of the day window, which by default contains only th

Página 86 - Campus internal enforcement

158 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Navigate to the sample_polices directory created in step 1 and sel

Página 87 - (Campus Ingress Enforcement)

Chapter 6. Compliance subsystem implementation 1599. In the next step the import wizard performs a validation of the signatures of the collectors in

Página 88 - (PAT access protection)

160 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.Now the actual policy installation is performed. Depending on the

Página 89 - Extranet compliance

Chapter 6. Compliance subsystem implementation 16111.After the wizard is closed you will see the imported policy in the Administrative Console, as s

Página 90 - Lab compliance

xvi Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 91 - Data Center protection

162 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsmust be evaluated on each client workstation. This is the reason why

Página 92 - 3.5 Conclusion

Chapter 6. Compliance subsystem implementation 1632. In the right pane click the Collectors tab and select the Symantec Antivirus collector, as show

Página 93 - Customer

164 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe different conditions are:– Version of the Symantec Antivirus Soft

Página 94

Chapter 6. Compliance subsystem implementation 165To adjust the parameters to your need modify the operational parameters, selecting the appropriate

Página 95 - Corporation

166 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are six parameters regulating the behavior of the collector, wh

Página 96 - 4.1 Company profile

Chapter 6. Compliance subsystem implementation 167When you are done editing click Save.5. The next policy we customize is the one that checks for th

Página 97 - 4.2 Current IT architecture

168 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. The parameters for the collector nac.win.any.oslevel.PostureOSLeve

Página 98 - NAC Framework

Chapter 6. Compliance subsystem implementation 169The operational parameters listed above accept multiple values, so edit the appropriate parameters

Página 99

170 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsBack at the list of the collectors right-click the Windows Hotfixes c

Página 100 - NAC Appliance

Chapter 6. Compliance subsystem implementation 1718. The next policy we configure checks whether the personal firewall is installed and running. Sin

Página 101

© Copyright IBM Corp. 2005, 2007. All rights reserved. 1Part 1 Architecture and designIn this part we discuss the overall business context of the IBM

Página 102

172 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNO_KEY_RULE Operational Used to determine the status of the registry

Página 103

Chapter 6. Compliance subsystem implementation 173The way this collector works depends on the data you have provided as parameters.It first checks f

Página 104 - Firewall

174 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRulesRules are used to evaluate the detected registry value and deter

Página 105

Chapter 6. Compliance subsystem implementation 175There are some limitations on numeric context evaluations. The collector initially receives all va

Página 106 - Project overview

176 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 VALUE equal to InstallDirectory.򐂰 NO_KEY_RULE equal to FAIL.򐂰 NO_VA

Página 107

Chapter 6. Compliance subsystem implementation 177When you are done with editing the parameters for the nac.win.any.regkey.PostureRegKeyV2 collector

Página 108

178 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo configure the policy with the right service name check it in the S

Página 109 - 4.4 Conclusion

Chapter 6. Compliance subsystem implementation 179– SERVICE_RUNNING_WF equal to TCRZLSoftwareRunning– REQ_DISABLED not set– SERVICE_DISABLED_WF not

Página 110

180 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe new dialog is presented, as shown in Figure 6-47. Select the dest

Página 111 - Solution design

Chapter 6. Compliance subsystem implementation 181There cannot be two compliance queries with the same name in one policy, so the copy of the compli

Página 113 - 5.1 Business requirements

2 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 114 - 5.2 Functional requirements

182 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the following dialog modify the name value to Messenger Service Di

Página 115

Chapter 6. Compliance subsystem implementation 183Next select the Compliance SQL tab on the right pane and modify the violation message generated by

Página 116

184 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollector as well. Right-click the ZoneAlarm Firewall Active name und

Página 117 - Compliance

Chapter 6. Compliance subsystem implementation 185Now we must change the parameters for the new collector instance. Right-click the Messenger Servic

Página 118 - Remediation services

186 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsYou are presented with a warning that the changes will affect all of

Página 119

Chapter 6. Compliance subsystem implementation 187The steps are:1. When logged into the Tivoli Security Compliance Manager Administration Console wi

Página 120 - 5.3.1 Logical components

188 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Assign the policy to this new group. Select the group in the navig

Página 121

Chapter 6. Compliance subsystem implementation 1895. An informational dialog is displayed, as shown in Figure 6-59, showing the successful completio

Página 122

190 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbook we cover only the installation of the client on Windows. For oth

Página 123

Chapter 6. Compliance subsystem implementation 191The installation of the certificate that is required for secure communication with the Cisco Secur

Página 124

© Copyright IBM Corp. 2005, 2007. All rights reserved. 3Chapter 1. Business contextInformation Technology (IT) security is a vital component of busine

Página 125

192 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstallation of Cisco Trust Agent on WindowsThe Cisco Trust Agent ins

Página 126

Chapter 6. Compliance subsystem implementation 1933. The license agreement is presented, as shown in Figure 6-63. Select I accept the license agreem

Página 127 - Enforcing compliance criteria

194 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Accept the defaults (Figure 6-64) and click Next.Figure 6-64 Cis

Página 128 - Posture token

Chapter 6. Compliance subsystem implementation 1955. Accept the default depicted in Figure 6-65 and click Next.Figure 6-65 Cisco Trust Agent insta

Página 129

196 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Next (Figure 6-66).Figure 6-66 Ready to install the Cisco

Página 130

Chapter 6. Compliance subsystem implementation 1977. If the certificate file was copied into the Certs directory, the window in Figure 6-67 is prese

Página 131

198 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click Finish to close the installation, as shown in Figure 6-68.Fi

Página 132 - Healthy indicates that the

Chapter 6. Compliance subsystem implementation 199If the certificate has been successfully imported, the window shown in Figure 6-69 is displayed.Fi

Página 133 - Performing remediation

200 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Security Compliance Manager client installation requires the foll

Página 134 - 5.3.2 Physical components

Chapter 6. Compliance subsystem implementation 2012. The Security Compliance Manager welcome screen appears momentarily (Figure 6-71).Figure 6-71

Página 135 - Compliance subsystem

4 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPersonal computer workstations are used in the office, at home, or at a

Página 136 - Access Control Server

202 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Client Installation Utility window appears, as depicted in Fig

Página 137

Chapter 6. Compliance subsystem implementation 2034. The license agreement window is displayed (Figure 6-73). Select I accept the terms in the licen

Página 138 - Layer 3 devices

204 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Accept the default destination folder, shown in Figure 6-74, and c

Página 139 - Cisco Trust Agent

Chapter 6. Compliance subsystem implementation 2056. Accept the default client installation (Figure 6-75) and click Next.Figure 6-75 Setup type wi

Página 140 - Software Package Web Server

206 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the IBM Security Solution for Cisco Networks window (Figure 6-7

Página 141 - 5.4 Conclusion

Chapter 6. Compliance subsystem implementation 207Figure 6-77 Client connection window

Página 142

208 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The server communication configuration window, shown in Figure 6-7

Página 143

Chapter 6. Compliance subsystem implementation 20910.If you selected the DHCP option in the previous step, you will see the client DHCP configuratio

Página 144

210 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Finally, the installation summary window is displayed (Figure 6-80

Página 145

Chapter 6. Compliance subsystem implementation 21112.The Security Compliance Manager client is successfully installed. Click Finish to close the win

Página 146

Chapter 1. Business context 5concept that can protect all networks in this era. This IBM and Cisco integration, depicted in an overview in Figure 1-

Página 147

212 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.If you want to verify that the Security Compliance Manager posture

Página 148

© Copyright IBM Corp. 2005, 2007. All rights reserved. 213Chapter 7. Network enforcement subsystem implementationThis chapter contains detailed descri

Página 149

214 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.1 Configuring NAC Framework componentsThis section focuses on the

Página 150

Chapter 7. Network enforcement subsystem implementation 215Installing Cisco Secure ACSTo install Cisco Secure ACS Version 4.0 software on a machine

Página 151

216 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring the administrative interface to Cisco Secure ACSBy defaul

Página 152

Chapter 7. Network enforcement subsystem implementation 217– Network Access FilteringThis option enables the appearance of the network access filter

Página 153

218 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAllowing administrator access via HTTP (optional)If you want to confi

Página 154

Chapter 7. Network enforcement subsystem implementation 2192. Fill in the user name and password fields, and click Grant All to give all configurati

Página 155 - Figure 6-11, click Next

220 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco Secure ACS uses the certificate store that is built into the Wi

Página 156

Chapter 7. Network enforcement subsystem implementation 221To use a self-signed certificate, perform the following steps:1. Click Generate Self-Sign

Página 157

6 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt has become mandatory for businesses to comply with regulatory guidel

Página 158

222 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Restart the Cisco Secure ACS (Figure 7-7).Figure 7-7 Restart Cis

Página 159 - English and click Next

Chapter 7. Network enforcement subsystem implementation 2235. After completing the certificate setup process and installation, verify that the certi

Página 160

224 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo import Security Compliance Manager attributes, perform the followi

Página 161

Chapter 7. Network enforcement subsystem implementation 225filename is the name of the file in which you want CSUtil.exe to write all attribute defi

Página 162

226 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfilename is the file that the attributes will be written to. The Secu

Página 163

Chapter 7. Network enforcement subsystem implementation 227that you wish to include in the log file. Scroll down and change the file management sett

Página 164

228 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click the Log to CSV Failed Attempts report under Enable Logging.

Página 165

Chapter 7. Network enforcement subsystem implementation 2298. In the window in under Services Log File Configuration (Figure 7-12) change Level of D

Página 166

230 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt is possible to group the NADs into Network Device Groups (NDGs) fo

Página 167

Chapter 7. Network enforcement subsystem implementation 2312. Select Advanced Options (Figure 7-13 on page 230). Ensure that Network Device Groups i

Página 168

Chapter 1. Business context 7The IBM Integrated Security Solution for Cisco Networks checks every client’s workstation when it attempts to connect t

Página 169

232 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Select Network Configuration in the main menu. The screen in Figur

Página 170

Chapter 7. Network enforcement subsystem implementation 2336. From the Network Configuration screen, select the hyperlink under Network Device Group

Página 171 - 6.2.1 Posture collectors

234 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click Add Entry under AAA Clients to add any AAA clients to this p

Página 172 - 6.2.2 Policy collector

Chapter 7. Network enforcement subsystem implementation 2358. You should now see the newly defined AAA clients (Figure 7-18).Figure 7-18 AAA Clien

Página 173

236 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS attributesThe RADIUS attributes required for NAC m

Página 174

Chapter 7. Network enforcement subsystem implementation 2372. From the Interface Configuration menu, select RADIUS (Cisco IOS/PIX 6.0) (Figure 7-20)

Página 175

238 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsActive Directory, for example. To configure groups and vendor-specifi

Página 176

Chapter 7. Network enforcement subsystem implementation 239Configuring usersNow that the groups have been defined, we can create our users and then

Página 177 - Figure 6-34, click Next

240 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. You will be prompted for the user’s real name and description unde

Página 178

Chapter 7. Network enforcement subsystem implementation 241Global authentication setupThe Cisco Secure ACS supports many types of protocols for secu

Página 179

8 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsStandard reports that can be generated from the IBM Integrated Security

Página 180 - Figure 6-37 Policies view

242 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click EAP-FAST Configuration from the Global Authentication Setup

Página 181

Chapter 7. Network enforcement subsystem implementation 2436. Click Submit + Restart.Require client certificate for provisioning CheckedAllow Machin

Página 182

244 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring posture validationTo do this:1. Select Posture Validation

Página 183

Chapter 7. Network enforcement subsystem implementation 2452. Select Internal Posture Validation. The screen show in Figure 7-27 will be displayed.3

Página 184

246 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In this example, we have entered the name of the first policy as C

Página 185

Chapter 7. Network enforcement subsystem implementation 2475. Click Add Rule (Figure 7-29).Figure 7-29 Posture Validation for CTA

Página 186

248 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add Condition Set (Figure 7-30).Figure 7-30 Condition sets

Página 187

Chapter 7. Network enforcement subsystem implementation 2497. From the Attribute drop-down list (Figure 7-31), select Cisco:PA:PA-Version. The opera

Página 188

250 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Figure 7-32 shows that if this condition is satisfied, that an App

Página 189

Chapter 7. Network enforcement subsystem implementation 2519. Next we need to modify the default action, which is the action to be taken if the cond

Página 190

Chapter 1. Business context 9򐂰 Enable an automated remediation process that eases the process of regaining compliancy for all authorized users on th

Página 191

252 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The posture token remains Cisco:PA, however the posture token valu

Página 192 - Rule operators

Chapter 7. Network enforcement subsystem implementation 25311.Click Submit and you will find yourself back in the dialog shown in Figure 7-35.Figure

Página 193 - Rule format

254 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.Click Apply and Restart, as shown in Figure 7-36.Figure 7-36 CTA

Página 194

Chapter 7. Network enforcement subsystem implementation 25515.Click Add Policy (Figure 7-37).Figure 7-37 Repeating the process for Security Compli

Página 195

256 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.In this example, we use TSCM in the Name field and IBM Security Co

Página 196

Chapter 7. Network enforcement subsystem implementation 25717.After entering the name and description, click Submit and you will see the dialog show

Página 197

258 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems18.Click Add Rule to get to the screen shown in Figure 7-40.Figure 7-

Página 198

Chapter 7. Network enforcement subsystem implementation 25920.From the Attribute drop-down menu, select IBMCorporation:SCM:PolicyViolation. From the

Página 199

260 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Make sure that the posture token is set to IBMCorporation:SCM, and

Página 200

Chapter 7. Network enforcement subsystem implementation 26125.The posture token should be set to IBMCorporation:SCM (Figure 7-43) and the value shou

Página 201

10 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 1-2 depicts the relevant tasks in a life-cycle overview for end

Página 202

262 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems27.Click Done (Figure 7-44).Figure 7-44 Completed Security Complian

Página 203

Chapter 7. Network enforcement subsystem implementation 26328.Click Apply and Restart (Figure 7-45).Figure 7-45 Completed posture validation rules

Página 204

264 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS Authorization ComponentsIn this section we configu

Página 205

Chapter 7. Network enforcement subsystem implementation 2653. Click Add.4. To create the Healthy Sales RAC, in the Name field type Healthy_Sales_RAC

Página 206

266 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add next to Cisco IOS/PIX6.0, which brings you to Figure 7-4

Página 207 - TCMCLI utility policy

Chapter 7. Network enforcement subsystem implementation 26710.Repeat the same procedure for the IETF attributes, first selecting the relevant field

Página 208 - 6.3.1 Cisco Trust Agent

268 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.When completed, your Healthy Sales RAC should look like Figure 7-4

Página 209

Chapter 7. Network enforcement subsystem implementation 269Table 7-4 Quarantine Sales RAC attributesTable 7-5 Quarantine Engineering RAC attribu

Página 210

270 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIETF Termination-Action (29) RADIUS-Request(1)IETF Tunnel-Type (64) [

Página 211

Chapter 7. Network enforcement subsystem implementation 271Configuring Network Access ProfilesWe have now configured all of the individual component

Página 212

Chapter 1. Business context 11those mentioned in 1.2, “Why we need this” on page 5, mandate every organization to comply with regulatory acts. Keys

Página 213

272 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The newly created NAP is shown (Figure 7-51) with the three polici

Página 214 - 6. Click Next (Figure 6-66)

Chapter 7. Network enforcement subsystem implementation 2735. Click Authentication. Click the tab Populate from Global and ensure that Posture Valid

Página 215

274 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. From the screen shown in Figure 7-53, click Add Rule.Figure 7-53

Página 216

Chapter 7. Network enforcement subsystem implementation 27510.Under Condition → Required Credential Types, there is a list of available credentials.

Página 217

276 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Scrolling down the page to Action → Selected Internal Posture Vali

Página 218

Chapter 7. Network enforcement subsystem implementation 277An example of the CTA Healthy pop-up is shown in Figure 7-56.Figure 7-56 Example of CTA

Página 219 - (Figure 6-71)

278 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 7-58 CTA pop-up configuration14.Click Submit.Note: Steps 12

Página 220

Chapter 7. Network enforcement subsystem implementation 279Figure 7-59 Completed posture validation for NAC_IISSCN15.Click Done. This will take yo

Página 221

280 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.From the screen shown in Figure 7-51 on page 272, click Authorizat

Página 222

Chapter 7. Network enforcement subsystem implementation 28121.Click Submit (Figure 7-61).Figure 7-61 Healthy Sales SPT creation22.Repeat this proc

Página 223

Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsJanuary 2007International Technical Support OrganizationSG24-6678-01

Página 224

12 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 225

282 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems23.Your screen should look similar to that in Figure 7-62.Figure 7-62

Página 226

Chapter 7. Network enforcement subsystem implementation 283External User DatabaseOne of the most common methods of deploying an ACS is to use an ext

Página 227

284 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDownloadable Access Control ListsNAC L2/L3 IP uses EAPoUDP (EOU), whi

Página 228

Chapter 7. Network enforcement subsystem implementation 2855. Add a name and description in the Name and Description fields as appropriate (Figure 7

Página 229

286 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Enter the name of the ACL and the ACL definition (Figure 7-65).Fig

Página 230 - 6.4 Conclusion

Chapter 7. Network enforcement subsystem implementation 2878. Note that there is an option of binding the ACL just created to a network access filte

Página 231 - Network enforcement

288 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Repeat step 3 on page 265 to step 12 on page 268, using the values

Página 232

Chapter 7. Network enforcement subsystem implementation 289Configuring Network Access ProfilesWe have now configured all the individual components t

Página 233 - Installing Cisco Secure ACS

290 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. From the Downloadable ACL drop-down list, select Healthy_ACL (Figu

Página 234

Chapter 7. Network enforcement subsystem implementation 29112.For this scenario, we selected the Quarantine_L2IP_RAC and Quarantine_ACL as the Share

Página 235

© Copyright IBM Corp. 2005, 2007. All rights reserved. 13Chapter 2. Architecting the solutionIn this chapter we discuss the solution architecture of t

Página 236

292 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring Cisco 3750 switch for NAC L2 802.1xNew for NAC Phase 2 is

Página 237

Chapter 7. Network enforcement subsystem implementation 293!<output omitted>!interface FastEthernet1/0/5 description **Connected to CARE-SYSTE

Página 238

294 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess-list 140 deny ip any 192.168.11.0 0.0.0.255access-list 140 den

Página 239

Chapter 7. Network enforcement subsystem implementation 295allow Web access and DNS access in case of manual remediation requirements or access to t

Página 240

296 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis section describes how to configure a Cisco 3750 switch acting as

Página 241

Chapter 7. Network enforcement subsystem implementation 297 permit tcp any any eq domain deny ip any anyip access-list extended initial-acl permit

Página 242

298 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAudit Session ID : 000000005222BFF40000001BC0A80B33PostureToken

Página 243

Chapter 7. Network enforcement subsystem implementation 2992. Configuring Admission Control EOU3. Configuring an Exception List Configuration for Cl

Página 244 - Configuring logging

300 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis example causes traffic with a destination port 53 (domain) or po

Página 245

Chapter 7. Network enforcement subsystem implementation 301The Cisco Secure ACS then issues a token according to the group in which a user with the

Página 246

14 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.1 Solution architectures, design, and methodologiesOur objective fo

Página 247 - client

302 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Enabling the HTTP server is necessary for URL redirection. When UR

Página 248

Chapter 7. Network enforcement subsystem implementation 30310.3.3.30 FastEthernet0/0 EAP Healthy 1310.3.3.31 FastEthernet0

Página 249

304 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.2.1 Installing CCA AgentAt the time of writing this book, the late

Página 250

Chapter 7. Network enforcement subsystem implementation 3052. Accept the default installation folder and click Next, as shown in Figure 7-72.Figure

Página 251 - Figure 7-16 AAA clients

306 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click Finish to complete the installation (Figure 7-74).Figure 7-7

Página 252

Chapter 7. Network enforcement subsystem implementation 307The steps are:1. Open a Web browser and enter the IP address of the CAM. There is no spec

Página 253 - Figure 7-18 AAA Clients

308 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Clean Access Summary window will be displayed (Figure 7-76).Fi

Página 254 - Configuring RADIUS attributes

Chapter 7. Network enforcement subsystem implementation 3094. From the Main Menu, select Device Management → CCA Servers (Figure 7-77).Figure 7-77

Página 255 - Configuring groups

310 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Select New Server. Add the server IP address and server location,

Página 256 - Figure 7-21 Group Setup

Chapter 7. Network enforcement subsystem implementation 3117. The CAS should now be visible under List of Servers, shown in Figure 7-79.Figure 7-79

Página 257 - Configuring users

Chapter 2. Architecting the solution 15In general, the IBM Integrated Security Solution for Cisco Networks consists of three subsystems or logical c

Página 258 - Internal Database

312 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click the Manage icon for the CAS just added. This takes you to th

Página 259 - Global authentication setup

Chapter 7. Network enforcement subsystem implementation 3139. Select Device Management → CCA Servers → Network. Check that your screen resembles Fig

Página 260 - (Figure 7-24 on page 241)

314 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand non-trusted networks. The main subnet is added by default. For ea

Página 261 - 6. Click Submit + Restart

Chapter 7. Network enforcement subsystem implementation 31514.Click Add Mapping. Confirmation of the successful mapping will appear (Figure 7-83).Fi

Página 262 - To do this:

316 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Click Add. The VLAN ID should be an asterisk (*), the subnet infor

Página 263

Chapter 7. Network enforcement subsystem implementation 3172. Enter the group name and description (Figure 7-85).Figure 7-85 Switch Group creation

Página 264

318 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Verify your new switch group (Figure 7-86).Figure 7-86 Switch Gr

Página 265

Chapter 7. Network enforcement subsystem implementation 319Configuring a switch profileTo configure a switch profile follow these steps:1. From Swit

Página 266

320 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Click Add. A confirmation of the new profile will appear, as shown

Página 267

Chapter 7. Network enforcement subsystem implementation 321When a client connects to a controlled port, the port is assigned to the authentication V

Página 268 - Figure 7-33 on page 251

16 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsdevices seeking to access network computing resources, thereby limitin

Página 269 - (Figure 7-33)

322 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Under Options: Device Disconnect, check the box Remove out-of-band

Página 270

Chapter 7. Network enforcement subsystem implementation 3235. Click Add. The configured switch profiles will be displayed (Figure 7-91).Figure 7-91

Página 271 - 12.Click Done

324 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Complete as necessary, depending on the version of SNMP being used

Página 272

Chapter 7. Network enforcement subsystem implementation 325the IP address of the switch should be entered in the IP Address box, and a description e

Página 273

326 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. As seen in Figure 7-94, click the Ports icon.Figure 7-94 Managed

Página 274

Chapter 7. Network enforcement subsystem implementation 3276. Under Profile, use the drop-down list to configure the ports as appropriate. Our clien

Página 275

328 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Add the role name and role description as appropriate. Our example

Página 276

Chapter 7. Network enforcement subsystem implementation 3294. The new role should be visible under List Of Roles, depicted in Figure 7-97.Figure 7-9

Página 277

330 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. From the first drop-down menu, select the role you have created. I

Página 278

Chapter 7. Network enforcement subsystem implementation 3315. The action should be Allow and the protocol should be All (Figure 7-99).Figure 7-99

Página 279

Chapter 2. Architecting the solution 17Security Compliance ManagerIBM Tivoli Security Compliance Manager performs the functions of managing security

Página 280 - 27.Click Done (Figure 7-44)

332 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe completed ruleset should look like Figure 7-100.Figure 7-100 Un

Página 281

Chapter 7. Network enforcement subsystem implementation 3332. Add the user name, password, and description as appropriate. From the Role drop-down m

Página 282

334 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The user just created should be seen under List of Local Users, as

Página 283

Chapter 7. Network enforcement subsystem implementation 3352. Select the following options (Figure 7-103):– From the Check Category drop-down menu,

Página 284

336 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Value Name should be set to Version.– Value Data Type should be set

Página 285

Chapter 7. Network enforcement subsystem implementation 3376. These two checks should now be displayed (Figure 7-105).Figure 7-105 Rules check lis

Página 286

338 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click New Rule (Figure 7-106).Figure 7-106 New rule8. Enter the

Página 287

Chapter 7. Network enforcement subsystem implementation 33910.Repeat steps 7 and 8, entering the following information (Figure 7-107):Rule Name CCA_

Página 288

340 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The newly defined rules will be displayed (Figure 7-108).Figure 7-

Página 289 - Allow any Protocol

Chapter 7. Network enforcement subsystem implementation 34114.Click Requirements → New Requirements (Figure 7-109).Figure 7-109 Requirements15.Ent

Página 290 - Grant access

18 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPort details and communication flows between Security Compliance Manag

Página 291

342 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems17.Repeat steps 14 and 15, entering the following information (Figure

Página 292 - NAC_IISSCN_Posture_Profile

Chapter 7. Network enforcement subsystem implementation 34319.The Requirement List window should appear similar to Figure 7-111.Figure 7-111 Requi

Página 293

344 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Repeat steps 20 and 21, entering the following information (Figure

Página 294 - Healthy PA message:

Chapter 7. Network enforcement subsystem implementation 34525.From “Select requirements to associate with the role,” select both SCM_Service and CCA

Página 295

346 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDiscovered clientsTo check that the Clean Access Solution is working

Página 296

Chapter 7. Network enforcement subsystem implementation 347Logging on as a clientTo log on as a client follow these steps.1. Once the CCA Agent soft

Página 297

348 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click OK.5. If a client fails the compliance check, a Web page wil

Página 298

Chapter 7. Network enforcement subsystem implementation 3498. The user is advised of their temporary access (Figure 7-118), and clicks Continue.Figu

Página 299

350 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The Security Compliance Manager Compliance Report window pops up (

Página 300 - 24.Click Submit

Chapter 7. Network enforcement subsystem implementation 35113.The user clicks Close on the Security Compliance Manager Compliance Report window, whi

Página 301 - Clientless user

Chapter 2. Architecting the solution 19Tivoli Configuration ManagerIBM Tivoli Configuration Manager automates the manual provisioning and deployment

Página 302

352 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The end user is advised of successful login to the network (Figure

Página 303 - Figure 7-64 Naming of ACL

Chapter 7. Network enforcement subsystem implementation 353Example of interface configuration for CAM interface:interface FastEthernet1/0/18 descrip

Página 304 - 7. Click Submit

354 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExample of SNMP configuration:snmp-server community public RWsnmp-ser

Página 305 - Figure 7-66 Binding the ACL

© Copyright IBM Corp. 2005, 2007. All rights reserved. 355Chapter 8. Remediation subsystem implementationThis chapter describes the IBM Tivoli Configu

Página 306

356 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Installation of the software package utilities– Creating remediatio

Página 307

Chapter 8. Remediation subsystem implementation 3578.1 Automated remediation enablementTo enable automated remediation, the remediation handler tha

Página 308

358 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor Tivoli Configuration Manager package at the IBM Tivoli Security C

Página 309

Chapter 8. Remediation subsystem implementation 359򐂰 For Software Package Web Server component:The IISSCN enablement pack2 for Tivoli Configuration

Página 310

360 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPreparing for the installationTivoli Configuration Manager Web Gatewa

Página 311

Chapter 8. Remediation subsystem implementation 361The steps to install the minimal required version of Web infrastructure are:1. To start the insta

Página 312

20 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstables that contain data gathered by the collectors. In a generic Secu

Página 313

362 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The WebSphere Application Server Installation wizard is displayed,

Página 314

Chapter 8. Remediation subsystem implementation 3634. In the next window, the standard license agreement is presented, as shown in Figure 8-3. Accep

Página 315

364 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. In the next window shown in Figure 8-4 you must select the install

Página 316

Chapter 8. Remediation subsystem implementation 365This is shown in Figure 8-5. Click Next.Figure 8-5 Component selection dialogImportant: If you

Página 317

366 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next window, shown in Figure 8-6, you may specify the direc

Página 318

Chapter 8. Remediation subsystem implementation 3678. In the next window you must specify the node name and host name for the Application Server to

Página 319

368 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The next dialog (Figure 8-8) allows you to select whether you want

Página 320

Chapter 8. Remediation subsystem implementation 36910.The next window presented to you contains the installation options summary, as shown in Figure

Página 321 - Router#

370 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt may take a few minutes to complete the installation. Then you are

Página 322 - 7.2.1 Installing CCA Agent

Chapter 8. Remediation subsystem implementation 37112.Finally, there remain two open windows. One of them is the First Steps dialog you can just exi

Página 323

Chapter 2. Architecting the solution 21򐂰 If the client is not Security Compliance Manager policy–enabled, it is denied access to the corporate netwo

Página 324

372 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Make sure that the IBM HTTP server is not running (look for the Ap

Página 325 - The steps are:

Chapter 8. Remediation subsystem implementation 373b. The Install fix packs option is selected, as shown in Figure 8-13.Figure 8-13 Installation o

Página 326

374 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsc. The directory location provided for the fix packs is the fix packs

Página 327 - (Figure 7-77)

Chapter 8. Remediation subsystem implementation 375Now you can continue with the Tivoli Configuration Manager Web Gateway installation.Installation

Página 328

376 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The welcome window is presented (Figure 8-16). Click Next.Figure 8

Página 329

Chapter 8. Remediation subsystem implementation 3774. In the next window (Figure 8-17), the standard license agreement is shown. Accept the license

Página 330

378 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. The component selection is displayed, as shown in Figure 8-18. Mak

Página 331

Chapter 8. Remediation subsystem implementation 3796. The installation directory selection window is displayed (Figure 8-19). Accept the default pat

Página 332 - Figure 7-82 Managed subnets

380 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next dialog (Figure 8-20) most of the fields are already fi

Página 333 - Configure default login page

Chapter 8. Remediation subsystem implementation 3818. The Web infrastructure configuration window is displayed (Figure 8-21). Check whether the righ

Página 334 - Configuring a Switch Group

© Copyright International Business Machines Corporation 2005, 2007. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, dupli

Página 335 - 3. Click Add

22 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess, this is an acceptable solution. Users are authenticated and pl

Página 336

382 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIf your Tivoli Configuration Manager is a single node installation th

Página 337 - Configuring a switch profile

Chapter 8. Remediation subsystem implementation 38310.The Secure access configuration window is presented, as shown in Figure 8-23. Since we are not

Página 338 - Configuring Port Profile

384 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.The summary of the selected installation options is presented, as

Página 339

Chapter 8. Remediation subsystem implementation 38512.The installation can take a while depending on the configuration of your system. You can follo

Página 340

386 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshandler located on the workstation attempting to connect to the netwo

Página 341 - Configuring SNMP receiver

Chapter 8. Remediation subsystem implementation 3873. If you have followed the installation of WebSphere Application Server as described in this boo

Página 342 - Adding a managed switch

388 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. On the next page expand the Applications menu item in the left pan

Página 343 - IP Address box, and a

Chapter 8. Remediation subsystem implementation 3896. The Preparing for the application installation window is displayed (Figure 8-28). Accept the d

Página 344 - Figure 7-94 Managed switch

390 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Leave the defaults and click Next in the several next windows unti

Página 345 - Defining user roles

Chapter 8. Remediation subsystem implementation 3918. The installation may take a few seconds or few minutes depending on your server configuration.

Página 346

Chapter 2. Architecting the solution 23The IEEE 802.1x standard addresses the need to authenticate the user or client trying to connect to the parti

Página 347 - Creating traffic policies

392 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next window, shown in Figure 8-31, select Save to save the

Página 348

Chapter 8. Remediation subsystem implementation 39310.When you click the Enterprise Application link under Applications in the left pane you should

Página 349 - Access to TCM

394 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOpen the file using a text editor, and find the value of the WEB_SERV

Página 350 - Creating local users

Chapter 8. Remediation subsystem implementation 395This file contains the mapping between the remediation workflows and the posture collector parame

Página 351

396 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. You must initialize the package creation utility environment. Issu

Página 352 - Configure Clean Access Agent

Chapter 8. Remediation subsystem implementation 397In Example 8-2 and Example 8-3 we present the final content required for the files that must be c

Página 353

398 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess to corporate intranet resources). To avoid serious business di

Página 354

Chapter 8. Remediation subsystem implementation 399The checks defined by the particular compliance objects within the policy relate to the data gath

Página 355

400 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemspages would be in a subdirectory named pl_PL. The default language an

Página 356 - Figure 7-106 New rule

Chapter 8. Remediation subsystem implementation 401If none of these locations contain a valid page, the user interface falls back to the method used

Página 357

24 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 In the Cisco NAC solution, the EAP header is extended with posture d

Página 358 - Validity

402 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPosture element HTMLEach posture element has a unique name and status

Página 359 - Figure 7-109 Requirements

Chapter 8. Remediation subsystem implementation 403The wfattribute tagThe simplest variables are workflow attributes. When a posture collector perfo

Página 360

404 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTable 8-5 presents the field names that may be used when a posture it

Página 361

Chapter 8. Remediation subsystem implementation 405The attributes that are generated by the Security Compliance Manager client are always present, a

Página 362

406 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsinformation. For example, to enable the user interface to display the

Página 363 - 26.Click Update

Chapter 8. Remediation subsystem implementation 407The attributes will be listed each time a posture element is selected (they are not logged when a

Página 364 - Discovered clients

408 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems `--PostureElement

Página 365 - Logging on as a client

Chapter 8. Remediation subsystem implementation 4098.3.4 Creating HTML pages for ABBC policyFigure 8-34 summarizes the directory structure for the

Página 366

410 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFirst we create the default.html page describing these basic requirem

Página 367 - Continue

Chapter 8. Remediation subsystem implementation 411<div id="Logo"></div><div id="MajorTitle">Tivoli Network Ac

Página 368

Chapter 2. Architecting the solution 25This requirement can be fulfilled by providing each user with a unique identity and verifying it even before

Página 369

412 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbackground: #fff url("file:///C:/Progra~1/IBM/SCM/client/scripts

Página 370

Chapter 8. Remediation subsystem implementation 413To prepare separate descriptions for each of these conditions we create two subdirectories named

Página 371

414 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems</title></head><body><div id="Logo">

Página 372 - 7.3 Conclusion

Chapter 8. Remediation subsystem implementation 4153. Understanding the tags described in the previous step, we now build a more sophisticated HTML

Página 373

416 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems<div id="Logo"></div><div id="MajorTitl

Página 374

Chapter 8. Remediation subsystem implementation 417You can build similar pages for all of the compliance checks described in your policy. In the nex

Página 375

418 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsWhile editing our policy in 6.2, “Configuration of the compliance pol

Página 376 - 8.2.1 Prerequisites

Chapter 8. Remediation subsystem implementation 4192. In the next step we create the Windows script that will perform the actual job. We can reuse t

Página 377

420 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Next we create the configuration file for the sputil.sh utility co

Página 378

Chapter 8. Remediation subsystem implementation 421As a result you should see the output presented below:Region Disp Flags Port

Página 379

26 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.2 Definition of a Network Admission Control projectObjectives of a

Página 380

422 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTwo additional files are created in the $BINDIR/tcmremed/work directo

Página 381

Chapter 8. Remediation subsystem implementation 423The remediation process window is displayed and the proper software package block is downloaded a

Página 382

424 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfile. The live update process is initiated with the vpdn_lu.exe execu

Página 383

Chapter 8. Remediation subsystem implementation 4253. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Página 384

426 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Create the configuration file for sputil.sh utility containing the

Página 385

Chapter 8. Remediation subsystem implementation 427the missing hotfixes. As this policy checks for multiple hotfixes in parallel, the missing ones m

Página 386

428 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsHotfixId=KB896423TmfWebUIEndpoint=tcmweb4. This configuration file is

Página 387

Chapter 8. Remediation subsystem implementation 429If the package was created the result will look like below (the number in the middle of the resul

Página 388

430 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere is a small catch with this collector, as it is able to check fo

Página 389

Chapter 8. Remediation subsystem implementation 431AddRegistryValueBeforeExecData.arrayLength=2AddRegistryValueBeforeExecParentKey[0]=HKEY_LOCAL_MAC

Página 390

Chapter 2. Architecting the solution 27Figure 2-5 illustrates a possible NAC deployment scenario.Figure 2-5 NAC deployment scenarioTypical candida

Página 391

432 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareInstalledThe TCRZLSoftwareInstalled workflow is also ver

Página 392

Chapter 8. Remediation subsystem implementation 4333. Create the configuration file for the sputil.sh utility containing the instructions on how to

Página 393

434 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsworkflows installing or uninstalling software should use silent mode

Página 394 - Figure 8-16 Welcome window

Chapter 8. Remediation subsystem implementation 4354. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Página 395

436 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareDisabled directory and edit it with the text editor to m

Página 396

Chapter 8. Remediation subsystem implementation 437In order to remove the package for the TCRMessengerDisabled remediation workflow:1. Open a comman

Página 397

438 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 398

© Copyright IBM Corp. 2005, 2007. All rights reserved. 439Part 3 AppendixesIn the following two appendixes we take a closer look at these topics:򐂰 Gen

Página 399

440 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 400

© Copyright IBM Corp. 2005, 2007. All rights reserved. 441Appendix A. Hints and tipsThis appendix contains hints, tips, and other useful information t

Página 401 - is False) and click Next

28 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.3 Design processThe MASS methodology that we follow in this book in

Página 402

442 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDeployment overviewThe solution deployment starts with the registrati

Página 403

Appendix A. Hints and tips 443Figure A-1 TRC-specific objects and relationshipACS ServerExternal User DatabaseViolation CountTokenMandatory Creden

Página 404 - IISSCN Extension Pack2 for

444 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTop-level sequence of eventsThe NAC process starts when the client tr

Página 405

Appendix A. Hints and tips 445Figure A-2 ISSCN top-level sequence diagramRemediation Objects()PostureQuery()SCM Policy CollectorQuarantinePostureN

Página 406

446 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager and NAC compliance subsystemFigure A-3 sh

Página 407

Appendix A. Hints and tips 447Cisco NAC sequence of eventsThe NAC process is initiated by the network. Whenever access to a protected network is det

Página 408

448 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsattempts by the client to access a protected resource will also trigg

Página 409

Appendix A. Hints and tips 449then to determine the actual problem based on the expected behavior of the solution.Assuming that all of the software

Página 410

450 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollectors, at which time any state changes affected by the remediati

Página 411

Appendix A. Hints and tips 451Communication port usageTivoli Security Compliance Manager server and client communicate only with temporary connectio

Página 412

Chapter 2. Architecting the solution 292. Check control settings and compare to security policy.The audit team periodically checks the systems to be

Página 413

452 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco IOS Software routerOn a Cisco router running Cisco IOS Software

Página 414

Appendix A. Hints and tips 453TimeToNextReauth = 48Authentication Method = Dot1xPosture = HealthyAuthorized By = Authentication ServerVlan Policy =

Página 415

454 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager clientWhen the Security Compliance Manage

Página 416 - 8.3.1 Locating HTML

Appendix A. Hints and tips 455Client logging can be turned on by setting the debug property to true in the %SCM_HOME%\client\client.pref file. When

Página 417

456 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsassessment). It can also be deployed in Layer-2 mode (users are L2-ad

Página 418 - Posture item HTML

Appendix A. Hints and tips 457meantime, the Clean Access Manager provides port-level or role-level control by assigning ports to specific VLANs, ass

Página 419 - HTML pages example

458 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInterested parties can use this design and the prototypes of these co

Página 420 - Posture element HTML

Appendix A. Hints and tips 459A high-level overview of this design is depicted in Figure 8-42.Figure 8-42 High-level overviewIntegration component

Página 421 - The field Tag

460 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTSCMAgent.batThis script creates the compliance semaphore file in and

Página 422 - The remattribute tag

Appendix A. Hints and tips 461SchedulerA platform-specific task scheduler (EG Windows Task Scheduler or Cron on UNIX) is configured to run the Secur

Página 423

30 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe security compliance process for desktops and mobile clients can be

Página 424 - 8.3.3 Debug attributes

462 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsusing the example HTML form provided. It should be noted that default

Página 425 - Logging posture items

Appendix A. Hints and tips 463the old one. This will indicate that the special functionality of this prototype collector will be lost when the produ

Página 426 - Logging the HTML search path

464 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC Appliance ManagerA policy on the NAC Appliance Manager must be cr

Página 427

Appendix A. Hints and tips 465State mapping and scenariosOne way for the solution to approach a design is to consider all of the possible states tha

Página 428

466 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Security Compliance Manager Client:i. Runs compliance validation. I

Página 429

Appendix A. Hints and tips 467– Security Compliance Manager Client:• Runs compliance validation. In this case, no violations are found, so set semap

Página 430

468 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Remediation handler:• Since semaphore is -1, PopUp Remediation Inte

Página 431

Appendix A. Hints and tips 469Since scenarios 5 and 6 are the most complex, the sequence of events for these scenarios is depicted in Figure 8-43.Fi

Página 432

470 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Statuscheck.exe:• Requests rescan from Security Compliance Manager

Página 433

© Copyright IBM Corp. 2005, 2007. All rights reserved. 471Appendix B. Network Admission ControlIn this appendix we discuss the Network Admission Contr

Página 434

Chapter 2. Architecting the solution 31reason a policy cannot be complied with due to a particular business need, the situation has to be accepted a

Página 435

472 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExecutive summaryEmerging network security threats, such as viruses,

Página 436 - TCRNavScan workflow

Appendix B. Network Admission Control 473Dramatically improve network securityWhile most organizations use identity management and authentication, a

Página 437

474 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSome of the security policy compliance checks that NAC can perform in

Página 438

Appendix B. Network Admission Control 475support for a complex security implementation involving a number of security vendors, combined with a corpo

Página 439

476 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Network access by unmanaged computers (such as guests, contractors,

Página 440

Appendix B. Network Admission Control 477organizations have evolving needs, Cisco Clean Access product components that are installed now can be used

Página 441 - TCRNavVirusDefUpdate

478 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe next stepsLet us take a look at the next steps:1. Deploy Cisco Cl

Página 442

Appendix B. Network Admission Control 479NAC Framework componentsThe NAC Framework provides the following technology support:򐂰 Broad network device

Página 443 - TCRNavSoftwareInstalled

480 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Recommended components:– Cisco Security Agent– Cisco Security Monit

Página 444 - TCRMSPatchesInstallWinXP

© Copyright IBM Corp. 2005, 2007. All rights reserved. 481Appendix C. Additional materialThis redbook refers to additional material that can be downlo

Página 445

© Copyright IBM Corp. 2005, 2007. All rights reserved. iiiContentsNotices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 446 - HotfixId

32 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis means that for each desired change in the configuration settings,

Página 447

482 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUsing the Web materialThe additional Web material that accompanies th

Página 448

© Copyright IBM Corp. 2005, 2007. All rights reserved. 483Related publicationsThe publications listed in this section are considered particularly suit

Página 449

484 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOnline resourcesThese Web sites and URLs are also relevant as further

Página 450 - TCRZLSoftwareInstalled

Related publications 485Help from IBMIBM Support and downloadsibm.com/supportIBM Global Servicesibm.com/services

Página 451

486 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 452 - TCRZLSoftwareRunning

© Copyright IBM Corp. 2005, 2007. All rights reserved. 487IndexNumerics802.1x 16, 22, 26, 68, 81, 95, 265credentials 112Aaccess control list 34

Página 453 - TCRMessengerDisabled

488 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsphysical components 121pop-up notification 277posture plug-in 4

Página 454

Index 489service pack level collector 167service running collector 177Software Package Utilities 394Software Package Web Server 386switch co

Página 455 - 8.5 Conclusion

490 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIBM Tivoli Security Compliance Managersee Security Compliance Manager

Página 456

Index 491configuration in ACS 229network policy enforcement 60placement 67polling of posture status 61posture validation 59PostureQuery

Página 457 - Appendixes

Chapter 2. Architecting the solution 332.3.4 Network design discussionIn this section we discuss the following network design factors for the IBM I

Página 458

492 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstimers 301PostureNotification 447PostureQuery 444, 447PPPsee Po

Página 459 - Hints and tips

Index 493SSarbanes-Oxley Act 6scalability 35, 357scope of the project 27Secure Access Control Serversee Access Control Serversecure communicat

Página 460 - Deployment overview

494 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRMessengerDisabled workflow 435TCRMSPatchesInstallWinXP workflow

Página 461

Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 464

®SG24-6678-01 ISBN 0738489883INTERNATIONAL TECHNICALSUPPORTORGANIZATIONBUILDING TECHNICALINFORMATION BASED ONPRACTICAL EXPERIENCE IBM Redbooks are dev

Página 465 - Cisco NAC sequence of events

34 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the reference architecture described later in this book, there are

Página 466 - Fault isolation

Chapter 2. Architecting the solution 35revalidation process takes place too often, this pop-up window may become annoying and significantly lower th

Página 467

36 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsparticular security compliance concept is aimed at validating client a

Página 468 - SCM Push Client

Chapter 2. Architecting the solution 37Part 2, “Customer environment” on page 75, details a comprehensive deployment scenario.2.6 ConclusionIn this

Página 469 - Tools and tricks

38 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 470 - Cisco IOS Software switch

© Copyright IBM Corp. 2005, 2007. All rights reserved. 39Chapter 3. Component structureThis chapter introduces the logical and physical components of

Página 471 - Cisco Secure ACS server

40 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1 Logical componentsThe IBM Integrated Security Solution for Cisco

Página 472

Chapter 3. Component structure 41The logical components are:򐂰 Network Admission Control򐂰 Compliance򐂰 RemediationThe following sections provide funct

Página 473 - NAC Appliance details

iv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1.1 Network Admission Control. . . . . . . . . . . . . . . . . . .

Página 474 - In-band versus out-of-band

42 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor network devices and other services. The various components that co

Página 475 - NAC Appliance integration

Chapter 3. Component structure 43Policy enforcement deviceClients access enterprise resources via the network which makes it an effective point to v

Página 476 - Integration design

44 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-3 shows the Cisco Trust Agent architecture, followed by a bri

Página 477 - NAC Appliance Agent

Chapter 3. Component structure 45EAP methods Provide a mechanism to authenticate the application or device requesting the host credentials, and encr

Página 478 - Policy collector

46 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsClean Access Policy UpdatesThese are regular updates of pre-packaged p

Página 479 - Scheduler

Chapter 3. Component structure 47Figure 3-4 depicts Security Compliance Manager’s high-level component architecture, followed by a brief explanation

Página 480

48 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCompliance evaluation Consisting of Security Compliance Manager snapsh

Página 481 - Scheduler.bat

Chapter 3. Component structure 49The compliance client component (Figure 3-5) consists of the following modules:򐂰 Policy collector򐂰 Posture collecto

Página 482 - NAC Appliance Manager

50 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the IBM Integrated Security Solution for Cisco Networks, the collec

Página 483 - State mapping and scenarios

Chapter 3. Component structure 51Posture cacheThis component provides the caching area where posture collectors store the results of posture determi

Página 484

Contents v6.2.1 Posture collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1536.2.2 Policy collector . . . .

Página 485

52 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand any client components that would normally be installed on a Tivoli

Página 486

Chapter 3. Component structure 53Cisco Trust AgentThe Cisco Trust Agent is Cisco client software that is required to pass posture credentials and va

Página 487

54 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.2.2 Network access infrastructureAll users connect to enterprise re

Página 488 - Conclusion

Chapter 3. Component structure 55be deployed to the clients. The server is also used for administration and for providing reports about client compl

Página 489

56 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe flow consists of these process groups, depicted in Figure 3-6:1. P

Página 490 - The benefit of NAC

Chapter 3. Component structure 57remediation object should also be provided. Details of the policy creation and deployment process are discussed her

Página 491

58 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Cisco Secure ACS policy creation (1d)An ACS policy consists of rules

Página 492 - NAC implementation options

Chapter 3. Component structure 59Posture validation and policy enforcement (flow 3)This section contains details about how a client in a live enviro

Página 493 - The NAC Appliance

60 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Quarantine– Infected– Unknown򐂰 Posture notification (3f)After the AC

Página 494 - Investment protection

Chapter 3. Component structure 61Remediation (flow 4)Two cases should be considered for the remediation process: one where the organization has a Ti

Página 495

vi Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFault isolation . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 496 - NAC technology

62 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.3.1 Secure communicationThe components are designed to provide a hi

Página 497 - NAC Framework components

Chapter 3. Component structure 63NAC communicationDuring communication of the Cisco Trust Agent client with the Cisco Secure ACS, a secure PEAP sess

Página 498

64 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-8 shows the security zones and their classifications. Organiz

Página 499 - Additional material

Chapter 3. Component structure 65corporate network through what are considered external networks, such as the DMZ and intranet zones.Details of reso

Página 500 - Using the Web material

66 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Remote offices and branch offices can use the Internet as a primary

Página 501 - Related publications

Chapter 3. Component structure 673.4.2 Policy enforcement pointsThe IBM Integrated Security Solution for Cisco Networks employs the Cisco NAC solut

Página 502 - How to get IBM Redbooks

68 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAdvantages of this kind of deployment are:򐂰 Policy enforcement load di

Página 503 - Help from IBM

Chapter 3. Component structure 69Figure 3-11 Campus ingress enforcementSite-to-SiteVPN UsersInternetAAAAAABranch Office Compliance(Campus Ingress

Página 504

70 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSmall Office Home Office compliancePolicy enforcement can be used to p

Página 505 - Numerics

Chapter 3. Component structure 71Extranet complianceOrganizations could have WAN connections to share information with partners. This would require

Página 506

© Copyright IBM Corp. 2005, 2007. All rights reserved. viiNoticesThis information was developed for products and services offered in the U.S.A. IBM ma

Página 507

72 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsLab complianceOrganizations prefer having lab networks to test systems

Página 508

Chapter 3. Component structure 73Data Center protectionThe Data Center is the site where organizations host business-critical systems that require m

Página 509

74 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemote access protectionRemote access users use dial-up or VPN to conn

Página 510

© Copyright IBM Corp. 2005, 2007. All rights reserved. 75Part 2 Customer environmentPart 2 discusses how the IBM Integrated Security Solution for Cisc

Página 511

76 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Página 512

© Copyright IBM Corp. 2005, 2007. All rights reserved. 77Chapter 4. Armando Banking Brothers CorporationThis chapter provides an introduction to the o

Página 513

78 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4.1 Company profileArmando Brothers Banking Corporation (ABBC) is a f

Página 514

Chapter 4. Armando Banking Brothers Corporation 794.2 Current IT architectureThis section provides background information about the existing Armand

Página 515

80 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUncontrolled zone - InternetThe Internet has become a pivotal componen

Página 516

Chapter 4. Armando Banking Brothers Corporation 81Figure 4-2 is representative of the ITSO Lab Environment used for L2Dot1x NAC deployment.VLAN-11 H

Comentários a estes Manuais

Sem comentários