Ibm Tivoli and Cisco Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Matériel Ibm Tivoli and Cisco. IBM Tivoli and Cisco User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 516
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
ibm.com/redbooks
Building a Network
Access Control Solution
with IBM Tivoli and Cisco Systems
Axel Buecker
Richard Abdullah
Markus Belkin
Mike Dougherty
Wlodzimierz Dymaczewski
Vahid Mehr
Frank Yeh
Covering Cisco Network Admission
Control Framework and Appliance
Automated remediation of
noncompliant workstations
Advanced security
compliance notification
Front cover
Vue de la page 0
1 2 3 4 5 6 ... 515 516

Résumé du contenu

Page 1 - Access Control Solution

ibm.com/redbooksBuilding a NetworkAccess Control Solution with IBM Tivoli and Cisco SystemsAxel BueckerRichard AbdullahMarkus BelkinMike DoughertyWlo

Page 2

viii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTrademarksThe following terms are trademarks of the International Bu

Page 3 - January 2007

82 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshis credentials, the Cisco Secure ACS checks its local user database a

Page 4 - “Notices” on page vii

Chapter 4. Armando Banking Brothers Corporation 83Figure 4-3 on page 84 is representative of the ITSO Lab environment used for NAC Appliance deploym

Page 5 - Contents

84 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 4-3 Armando Banking Brothers network environment for NAC Appl

Page 6

Chapter 4. Armando Banking Brothers Corporation 854.2.3 Application security infrastructureGeneral management and the IT department are aware of th

Page 7 - Contents v

86 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe diagram in Figure 4-4 provides a high-level graphical overview of

Page 8

Chapter 4. Armando Banking Brothers Corporation 87cluster of IBM HTTP servers and WebSphere® Application Servers providing Internet banking and othe

Page 9

88 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the practice of IT security, it is possible to design an extremely

Page 10 - Trademarks

Chapter 4. Armando Banking Brothers Corporation 89Configure Security Compliance Manager posture policy.Ample thought time must always be provided fo

Page 11 - Admission Control

90 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstalling the Clean Access AgentHighlights the steps for installing t

Page 12

Chapter 4. Armando Banking Brothers Corporation 914.4 ConclusionArmando Banking Brothers Corporation (ABBC) is a company with a long history of lea

Page 13 - Preface xi

© Copyright IBM Corp. 2005, 2007. All rights reserved. ixPrefaceIn February of 2004, IBM® announced that it would be joining Cisco’s Network Admission

Page 14 - Become a published author

92 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 15 - Comments welcome

© Copyright IBM Corp. 2005, 2007. All rights reserved. 93Chapter 5. Solution designIn this chapter we describe the business objectives that drive the

Page 16

94 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsimplementation of part two is described in Chapter 7, “Network enforce

Page 17 - Summary of changes

Chapter 5. Solution design 955.1 Business requirementsAs described in Chapter 4, “Armando Banking Brothers Corporation” on page 77, Armando Banking

Page 18

96 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5.2 Functional requirementsIn this section, the business requirements

Page 19 - Architecture

Chapter 5. Solution design 975.2.3 Remediation requirementsExamining the operational maintenance related requirements we found that the following p

Page 20

98 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsallows us to warn users if any noncompliance is found and explain the

Page 21 - Business context

Chapter 5. Solution design 99ABBC will institute posture-based network admission. Systems deemed in noncompliance will be quarantined and allowed to

Page 22 - IBM Integrated

100 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The Security Compliance Manager client is armed with a remediation

Page 23 - Compliance & Remediation

Chapter 5. Solution design 101recommend that a process be in place for the normal notification and distribution of required workstation updates and

Page 24

x Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe team that wrote this redbookThis redbook was produced by a team of

Page 25

102 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsintegrated solution include the Security Compliance Manager client/se

Page 26

Chapter 5. Solution design 103with the Web Gateway component to allow for automated remediation at the workstation level without need of having Tivo

Page 27

104 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsEstablishing the policy collector parametersAt this point, we have to

Page 28 - 1.7 Conclusion

Chapter 5. Solution design 105Although the policy collector appears to be at a peer level with the posture collectors in Figure 5-5, it is actually

Page 29

106 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are several parameters of interest:򐂰 The POLICY_VERSION paramet

Page 30

Chapter 5. Solution design 107For ABBC we set the parameter to 60 seconds. Effectively this forces the posture status to refresh itself at every cha

Page 31 - Architecting the solution

108 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 The HANDLER_ATTRIBUTES parameter (Figure 5-9) establishes the URL w

Page 32 - 2.1.1 Architecture overview

Chapter 5. Solution design 109򐂰 The REMEDIATOR_JAR parameter (Figure 5-10 on page 108) tells the class loader where the JAR file is located for the

Page 33 - Network Admission Control

110 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfocus on how our posture policy, as established by the Tivoli Securit

Page 34

Chapter 5. Solution design 111In the posture validation policies, we check that a client has the correct minimum supported version of CTA installed

Page 35 - Security Compliance Manager

Preface xiRichard Abdullah is a Consulting Engineer with Cisco Systems Strategic Alliances. Prior to joining Cisco Systems in 2001, he worked in tec

Page 36

112 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsthose users that are in breach of these requirements, and how to reme

Page 37 - Compliance query

Chapter 5. Solution design 113Quarantine System Posture Token for a policy violation, he will be mapped to the Quarantine_Engineering_RAC (VLAN14).

Page 38 - Remediation handler

114 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Cisco Secure ACS evaluates each of the authorization rules in ord

Page 39 - Quarantined

Chapter 5. Solution design 115SVIs. Each Shared RADIUS Authorization Component had a corresponding ACL defined on the NAD. The example below shows t

Page 40 - Cisco NAC and IEEE 802.1x

116 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSee 8.4, “Building the remediation workflows” on page 417, for inform

Page 41 - Using Cisco terminology

Chapter 5. Solution design 117Compliance subsystemThe compliance subsystem has two major components: 򐂰 The IBM Security Compliance Manager server򐂰 T

Page 42 - Network identity provisioning

118 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe system used by ABBC for the Security Compliance Manager server is

Page 43 - Remediation process

Chapter 5. Solution design 119Operating system requirements for ACS V4.0 are:򐂰 Windows 2000 Server 򐂰 Windows 2000 Advanced Server with the following

Page 44

120 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC-enabled network deviceThe following Layer 2 and Layer 3 network d

Page 45 - Internet

Chapter 5. Solution design 121򐂰 Cisco 2600XM Series Router򐂰 Cisco 2691 Multiservice Platform򐂰 Cisco 2800 Series Router򐂰 Cisco 3640 Multiservice Plat

Page 46 - 2.3 Design process

xii Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThanks to the following people for their contributions to this projec

Page 47

122 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemediation subsystemThe remediation subsystem has three components:򐂰

Page 48

Chapter 5. Solution design 123EAR file. This application must be installed on the same WebSphere Application Server as the Web Gateway component.Rem

Page 49 - Implementation

124 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 50 - 2.3.3 Solution objectives

© Copyright IBM Corp. 2005, 2007. All rights reserved. 125Chapter 6. Compliance subsystem implementationThis chapter describes the IBM Tivoli Security

Page 51 - Default network

126 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6.1 Tivoli Security Compliance Manager setupTivoli Security Complian

Page 52 - Performance controls

Chapter 6. Compliance subsystem implementation 1272. After a little while you are presented with the Welcome window, as shown in Figure 6-1. Click t

Page 53 - 2.4 Implementation flow

128 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The DB2 version selection is presented similar to the one shown in

Page 54

Chapter 6. Compliance subsystem implementation 1294. Next the welcome window is displayed, as presented in Figure 6-3. Click Next.Figure 6-3 Setup

Page 55 - 2.6 Conclusion

130 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. On the next dialog you are presented with the standard license agr

Page 56

Chapter 6. Compliance subsystem implementation 1316. In the Installation type selection window (Figure 6-5) leave all of the default values (which i

Page 57 - Component structure

Preface xiiiFind out more about the residency program, browse the residency index, and apply online at:ibm.com/redbooks/residencies.htmlComments wel

Page 58 - 3.1 Logical components

132 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. On the next dialog, shown in Figure 6-6, you are presented with th

Page 59 - Posture validation server

Chapter 6. Compliance subsystem implementation 1338. In the next window, shown in Figure 6-7, you must select the installation destination folder. M

Page 60 - Figure 3-2 ACS architecture

134 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next dialog, shown in Figure 6-8, you must provide user inf

Page 61 - Admission control client

Chapter 6. Compliance subsystem implementation 13510.In the next dialog, depicted in Figure 6-9, you are presented with the administration contact c

Page 62

136 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.In the next window, shown in Figure 6-10, you can modify the DB2 i

Page 63

Chapter 6. Compliance subsystem implementation 13712.As we do not need to use any DB2 tools on the next dialog, shown in Figure 6-11, click Next.Fig

Page 64 - 3.1.2 Compliance

138 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.In the next window, presented in Figure 6-12, you can provide the

Page 65

Chapter 6. Compliance subsystem implementation 13914.In the next window, shown in Figure 6-13, you are given a last chance to review your selected o

Page 66 - Compliance client

140 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The installation may take a few minutes depending on the configura

Page 67 - Posture collector

Chapter 6. Compliance subsystem implementation 1412. The usual language selection box is presented, as shown on Figure 6-15. Accept English and clic

Page 68

xiv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 69 - 3.1.3 Remediation

142 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In the next window, shown in Figure 6-17, specify the destination

Page 70 - 3.2 Physical components

Chapter 6. Compliance subsystem implementation 143Tivoli Security Compliance Manager server installation. This is a recommended option in large scal

Page 71

144 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. You are presented the e-mail Server configuration dialog, as shown

Page 72 - Network access device

Chapter 6. Compliance subsystem implementation 1457. In the next window, shown on Figure 6-20, the installation wizard asks for the communication po

Page 73

146 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. The Server Security Configuration window is displayed, as shown in

Page 74

Chapter 6. Compliance subsystem implementation 1479. In the next window, presented in Figure 6-22, select the location for your database. If you ins

Page 75

148 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.In the next dialog, provide the database configuration information

Page 76 - Network Access Profiles

Chapter 6. Compliance subsystem implementation 14911.In the next dialog, shown in Figure 6-24, you are asked whether the database should be created

Page 77

150 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The next dialog allows you to specify an administrator user ID and

Page 78

Chapter 6. Compliance subsystem implementation 15113.Finally you are presented with the installation selection summary, as shown in Figure 6-26. Cli

Page 79 - Remediation (flow 4)

© Copyright IBM Corp. 2005, 2007. All rights reserved. xvSummary of changesThis section describes the technical changes made in this edition of the bo

Page 80 - 3.3.1 Secure communication

152 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems14.The installation itself is very fast, but the database creation pr

Page 81 - 3.4 Component placement

Chapter 6. Compliance subsystem implementation 153򐂰 The user password settings on the client workstation have to be following the policy, which mean

Page 82 - Figure 3-8 Security zones

154 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe status of a posture element can be one of the following:PASS The

Page 83

Chapter 6. Compliance subsystem implementation 155remediation subsystem, such as a Tivoli Configuration Manager. After the remediation has been perf

Page 84 - Other networks

156 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. When the GUI pops up, as shown on Figure 6-28, log in with the cre

Page 85 - Branch office compliance

Chapter 6. Compliance subsystem implementation 1575. You are presented with the default Message of the day window, which by default contains only th

Page 86 - Campus internal enforcement

158 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Navigate to the sample_polices directory created in step 1 and sel

Page 87 - (Campus Ingress Enforcement)

Chapter 6. Compliance subsystem implementation 1599. In the next step the import wizard performs a validation of the signatures of the collectors in

Page 88 - (PAT access protection)

160 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.Now the actual policy installation is performed. Depending on the

Page 89 - Extranet compliance

Chapter 6. Compliance subsystem implementation 16111.After the wizard is closed you will see the imported policy in the Administrative Console, as s

Page 90 - Lab compliance

xvi Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 91 - Data Center protection

162 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsmust be evaluated on each client workstation. This is the reason why

Page 92 - 3.5 Conclusion

Chapter 6. Compliance subsystem implementation 1632. In the right pane click the Collectors tab and select the Symantec Antivirus collector, as show

Page 93 - Customer

164 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe different conditions are:– Version of the Symantec Antivirus Soft

Page 94

Chapter 6. Compliance subsystem implementation 165To adjust the parameters to your need modify the operational parameters, selecting the appropriate

Page 95 - Corporation

166 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere are six parameters regulating the behavior of the collector, wh

Page 96 - 4.1 Company profile

Chapter 6. Compliance subsystem implementation 167When you are done editing click Save.5. The next policy we customize is the one that checks for th

Page 97 - 4.2 Current IT architecture

168 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. The parameters for the collector nac.win.any.oslevel.PostureOSLeve

Page 98 - NAC Framework

Chapter 6. Compliance subsystem implementation 169The operational parameters listed above accept multiple values, so edit the appropriate parameters

Page 99

170 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsBack at the list of the collectors right-click the Windows Hotfixes c

Page 100 - NAC Appliance

Chapter 6. Compliance subsystem implementation 1718. The next policy we configure checks whether the personal firewall is installed and running. Sin

Page 101

© Copyright IBM Corp. 2005, 2007. All rights reserved. 1Part 1 Architecture and designIn this part we discuss the overall business context of the IBM

Page 102

172 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNO_KEY_RULE Operational Used to determine the status of the registry

Page 103

Chapter 6. Compliance subsystem implementation 173The way this collector works depends on the data you have provided as parameters.It first checks f

Page 104 - Firewall

174 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRulesRules are used to evaluate the detected registry value and deter

Page 105

Chapter 6. Compliance subsystem implementation 175There are some limitations on numeric context evaluations. The collector initially receives all va

Page 106 - Project overview

176 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 VALUE equal to InstallDirectory.򐂰 NO_KEY_RULE equal to FAIL.򐂰 NO_VA

Page 107

Chapter 6. Compliance subsystem implementation 177When you are done with editing the parameters for the nac.win.any.regkey.PostureRegKeyV2 collector

Page 108

178 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo configure the policy with the right service name check it in the S

Page 109 - 4.4 Conclusion

Chapter 6. Compliance subsystem implementation 179– SERVICE_RUNNING_WF equal to TCRZLSoftwareRunning– REQ_DISABLED not set– SERVICE_DISABLED_WF not

Page 110

180 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe new dialog is presented, as shown in Figure 6-47. Select the dest

Page 111 - Solution design

Chapter 6. Compliance subsystem implementation 181There cannot be two compliance queries with the same name in one policy, so the copy of the compli

Page 113 - 5.1 Business requirements

2 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 114 - 5.2 Functional requirements

182 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the following dialog modify the name value to Messenger Service Di

Page 115

Chapter 6. Compliance subsystem implementation 183Next select the Compliance SQL tab on the right pane and modify the violation message generated by

Page 116

184 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollector as well. Right-click the ZoneAlarm Firewall Active name und

Page 117 - Compliance

Chapter 6. Compliance subsystem implementation 185Now we must change the parameters for the new collector instance. Right-click the Messenger Servic

Page 118 - Remediation services

186 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsYou are presented with a warning that the changes will affect all of

Page 119

Chapter 6. Compliance subsystem implementation 187The steps are:1. When logged into the Tivoli Security Compliance Manager Administration Console wi

Page 120 - 5.3.1 Logical components

188 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Assign the policy to this new group. Select the group in the navig

Page 121

Chapter 6. Compliance subsystem implementation 1895. An informational dialog is displayed, as shown in Figure 6-59, showing the successful completio

Page 122

190 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbook we cover only the installation of the client on Windows. For oth

Page 123

Chapter 6. Compliance subsystem implementation 191The installation of the certificate that is required for secure communication with the Cisco Secur

Page 124

© Copyright IBM Corp. 2005, 2007. All rights reserved. 3Chapter 1. Business contextInformation Technology (IT) security is a vital component of busine

Page 125

192 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInstallation of Cisco Trust Agent on WindowsThe Cisco Trust Agent ins

Page 126

Chapter 6. Compliance subsystem implementation 1933. The license agreement is presented, as shown in Figure 6-63. Select I accept the license agreem

Page 127 - Enforcing compliance criteria

194 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Accept the defaults (Figure 6-64) and click Next.Figure 6-64 Cis

Page 128 - Posture token

Chapter 6. Compliance subsystem implementation 1955. Accept the default depicted in Figure 6-65 and click Next.Figure 6-65 Cisco Trust Agent insta

Page 129

196 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Next (Figure 6-66).Figure 6-66 Ready to install the Cisco

Page 130

Chapter 6. Compliance subsystem implementation 1977. If the certificate file was copied into the Certs directory, the window in Figure 6-67 is prese

Page 131

198 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click Finish to close the installation, as shown in Figure 6-68.Fi

Page 132 - Healthy indicates that the

Chapter 6. Compliance subsystem implementation 199If the certificate has been successfully imported, the window shown in Figure 6-69 is displayed.Fi

Page 133 - Performing remediation

200 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe Security Compliance Manager client installation requires the foll

Page 134 - 5.3.2 Physical components

Chapter 6. Compliance subsystem implementation 2012. The Security Compliance Manager welcome screen appears momentarily (Figure 6-71).Figure 6-71

Page 135 - Compliance subsystem

4 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPersonal computer workstations are used in the office, at home, or at a

Page 136 - Access Control Server

202 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Client Installation Utility window appears, as depicted in Fig

Page 137

Chapter 6. Compliance subsystem implementation 2034. The license agreement window is displayed (Figure 6-73). Select I accept the terms in the licen

Page 138 - Layer 3 devices

204 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Accept the default destination folder, shown in Figure 6-74, and c

Page 139 - Cisco Trust Agent

Chapter 6. Compliance subsystem implementation 2056. Accept the default client installation (Figure 6-75) and click Next.Figure 6-75 Setup type wi

Page 140 - Software Package Web Server

206 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the IBM Security Solution for Cisco Networks window (Figure 6-7

Page 141 - 5.4 Conclusion

Chapter 6. Compliance subsystem implementation 207Figure 6-77 Client connection window

Page 142

208 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The server communication configuration window, shown in Figure 6-7

Page 143

Chapter 6. Compliance subsystem implementation 20910.If you selected the DHCP option in the previous step, you will see the client DHCP configuratio

Page 144

210 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Finally, the installation summary window is displayed (Figure 6-80

Page 145

Chapter 6. Compliance subsystem implementation 21112.The Security Compliance Manager client is successfully installed. Click Finish to close the win

Page 146

Chapter 1. Business context 5concept that can protect all networks in this era. This IBM and Cisco integration, depicted in an overview in Figure 1-

Page 147

212 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.If you want to verify that the Security Compliance Manager posture

Page 148

© Copyright IBM Corp. 2005, 2007. All rights reserved. 213Chapter 7. Network enforcement subsystem implementationThis chapter contains detailed descri

Page 149

214 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.1 Configuring NAC Framework componentsThis section focuses on the

Page 150

Chapter 7. Network enforcement subsystem implementation 215Installing Cisco Secure ACSTo install Cisco Secure ACS Version 4.0 software on a machine

Page 151

216 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring the administrative interface to Cisco Secure ACSBy defaul

Page 152

Chapter 7. Network enforcement subsystem implementation 217– Network Access FilteringThis option enables the appearance of the network access filter

Page 153

218 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAllowing administrator access via HTTP (optional)If you want to confi

Page 154

Chapter 7. Network enforcement subsystem implementation 2192. Fill in the user name and password fields, and click Grant All to give all configurati

Page 155 - Figure 6-11, click Next

220 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco Secure ACS uses the certificate store that is built into the Wi

Page 156

Chapter 7. Network enforcement subsystem implementation 221To use a self-signed certificate, perform the following steps:1. Click Generate Self-Sign

Page 157

6 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt has become mandatory for businesses to comply with regulatory guidel

Page 158

222 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Restart the Cisco Secure ACS (Figure 7-7).Figure 7-7 Restart Cis

Page 159 - English and click Next

Chapter 7. Network enforcement subsystem implementation 2235. After completing the certificate setup process and installation, verify that the certi

Page 160

224 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTo import Security Compliance Manager attributes, perform the followi

Page 161

Chapter 7. Network enforcement subsystem implementation 225filename is the name of the file in which you want CSUtil.exe to write all attribute defi

Page 162

226 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfilename is the file that the attributes will be written to. The Secu

Page 163

Chapter 7. Network enforcement subsystem implementation 227that you wish to include in the log file. Scroll down and change the file management sett

Page 164

228 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click the Log to CSV Failed Attempts report under Enable Logging.

Page 165

Chapter 7. Network enforcement subsystem implementation 2298. In the window in under Services Log File Configuration (Figure 7-12) change Level of D

Page 166

230 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt is possible to group the NADs into Network Device Groups (NDGs) fo

Page 167

Chapter 7. Network enforcement subsystem implementation 2312. Select Advanced Options (Figure 7-13 on page 230). Ensure that Network Device Groups i

Page 168

Chapter 1. Business context 7The IBM Integrated Security Solution for Cisco Networks checks every client’s workstation when it attempts to connect t

Page 169

232 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Select Network Configuration in the main menu. The screen in Figur

Page 170

Chapter 7. Network enforcement subsystem implementation 2336. From the Network Configuration screen, select the hyperlink under Network Device Group

Page 171 - 6.2.1 Posture collectors

234 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click Add Entry under AAA Clients to add any AAA clients to this p

Page 172 - 6.2.2 Policy collector

Chapter 7. Network enforcement subsystem implementation 2358. You should now see the newly defined AAA clients (Figure 7-18).Figure 7-18 AAA Clien

Page 173

236 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS attributesThe RADIUS attributes required for NAC m

Page 174

Chapter 7. Network enforcement subsystem implementation 2372. From the Interface Configuration menu, select RADIUS (Cisco IOS/PIX 6.0) (Figure 7-20)

Page 175

238 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsActive Directory, for example. To configure groups and vendor-specifi

Page 176

Chapter 7. Network enforcement subsystem implementation 239Configuring usersNow that the groups have been defined, we can create our users and then

Page 177 - Figure 6-34, click Next

240 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. You will be prompted for the user’s real name and description unde

Page 178

Chapter 7. Network enforcement subsystem implementation 241Global authentication setupThe Cisco Secure ACS supports many types of protocols for secu

Page 179

8 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsStandard reports that can be generated from the IBM Integrated Security

Page 180 - Figure 6-37 Policies view

242 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click EAP-FAST Configuration from the Global Authentication Setup

Page 181

Chapter 7. Network enforcement subsystem implementation 2436. Click Submit + Restart.Require client certificate for provisioning CheckedAllow Machin

Page 182

244 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring posture validationTo do this:1. Select Posture Validation

Page 183

Chapter 7. Network enforcement subsystem implementation 2452. Select Internal Posture Validation. The screen show in Figure 7-27 will be displayed.3

Page 184

246 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. In this example, we have entered the name of the first policy as C

Page 185

Chapter 7. Network enforcement subsystem implementation 2475. Click Add Rule (Figure 7-29).Figure 7-29 Posture Validation for CTA

Page 186

248 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add Condition Set (Figure 7-30).Figure 7-30 Condition sets

Page 187

Chapter 7. Network enforcement subsystem implementation 2497. From the Attribute drop-down list (Figure 7-31), select Cisco:PA:PA-Version. The opera

Page 188

250 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Figure 7-32 shows that if this condition is satisfied, that an App

Page 189

Chapter 7. Network enforcement subsystem implementation 2519. Next we need to modify the default action, which is the action to be taken if the cond

Page 190

Chapter 1. Business context 9򐂰 Enable an automated remediation process that eases the process of regaining compliancy for all authorized users on th

Page 191

252 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The posture token remains Cisco:PA, however the posture token valu

Page 192 - Rule operators

Chapter 7. Network enforcement subsystem implementation 25311.Click Submit and you will find yourself back in the dialog shown in Figure 7-35.Figure

Page 193 - Rule format

254 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems13.Click Apply and Restart, as shown in Figure 7-36.Figure 7-36 CTA

Page 194

Chapter 7. Network enforcement subsystem implementation 25515.Click Add Policy (Figure 7-37).Figure 7-37 Repeating the process for Security Compli

Page 195

256 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.In this example, we use TSCM in the Name field and IBM Security Co

Page 196

Chapter 7. Network enforcement subsystem implementation 25717.After entering the name and description, click Submit and you will see the dialog show

Page 197

258 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems18.Click Add Rule to get to the screen shown in Figure 7-40.Figure 7-

Page 198

Chapter 7. Network enforcement subsystem implementation 25920.From the Attribute drop-down menu, select IBMCorporation:SCM:PolicyViolation. From the

Page 199

260 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Make sure that the posture token is set to IBMCorporation:SCM, and

Page 200

Chapter 7. Network enforcement subsystem implementation 26125.The posture token should be set to IBMCorporation:SCM (Figure 7-43) and the value shou

Page 201

10 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 1-2 depicts the relevant tasks in a life-cycle overview for end

Page 202

262 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems27.Click Done (Figure 7-44).Figure 7-44 Completed Security Complian

Page 203

Chapter 7. Network enforcement subsystem implementation 26328.Click Apply and Restart (Figure 7-45).Figure 7-45 Completed posture validation rules

Page 204

264 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring RADIUS Authorization ComponentsIn this section we configu

Page 205

Chapter 7. Network enforcement subsystem implementation 2653. Click Add.4. To create the Healthy Sales RAC, in the Name field type Healthy_Sales_RAC

Page 206

266 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Click Add next to Cisco IOS/PIX6.0, which brings you to Figure 7-4

Page 207 - TCMCLI utility policy

Chapter 7. Network enforcement subsystem implementation 26710.Repeat the same procedure for the IETF attributes, first selecting the relevant field

Page 208 - 6.3.1 Cisco Trust Agent

268 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.When completed, your Healthy Sales RAC should look like Figure 7-4

Page 209

Chapter 7. Network enforcement subsystem implementation 269Table 7-4 Quarantine Sales RAC attributesTable 7-5 Quarantine Engineering RAC attribu

Page 210

270 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIETF Termination-Action (29) RADIUS-Request(1)IETF Tunnel-Type (64) [

Page 211

Chapter 7. Network enforcement subsystem implementation 271Configuring Network Access ProfilesWe have now configured all of the individual component

Page 212

Chapter 1. Business context 11those mentioned in 1.2, “Why we need this” on page 5, mandate every organization to comply with regulatory acts. Keys

Page 213

272 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The newly created NAP is shown (Figure 7-51) with the three polici

Page 214 - 6. Click Next (Figure 6-66)

Chapter 7. Network enforcement subsystem implementation 2735. Click Authentication. Click the tab Populate from Global and ensure that Posture Valid

Page 215

274 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. From the screen shown in Figure 7-53, click Add Rule.Figure 7-53

Page 216

Chapter 7. Network enforcement subsystem implementation 27510.Under Condition → Required Credential Types, there is a list of available credentials.

Page 217

276 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.Scrolling down the page to Action → Selected Internal Posture Vali

Page 218

Chapter 7. Network enforcement subsystem implementation 277An example of the CTA Healthy pop-up is shown in Figure 7-56.Figure 7-56 Example of CTA

Page 219 - (Figure 6-71)

278 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 7-58 CTA pop-up configuration14.Click Submit.Note: Steps 12

Page 220

Chapter 7. Network enforcement subsystem implementation 279Figure 7-59 Completed posture validation for NAC_IISSCN15.Click Done. This will take yo

Page 221

280 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems16.From the screen shown in Figure 7-51 on page 272, click Authorizat

Page 222

Chapter 7. Network enforcement subsystem implementation 28121.Click Submit (Figure 7-61).Figure 7-61 Healthy Sales SPT creation22.Repeat this proc

Page 223

Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsJanuary 2007International Technical Support OrganizationSG24-6678-01

Page 224

12 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 225

282 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems23.Your screen should look similar to that in Figure 7-62.Figure 7-62

Page 226

Chapter 7. Network enforcement subsystem implementation 283External User DatabaseOne of the most common methods of deploying an ACS is to use an ext

Page 227

284 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDownloadable Access Control ListsNAC L2/L3 IP uses EAPoUDP (EOU), whi

Page 228

Chapter 7. Network enforcement subsystem implementation 2855. Add a name and description in the Name and Description fields as appropriate (Figure 7

Page 229

286 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. Enter the name of the ACL and the ACL definition (Figure 7-65).Fig

Page 230 - 6.4 Conclusion

Chapter 7. Network enforcement subsystem implementation 2878. Note that there is an option of binding the ACL just created to a network access filte

Page 231 - Network enforcement

288 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Repeat step 3 on page 265 to step 12 on page 268, using the values

Page 232

Chapter 7. Network enforcement subsystem implementation 289Configuring Network Access ProfilesWe have now configured all the individual components t

Page 233 - Installing Cisco Secure ACS

290 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems6. From the Downloadable ACL drop-down list, select Healthy_ACL (Figu

Page 234

Chapter 7. Network enforcement subsystem implementation 29112.For this scenario, we selected the Quarantine_L2IP_RAC and Quarantine_ACL as the Share

Page 235

© Copyright IBM Corp. 2005, 2007. All rights reserved. 13Chapter 2. Architecting the solutionIn this chapter we discuss the solution architecture of t

Page 236

292 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsConfiguring Cisco 3750 switch for NAC L2 802.1xNew for NAC Phase 2 is

Page 237

Chapter 7. Network enforcement subsystem implementation 293!<output omitted>!interface FastEthernet1/0/5 description **Connected to CARE-SYSTE

Page 238

294 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess-list 140 deny ip any 192.168.11.0 0.0.0.255access-list 140 den

Page 239

Chapter 7. Network enforcement subsystem implementation 295allow Web access and DNS access in case of manual remediation requirements or access to t

Page 240

296 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis section describes how to configure a Cisco 3750 switch acting as

Page 241

Chapter 7. Network enforcement subsystem implementation 297 permit tcp any any eq domain deny ip any anyip access-list extended initial-acl permit

Page 242

298 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAudit Session ID : 000000005222BFF40000001BC0A80B33PostureToken

Page 243

Chapter 7. Network enforcement subsystem implementation 2992. Configuring Admission Control EOU3. Configuring an Exception List Configuration for Cl

Page 244 - Configuring logging

300 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis example causes traffic with a destination port 53 (domain) or po

Page 245

Chapter 7. Network enforcement subsystem implementation 301The Cisco Secure ACS then issues a token according to the group in which a user with the

Page 246

14 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.1 Solution architectures, design, and methodologiesOur objective fo

Page 247 - client

302 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Enabling the HTTP server is necessary for URL redirection. When UR

Page 248

Chapter 7. Network enforcement subsystem implementation 30310.3.3.30 FastEthernet0/0 EAP Healthy 1310.3.3.31 FastEthernet0

Page 249

304 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7.2.1 Installing CCA AgentAt the time of writing this book, the late

Page 250

Chapter 7. Network enforcement subsystem implementation 3052. Accept the default installation folder and click Next, as shown in Figure 7-72.Figure

Page 251 - Figure 7-16 AAA clients

306 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click Finish to complete the installation (Figure 7-74).Figure 7-7

Page 252

Chapter 7. Network enforcement subsystem implementation 307The steps are:1. Open a Web browser and enter the IP address of the CAM. There is no spec

Page 253 - Figure 7-18 AAA Clients

308 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The Clean Access Summary window will be displayed (Figure 7-76).Fi

Page 254 - Configuring RADIUS attributes

Chapter 7. Network enforcement subsystem implementation 3094. From the Main Menu, select Device Management → CCA Servers (Figure 7-77).Figure 7-77

Page 255 - Configuring groups

310 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. Select New Server. Add the server IP address and server location,

Page 256 - Figure 7-21 Group Setup

Chapter 7. Network enforcement subsystem implementation 3117. The CAS should now be visible under List of Servers, shown in Figure 7-79.Figure 7-79

Page 257 - Configuring users

Chapter 2. Architecting the solution 15In general, the IBM Integrated Security Solution for Cisco Networks consists of three subsystems or logical c

Page 258 - Internal Database

312 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems8. Click the Manage icon for the CAS just added. This takes you to th

Page 259 - Global authentication setup

Chapter 7. Network enforcement subsystem implementation 3139. Select Device Management → CCA Servers → Network. Check that your screen resembles Fig

Page 260 - (Figure 7-24 on page 241)

314 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand non-trusted networks. The main subnet is added by default. For ea

Page 261 - 6. Click Submit + Restart

Chapter 7. Network enforcement subsystem implementation 31514.Click Add Mapping. Confirmation of the successful mapping will appear (Figure 7-83).Fi

Page 262 - To do this:

316 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Click Add. The VLAN ID should be an asterisk (*), the subnet infor

Page 263

Chapter 7. Network enforcement subsystem implementation 3172. Enter the group name and description (Figure 7-85).Figure 7-85 Switch Group creation

Page 264

318 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Verify your new switch group (Figure 7-86).Figure 7-86 Switch Gr

Page 265

Chapter 7. Network enforcement subsystem implementation 319Configuring a switch profileTo configure a switch profile follow these steps:1. From Swit

Page 266

320 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Click Add. A confirmation of the new profile will appear, as shown

Page 267

Chapter 7. Network enforcement subsystem implementation 321When a client connects to a controlled port, the port is assigned to the authentication V

Page 268 - Figure 7-33 on page 251

16 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsdevices seeking to access network computing resources, thereby limitin

Page 269 - (Figure 7-33)

322 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Under Options: Device Disconnect, check the box Remove out-of-band

Page 270

Chapter 7. Network enforcement subsystem implementation 3235. Click Add. The configured switch profiles will be displayed (Figure 7-91).Figure 7-91

Page 271 - 12.Click Done

324 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Complete as necessary, depending on the version of SNMP being used

Page 272

Chapter 7. Network enforcement subsystem implementation 325the IP address of the switch should be entered in the IP Address box, and a description e

Page 273

326 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. As seen in Figure 7-94, click the Ports icon.Figure 7-94 Managed

Page 274

Chapter 7. Network enforcement subsystem implementation 3276. Under Profile, use the drop-down list to configure the ports as appropriate. Our clien

Page 275

328 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. Add the role name and role description as appropriate. Our example

Page 276

Chapter 7. Network enforcement subsystem implementation 3294. The new role should be visible under List Of Roles, depicted in Figure 7-97.Figure 7-9

Page 277

330 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2. From the first drop-down menu, select the role you have created. I

Page 278

Chapter 7. Network enforcement subsystem implementation 3315. The action should be Allow and the protocol should be All (Figure 7-99).Figure 7-99

Page 279

Chapter 2. Architecting the solution 17Security Compliance ManagerIBM Tivoli Security Compliance Manager performs the functions of managing security

Page 280 - 27.Click Done (Figure 7-44)

332 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe completed ruleset should look like Figure 7-100.Figure 7-100 Un

Page 281

Chapter 7. Network enforcement subsystem implementation 3332. Add the user name, password, and description as appropriate. From the Role drop-down m

Page 282

334 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. The user just created should be seen under List of Local Users, as

Page 283

Chapter 7. Network enforcement subsystem implementation 3352. Select the following options (Figure 7-103):– From the Check Category drop-down menu,

Page 284

336 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Value Name should be set to Version.– Value Data Type should be set

Page 285

Chapter 7. Network enforcement subsystem implementation 3376. These two checks should now be displayed (Figure 7-105).Figure 7-105 Rules check lis

Page 286

338 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Click New Rule (Figure 7-106).Figure 7-106 New rule8. Enter the

Page 287

Chapter 7. Network enforcement subsystem implementation 33910.Repeat steps 7 and 8, entering the following information (Figure 7-107):Rule Name CCA_

Page 288

340 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems12.The newly defined rules will be displayed (Figure 7-108).Figure 7-

Page 289 - Allow any Protocol

Chapter 7. Network enforcement subsystem implementation 34114.Click Requirements → New Requirements (Figure 7-109).Figure 7-109 Requirements15.Ent

Page 290 - Grant access

18 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPort details and communication flows between Security Compliance Manag

Page 291

342 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems17.Repeat steps 14 and 15, entering the following information (Figure

Page 292 - NAC_IISSCN_Posture_Profile

Chapter 7. Network enforcement subsystem implementation 34319.The Requirement List window should appear similar to Figure 7-111.Figure 7-111 Requi

Page 293

344 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems22.Repeat steps 20 and 21, entering the following information (Figure

Page 294 - Healthy PA message:

Chapter 7. Network enforcement subsystem implementation 34525.From “Select requirements to associate with the role,” select both SCM_Service and CCA

Page 295

346 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDiscovered clientsTo check that the Clean Access Solution is working

Page 296

Chapter 7. Network enforcement subsystem implementation 347Logging on as a clientTo log on as a client follow these steps.1. Once the CCA Agent soft

Page 297

348 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. Click OK.5. If a client fails the compliance check, a Web page wil

Page 298

Chapter 7. Network enforcement subsystem implementation 3498. The user is advised of their temporary access (Figure 7-118), and clicks Continue.Figu

Page 299

350 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems10.The Security Compliance Manager Compliance Report window pops up (

Page 300 - 24.Click Submit

Chapter 7. Network enforcement subsystem implementation 35113.The user clicks Close on the Security Compliance Manager Compliance Report window, whi

Page 301 - Clientless user

Chapter 2. Architecting the solution 19Tivoli Configuration ManagerIBM Tivoli Configuration Manager automates the manual provisioning and deployment

Page 302

352 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems15.The end user is advised of successful login to the network (Figure

Page 303 - Figure 7-64 Naming of ACL

Chapter 7. Network enforcement subsystem implementation 353Example of interface configuration for CAM interface:interface FastEthernet1/0/18 descrip

Page 304 - 7. Click Submit

354 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExample of SNMP configuration:snmp-server community public RWsnmp-ser

Page 305 - Figure 7-66 Binding the ACL

© Copyright IBM Corp. 2005, 2007. All rights reserved. 355Chapter 8. Remediation subsystem implementationThis chapter describes the IBM Tivoli Configu

Page 306

356 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Installation of the software package utilities– Creating remediatio

Page 307

Chapter 8. Remediation subsystem implementation 3578.1 Automated remediation enablementTo enable automated remediation, the remediation handler tha

Page 308

358 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor Tivoli Configuration Manager package at the IBM Tivoli Security C

Page 309

Chapter 8. Remediation subsystem implementation 359򐂰 For Software Package Web Server component:The IISSCN enablement pack2 for Tivoli Configuration

Page 310

360 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPreparing for the installationTivoli Configuration Manager Web Gatewa

Page 311

Chapter 8. Remediation subsystem implementation 361The steps to install the minimal required version of Web infrastructure are:1. To start the insta

Page 312

20 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstables that contain data gathered by the collectors. In a generic Secu

Page 313

362 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The WebSphere Application Server Installation wizard is displayed,

Page 314

Chapter 8. Remediation subsystem implementation 3634. In the next window, the standard license agreement is presented, as shown in Figure 8-3. Accep

Page 315

364 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. In the next window shown in Figure 8-4 you must select the install

Page 316

Chapter 8. Remediation subsystem implementation 365This is shown in Figure 8-5. Click Next.Figure 8-5 Component selection dialogImportant: If you

Page 317

366 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next window, shown in Figure 8-6, you may specify the direc

Page 318

Chapter 8. Remediation subsystem implementation 3678. In the next window you must specify the node name and host name for the Application Server to

Page 319

368 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. The next dialog (Figure 8-8) allows you to select whether you want

Page 320

Chapter 8. Remediation subsystem implementation 36910.The next window presented to you contains the installation options summary, as shown in Figure

Page 321 - Router#

370 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIt may take a few minutes to complete the installation. Then you are

Page 322 - 7.2.1 Installing CCA Agent

Chapter 8. Remediation subsystem implementation 37112.Finally, there remain two open windows. One of them is the First Steps dialog you can just exi

Page 323

Chapter 2. Architecting the solution 21򐂰 If the client is not Security Compliance Manager policy–enabled, it is denied access to the corporate netwo

Page 324

372 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Make sure that the IBM HTTP server is not running (look for the Ap

Page 325 - The steps are:

Chapter 8. Remediation subsystem implementation 373b. The Install fix packs option is selected, as shown in Figure 8-13.Figure 8-13 Installation o

Page 326

374 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsc. The directory location provided for the fix packs is the fix packs

Page 327 - (Figure 7-77)

Chapter 8. Remediation subsystem implementation 375Now you can continue with the Tivoli Configuration Manager Web Gateway installation.Installation

Page 328

376 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. The welcome window is presented (Figure 8-16). Click Next.Figure 8

Page 329

Chapter 8. Remediation subsystem implementation 3774. In the next window (Figure 8-17), the standard license agreement is shown. Accept the license

Page 330

378 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. The component selection is displayed, as shown in Figure 8-18. Mak

Page 331

Chapter 8. Remediation subsystem implementation 3796. The installation directory selection window is displayed (Figure 8-19). Accept the default pat

Page 332 - Figure 7-82 Managed subnets

380 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. In the next dialog (Figure 8-20) most of the fields are already fi

Page 333 - Configure default login page

Chapter 8. Remediation subsystem implementation 3818. The Web infrastructure configuration window is displayed (Figure 8-21). Check whether the righ

Page 334 - Configuring a Switch Group

© Copyright International Business Machines Corporation 2005, 2007. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, dupli

Page 335 - 3. Click Add

22 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess, this is an acceptable solution. Users are authenticated and pl

Page 336

382 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIf your Tivoli Configuration Manager is a single node installation th

Page 337 - Configuring a switch profile

Chapter 8. Remediation subsystem implementation 38310.The Secure access configuration window is presented, as shown in Figure 8-23. Since we are not

Page 338 - Configuring Port Profile

384 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems11.The summary of the selected installation options is presented, as

Page 339

Chapter 8. Remediation subsystem implementation 38512.The installation can take a while depending on the configuration of your system. You can follo

Page 340

386 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemshandler located on the workstation attempting to connect to the netwo

Page 341 - Configuring SNMP receiver

Chapter 8. Remediation subsystem implementation 3873. If you have followed the installation of WebSphere Application Server as described in this boo

Page 342 - Adding a managed switch

388 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4. On the next page expand the Applications menu item in the left pan

Page 343 - IP Address box, and a

Chapter 8. Remediation subsystem implementation 3896. The Preparing for the application installation window is displayed (Figure 8-28). Accept the d

Page 344 - Figure 7-94 Managed switch

390 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems7. Leave the defaults and click Next in the several next windows unti

Page 345 - Defining user roles

Chapter 8. Remediation subsystem implementation 3918. The installation may take a few seconds or few minutes depending on your server configuration.

Page 346

Chapter 2. Architecting the solution 23The IEEE 802.1x standard addresses the need to authenticate the user or client trying to connect to the parti

Page 347 - Creating traffic policies

392 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems9. In the next window, shown in Figure 8-31, select Save to save the

Page 348

Chapter 8. Remediation subsystem implementation 39310.When you click the Enterprise Application link under Applications in the left pane you should

Page 349 - Access to TCM

394 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOpen the file using a text editor, and find the value of the WEB_SERV

Page 350 - Creating local users

Chapter 8. Remediation subsystem implementation 395This file contains the mapping between the remediation workflows and the posture collector parame

Page 351

396 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems5. You must initialize the package creation utility environment. Issu

Page 352 - Configure Clean Access Agent

Chapter 8. Remediation subsystem implementation 397In Example 8-2 and Example 8-3 we present the final content required for the files that must be c

Page 353

398 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsaccess to corporate intranet resources). To avoid serious business di

Page 354

Chapter 8. Remediation subsystem implementation 399The checks defined by the particular compliance objects within the policy relate to the data gath

Page 355

400 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemspages would be in a subdirectory named pl_PL. The default language an

Page 356 - Figure 7-106 New rule

Chapter 8. Remediation subsystem implementation 401If none of these locations contain a valid page, the user interface falls back to the method used

Page 357

24 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 In the Cisco NAC solution, the EAP header is extended with posture d

Page 358 - Validity

402 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsPosture element HTMLEach posture element has a unique name and status

Page 359 - Figure 7-109 Requirements

Chapter 8. Remediation subsystem implementation 403The wfattribute tagThe simplest variables are workflow attributes. When a posture collector perfo

Page 360

404 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTable 8-5 presents the field names that may be used when a posture it

Page 361

Chapter 8. Remediation subsystem implementation 405The attributes that are generated by the Security Compliance Manager client are always present, a

Page 362

406 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsinformation. For example, to enable the user interface to display the

Page 363 - 26.Click Update

Chapter 8. Remediation subsystem implementation 407The attributes will be listed each time a posture element is selected (they are not logged when a

Page 364 - Discovered clients

408 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems `--PostureElement

Page 365 - Logging on as a client

Chapter 8. Remediation subsystem implementation 4098.3.4 Creating HTML pages for ABBC policyFigure 8-34 summarizes the directory structure for the

Page 366

410 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFirst we create the default.html page describing these basic requirem

Page 367 - Continue

Chapter 8. Remediation subsystem implementation 411<div id="Logo"></div><div id="MajorTitle">Tivoli Network Ac

Page 368

Chapter 2. Architecting the solution 25This requirement can be fulfilled by providing each user with a unique identity and verifying it even before

Page 369

412 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsbackground: #fff url("file:///C:/Progra~1/IBM/SCM/client/scripts

Page 370

Chapter 8. Remediation subsystem implementation 413To prepare separate descriptions for each of these conditions we create two subdirectories named

Page 371

414 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems</title></head><body><div id="Logo">

Page 372 - 7.3 Conclusion

Chapter 8. Remediation subsystem implementation 4153. Understanding the tags described in the previous step, we now build a more sophisticated HTML

Page 373

416 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems<div id="Logo"></div><div id="MajorTitl

Page 374

Chapter 8. Remediation subsystem implementation 417You can build similar pages for all of the compliance checks described in your policy. In the nex

Page 375

418 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsWhile editing our policy in 6.2, “Configuration of the compliance pol

Page 376 - 8.2.1 Prerequisites

Chapter 8. Remediation subsystem implementation 4192. In the next step we create the Windows script that will perform the actual job. We can reuse t

Page 377

420 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Next we create the configuration file for the sputil.sh utility co

Page 378

Chapter 8. Remediation subsystem implementation 421As a result you should see the output presented below:Region Disp Flags Port

Page 379

26 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.2 Definition of a Network Admission Control projectObjectives of a

Page 380

422 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTwo additional files are created in the $BINDIR/tcmremed/work directo

Page 381

Chapter 8. Remediation subsystem implementation 423The remediation process window is displayed and the proper software package block is downloaded a

Page 382

424 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfile. The live update process is initiated with the vpdn_lu.exe execu

Page 383

Chapter 8. Remediation subsystem implementation 4253. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Page 384

426 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3. Create the configuration file for sputil.sh utility containing the

Page 385

Chapter 8. Remediation subsystem implementation 427the missing hotfixes. As this policy checks for multiple hotfixes in parallel, the missing ones m

Page 386

428 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsHotfixId=KB896423TmfWebUIEndpoint=tcmweb4. This configuration file is

Page 387

Chapter 8. Remediation subsystem implementation 429If the package was created the result will look like below (the number in the middle of the resul

Page 388

430 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThere is a small catch with this collector, as it is able to check fo

Page 389

Chapter 8. Remediation subsystem implementation 431AddRegistryValueBeforeExecData.arrayLength=2AddRegistryValueBeforeExecParentKey[0]=HKEY_LOCAL_MAC

Page 390

Chapter 2. Architecting the solution 27Figure 2-5 illustrates a possible NAC deployment scenario.Figure 2-5 NAC deployment scenarioTypical candida

Page 391

432 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareInstalledThe TCRZLSoftwareInstalled workflow is also ver

Page 392

Chapter 8. Remediation subsystem implementation 4333. Create the configuration file for the sputil.sh utility containing the instructions on how to

Page 393

434 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsworkflows installing or uninstalling software should use silent mode

Page 394 - Figure 8-16 Welcome window

Chapter 8. Remediation subsystem implementation 4354. Run the sputil.sh command to create the software package block and publish it on the Web Gatew

Page 395

436 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRZLSoftwareDisabled directory and edit it with the text editor to m

Page 396

Chapter 8. Remediation subsystem implementation 437In order to remove the package for the TCRMessengerDisabled remediation workflow:1. Open a comman

Page 397

438 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 398

© Copyright IBM Corp. 2005, 2007. All rights reserved. 439Part 3 AppendixesIn the following two appendixes we take a closer look at these topics:򐂰 Gen

Page 399

440 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 400

© Copyright IBM Corp. 2005, 2007. All rights reserved. 441Appendix A. Hints and tipsThis appendix contains hints, tips, and other useful information t

Page 401 - is False) and click Next

28 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems2.3 Design processThe MASS methodology that we follow in this book in

Page 402

442 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsDeployment overviewThe solution deployment starts with the registrati

Page 403

Appendix A. Hints and tips 443Figure A-1 TRC-specific objects and relationshipACS ServerExternal User DatabaseViolation CountTokenMandatory Creden

Page 404 - IISSCN Extension Pack2 for

444 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTop-level sequence of eventsThe NAC process starts when the client tr

Page 405

Appendix A. Hints and tips 445Figure A-2 ISSCN top-level sequence diagramRemediation Objects()PostureQuery()SCM Policy CollectorQuarantinePostureN

Page 406

446 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager and NAC compliance subsystemFigure A-3 sh

Page 407

Appendix A. Hints and tips 447Cisco NAC sequence of eventsThe NAC process is initiated by the network. Whenever access to a protected network is det

Page 408

448 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsattempts by the client to access a protected resource will also trigg

Page 409

Appendix A. Hints and tips 449then to determine the actual problem based on the expected behavior of the solution.Assuming that all of the software

Page 410

450 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemscollectors, at which time any state changes affected by the remediati

Page 411

Appendix A. Hints and tips 451Communication port usageTivoli Security Compliance Manager server and client communicate only with temporary connectio

Page 412

Chapter 2. Architecting the solution 292. Check control settings and compare to security policy.The audit team periodically checks the systems to be

Page 413

452 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCisco IOS Software routerOn a Cisco router running Cisco IOS Software

Page 414

Appendix A. Hints and tips 453TimeToNextReauth = 48Authentication Method = Dot1xPosture = HealthyAuthorized By = Authentication ServerVlan Policy =

Page 415

454 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSecurity Compliance Manager clientWhen the Security Compliance Manage

Page 416 - 8.3.1 Locating HTML

Appendix A. Hints and tips 455Client logging can be turned on by setting the debug property to true in the %SCM_HOME%\client\client.pref file. When

Page 417

456 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsassessment). It can also be deployed in Layer-2 mode (users are L2-ad

Page 418 - Posture item HTML

Appendix A. Hints and tips 457meantime, the Clean Access Manager provides port-level or role-level control by assigning ports to specific VLANs, ass

Page 419 - HTML pages example

458 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsInterested parties can use this design and the prototypes of these co

Page 420 - Posture element HTML

Appendix A. Hints and tips 459A high-level overview of this design is depicted in Figure 8-42.Figure 8-42 High-level overviewIntegration component

Page 421 - The field Tag

460 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTSCMAgent.batThis script creates the compliance semaphore file in and

Page 422 - The remattribute tag

Appendix A. Hints and tips 461SchedulerA platform-specific task scheduler (EG Windows Task Scheduler or Cron on UNIX) is configured to run the Secur

Page 423

30 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe security compliance process for desktops and mobile clients can be

Page 424 - 8.3.3 Debug attributes

462 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsusing the example HTML form provided. It should be noted that default

Page 425 - Logging posture items

Appendix A. Hints and tips 463the old one. This will indicate that the special functionality of this prototype collector will be lost when the produ

Page 426 - Logging the HTML search path

464 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsNAC Appliance ManagerA policy on the NAC Appliance Manager must be cr

Page 427

Appendix A. Hints and tips 465State mapping and scenariosOne way for the solution to approach a design is to consider all of the possible states tha

Page 428

466 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Security Compliance Manager Client:i. Runs compliance validation. I

Page 429

Appendix A. Hints and tips 467– Security Compliance Manager Client:• Runs compliance validation. In this case, no violations are found, so set semap

Page 430

468 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Remediation handler:• Since semaphore is -1, PopUp Remediation Inte

Page 431

Appendix A. Hints and tips 469Since scenarios 5 and 6 are the most complex, the sequence of events for these scenarios is depicted in Figure 8-43.Fi

Page 432

470 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Statuscheck.exe:• Requests rescan from Security Compliance Manager

Page 433

© Copyright IBM Corp. 2005, 2007. All rights reserved. 471Appendix B. Network Admission ControlIn this appendix we discuss the Network Admission Contr

Page 434

Chapter 2. Architecting the solution 31reason a policy cannot be complied with due to a particular business need, the situation has to be accepted a

Page 435

472 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsExecutive summaryEmerging network security threats, such as viruses,

Page 436 - TCRNavScan workflow

Appendix B. Network Admission Control 473Dramatically improve network securityWhile most organizations use identity management and authentication, a

Page 437

474 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSome of the security policy compliance checks that NAC can perform in

Page 438

Appendix B. Network Admission Control 475support for a complex security implementation involving a number of security vendors, combined with a corpo

Page 439

476 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Network access by unmanaged computers (such as guests, contractors,

Page 440

Appendix B. Network Admission Control 477organizations have evolving needs, Cisco Clean Access product components that are installed now can be used

Page 441 - TCRNavVirusDefUpdate

478 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe next stepsLet us take a look at the next steps:1. Deploy Cisco Cl

Page 442

Appendix B. Network Admission Control 479NAC Framework componentsThe NAC Framework provides the following technology support:򐂰 Broad network device

Page 443 - TCRNavSoftwareInstalled

480 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Recommended components:– Cisco Security Agent– Cisco Security Monit

Page 444 - TCRMSPatchesInstallWinXP

© Copyright IBM Corp. 2005, 2007. All rights reserved. 481Appendix C. Additional materialThis redbook refers to additional material that can be downlo

Page 445

© Copyright IBM Corp. 2005, 2007. All rights reserved. iiiContentsNotices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 446 - HotfixId

32 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThis means that for each desired change in the configuration settings,

Page 447

482 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUsing the Web materialThe additional Web material that accompanies th

Page 448

© Copyright IBM Corp. 2005, 2007. All rights reserved. 483Related publicationsThe publications listed in this section are considered particularly suit

Page 449

484 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsOnline resourcesThese Web sites and URLs are also relevant as further

Page 450 - TCRZLSoftwareInstalled

Related publications 485Help from IBMIBM Support and downloadsibm.com/supportIBM Global Servicesibm.com/services

Page 451

486 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 452 - TCRZLSoftwareRunning

© Copyright IBM Corp. 2005, 2007. All rights reserved. 487IndexNumerics802.1x 16, 22, 26, 68, 81, 95, 265credentials 112Aaccess control list 34

Page 453 - TCRMessengerDisabled

488 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsphysical components 121pop-up notification 277posture plug-in 4

Page 454

Index 489service pack level collector 167service running collector 177Software Package Utilities 394Software Package Web Server 386switch co

Page 455 - 8.5 Conclusion

490 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIBM Tivoli Security Compliance Managersee Security Compliance Manager

Page 456

Index 491configuration in ACS 229network policy enforcement 60placement 67polling of posture status 61posture validation 59PostureQuery

Page 457 - Appendixes

Chapter 2. Architecting the solution 332.3.4 Network design discussionIn this section we discuss the following network design factors for the IBM I

Page 458

492 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemstimers 301PostureNotification 447PostureQuery 444, 447PPPsee Po

Page 459 - Hints and tips

Index 493SSarbanes-Oxley Act 6scalability 35, 357scope of the project 27Secure Access Control Serversee Access Control Serversecure communicat

Page 460 - Deployment overview

494 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsTCRMessengerDisabled workflow 435TCRMSPatchesInstallWinXP workflow

Page 461

Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 464

®SG24-6678-01 ISBN 0738489883INTERNATIONAL TECHNICALSUPPORTORGANIZATIONBUILDING TECHNICALINFORMATION BASED ONPRACTICAL EXPERIENCE IBM Redbooks are dev

Page 465 - Cisco NAC sequence of events

34 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the reference architecture described later in this book, there are

Page 466 - Fault isolation

Chapter 2. Architecting the solution 35revalidation process takes place too often, this pop-up window may become annoying and significantly lower th

Page 467

36 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsparticular security compliance concept is aimed at validating client a

Page 468 - SCM Push Client

Chapter 2. Architecting the solution 37Part 2, “Customer environment” on page 75, details a comprehensive deployment scenario.2.6 ConclusionIn this

Page 469 - Tools and tricks

38 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 470 - Cisco IOS Software switch

© Copyright IBM Corp. 2005, 2007. All rights reserved. 39Chapter 3. Component structureThis chapter introduces the logical and physical components of

Page 471 - Cisco Secure ACS server

40 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1 Logical componentsThe IBM Integrated Security Solution for Cisco

Page 472

Chapter 3. Component structure 41The logical components are:򐂰 Network Admission Control򐂰 Compliance򐂰 RemediationThe following sections provide funct

Page 473 - NAC Appliance details

iv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.1.1 Network Admission Control. . . . . . . . . . . . . . . . . . .

Page 474 - In-band versus out-of-band

42 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsfor network devices and other services. The various components that co

Page 475 - NAC Appliance integration

Chapter 3. Component structure 43Policy enforcement deviceClients access enterprise resources via the network which makes it an effective point to v

Page 476 - Integration design

44 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-3 shows the Cisco Trust Agent architecture, followed by a bri

Page 477 - NAC Appliance Agent

Chapter 3. Component structure 45EAP methods Provide a mechanism to authenticate the application or device requesting the host credentials, and encr

Page 478 - Policy collector

46 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsClean Access Policy UpdatesThese are regular updates of pre-packaged p

Page 479 - Scheduler

Chapter 3. Component structure 47Figure 3-4 depicts Security Compliance Manager’s high-level component architecture, followed by a brief explanation

Page 480

48 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsCompliance evaluation Consisting of Security Compliance Manager snapsh

Page 481 - Scheduler.bat

Chapter 3. Component structure 49The compliance client component (Figure 3-5) consists of the following modules:򐂰 Policy collector򐂰 Posture collecto

Page 482 - NAC Appliance Manager

50 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsIn the IBM Integrated Security Solution for Cisco Networks, the collec

Page 483 - State mapping and scenarios

Chapter 3. Component structure 51Posture cacheThis component provides the caching area where posture collectors store the results of posture determi

Page 484

Contents v6.2.1 Posture collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1536.2.2 Policy collector . . . .

Page 485

52 Building a Network Access Control Solution with IBM Tivoli and Cisco Systemsand any client components that would normally be installed on a Tivoli

Page 486

Chapter 3. Component structure 53Cisco Trust AgentThe Cisco Trust Agent is Cisco client software that is required to pass posture credentials and va

Page 487

54 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.2.2 Network access infrastructureAll users connect to enterprise re

Page 488 - Conclusion

Chapter 3. Component structure 55be deployed to the clients. The server is also used for administration and for providing reports about client compl

Page 489

56 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsThe flow consists of these process groups, depicted in Figure 3-6:1. P

Page 490 - The benefit of NAC

Chapter 3. Component structure 57remediation object should also be provided. Details of the policy creation and deployment process are discussed her

Page 491

58 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Cisco Secure ACS policy creation (1d)An ACS policy consists of rules

Page 492 - NAC implementation options

Chapter 3. Component structure 59Posture validation and policy enforcement (flow 3)This section contains details about how a client in a live enviro

Page 493 - The NAC Appliance

60 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems– Quarantine– Infected– Unknown򐂰 Posture notification (3f)After the AC

Page 494 - Investment protection

Chapter 3. Component structure 61Remediation (flow 4)Two cases should be considered for the remediation process: one where the organization has a Ti

Page 495

vi Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFault isolation . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 496 - NAC technology

62 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems3.3.1 Secure communicationThe components are designed to provide a hi

Page 497 - NAC Framework components

Chapter 3. Component structure 63NAC communicationDuring communication of the Cisco Trust Agent client with the Cisco Secure ACS, a secure PEAP sess

Page 498

64 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsFigure 3-8 shows the security zones and their classifications. Organiz

Page 499 - Additional material

Chapter 3. Component structure 65corporate network through what are considered external networks, such as the DMZ and intranet zones.Details of reso

Page 500 - Using the Web material

66 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems򐂰 Remote offices and branch offices can use the Internet as a primary

Page 501 - Related publications

Chapter 3. Component structure 673.4.2 Policy enforcement pointsThe IBM Integrated Security Solution for Cisco Networks employs the Cisco NAC solut

Page 502 - How to get IBM Redbooks

68 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsAdvantages of this kind of deployment are:򐂰 Policy enforcement load di

Page 503 - Help from IBM

Chapter 3. Component structure 69Figure 3-11 Campus ingress enforcementSite-to-SiteVPN UsersInternetAAAAAABranch Office Compliance(Campus Ingress

Page 504

70 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsSmall Office Home Office compliancePolicy enforcement can be used to p

Page 505 - Numerics

Chapter 3. Component structure 71Extranet complianceOrganizations could have WAN connections to share information with partners. This would require

Page 506

© Copyright IBM Corp. 2005, 2007. All rights reserved. viiNoticesThis information was developed for products and services offered in the U.S.A. IBM ma

Page 507

72 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsLab complianceOrganizations prefer having lab networks to test systems

Page 508

Chapter 3. Component structure 73Data Center protectionThe Data Center is the site where organizations host business-critical systems that require m

Page 509

74 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsRemote access protectionRemote access users use dial-up or VPN to conn

Page 510

© Copyright IBM Corp. 2005, 2007. All rights reserved. 75Part 2 Customer environmentPart 2 discusses how the IBM Integrated Security Solution for Cisc

Page 511

76 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems

Page 512

© Copyright IBM Corp. 2005, 2007. All rights reserved. 77Chapter 4. Armando Banking Brothers CorporationThis chapter provides an introduction to the o

Page 513

78 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems4.1 Company profileArmando Brothers Banking Corporation (ABBC) is a f

Page 514

Chapter 4. Armando Banking Brothers Corporation 794.2 Current IT architectureThis section provides background information about the existing Armand

Page 515

80 Building a Network Access Control Solution with IBM Tivoli and Cisco SystemsUncontrolled zone - InternetThe Internet has become a pivotal componen

Page 516

Chapter 4. Armando Banking Brothers Corporation 81Figure 4-2 is representative of the ITSO Lab Environment used for L2Dot1x NAC deployment.VLAN-11 H

Commentaires sur ces manuels

Pas de commentaire