• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Standard Disclaimers
  • Resume/Curriculum Vitae
  • Why Blog?
  • About
  • (Somewhat Recent) Publication List

packetqueue.net

Musings on computer stuff, and things... and other stuff.

Cisco

July 8, 2011 Cisco

Cisco Live!

Read­ing Time: 1 minute

I just want­ed to drop a quick note here to let every­one know that I plan on blog­ging a lit­tle more fre­quent­ly this week, as I’ll be in Las Vegas for the annu­al North Amer­i­can Cis­co con­fer­ence: Cis­co Networkers/Live. I can’t promise I’ll be in my room slav­ing over long, elab­o­rate break­downs of technology–maybe an in depth review of whiskey selec­tions by bar–but I will try to post some pic­tures and infor­ma­tion about what I’m see­ing and hear­ing dur­ing the show. In years where I haven’t been able to attend the show, I always liked see­ing and hear­ing from folks who did. Now it’s my turn to give back some­thing, so watch this space…

Oh, and keep up with real-time infor­ma­tion on twit­ter where I hide behind the han­dle @someclown, or G+ where I can be found at: http://gplus.to/someclown.

Share

June 11, 2011 Cisco

IPv6 Half-truths

Read­ing Time: 2 min­utes

This post will be a short one, and most­ly just comes from a dis­cus­sion I had the oth­er day with anoth­er engi­neer.  It turns out that even among peo­ple who are com­fort­able with IPv6, and maybe even have expe­ri­ence deploy­ing it, a lot of mis­in­for­ma­tion still per­sists.  Hope­ful­ly I can cor­rect a cou­ple of those today.  I also tossed in a hot-pota­to at the end just to see how many folks get hopped up.  Dis­cus­sion is wel­come, and in addi­tion to com­ments here I can be found on twit­ter hid­ing behind the han­dle: @someclown.

You must turn on IPv6 by using the IPv6 uni­cast-rout­ing com­mand.

Not true.  This is one of the more per­sis­tent, yet wild­ly incor­rect, pieces of infor­ma­tion regard­ing IPv6.  I have even seen many train­ing cen­ters and instruc­tors at the CCIE lev­el get this one wrong and it falls into the cat­e­go­ry of atten­tion to detail.  What this com­mand actu­al­ly does is enable uni­cast rout­ing for IPv6, just as it says.  To actu­al­ly enable IPv6 you sim­ply need to go to any inter­face and use the ipv6 enable com­mand.  And yes, you can enable IPv6 on the inter­face with­out enabling uni­cast rout­ing.  Of course, it would be help­ful to have an address on the inter­face as well.

Yes, but if you don’t turn on uni­cast rout­ing you can’t route IPv6 traf­fic.

Not strict­ly speak­ing true.  You can still set up a default route for IPv6 traf­fic and get it off of your sys­tem.  To the extent that you want to argue whether or not this is actu­al­ly rout­ing is fine, but you can move IPv6 traf­fic off of your local device using a default route, and nev­er have enabled rout­ing for IPv6.

Using a /127 address on point-to-point links is wrong, wrong, wrong.

This is an inter­est­ing one, and usu­al­ly sparks a fair amount of debate.  Up until very recent­ly, the rec­om­men­da­tion across the board (RFC 4291) was to use /64 address­es even on point-to-point links, osten­si­bly because the IPv6 space is so big any­how, and because sev­er­al pro­to­cols will break (notably sub­net-router any­cast, spec­i­fied in RFC 3627).  While I’m not dis­put­ing that this is what the cur­rent best-prac­tices reflect, I will say that RFC 6164 which has a sta­tus of Pro­posed Stan­dard makes a fair­ly com­pelling case for using /127 on point-to-point links.  I’m sure this won’t be resolved any­time soon, stan­dards or no, but I would say that if you have a com­pelling rea­son for using /127 and know what you’re doing it for, go for it.  Just be aware that stan­dards can change, and you don’t want to leave a steam­ing pile for the poor per­son who has to fol­low you.

Share

June 4, 2011 Cisco

Home CCIE Study Lab

Read­ing Time: 2 min­utes
So, a lot of peo­ple who are work­ing towards their CCIE cer­ti­fi­ca­tions end up build­ing home labs for study­ing.  The rea­sons are many and var­ied, but mine boiled down to two pri­ma­ry ones:

 

(1) My study hours don’t always match well with what slots the online rack ven­dors have avail­able.

(2) I just like phys­i­cal equip­ment and the flex­i­bil­i­ty it pro­vides in both study­ing and in research.

Also, I just wan­na.

With that said, one of the next things peo­ple want to know is what gear it is that I have, and how do I have it con­fig­ured.  There­fore, with the recent post­ing fre­quen­cy here severe­ly lack­ing, writ­ing about my lab is a nice way to get some­thing fresh on the blog and hope­ful­ly it pro­vides some­thing use­ful to some­one out there.  I’m going to break this down into two gen­er­al cat­e­gories: equip­ment that I have pure­ly for my Cis­co CCIE lab, and oth­er equip­ment that I have either for my home net­work or for ran­dom rea­sons.

Ran­dom Non-Lab Spe­cif­ic Equip­ment List:

  1. WS-2950T-24 switch
  2. Two 1142N access points
  3. Wire­less Con­troller Mod­ule (NME-AIR-WLC6-K9) which is pret­ty fun, but breaks bon­jour and so is the bane of my exis­tence (see pre­vi­ous post here.)
  4. ASA 5505 with IPS mod­ule, run­ning bot-net fil­ter and some oth­er things.  This is also the main gate­way for the home net­work, con­nect­ing up to the cable modem.  It’s also the IPsec end­point for my always-on con­nec­tion to the office and seg­ments my home net­work, lab net­work, work net­work, etc.
  5. Com­cast Cable Modem, made by Motorol­la
  6. Ran­dom doohick­ey for my “Whole-Home DVR” with DirecTV
  7. Sun Sun­Fire v240 Serv­er with StorEdge 3300 stor­age array

Non-plugged in Equip­ment

  1. Sun Enter­prise 3500
  2. Two Cis­co 3550 switch­es
  3. Two PIX 501

Com­put­er stor­age:

  1. Sea­gate 750GB exter­nal dri­ve (USB)
  2. Iomega 1TB exter­nal (eSA­TA)
  3. Drobo S with 5 2TB dri­ves for 10TB raw (eSA­TA)

Cis­co Lab Equip­ment:

  1. Four 3560‑X switch­es, with four-gig uplink mod­ules (might still get the 10 at some point), ful­ly licensed with IPSer­vices and run­ning 12.2(53) SE2.
  2. Eight 2801 routers, all run­ning 12.4(22)T5 Advanced Enter­prise, and all with at least one Wic-2T smart ser­i­al card which pro­vides two smart ser­i­al con­nec­tions.  Four of the 2801 have two Wic-2T cards, and a cou­ple oth­ers have a mix­ture of 1‑Wic-DSU-T1 cards, FXO cards, and FXS cards (most­ly left­overs and hand-me downs, but there are some inter­est­ing pos­si­bil­i­ties.)
  3. One 2811 run­ning the same IOS as the 2801 routers, used as a back­bone router for inject­ing routes and some oth­er misc. stuff.
  4. One 2621 run­ning some­thing-or-oth­er and act­ing as anoth­er back­bone router.
  5. One 3845 run­ning the same Advanced Enter­prise as the oth­ers.  This has five Wic-2T cards and acts as the frame switch. It also has an HWIC-16A card and does reverse-tel­net to every­thing else (ter­mi­nal serv­er).  It also hous­es some ran­dom stuff includ­ing the wire­less con­troller men­tioned above.

All of this is cabled and wired almost iden­ti­cal­ly to the CCBoot­Camp lab topol­o­gy.  This is because I have all of their work­books and want­ed to be able to study with my own equip­ment.  A cou­ple of the details are dif­fer­ent, most­ly around inter­face num­bers and the specifics of the back­bone routers and such.  Also, the switch­es I have are way overkill but sat­is­fy the lab require­ments.  Giv­en the actu­al topol­o­gy from just about any main­stream train­ing provider, I can copy it with the equip­ment I have, and that’s exact­ly what I want­ed to be able to do.  As always, con­tact me here or on twit­ter with ques­tions and com­ments.

Pic­tures of the lab and sun­dries are includ­ed below.

ASA and misc. non lab gear
CCIE Lab
CCIE Lab

CCIE Lab
CCIE Lab
Non plugged in gear — for now

Apple IIc — Mine since I was 8
Home Stor­age

Share

March 11, 2011 Cisco

Frame Relay Switch Setup

Read­ing Time: 5 min­utes

Edi­tor’s Note: Google Chrome seems to dis­like my site theme and is hyphen­at­ing absolute­ly every­thing.  Apolo­gies for that, and I’ll look into it just as soon as I get done with a few items on the “hon­ey-do” list.

If you are study­ing for the CCIE Rout­ing and Switch­ing exam, one of the tech­nolo­gies that is still heav­i­ly preva­lent is Frame Relay.  It is expect­ed that you know both the tech­nol­o­gy itself, and how to con­fig­ure it, but also how it inter­acts with and affects oth­er key tech­nolo­gies like OSPF and EIGRP.  Hav­ing the abil­i­ty to study Frame Relay, then, and get plen­ty of hands-on con­fig­u­ra­tion time becomes as impor­tant as with any­thing on the R&S 4.0 Blue­print.

While many net­work engi­neers are already famil­iar with Frame Relay from a con­sumer side–in oth­er words, from the per­spec­tive of an enti­ty which buys Frame Relay ser­vices from a provider–not many of us are famil­iar with the ser­vice provider por­tion of the equa­tion.  This makes set­ting up prac­tice labs dif­fi­cult if you are try­ing to study using your own equip­ment.  For­tu­nate­ly, you can set up your own Frame Relay switch fair­ly eas­i­ly, and that is what we’re going to walk through today.

A Frame Relay switch is the DCE device that sits inside a ser­vice provider’s net­work and moves the frames along from point A to point B.  There are many of these devices all work­ing togeth­er inside of your provider’s net­work to move your infor­ma­tion along, but for­tu­nate­ly for lab can­di­dates study­ing at home, you can eas­i­ly get by with just one.  Even more for­tu­nate is that you can use a fair­ly low pow­ered router to act as a Frame Relay switch, and not miss any­thing that you’ll need for pur­pos­es of the lab.

A quick note on the lab is in order here.  It used to be a part of the lab blue­print (dont’ ask me which one, or how far back in time) that you had to know how to set up a Frame Relay switch.  Cis­co has since tak­en that require­ment away, at least from the R&S lab, and so a lot of that knowl­edge isn’t com­mu­ni­cat­ed in teach­ing texts any longer.  What you’ll find in the lab itself is an already con­fig­ured Frame Relay switch that you’ll have no direct access to, but all of the infor­ma­tion you need to make your equip­ment talk to it.

It may seem coun­ter­in­tu­itive, but for a home lab the best device to use for a Frame Switch is actu­al­ly a router.  For instance, I’m using an old­er Cis­co 2621 mod­el for my Frame Switch, and it does every­thing I need it to do.  Ser­vice providers will typ­i­cal­ly use more spe­cial­ized gear, but all we’re going for in our stud­ies is a rea­son­able fac­sim­i­le.  If you want to spend a lot of mon­ey, fol­low the advice of so many oth­ers and spend it on your layer‑3 switch­es.

Anoth­er thing we want to briefly dis­cuss is inter­faces.  Gen­er­al­ly speak­ing, you can either fol­low the “run what’cha brung” phi­los­o­phy of just using what you have access to, or you can buy the inter­faces you want.  In my case I had a cou­ple of WIC-T1 cards that I’ve used, and then I bought a hand­ful of WIC-2T ser­i­al inter­face cards.  The key is to have a ser­i­al inter­face for each router you want to con­nect via the Frame switch.  So I have one T1 inter­face, and six ser­i­al inter­faces for a total of sev­en devices I can con­nect into the Frame “cloud”.  I find this to me more than ade­quate, though if you’re try­ing to dupli­cate a spe­cif­ic topol­o­gy you may need more or less.

The con­fig­u­ra­tion of a Frame switch is actu­al­ly very sim­ple, as you’ll see, though atten­tion to detail does mat­ter.  I’m assum­ing here, by the way, that you already know how to set up your router for basic access, clock, etc., so I won’t cov­er that here.  So, the first step in con­fig­ur­ing your router to be a Frame switch is to put it into Frame switch­ing mode using the com­mands:

ip cef
frame-relay switching

 

These com­mands turn on Cis­co Express For­ward­ing, put the router into a Frame switch­ing mode, and change quite a bit of the default behav­ior, so don’t expect to use this device as a router in any lab topol­o­gy you’re work­ing on.  This device will be just a Frame switch and noth­ing more.

The next step is to con­fig­ure the indi­vid­ual inter­faces you’ll con­nect your oth­er routers to, and you have a lot of choic­es here.  I don’t know exact­ly how the R&S lab devices are set up, so I’m just going to give you the con­fig­u­ra­tion I use.  I’ll post the con­fig­u­ra­tion below, and then go over the key comands:

interface Serial0/1
no ip address
encapsulation frame-relay
logging event subif-link-status
logging event dlci-status-change
clock rate 8000000
no frame-relay inverse-arp
frame-relay intf-type dce
frame-relay route 220 interface Serial0/2 120
frame-relay route 221 interface Serial0/0 320

 

The first few lines of the con­fig­u­ra­tion should be famil­iar to you already.  We’re set­ting our inter­face encap­su­la­tion to frame-relay, and then log­ging on a cou­ple of events.  The log­ging is com­plete­ly up to you, and not nec­es­sary one way or anoth­er.  I just find them help­ful.  Next we set the clock rate, and we tell the inter­face that we are the DCE end of the con­nec­tion.  Remem­ber, in a Frame Relay net­work the clock­ing (DCE end) comes from the line or provider side, so this is what you’ll want.  If I am work­ing with a T1 ser­i­al inter­face, I’ll also need a line for that:

service-module t1 clock source internal

 

This can change depend­ing on the type of card and how you have it con­fig­ured.

Now, the oth­er options we have here require a lit­tle more expla­na­tion.  The “no frame-relay inverse-arp” com­mand does just what it says, and you can argue for the Frame switch hav­ing this turned on, or off.  In most cas­es in the lab, you’ll be instruct­ed to not use inverse arp on the DTE devices, so I’ve just turned that func­tion­al­i­ty off on my Frame switch from the out­set.  It’s real­ly your call.

The next two lines begin­ning with frame-relay route are the ones that always seem to cause con­fu­sion.  You can read the first line as “If some traf­fic comes in from DLCI 220, with a des­ti­na­tion of DLCI 120, send it out inter­face Ser­i­al 0/2”.  Sub­sti­tute DLCI 221 and 320 on the next line, but oth­er­wise read it the same.  So if I now plug in a router to inter­face Ser­i­al 0/1, and assign DLCI 220 and 221 to two dif­fer­ent sub-inter­faces (for instance, dif­fer­ent options are pos­si­ble) the Frame switch will know what to do with that traf­fic.

So, if we have a dia­gram that looks like the fol­low­ing:

Then we have a con­fig­u­ra­tion for inter­faces that looks like so:

interface Serial0/0
no ip address
encapsulation frame-relay
logging event subif-link-status
logging event dlci-status-change
service-module t1 clock source internal
no frame-relay inverse-arp
frame-relay intf-type dce
frame-relay route 320 interface Serial0/1 221
frame-relay route 321 interface Serial0/2 121
!
interface Serial0/1
no ip address
encapsulation frame-relay
logging event subif-link-status
logging event dlci-status-change
clock rate 8000000
no frame-relay inverse-arp
frame-relay intf-type dce
frame-relay route 220 interface Serial0/2 120
frame-relay route 221 interface Serial0/0 320
!
interface Serial0/2
no ip address
encapsulation frame-relay
logging event subif-link-status
logging event dlci-status-change
clock rate 8000000
no frame-relay inverse-arp
frame-relay intf-type dce
frame-relay route 120 interface Serial0/1 220
frame-relay route 121 interface Serial0/0 321

 

I hope that helps out, and as always if you have any ques­tions or clar­i­fi­ca­tions please drop me a line here or on twit­ter where I’m known as @SomeClown.

Share

August 11, 2010 802.1x

802.1x for Wired Networks (Part 2)

Read­ing Time: 6 min­utes

One of the nice things about work­ing with Cis­co equip­ment, as opposed to many oth­er brands, is that you tru­ly do get a smor­gas­bord of fea­tures and capa­bil­i­ties.  On the flip side of that coin, how­ev­er, the bad thing about work­ing with Cis­co equip­ment is that you can real­ly paint your­self into a cor­ner with fea­tures, even when you know what you’re doing.  Many fea­tures and capa­bil­i­ties that you have access to on a mul­ti­lay­er switch (or bridge, layer‑2 router, for­warder, oth­er nom-de-jour) con­flict with one anoth­er, are just not near­ly as use­ful as they might seem at first glance, or bring a num­ber of gotchas to the prover­bial ball-game, often far out­weigh­ing any ben­e­fits inher­ent there­in.  Dynam­ic VLAN assign­ment with 802.1x is one of those fea­tures.

If you’ve read the first part in this series on dot1x, or are gen­er­al­ly famil­iar with the tech­nol­o­gy, you know that dot1x on a wired net­work allows a sup­pli­cant (soft­ware on your PC) to com­mu­ni­cate with an inter­me­di­ary (the switch) in order to facil­i­tate hard­ware lev­el authen­ti­ca­tion of assets on the cor­po­rate net­work.  In oth­er words, the switch acts as a traf­fic-cop and only allows known sys­tems to gain even layer‑2 access to the net­work.  This hap­pens in many cas­es pri­or to oth­er types of authen­ti­ca­tion and autho­riza­tion and can be part of an over­all secu­ri­ty strat­e­gy on your net­work.

When you try to do more with wired dot1x is where things get a lit­tle more fun.  And by fun I mean goug­ing your eyes out with dull imple­ments, or ran­dom­ly beat­ing the near­est co-work­er with the weight­ed end of a con­sole cable.  Doing more in this case refer­ring to assign­ing com­put­ers on your net­work to spe­cif­ic VLANs based on what­ev­er poli­cies you use to do these things.

For argument’s sake, and because we’ve already estab­lished that you’re prob­a­bly a masochist for doing things this way, let’s just assume that you are using VTP (VLAN Trunk­ing Pro­to­col) to keep your VLANs con­sis­tent across all switch­es in a giv­en cam­pus or build­ing.  Let’s also assume that you have  a cou­ple of VTP Servers, and all oth­er switch­es are in client mode.  This would also be a good time to men­tion VTP Pass­words, domains, and care­ful plan­ning, but I think we’ve estab­lished that you might be a bit of a rene­gade.  So we’ll move on.

If you’ve already got­ten through the first part of this series, then you already have your switch­es talk­ing to a back­end access and autho­riza­tion serv­er; most like­ly this is NPS on Win­dows 2008 Serv­er or some oth­er RADIUS serv­er tied into your user data­base.  The main thing you have to do on the RADIUS side that is dif­fer­ent for this con­fig­u­ra­tion is to deter­mine what user groups, or com­put­er groups, etc. are going to be assigned to what VLAN.

So your main switch con­fig­u­ra­tion, assum­ing NPS, could look some­thing like this and would be defined under the Radius Clients sec­tion of Net­work Pol­i­cy and Access Ser­vices:

 

All this does is estab­lish a con­nec­tion pro­file which allows your switch (or what­ev­er device) to speak to the NPS serv­er.  For net­work poli­cies we’ll have two defined for our exam­ple:

 

One of these is for the IT group, as you might have guessed.  The oth­er is for a Guest access group that we’ll talk about soon.  These poli­cies, by the way, are very flex­i­ble and can be writ­ten in a myr­i­ad of dif­fer­ent ways.  The exam­ples here are just one par­tic­u­lar way of imple­ment­ing this type of con­trol.

If we break open one of our poli­cies to look at it, you’ll see some­thing like so:

 

We actu­al­ly have a lot more in this sec­tion that we’re not show­ing, includ­ing many dia­log box­es and con­fig­u­ra­tion tabs.  The sum­ma­ry above, how­ev­er, is enough to give you a gen­er­al sense of what’s going on.  While the whole break­down is beyond the scope of what I’m writ­ing here, a cou­ple of the key things you’ll want to take note of are:

  1. Tun­nel-Pvt-Group-ID: This is the VLAN you want to assign to this group.  This had bet­ter match what exists in your VTP domain, on the switch or switch­es in ques­tion.
  2. Tun­nel-Type: This is pret­ty self-explana­to­ry, but I’ve seen it over­looked.
  3. Tun­nel-Medi­um-Type: The 802 here refers to, you guessed it, 802.1x

This is all fair­ly stan­dard serv­er-side NPS or IAS con­fig­u­ra­tion for Win­dows.  Oth­er sys­tems will, of course dif­fer­ent and have their own idio­syn­crasies to deal with.  I assume that you or some­one you work with is famil­iar with this on some lev­el, as almost all major enter­prise net­works these days use a cen­tral data­base like Active Direc­to­ry to not only con­trol user access to the net­work gen­er­al­ly, but also to authen­ti­cate and autho­rize all man­ner of con­nec­tions from wire­less dot1x to SSL VPN.

On the Cis­co side, things are actu­al­ly con­sid­er­ably clean­er as you might expect.  Since you should already have dot1x work­ing from our first part in this series, only a few changes are nec­es­sary:

  1. Define a guest VLAN (in our exam­ple we’re using this but it is far from nec­es­sary)
  2. Define a quar­an­tine, or authen­ti­ca­tion fail­ure VLAN (again, our exam­ple, etc.)
  3. Define con­fig­u­ra­tion for indi­vid­ual switch ports, or more like­ly for ranges.

Steps one and two above shouldn’t need explain­ing if you’ve come this far: just make the VLANs and be done with it.  For step three, we’re going to use the fol­low­ing con­fig­u­ra­tion:

dot1x pae authenticator
dot1x port-control auto
dot1x timeout quiet-period 5
dot1x timeout server-timeout 10
dot1x max-reauth-req 1
dot1x guest-vlan 405
dot1x auth-fail vlan 404
dot1x auth-fail max-attempts 1

 

Note that we are using a few extra options here that aren’t, strict­ly speak­ing, need­ed (the time­outs, qui­et peri­ods, etc.)  Don’t let those dis­tract you from the core ele­ments.  The dot1x guest-vlan and auth-fail vlan state­ments in par­tic­u­lar are inter­est­ing.  What we’re basi­cal­ly doing here are a cou­ple of things:

  1. When the switch port receives an EAPoL from the sup­pli­cant (PC) indi­cat­ing dot1x capa­bil­i­ty, the cre­den­tials are test­ed.  If they are good, the device is auto­mat­i­cal­ly put into the appro­pri­ate VLAN as pre­scribed by our RADIUS serv­er.
  2. If fail­ure occurs dur­ing authen­ti­ca­tion (ie; EAPoL capa­ble, but wrong cre­den­tials, etc.) then the device is put into the auth-fail VLAN (404 in this case.)
  3. If the device in ques­tion has no dot1x capa­bil­i­ty or the capa­bil­i­ty is turned off (no EAPoL seen) then the device is put into the guest VLAN (405 in this case.)

 

Note that if you have voice VLANs set up, these are unaf­fect­ed by the dot1x con­fig­u­ra­tion.  Also, you have options to force a port into a per­ma­nent autho­rized or unau­tho­rized state (using the dot1x port-con­trol force-autho­rized or force-unau­tho­rized com­mand) if you need this func­tion­al­i­ty.

So when all put togeth­er, what does this con­fig­u­ra­tion get you besides a headache?  Seam­less and dynam­ic con­trol of clients, as well as some pret­ty good secu­ri­ty.  You have the clients you know being put into their assigned VLANs regard­less of where in the net­work they are.  This can be good if you rely heav­i­ly on VLAN access con­trol lists (VACLs) for secu­ri­ty.  Clients who fail autho­riza­tion are imme­di­ate­ly dumped into what can be set up as a black-hole VLAN and then dealt with as need­ed.  Every­one else—those we don’t know or are old­er clients—can be put into a guest VLAN where maybe we just give them access out to the Inter­net at large and pos­si­bly a print­er.  This is a handy fea­ture for audi­tors or cus­tomers who may set up in a con­fer­ence room and need some access, but very lim­it­ed.  Anoth­er use for this might be in con­junc­tion with a Net­work Access Con­trol (NAC) sys­tem.  In this case you could test for appro­pri­ate patch lev­els of clients, appro­pri­ate fire­wall set­tings, unau­tho­rized soft­ware or what­ev­er, then dump the client into a quar­an­tine VLAN for reme­di­a­tion.

In the next part of this series I’ll explore some switch port secu­ri­ty fea­tures that are arguably more use­ful than dot1x, but con­flict in some way forc­ing you to make a choice.  We’ll also talk about the things that can break in some way when run­ning dot1x.  Ulti­mate­ly secu­ri­ty pol­i­cy will be deter­mined by busi­ness needs—in my case we have a pret­ty heavy secu­ri­ty bur­den due to the busi­ness we’re in.  You, how­ev­er, may find the headache of dot1x is too much to deal with when com­pared with the admin­is­tra­tive over­head to man­age it.  You may also decide that the things you give up to run it just aren’t worth the cost.  Hope­ful­ly, when we’re all done you’ll have enough infor­ma­tion to make that choice intel­li­gent­ly.

Share

July 29, 2010 802.1x

802.1x for Wired Networks (Part 1)

Read­ing Time: 3 min­utes

Most of you are prob­a­bly famil­iar with the IEEE 802.1x spec­i­fi­ca­tion, at least in gen­er­al terms, but are more than like­ly used to see­ing it applied in the con­text of wire­less net­works and ser­vices.  In this mul­ti-part series, I’m going to explore the use of 802.1x as it applies to wired net­works.  In part I we’ll begin with what 802.1x is and what it isn’t, fol­lowed by some basic con­fig­u­ra­tion adher­ing to Cisco’s cur­rent best prac­tices rec­om­men­da­tions.  Then, in part II we’ll fol­low-up with a more com­plex con­fig­u­ra­tion that you real­ly, real­ly don’t want to use but I put out as an aca­d­e­m­ic exam­ple of what can be done if you like the kind of com­plex­i­ty that will guar­an­tee you or your sup­port staff nev­er sleep again.  We’ll also talk about what hap­pens when you mix oth­er secu­ri­ty fea­tures with 802.1x.

Dot1x, as I’ll be refer­ring to it from now on, is at its most fun­da­men­tal lev­el sim­ply a method for ver­i­fy­ing that a device con­nect­ed to your net­work is who it appears to be.  If a com­pa­ny-owned com­put­er con­nects to the net­work, we let them have access to cer­tain resources.  If some­one con­nects an unau­tho­rized com­put­er (per­son­al lap­top, etc.) to the net­work, they have no access to any­thing.  This is the basic idea behind dot1x when we’re talk­ing about wired net­works.

Dot1x is not encryp­tion, and doesn’t pro­vide any kind of pri­va­cy or anti-replay pro­tec­tion like IPsec.  It isn’t intend­ed for that.  Think of dot1x as login secu­ri­ty for your switch ports.  If your switch ports are con­nect­ed through to wall jacks, with no authen­ti­ca­tion, then rogue machines have at least lim­it­ed (lay­er 1 and 2) access to, at min­i­mum, the VLAN or net­work that switch port is a part of.  Is that enough to cause dam­age to your net­work?  You’ll have to decide for your­self based on your own appetite for risk and inter­nal secu­ri­ty poli­cies.

So, what do we do to make it all work?  I’m glad you asked.  You’ll need to do four things, of which I’ll cov­er the two that hap­pen on the Cis­co side:

(1)    Con­fig­ure your switch to act as an authen­ti­ca­tor

(2)    Con­fig­ure indi­vid­ual switch ports to use dot1x

(3)    Con­fig­ure your Radius Serv­er to pro­vide authen­ti­ca­tion and autho­riza­tion to clients

(4)    Turn on dot1x authen­ti­ca­tion on your clients (Win­dows, Mac, Lin­ux, etc.)

The first step is fair­ly straight for­ward, and that is to tell your switch you want to do dot1x authen­ti­ca­tion.  In order for this to work you have to have AAA enabled which is going to change your entire login method, so def­i­nite­ly play around with in a lab if you’re not famil­iar with it already.  So, the com­mands we want look like this, entered from Glob­al Con­fig mode:

! Turn on aaa authentication
aaa new-model
! Define our Radius server, port, and shared secret (must match
! with our server setup)
radius-server host 10.0.0.1 auth-port 1812 key abc123
! Here we tell the switch that our default authentication method is to
! use the Radius host we defined above
aaa authentication dot1x default group radius
! Enable dot1x on the switch
dot1x system-auth-control

 

Now that we have the switch set to authen­ti­cate clients to our Radius (Remote Authen­ti­ca­tion Dial-in User Serv­er) Serv­er, we have to make sure the Radius serv­er has some poli­cies defined.  This is beyond the scope of what I’m going to cov­er in this post, though if I get enough com­ments request­ing it I can cov­er that por­tion in anoth­er post.  Basi­cal­ly you’re just telling your Radius serv­er (typ­i­cal­ly IAS or NPS on some ver­sion of Win­dows Serv­er) that the switch will be con­tact­ing it for client authen­ti­ca­tion, and what that client can and can’t do once authen­ti­cat­ed (the autho­riza­tion piece.)

The next step is to con­fig­ure your clients to use dot1x authen­ti­ca­tion, and this is dif­fer­ent for each client OS you use.  Win­dows clients need to have a ser­vice turned on which is not on by default, where­as Mac­in­tosh has the ser­vice turned on but not con­fig­ured.  For Lin­ux and all man­ner of mobile devices, there are as many options as there are devices, so I’ll leave that as an exer­cise for the read­er.  As above with the Serv­er sec­tion, if I get enough com­ments I can cov­er the Win­dows and Mac­in­tosh con­fig­u­ra­tion piece in anoth­er post.  Mobile devices and Lin­ux I have lim­it­ed expe­ri­ence with as per­tains to dot1x set­up.

The last step in this whole busi­ness is to turn on dot1x authen­ti­ca­tion on a per port or port-range basis.  Keep in mind that you’ll want to test this before turn­ing on carte-blanche as I’ve seen a lot of mis­con­fig­u­ra­tion in the ini­tial set­up and the last thing you want is a horde of scream­ing users look­ing for your head on a stick.  There­fore, to turn on one port, pre­sum­ably for test­ing, we do like so from inter­face con­fig­u­ra­tion mode:

dot1x port-control auto
! kind of anti-climactic isn’t it

 

That is the basic con­fig­u­ra­tion of dot1x on a Cis­co switch.  In part II of this series, I’ll explore some more com­plex con­fig­u­ra­tions, as well as some less-than-ide­al ram­i­fi­ca­tions of com­bin­ing oth­er secu­ri­ty fea­tures with dot1x.  As with any­thing you con­fig­ure in the realm of secu­ri­ty in par­tic­u­lar, it is always a trade-off between secu­ri­ty and usabil­i­ty and dot1x is no excep­tion.  Test, test, and test some more.

Share
  • « Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Next Page »

Copyright© 2023 · by Shay Bocks