NAC

Arran Cudbard-Bell A.Cudbard-Bell at sussex.ac.uk
Thu Jul 12 18:26:31 CEST 2007


Phil Mayers wrote:
> On Thu, 2007-07-12 at 12:46 +0100, Arran Cudbard-Bell wrote:
>   
>>>> It's another topic that I'm overall sceptical of NAC, IMO a network should 
>>>> only reactively shut a client down *after* it did something wrong, not 
>>>> proactively sniff around the local environment and lock it away at once. But 
>>>> NAC is here to stay I guess. :-(
>>>>     
>>>>         
>>> "Presumed innocent" is a nice idea, but IMHO there are environments that
>>> simply doesn't work in. Financial institutes are one I can think of, and
>>> I could make convincing arguments based on my own experience that many
>>> academic networks (and CERTAINLY student residence networks) would
>>> benefit greatly from a default-deny.
>>>   
>>>       
>> Right, but machines on a residential network are generally going to be 
>> personal machines, I for one would protest greatly if I was forced to 
>>     
>
> You could protest all you wanted; *if* we had implemented that policy
> then it would have been signed off by the student union, senior tutors
> and college IT security advisory group, and it would have been in the
> wording on the bit of paper you sign when you join the university.
>   
Oh you have one of those political infrastructure things ..
We have an AUP policy which students have to accept before we allow 
their machines onto the network, and it does stipulate that users should 
have an up to date antivirus solution, but we don't explicitly enforce it.
> We've done this with lots of other policies (e.g. 5Gb/24 hours bandwidth
> limit - exceed it once and you're off for 48 hours, 2nd time and it's 2
> weeks and 3 times, you're off for the rest of the academic year) and it
> works fine.
>
>   
Thats a pretty harsh policy, considering the residential network here 
uses at least 40mbit/s downstream b/w at any given time throughout the 
day, i'd say most of our students would use up their 5gb quota pretty fast.

We use rate limiting here instead, based on the number of connections 
over a given period of time. This only targets really targets p2p 
traffic, and leaves everyone else undisturbed. We inform the students 
that they have been rate limited, and that they may be experiencing a 
slow connection, but there are no permenant blocks or bans in place, so 
after a period of time they automatically get the rate limiting removed.
Eventually they learn ...
>> install an AV solution just to use the network in my halls of residence. 
>> It's fine dictating what is installed on University owned machines, but 
>> users personal equipment is their *own*, and they should be able to 
>> manage it how they see fit.
>>     
>
> I have no intention of forcing people to install software to get onto
> the network.
>
> But when they get kicked off into a BANNED vrf, after the first offense
> we require that they prove their machine is clean before they get back
> on. At the moment, that means they physically carry it to the helpdesk.
>   
Our helpdesk staff would absolutely hate us if we tried that here !
> Were the option available, running some kind of software agent that we
> supply seems like a clear win.
>   

So say I'm doing something perfectly legitimate with my embedded *nux 
box, and your IDP system bans me for some reason ... do your helpdesk 
staff have the technical knowlege to check that my *nux box is safe and 
secure ? Or do they feed me some line about having to install a 
supported operating system, and an AV client from a recognised 
commerical vendor ?
> People focus rather too much on the "initial access" bit of NAC, and
> seem to ignore the remediation benefits.
>
>   
>> If you feel like experimenting a little, you can always stick a snort 
>> probe at a key point in your infrastructure.
>>     
>
> We have extensive IDS and IPS systems setting between our residence
> network.
>
>   
Do you get many false positives ?
>> Then make decisions as to whether the user should be segregated  from 
>> the main network, based on the information gathered about what their
>>     
>
> The residences systems ARE segregated from the main network, always and
> forever - they live in a VRF and hit a firewall before coming into the
> main production zone.
>
>   
Yes ours sit behind a cluster of routing firewalls.
What I meant by main network was a network other than a "quarantine" 
network.




More information about the Freeradius-Users mailing list