(Cisco) Deploying 802.1X For Lan Security (2003) (PPT)
(Cisco) Deploying 802.1X For Lan Security (2003) (PPT)
(Cisco) Deploying 802.1X For Lan Security (2003) (PPT)
SEC-2005 8136_05_2003_c1
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Enterprise Network
Authorized User/Employee
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
Understanding Authentication
SEC-2005 8136_05_2003_c1
10
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
What Is Authentication?
The process of establishing and confirming the identity of a client requesting services Authentication is only useful if used to establish corresponding authorization Model is very common in everyday scenarios
Id like to withdraw $200.00 please. Do you have identification? Yes, I do. Here it is. Thank you. Heres your money.
SEC-2005 8136_05_2003_c1
11
12
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
The concept of being able to differentiate services amongst groups or individuals If everyone had the same rights, then we wouldnt need authorization
SEC-2005 8136_05_2003_c1
13
Why Do We Care?
Because differentiation of services and rights control is critical in network environments Not everyone has the same privileges; not all resources or information have the same level of confidentiality Unauthorized access, theft, and misuse of computer resources accounted for over $2 billion in losses in 2001
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
14
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
15
16
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Id like to connect to the network Do you have identification? Yes, I do. Here it is. Thank you. Here you go.
SEC-2005 8136_05_2003_c1
17
Hello Hello, AAA Cert, Request for Phone Cert, Signed MD5 Hash of AAA Cert Phone Cert, Signed MD5 Hash of Phone Cert Great, I Know You Are Phone w/MAC 00-0c-12-34-56-78
IP Phone
AAA Server
SEC-2005 8136_05_2003_c1
18
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Actual Authentication Conversation Is between Client and Auth Server Using EAP; the Switch Is Just a Middleman, but Is Aware of Whats Going on
SEC-2005 8136_05_2003_c1
19
A Closer Look
Login Req. Send Credentials Accept Forward Credentials to ACS Server Authentication Successful Policy Instructions Actual Authentication Conversation Is between Client and Auth Server Using EAP; the Switch Is Just a Middleman, but Is Aware of Whats Going on
802.1x
RADIUS
SEC-2005 8136_05_2003_c1
20
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Login Req. Send Credentials Accept Forward Credentials to ACS Server Authentication Successful Policy Instructions Actual Authentication Conversation Is between Client and Auth Server Using EAP; the Switch Is Just a Middleman, but Is Aware of Whats Going on
802.1x
RADIUS
SEC-2005 8136_05_2003_c1
21
SEC-2005 8136_05_2003_c1
22
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
IEEE 802.1x?
Standard set by the IEEE 802.1 working groupratified in December of 2001 Designed to address and provide port-based access control using authentication Describes a standard link layer protocol used for transporting higher-level authentication protocols (i.e. EAP) Actual enforcement is via MAC-based filtering and port state monitoring
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
23
SEC-2005 8136_05_2003_c1
24
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
802.1x Header
EAP Payload
25
What Is EAP?
EAPThe Extensible Authentication Protocol A flexible protocol used to carry arbitrary authentication information Typically rides on top of another protocol such as 802.1x or RADIUS (could be TACACS+, etc.) Specified in RFC 2284
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
26
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Initially developed for PPP Authentication Code is Request, Response, Success, or Failure Identifier is used to match responses with requests Format of the data field is determined by the code field
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
27
0
Destination MAC Length
6
Source MAC Body
12
14
EtherType Version
15
Type
16
18
SEC-2005 8136_05_2003_c1
28
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
29
30
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Understanding EAP-MD5
SEC-2005 8136_05_2003_c1
31
32
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
EAP-MD5
Client Process
Identity Request Identity Reply MD5 Challenge MD5 Response Auth Success Identity Reply MD5 Challenge MD5 Response Access-Accept
NAS Process
AAA Process
SEC-2005 8136_05_2003_c1
33
SEC-2005 8136_05_2003_c1
34
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Understanding EAP-TLS
SEC-2005 8136_05_2003_c1
35
EAP-TLS Authentication
Passwords arent used at all Instead TLS public key cryptographybased RSA handshake is used AAA Server authenticates client, but client can also authenticate AAA Servermutual authentication AAA server receives cert from client, verifies authenticity of cert (using CA public key), then verifies bearer identity using TLS handshake
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
36
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
EAP-TLS is the EAP implementation of the Transport Layer Security Protocol (similar to SSL) TLS uses public key certificates to authenticate clients Certificates must be x.509 v3 PKI certificates to be usable
SEC-2005 8136_05_2003_c1
37
Certificate Authorities
A CA can be sourced by an enterprise internal or external trusted structure It just needs to be trusted by the users The responsibility of the CA is to verify the identity of the certificate holder PRIOR to handing out a certificate for them Internal structures can be set up using commercial products:
VeriSign Entrust Microsoft CA
38
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Hello
Hello, Marys Cert, Request for Freds Cert, Signed MD5 Hash of Marys Cert
Freds Cert, Signed MD5 Hash of Freds Cert Great, I Know You Are Fred Great, I Know You Are Mary Fred Trusts the ABC Inc. CA Mary Trusts the ABC Inc. CA
SEC-2005 8136_05_2003_c1
39
But how does Fred know that the entity that presented the cert is really Mary, and not someone with a copy of Marys cert?
At the end of Marys reply, Mary includes an MD5 hash of her cert and some other information unique to this communication session, that is signed with her private key. Fred uses the public key contained in the cert to verify the signature by the private key. If this works, he can now believe that the presenter of the cert with whom he is speaking to is also the bearer of the correct private key, meaning, by inference that the other person is indeed Mary.
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
40
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
41
Common Questions
Is key distribution needed?
No, there is no need for a key distribution scheme; all that is needed is for Fred and Mary to each have a copy of the CAs public key cert, and to trust that CA. Fred doesnt have to have previous knowledge of Marys public key or vice-versa.
Aside from issuing the certs, is there any other CA interaction required?
No, the CA only exists to issue the certs to the parties using TLS to authenticate. It is not actively needed in the authentication process. In some schemes it may also be used to periodically provide updates on revoked certs.
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
42
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
EAP-TLS
Client Process
Identity Request Identity Reply, TLS Hello TLS Hello, Server Cert, Cert Request Client Cert Auth Success Identity Reply, TLS Hello TLS Hello, Server Cert, Cert Request Client Cert Access-Accept
NAS Process
AAA Process
SEC-2005 8136_05_2003_c1
43
Pros
One of the strongest forms of authentication in existence Can be made a two factor system; sometimes more
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
Cons
Can be more complex to deployneeds PKI Computationally intensive
44
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Understanding PEAP
SEC-2005 8136_05_2003_c1
45
PEAP Authentication
PEAP doesnt do client authentication on its own PEAP tunnels other EAP methods within an encrypted tunnelyou still need to choose an EAP method to use within it PEAP uses the same TLS mechanism as EAP-TLS, but adds the record protocol for encryption The encrypted tunnel only exists for the duration of the authentication interaction, not all traffic
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
46
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
TLS Handshake
TLS Handshake
TLS Record Protocol-Based Encrypted Tunnel Additional EAP Methods within Tunnel
SEC-2005 8136_05_2003_c1
47
PEAP Setup
Client Process
Identity Request Identity Reply, PEAP Request TLS Hello, Server Cert, Cipher Change Cipher Change, Session Key Start Embedded EAP Auth Identity Reply, PEAP Request TLS Hello, Server Cert, Cipher Change Cipher Change, Session Key
NAS Process
AAA Process
SEC-2005 8136_05_2003_c1
48
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
RADIUS in 802.1x
SEC-2005 8136_05_2003_c1
49
RADIUS is also used to carry policy instructions back to the authenticator in the form of AV pairs
IP Header UDP Header RADIUS Header EAP Payload AV Pairs
SEC-2005 8136_05_2003_c1
50
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
51
Power Up
DHCP
Update GPOs
SEC-2005 8136_05_2003_c1
52
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Why do we care?
Pre-802.1x this worked under the assumption that network connectivity was a given; post -802.1x the blocking of network access prior to 802.1x authentication breaks the machine-based group policy modelUNLESS the machine can authenticate using its own identity in 802.1x
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
53
Power Up
DHCP
Update GPOs
SEC-2005 8136_05_2003_c1
54
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Authenticate to Domain Controller Request Group Policy Updates Group Policy Updates
SEC-2005 8136_05_2003_c1
55
Follows method chosen for user authentication For EAP-TLSwill use machine certs For EAP-MD5 or EAP-MSCHAPv2will use machine account and password
SEC-2005 8136_05_2003_c1
56
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
57
58
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Power Up
DHCP
SEC-2005 8136_05_2003_c1
59
60
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
61
Authorization
Authorization is the embodiment of the ability to enforce policies on identities Typically policies are applied using a group methodologyallows for easier manageability The goal is to take the notion of group management and policies into the network Basic policy enforcement is the ability to allow or disallow access to the network
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
62
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
63
User Has Access to Network, with Applicable VLAN Login Request Credentials Login Good! Apply Policies
64
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
65
How does our 802.1x strategy fit with our VoIP solutions?
This topic gets its own slide
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
66
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
67
Hello Hello, AAA Cert, Request for Phone Cert, Signed MD5 Hash of AAA Cert Phone Cert, Signed MD5 Hash of Phone Cert Great, I Know You Are Phone w/MAC 00-0c-12-34-56-78 Great, I Know You Are My AAA Server
IP Phone
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
AAA Server
68
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
69
Catalyst 5500basic 802.1x only Catalyst 6000/4000all features* Catalyst 2950/3550all features* Aironet WLAN APsall features* Cisco 800 seriesspecialized feature set
70
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Deployment Example
Creating Value out of All the Pieces
SEC-2005 8136_05_2003_c1
71
User Has Access to Network, with Applicable VLAN Login Request Credentials Login Good! Apply Policies
72
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
73
Scenario Dependencies
WinXP clients: require Service Pack 1 installed Windows 2000 server for ACS 3.2: requires all current service packs and patches CatOS switches: CatOS 7.5.1+ Cisco IOS switches: Cisco IOS 12.1(EA1)13+ Enterprise PKI (i.e. MS CA) or trusted 3rd party (i.e. Verisign) certificate for ACS
SEC-2005 8136_05_2003_c1
74
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
75
ACS Configuration
Adding the Network Access Device
SEC-2005 8136_05_2003_c1
76
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Adding the Network Access Device
SEC-2005 8136_05_2003_c1
77
ACS Configuration
Server Certificate Setup
SEC-2005 8136_05_2003_c1
78
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Server Certificate Setup
SEC-2005 8136_05_2003_c1
79
ACS Configuration
Server Certificate SetupPKCS #7 Certificate Request
SEC-2005 8136_05_2003_c1
80
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
81
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
82
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
83
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
84
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
85
ACS Configuration
Server Certificate Request (MS Certificate Services)
SEC-2005 8136_05_2003_c1
86
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Server Certificate Installation
SEC-2005 8136_05_2003_c1
87
ACS Configuration
Server Certificate Installation
SEC-2005 8136_05_2003_c1
88
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Global Authentication SetupEAP Method Selection
SEC-2005 8136_05_2003_c1
89
ACS Configuration
External User Database Configuration
SEC-2005 8136_05_2003_c1
90
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
External User Database Configuration
SEC-2005 8136_05_2003_c1
91
ACS Configuration
External User Database Configuration
SEC-2005 8136_05_2003_c1
92
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
External User Database Configuration
SEC-2005 8136_05_2003_c1
93
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
94
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
95
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
96
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
97
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
98
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
99
ACS Configuration
External User Database Group Mapping
SEC-2005 8136_05_2003_c1
100
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
User Interface Option Configuration
SEC-2005 8136_05_2003_c1
101
ACS Configuration
User Interface OptionsRADIUS AV Pair Configuration
SEC-2005 8136_05_2003_c1
102
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
ACS Configuration
Group Policy Configuration
SEC-2005 8136_05_2003_c1
103
ACS Configuration
Group Policy ConfigurationVLAN Assignment
SEC-2005 8136_05_2003_c1
104
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
105
Switch Configuration
CatOS ConfigurationGlobal Commands
# RADIUS configuration set radius server <ip_address> auth-port 1812 primary set radius key <key> # Global 802.1x configuration set dot1x system-auth-control enable set dot1x quiet-period 10 (default: 30) set dot1x tx-period 10 (default: 30) set dot1x supp-timeout 5 (default: 30) set dot1x server-timeout 5 (default: 30) set dot1x max-req 4 (default: 2) set dot1x re-authperiod
SEC-2005 8136_05_2003_c1
106
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Switch Configuration
CatOS ConfigurationPer-Port Commands
# Port Level 802.1x configuration set port dot1x <mod/port> port-control auto set port dot1x <mod/port> port-control force-authorized set port dot1x <mod/port> multiple-host enable/disable set port dot1x <mod/port> re-authentication enable/disable
SEC-2005 8136_05_2003_c1
107
Switch Configuration
IOS ConfigurationGlobal Commands
# RADIUS configuration radius-server host <ip_address> radius-server key <key> aaa new-model aaa authentication dot1x default group radius aaa authorization default group radius aaa authorization config-commands # 802.1x Global Commands dot1x system-auth-control dot1x max-req dot1x timeout quiet-period dot1x timeout tx-period dot1x timeout re-authperiod dot1x re-authentication
SEC-2005 8136_05_2003_c1
2003, Cisco Systems, Inc. All rights reserved.
108
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Switch Configuration
IOS ConfigurationPer-Port Commands
# IOS Per-port configuration dot1x port-control auto
SEC-2005 8136_05_2003_c1
109
SEC-2005 8136_05_2003_c1
110
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Supplicant Configuration
Network Connection Properties
SEC-2005 8136_05_2003_c1
111
Supplicant Configuration
Network Interface Authentication Properties
SEC-2005 8136_05_2003_c1
112
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Supplicant Configuration
Authentication MethodPEAP Configuration
SEC-2005 8136_05_2003_c1
113
Supplicant Configuration
Interface StatusDisconnected State
SEC-2005 8136_05_2003_c1
114
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Supplicant Configuration
Interface StatusConnected/Authenticating State
SEC-2005 8136_05_2003_c1
115
Supplicant Configuration
Interface StatusAuth Successful/Connected State
SEC-2005 8136_05_2003_c1
116
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Troubleshooting
SEC-2005 8136_05_2003_c1
117
Set logging in ACS to full detail Enable logging of passed authentications (disabled by default) Logs available in ACS GUI, but additional detailed information is available in logging directories
SEC-2005 8136_05_2003_c1
118
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
119
SEC-2005 8136_05_2003_c1
120
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
121
SEC-2005 8136_05_2003_c1
122
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
123
SEC-2005 8136_05_2003_c1
124
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
125
SEC-2005 8136_05_2003_c1
126
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
127
128
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
129
130
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
131
132
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
133
SEC-2005 8136_05_2003_c1
134
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Whats Next?
The Future Directions of Identity-Based Networking
SEC-2005 8136_05_2003_c1
135
136
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
Recommended Reading
Network Security Principles and Practices
ISBN: 1587050250
137
Recommended Reading
Managing Cisco Network Security
ISBN: 1578701031
138
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1
SEC-2005 8136_05_2003_c1
139
SEC-2005 8136_05_2003_c1
140
Copyright 2003, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-2005 8136_05_2003_c1