Extreme Networks NAC

EAST GRAND RAPIDS PUBLIC SCHOOLS
Jeff Crawford
Manager of Networking and Security
East Grand Rapids Public Schools
Educating and inspiring each student to navigate successfully in a global community
The Problem
•  Adding a user centric security appliance to
support a BYOD environment while not adding
additional layers of authentication.
The Solution
Wired Infrastructure
•  Extreme Networks
Matrix N7 Core Switch
•  Extreme Networks
SecureStack C3 Series
Distribution Layer
•  Extreme Networks
SecureStack B3/D2 Edge
Layer
Wireless Infrastructure
•  Extreme Networks
Redundant C4110
controllers
•  274 x 3610 access points
–  AP in every “teaching
space”
–  30 dedicated sensors
Palo Alto NGFW
•  Palo Alto Networks nextgeneration firewalls offer a
flexible security platform that
can be deployed to address your
unique business initiatives.
Whether your IT initiatives
range from addressing mobility
and BYOD issues, to enabling
security for your dynamic
virtualized datacenter, we can
help solve your needs. We
understand the challenges you
face, and can provide a security
offering that empowers your
users and aligns with your core
business objectives.
Palo Alto User-ID Agent
• 
• 
User-ID seamlessly integrates Palo Alto
Networks next-generation firewalls with a
wide range of user repositories and terminal
services environments. Depending on your
network environment, there are a variety of
ways you can map a user's identity to an IP
address. Some of these include:
–  Authentication events
–  User authentication
–  Terminal services monitoring
–  Client probing
–  Directory services integration
–  Syslog Listener and a powerful XML
API
The user identity, when tied to the
application activity, provides you with more
complete visibility into usage patterns,
greater policy control, and more granular
logging, reporting and forensics capabilities.
NetSight Management Suite (NMS)
NetSight, Extreme Networks management application, provides
centralized visibility and granular control of enterprise network
resources. NetSight is distinctive for granularity that reaches
beyond ports and VLANs down to individual users, applications,
and protocols. NetSight increases efficiency, enabling IT staff to
avoid time-consuming manual switch-by-switch configuration
tasks. NetSight fills the functionality gap between traditional
element managers that offer limited vendor-specific device
control, and expensive, complex enterprise management
applications. NetSight is a key component of Extreme Networks
networking solutions and assures that network operations are
aligned with the business, operationally efficient, and secure.
• 
Specialized identity and access management for visibility
and control of users' devices
• 
Unified LAN/WLAN management system automates
management tasks to significantly reduce IT administrative
effort
• 
Provisions role-based access controls for wired and wireless
environments
• 
Simplifies configuration change and troubleshooting
procedures
• 
Anytime, anywhere management from popular mobile
devices for the fastest response times
• 
Enables easy policy deployment aligned with industryspecific best practices
Extreme Networks NAC
Extreme Networks Access Control (NAC) is a
complete standards-based, multi-vendor
interoperable pre-connect and post-connect
Network Access Control solution for wired and
wireless LAN and VPN users. Using Extreme
Networks NAC Gateway appliances and/or
NAC Gateway Virtual Appliance with NetSight
NAC management configuration and reporting
software, IT administrators can deploy a leadingedge NAC solution to ensure only the right users
have access to the right information from the
right place at the right time.
•  Pre-connect and post-connect Network
Access Control (NAC)
•  Solution for wired/wireless LAN and VPN
users
•  Managed guest access control with
sponsorship
•  Unified policy management
OneFabric Connect SDN (formerly
Fusion Module)
Extreme Networks OneFabric Connect is a proven SDN
solution that makes it easy for organizations to
programmatically integrate and control new apps and
services – with network wide visibility, flexibility,
simplicity and scaling. An open, bidirectional and
programmable solution, OneFabric Connect provides
intelligent, centralized management and control for both
wired and wireless networks. Currently available services
include Data Center Management, MDM, and other
network functions. An open, bidirectional and
programmable solution, OneFabric Connect Extreme
Networks has developed a number of predefined
integrations that allow programmatic control of VM,
MDM, web filtering and firewall systems, but additional
customer-defined integrations are always an option.
Customers can also develop their own integrations simply
and easily via the open, XML/SOAP-based API.
• 
Centralized Management & Control of both
network and third party systems with OneFabric
Control Center Advanced
• 
Programmability of virtualization and application
integration with OneFabric Connect
• 
Open via XML/SOAP-based API provided by
OneFabric Connect
OneFabric Solutions Architecture
PaloAlto Plugin v2.0.2 Requirements
•  Edge Switches must support RADIUS Accounting
and must be integrated within NAC.
•  Palo Alto NGFW version 5.0.2 or later installed
and running properly.
•  Extreme Networks NetSight 5.0 or later installed.
•  Extreme Networks NAC 5.0 or later is installed and
running properly with 802.1X or Web
Authentication / Registration where usernames are
populated into NAC Manager.
Overview of Integration
•  Configure separate or embedded User-ID Agent to accept User-IP
mappings over User-ID Agent XML API
•  Configure Palo Alto to send threat information to NetSight over Syslog
–  PaloAlto: -threatIpAddress $src -threatName "$threatid" -severity
$severity
•  Configure NetSight and NAC to show “Top Applications” for an EndSystem based on Syslog information from Palo Alto
•  Install OneFabric Connect module (formerly Fusion module) on
NetSight appliance or server
•  Configure OneFabric Connect to communicate with Palo Alto UserID Agent XML API
•  Create Extreme Networks Policies based on threat information from
Palo Alto
Solution Benefits
•  Integrating Palo Alto’s next generation firewall with Extreme Networks
Management Suite (NMS) addresses all four considerations for user
access.
–  This solution provides seamless application based policy enforcement at
the network edge (wireless and wired), data center edge and Internet edge.
–  Threats originating from internal users will be detected by the Palo Alto
firewall which will report the source IP address to Extreme Networks
NMS. The user will be located and quarantined, removing the threat and
preventing additional damage.
–  Extreme Networks NMS provides dynamic real time IP address to user
name / asset mapping for the Palo Alto firewall, eliminating complex
Active Directory integration.
–  State changes sent from Extreme Networks NMS when a user disconnects
from the network keep the firewall mapping tables current and eliminate
stale mappings.
User Connects
1. 
2. 
3. 
4. 
5. 
User authenticates using 802.1x
or captive portal
802.1x request sent from switch,
access point, or captive portal to
NAC
NAC approves authentication
and informs point of connection
NAC informs NetSight that user
is in CONNECT state
NetSight sends message based on
CONNECT state to Palo Alto
NGFW (Embedded User-ID
Agent or dedicated User-ID
Agent) that includes username
and IP address mapping
User Disconnects
1.  Point of connection informs
NAC that state is now
disconnected or NAC sends
disconnect to point of
connection
2.  NAC informs NetSight that
user is in DISCONNECT
state
3.  NetSight sends message based
on DISCONNECT state to
Palo Alto NGFW (Embedded
User-ID Agent or dedicated
User-ID Agent) and Palo Alto
removes entry from User-IP
Mapping
Application Visibility
1.  Palo Alto sends
application information
to NetSight via Syslog
2.  NetSight informs NAC to
adjust policy based on
application information
3.  NAC modifies policy on
switch via filter-id or
Extreme Networks
proprietary policy
4.  NetSight displays
application information
in OneView Reports
Disconnect based on threat
1.  Palo Alto sends threat
information to NetSight
via Syslog
2.  NetSight informs NAC to
reject based on threat
information
3.  NAC sends REJECT to
point of connection
4.  NetSight displays threat
information in OneView
Reports
OneView Reports
OneView Reports
Extreme Networks Purview
• 
• 
• 
• 
• 
• 
• 
• 
• 
• 
• 
Pervasive – Visibility across the entire enterprise. Most other
solutions are placed at a choke point, limiting the view AND the
scale
Hardware Embedded, Scalable, No Network overlay – N-packet
mirror, CoreFlow2 enables millions of flows with deep packet
inspection (DPI) at Terabit speeds without impacting the
network
Massive and Open / Customizable Signature Set – Currently
supporting more than 6900 applications with over 12,500
signatures that are public and can be easily customized by the
customer, partner, or professional services
Intelligent Application Awareness – uses application layer
metadata: browser user-agent strings, cookie information, SSL
certificate common/organization names, HTTP request
methods, and more. Allows categorization of sub-applications (ie
Google Docs vs Gmail)
Application Health – compare application response with
network response
Contextual integration – use NAC for location, who what,
when, etc. within a single architecture and database. (Apps are
associated with users)
Security – Security teams are eager to have more insight into
application usage among users
Simplified Integration with OpenConnect SDN API – other
applications can be easily integrated. e.g. the Extreme Networks
SIEM product and Splunk software are already integrated
EAST GRAND RAPIDS PUBLIC SCHOOLS
Educating and inspiring each student to navigate successfully in a global community