Chapter 5: Network Access Control and Cloud Security Flashcards

1
Q

What does network access control mean (NAC)?

A

It’s an umbrella term for managing access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three categories of components does NAC systems deal with?

A
  1. Access requestor (AR): the node attempting to access the network, can be any device that is managed by the NAC system. AKA, supplicants, or clients.
  2. Policy server: determines what access should be granted. Often relies on backend systems, including antivirus, patch management, etc, to help determine the host’s condition.
  3. Network access server (NAS): an access control point for users in remote locations connecting to an enterprise’s internal network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 4 common NAC enforcement methods and what is an enforcement method?

A

Enforcement method: the actions that are applied to the AR to regulate access to the enterprise network.

  1. IEEE 802.1X
  2. VLANs
  3. Firewall: a form of NAC
  4. DHCP management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the extensible authentication protocol?

A

It acts as a framework for network access and authentication protocols. It provides a set of protocol messages that can encapsulate various authentication methods to be used between a client and an authentication server.

Supports multiple authentication methods.

Provides a generic transport service for the exchange of authentication information between a client system and an authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shortly describe how the network access server (NAS) works?

A

ARs seek access by applying to some type of NAS.

  1. Authenticate the AR. This usually involves some sort of secure protocol and usage of cryptographic keys. Authentication helps in determining access privileges (and more)
  2. The policy server performs checks on the AR. The checks verify the users compliance with certain requirements from the organisations secure configuration baseline.
  3. When the AR is cleared it can access the enterprise network within its authorised level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IEEE 802.1X enforcement method

A

Link layer protocol that enforces authorisation before a port is assigned an IP address. Used EAP for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the VLAN enforcement method

A

The network (set of interconnected LANs) is segmented logically into a number of VLANs. NAC decides which of the VLANs an AR will connect to, depending on if the AR needs security remediation, internet access, or some level of network access to enterprise resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the DHCP management enforcement method

A

Dynamic Host Configuration Protocol. An internet protocol that enables dynamic allocation of IP addresses to hosts. A DHCP server intercepts DHCP requests and assigns IP addresses instead. NAC enforcement occurs at the IP layer based on subnet and IP assignment.

Limitations:
IP spoofing, thus providing limited security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 3 components exist in a typical EAP arrangement?

A
  1. EAP peer: client computer attempting to access a network
  2. EAP authenticator: access point or NAS that requires EAP authentication prior to granting access.
  3. Authentication server: a server computer that negotiates the use of a specific EAP method with and EAP peer, validates the peer’s credentials and authorises access to the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the EAP authentication exchange work?

A

The authenticator sends a request to the peer to request and identity and the peer sends a response with identity information.

This request-response continues until (1) the authenticator determines that it cannot authenticate (EAP Failure) or that it can (EAP Success)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the IEEE 802.1X Port-Based Network Access Control

A

It was designed to provide access control functions for LANs.

Until the authentication server authenticates a peer (supplicant) only control and authentication messages are sent between the peer and the AS on the control channel.

When the peer is authenticated and has provided keys, data can be forwarded from the peer to the network on the data channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between the 802.1X channel and the 802.11 channel?

A

The 802.1X is the control channel and it is unblocked, only used for control and authentication messages

The 802.11 is the data channel and it is blocked until a peer has been authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is EAPOL?

A

EAP over LAN. It operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.

It enables a peer to communicate with an authenticator and supports the exchange of EAP packets for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly