Juniper Mist Access Assurance 모범 사례
Juniper Mist Access Assurance를 구축할 때 최상의 결과를 얻으려면 다음 권장 사항을 따르십시오.
다음은 Juniper Mist Access Assurance로 구현할 수 있는 몇 가지 네트워크 액세스 제어(NAC) 모범 사례 목록입니다.
- 802.1X 프레임워크 사용: NAC의 표준이며 대부분의 클라이언트 디바이스에서 지원됩니다. 가장 좋은 방법은 802.1X 인증을 지원하는 회사 디바이스를 온보딩하는 것입니다.
참고: IoT 또는 BYOD를 통해 연결하는 비 802.1X 디바이스의 MAC리스 온보딩을 수행할 수도 있습니다.
- ID 공급자와 함께 자격 증명 기반 인증 사용: 사용자는 사용자 이름과 암호를 사용하여 네트워크에 연결합니다. IdP(ID 공급자)는 자격 증명과 사용자 계정을 확인해야 합니다.
- 인증서 기반 인증 사용: 이 방법은 클라이언트 장치에 설치된 디지털 인증서를 인증에 사용합니다. 이러한 인증서는 디바이스 또는 사용자 프로필에 할당할 수 있습니다.
- 클라우드 기반 IdP로 전환: Microsoft Azure Active Directory, Okta, Ping Identity 또는 Google Workspace와 같은 클라우드 기반 ID 공급자가 점점 더 보편화되고 있으며 다양한 이점을 제공합니다.
- PKI(공개 키 인프라) 사용: PKI(공개 키 인프라) 사용: PKI를 사용하여 디지털 인증서를 만들고, 저장하고, 배포하고, 해지합니다.
- 장치 프로비저닝: 디바이스를 대규모로 프로비저닝하도록 Juniper Mist Access Assurance를 구성합니다. 일반적으로 디바이스 프로비저닝을 위해 엔터프라이즈 환경에서 MDM(모바일 디바이스 관리) 플랫폼을 사용합니다.
- 자동화된 NAC 솔루션 사용: 자동화된 NAC 솔루션은 에 연결된 모든 디바이스에 대해 가시성, 관리 및 자동화된 대응을 제공할 수 있습니다. 또한 이 솔루션은 모든 디바이스와 사용자에 정책을 적용하여 보안 네트워크 액세스를 제공합니다.
- 다단계 인증 사용: 네트워크 액세스에 두 가지 이상의 인증 형식을 사용하여 추가 보안 계층을 제공합니다
- 네트워크 세그먼테이션 수행: 네트워크 세그먼테이션은 멀웨어의 확산을 방지하고 보안 침해의 영향을 제한하는 데 도움이 될 수 있습니다.
- 게스트 액세스 정책 구현: 요구 사항에 따라 여러 사용자에게 다양한 유형의 액세스 권한을 제공합니다. 게스트 액세스 정책은 방문자와 계약자의 네트워크 액세스를 제어하는 데 도움이 될 수 있습니다.
다음 비디오에서 액세스 제어 모범 사례를 확인하십시오.
Some of the best practices when it comes to securing your access to the network-- when we talk about the most secure method to access the network, we are generally talking about 802.1X, which is a framework standard that's been out there for many, many years. Many client devices support this today. This is what we would consider the best and optimal way to do secure access to your network.
But there are many flavors of 802.1X and how devices would authenticate themselves to the network. But broadly speaking, we can separate them into categories. One is the credential-based authentication. So you would connect to a network, whether it's a switchboard, or you connect to your AP that supports .1X. You would put in your username and password, and, at that point, you're authenticated, and you're on the network.
In this scenario, when we are using credentials to authenticate, you are required to have an identity provider that will actually verify that the credentials, and the user account is valid. And nowadays, or actually, previously, the primary IdP for everybody was Active Directory. That was typically running on prem. Nowadays, the trend is to move to cloud-based identity providers such as Azure AD or Okta or Ping Identity or Google Workspace or whatever else that is out there. So IdPs are moving to the cloud.
Now, the challenge with credential-based authentication is that there is really no good way to handle multifactor authentication here. So you are literally only relying on your username and a static password that you may or may not rotate periodically. And that brings in certain issues when it comes to man-in-the-middle attacks.
Historically, customers were not configuring their client devices correctly. So that was exposing man-in-the-middle attacks vectors to happen. And the typical scenario is that clients would bypass server certificate validation. So there is no mutual authentication happening. And at that point, anybody could have spoofed your credentials, and you would have become a victim of an attack.
The other aspect of this is, starting from Windows 11, the latest update from Microsoft, Microsoft decided to enable a feature called Credential Guard by default, which, as a result, disables and blocks all password-based authentication methods for both Wi-Fi and VPN. That means you can no longer use your standard PEAP-MSCHAPv2 or TTLS/PAP methods to connect using .1X. Microsoft is saying everybody should move to certificates, which brings me to the next section.
The next option to validate or to authenticate devices against network is to use certificates as user or device identity. So digital certificates are installed on client devices, whether it's laptops, mobile devices, et cetera, et cetera. They can be either device based, so they're issued for a specific machine name, like a laptop name or a specific device or mobile device, or they're issued for a specific user that's logged in to that device or both.
So in this case, you have an option to choose whether to use user-based authentication or device-based authentication. In this case, identity provider is optional. So you can solely rely on validating the certificate. And if the user or device certificate is valid and trusted, then you would allow the client to connect.
You can additionally rely on the IdP to get more information, more context about the user that's trying to connect you. For example, you could check account state of that user if that account is still enabled. Maybe the account got disabled, but certificate is still valid. There's certain cases like this.
And, most importantly, you want to get group membership information about the user. So you need to know, OK, this is a valid certificate, but what level of authorization I want to provide for this user, whether it's an employee contract or part of finance, marketing, et cetera, et cetera. This is where IdP becomes useful.
Today, this is the most secure authentication method. Certificates are stored in secure storage. They're generally not user accessible. It's virtually impossible to forge them, to hack them, or do anything of that nature. So this is the recommended authentication method if you want the most secure way of accessing the network.
With certificates, the challenge is client device provisioning. You need to have a certificate infrastructure, which is called PKI, or Public Key Infrastructure. And you will need to have a tool that will provision your devices at scale, so users don't have to do this manually. In enterprises, in production environments, it is typically done using MDMs, or Mobile Device Management platforms, right?
So an example of an MDM is Microsoft Intune. So at the moment, you will get the company-managed device. It will register itself with an MDM. MDM will push all the required information, including a certificate.
OK, what about cases where we are not dealing with a device that supports 802.1X, or you're dealing with cases where you don't want to manage the device and deal with certificate provisioning, et cetera, et cetera? So with non .1X cases, we need to look at two categories. First is Wi-Fi. What can you do with Wi-Fi-connected devices that are not leveraging .1X?
And when we're talking about Wi-Fi, you really have two types of devices there. One is IoT devices, or your headless devices that don't have any interface on them. They generally don't support .1X, or their .1X is very, very limited and cumbersome to configure. And we can call them unattended devices, right?
And we can also talk about the BYOD devices, or Bring Your Own Device, where we are talking about personal devices, but, say, in the enterprise of personal devices of employees, that you are not managing as IT, but you want them to be able to connect to the network using some form of an identity that they have.
In this case, our recommendation is to use multi-preshared key solution that we have today, where each and every user, if we are talking about BYOD, will have their own personalized PSK, which becomes the identity of that user. And that personalized PSK is self-provisioned using single sign-on through a PSK portal that we host. From an IoT device perspective, you would have a unique PSK for each device type, for example, a PSK for Wi-Fi cameras, a PSK for Wi-Fi door locks, HVAC systems, et cetera, et cetera.
For each keys, you could set up your policy segmentation logic, assign a VLAN, assign role, et cetera, et cetera. And you get the same level of visibility and auditing as with traditional .1X systems, right? But from an end-user perspective or end-client device perspective, it's as simple as connecting to a Wi-Fi using a passphrase, so the same as you would do at home, right?
This second aspect is wired IoT devices, right? This is where we are talking about, say, wired cameras, wired printers, wired anything that does not support .1X or is not provisioned to do .1X. In this case, the identity of the device is really just the MAC address. And, in this case, you could use Mist access assurance client list labels to apply policies on a switch side. You could look at the MAC or UIO MAC vendor of the device and apply different VLANs for printers, for cameras, etc, etc.
자격 증명 기반 인증과 인증서 기반 인증 중에서 선택하는 것은 특정 요구 사항과 필요한 보안 수준에 따라 달라집니다. 인증서 기반 인증은 현재 가장 안전한 방법으로 간주됩니다.