Družina IEEE802 Poddružina IEEE802.1 Priključitev v omrežje IEEE802.1x

Similar documents
General Important Protocols for Examination of IA Examination 2018

Delavnica za konfiguriranje dostopovnih točk WEB konfiguracija LANCOM L-54

1. Data Link Layer Protocols

Local Area Networks. Ethernet LAN

Implementing X Security Solutions for Wired and Wireless Networks

Delavnica za konfiguriranje dostopovnih točk Konfiguracija LANCOM L-54 z uporabo orodja LANConfig

Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. IEEE 802 Standards Overview

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

ก ก Information Technology II

IEEE-SA Standardization Activities for Smart Grid in Communications & Networking. Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Ethernet. ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications

Ethernet. Contents. ITS323: Introduction to Data Communications CSS331: Fundamentals of Data Communications. IEEE 802 LANs.

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

802.1x. ACSAC 2002 Las Vegas

Navodila za uporabo izdelkov programske opreme Microsoft

802 Active Standards as of 6/28/17 Standard Year Working Group Title SASB Expiration Rev PAR Open

Table of Contents X Configuration 1-1

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Discovering Computers Chapter 9 Communications and Networks

RADIUS Change of Authorization

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

QUESTION: 2 Which of the following statements is true regarding the SFP interfaces on the C2G124-48, and C2G124-48P?

Authentication and Security: IEEE 802.1x and protocols EAP based

Configuring IEEE 802.1x Port-Based Authentication

Controlled/uncontrolled port and port authorization status

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 3: Overview 802 Standard

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Lotus Quickr Najhitrejši način izmenjave poslovne vsebine

Uvod in ponovitev osnov predmeta

10/6/11. Komunikacijski protokoli in omrežna varnost. Vsebina predmeta. Uvod in ponovitev osnov predmeta

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks

Wireless LAN, WLAN Security, and VPN

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals.

Anca Cioraca, Ilia Voloh, Mark Adamiak GE Grid Automation

VARNOST PODATKOV V BREZŽIČNEM LOKALNEM OMREŽJU

New Media & Language Technologies Jozef Stefan International Postgraduate School January Speech apps. Jerneja Žganec Gros

IEEE 802 Standardization: Past, Present and Future

Configuring a VAP on the WAP351, WAP131, and WAP371

Authentication and Security: IEEE 802.1x and protocols EAP based

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

QuickSpecs. HP M111 Client Bridge Series (Retired) Model. Key features

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks

Securing Your Wireless LAN

Sistemske zahteve za SAOP

Example: Setting Up 802.1X for Single Supplicant or Multiple Supplicant Configurations on an EX Series Switch

It is the process of sharing data, programs, and information between two or more computers.

Chapter 9. Introduction. Communications

IEEE standards for local area networks

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

PPPoE Circuit-Id Tag Processing

COMPUTER SKILLS COMP101

EXAM - N CompTIA Network+ Certification Exam. Buy Full Product.

Example: Configuring IP Source Guard on a Data VLAN That Shares an Interface with a Voice VLAN

COPYRIGHTED MATERIAL. Introduction. Bernhard H. Walke, Guido Hiertz and Lars Berlemann. 1.1 Standardization

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Communications and Networks

Introduction to Networks and the Internet

Operation Manual 802.1x. Table of Contents

Table of Contents X Configuration 1-1

Models HP ProCurve M110 Access Point WW

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Vodnik skozi Google Analytics Beta verzija 1. del. prehod s stare kode (urchin.js), k novi kodi za sledenje (ga.js)

COMPUTER NETWORKING. By: Dr. Noor Dayana Abd Halim

Numerics. Index 1. SSH See SSH. connection inactivity time 2-3 console, for configuring authorized IP managers 11-5 DES 6-3, 7-3

Study Guide. Module Two

IEEE &

Cisco Exam Questions & Answers

Fixed-Mobile Wireless Networks Convergence

Table of Contents. 4 System Guard Configuration 4-1 System Guard Overview 4-1 Guard Against IP Attacks 4-1 Guard Against TCN Attacks 4-1

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Configuring r BSS Fast Transition

CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ]

PRIMENA INTERNET AUTHENTICATION SERVER-A U RAČUNARSKOJ MREŽI KAMPUSA SREDNJE VELIČINE

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

Configuring 802.1X. Finding Feature Information. Information About 802.1X

Introduction to Wireless Networking ECE 401WN Spring 2009

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

The Year of the Virtual LAN

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

Exam Questions CWSP-205

Port-based authentication with IEEE Standard 802.1x. William J. Meador

Hitra rast hranjenih podatkov

» Nakup in vzdrževanje Oracle programske opreme «Tehnične specifikacije

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

802.1P CoS Bit Set for PPP and PPPoE Control Frames

VIEW Configuration Guide. Cisco. 1131, 1232 and 1242 Autonomous APs. June 2010 Edition Version D

Resilient Packet Ring 5 Criteria (2. Compatibility)

TestsDumps. Latest Test Dumps for IT Exam Certification

Wireless technology Principles of Security

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Chapter 4 Advanced Settings and Features

Transcription:

1

Družina IEEE802 Poddružina IEEE802.1 Priključitev v omrežje IEEE802.1x 2

družina standardov, ki opisujejo delovanje lokalnih (LAN) in mestnih (MAN) omrežij delo opravljano v delovnih skupinah več na URL: http://www.ieee802.org/ izziv: Preglejte si spletno stran in preglejte vsebino. 3

osnovna arhitektura: spodaj: nadzor dostopa do medija (media access Control, MAC) zgoraj: logična povezavna plast (logical link layer, LLC) ločen dostop do medija in naslavljanje -> prenašanje okvirjev 4

enoten naslovni prostor okvirjev (lokalna) mreža mora znati pravilno pošiljati okvirje 5

IEEE 802.1 Management IEEE 802.2 IEEE 802.3 IEEE 802.4 IEEE 802.5 IEEE 802.6 IEEE 802.7 IEEE 802.8 IEEE 802.9 IEEE 802.10 Bridging (networking) and Network Logical Link Control LLC Ethernet Token bus Defines the MAC layer for a Token Ring MANs Broadband LAN using Coaxial Cable Fiber Optic TAG Integrated Services LAN Interoperable LAN Security 6

IEEE 802.11 Wireless LAN (WLAN) & Mesh (Wi-Fi certification) IEEE 802.12 demand priority IEEE 802.13 Used for 100BASE-X Ethernet IEEE 802.14 Cable modems IEEE 802.15 Wireless PAN (Bluetooth,...) IEEE 802.16 Broadband Wireless Access (WiMAX certification) IEEE 802.17 Resilient packet ring IEEE 802.18 Radio Regulatory TAG IEEE 802.19 Coexistence TAG IEEE 802.20 Mobile Broadband Wireless Access IEEE 802.21 Media Independent Handoff IEEE 802.22 Wireless Regional Area Network IEEE 802.23 Emergency Services Working Group (marec 2010) 7

Bridging (networking) and Network Management povezovanje med pod-mrežami upravljanje omrežij (npr. najmanjše vpeto drevo) varnost v mrežah deluje na vrhu LLC več na URL: http://www.ieee802.org/1/ izziv: Preglejte si spletno stran in preglejte vsebino. 8

802.1b: upravljanje LAN/MAN (umaknjeno) 802.1d: mostički na MAC plasti 802.1e 802.1g: umaknjeno 802.1h: Ethernet MAC mostički 802.1q: navidezni LAN (VLAN) 802.1x: nadzor priključitve v mrežo (Port Based Network Access Control) 9

802.1ab: postaje in nadzor dostopa do medija ter iskanje povezljivosti 802.1ae: varnost na MAC plasti 802.1ar: varno identificiranje enot 802.1as: časovno usklajevanje in časovno občutljive aplikacije v mrežah z mostički 802.1ax: združevanje povezav (link aggregation) 802.1ba: avdio/video sistemi z mostički 10

dostop v mrežo je storitev, ki omogoča rabo drugih storitev dostop do medmrežja,... podrobnosti na URL http://www.ieee802.org/1/pages/ 802.1x-2004.html izziv: Preglejte si spletno stran. Kako je z vsebino? 11

dostop v mrežo je storitev, ki omogoča rabo drugih storitev dostop do medmrežja,... raba storitve je lahko prosta ali nadzorovana za nadzorovano rabo storitve potrebujemo ugotoviti, kdo je morebitni uporabnik; in ali ima pravico rabe storitve. avtentikacija in avtorizacija (nekje tudi beleženje) naloga: v priključitev v mrežo nekako vplesti AAA 12

nastopajo trije gradniki: odjemalec (supplicant) avtentikator (authenticator) avtentikacijski strežnik (authentication server) odjemalec se prijavi avtentikatorju, ki pri avtentikacijskem strežniku preveri njegovo avtentiteto in ali je avtoriziran za dostop do mreže naloga: vgraditi EAP na povezavno plast izziv: Kako(!) avtenitkator dejansko omogoči odjemalcu dostop do mreže? 13

standard IEEE 802.1x definira EAP na povezavni plasti EAP over LAN -> EAPOL kasneje je bil EAPOL uporabljen še v drugih pod-družinah IEEE 802.1x: 802.1ae: varnost na MAC plasti 802.1ar: varno identificiranje enot EAPOL je definiran tako, da se njegova vsebina prenaša neposredno v Ethernet okvirjih z vsebinsko značko 0x888E: Preamble (7-bytes) Start Frame Delimiter (1-byte) Dest. MAC Address (6-bytes) Source MAC Address (6-bytes) Length / Type (2-bytes) MAC Client Data (0-n bytes) Pad(0-p bytes) Frame Check Sequence (4-bytes) 14

definiran v RFC 3748 podpora za različne avtentikacijske protokole koračni protokol 15

inicializacija: ko avtentikator (običajno tudi stikalo, WLAN dostopovna točka ipd.) zazna novega odjemalca, mu omogoči samo IEEE 802.1x komunikacijo od tu naprej se prične EAP protokol 16

povabilo: avtentikator (periodično) pošlje odjemalcu povabilo, da se naj predstavi odjemalec se predstavi avtentikatorju, ki predstavitev pošlje avtentikacijskemu strežniku (RADIUS) sedaj je avtentikator samo vmesni strežnik za avtentikacijski strežnik dejansko avtentikacijo izvede vatentikacijski strežnik zaupanje!! med avtentikatorjem in avtentikacijskim strežnikom izziv: Kako sprogramirati to zaupanje? 17

pogajanje: se izvaja med odjemalcem in avtentikatorjem v skladu z EAP protokolom kateri avtentikacijski protokol, izziv in odgovor,... 18

avtentikacija: sama avtentikacija odjemalca avtentikator, ko strežnik avtenticira odjemalca, dovoli odjemalcu dostop do lokalne mreže 19

federacija avtentikacijskih strežnikov, ki si zaupajo uporabnik kateregakoli strežnika se lahko avtenticira pri kateremkoli avtentikatorju v federaciji izziv: Kje je sedaj asimetrična kriptografija, ki jo uporablja EDUROAM v protokolu za avtentikacijo? Za avtentikacijo koga jo uporabljamo? Odgovorite na forum za dodatne točke. 20

Hvala za pozornost in veliko uspeha v naprej! 21