Implementation of IEEE 802.1X Port-Based Authentication Mechanism For Ethernet
Implementation of IEEE 802.1X Port-Based Authentication Mechanism For Ethernet
net/publication/329979388
CITATION READS
1 728
2 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Kakelli Anil Kumar on 17 April 2021.
Abstract
We exploredsome mechanisms for securing vulnerabilities or risks could be either from „insiders‟ or
corporate wired Ethernet, which are often more or less from „outsiders‟ who may not belong to the network
neglected. After a careful analysis of all possible [6]. In this era of technological advancement, more and
solutions, we opted for IEEE 802.1X port based more businesses are adopting newer technologies for
authentication mechanism. It uses radius server as an multiple reasons ranging from better customer services
authentication server (on Windows Server 2012 r2) and to better working conditions for their own employees.
Cisco switch as an authenticator. The main purpose of Newer vulnerabilities are being discovered daily, and
implementation of IEEE 802.1X is to restrict guest thereby making it more crucial for businesses to audit,
access to the LAN/wired network and authenticate only map and understand their infrastructure in an
genuine users. Only the authenticated users have access increasingly secure and connected environment.
to the network. The proposed mechanism monitors Organizations need to be aware that cyber-criminal
active users through centralized user access syndicates keep finding more sophisticated techniques
management using Microsoft Active Directory to gain access on organization‟s resources,mostly
Servicesin Microsoft Server 2012 R2. The individual through their networks. Organizations today, need a
configurations of all the entities involved in the meticulous view of their network infrastructurecovering
mechanism are discussed in detail to successfully hosts, VLANs, NAT,VPNs, routing protocols, network
deliver a pilot implementation of the protocol wherein access rules, network components (current versions and
one could debug all the errors and later deploy the updates), services running, and assets. Once this is
same on a live network. By configuring the accounting done, security administratorscould use this network
tab on the Server Manager we will be able to keep track map to figure out existing vulnerabilities and device
of all the users/employees activities on the better security policies to counter them.
organization's network.
II. RELATED WORK
Keywords – Authentication, IEEE-802.1X, Radius
server, switch, Network security. EAP [20] as described in RFC 3784 is mostly used
between clients and switches. EAP operates over the
ABBREVIATIONS: data link layer such as Point-to-Point Protocol (PPP) or
IEEE 802, without requiring IP. EAP supports multiple
EAP- Extensible Authentication Protocol authentication methods such as EAP-Md5, EAP-TLS,
PEAP– Protected Extensible Authentication Protocol EAP-TTLS, PEAP and so on. The EAP packet has
EAPoL- Extensible Authentication Protocol over LAN code, identifier, length, type and data, each of size 1
VPN- Virtual Private Network byte and variable [3, 8].
NAT- Network Address translation
IETF- Internet Engineering Task Force The EAPoLprotocol is a port-based authentication
RFC- Request for Comments protocol used for IEEE 802.1X (Port Based Network
SSID- Service Set Identifier Access Control). Transportation of EAP packets
DSL - Digital Subscriber Line between the client and the authenticator is taken care by
RADIUS- Remote Authentication Dial-In User Service this protocol. Using EAPoL, an EAP authentication
session can be started by either the client or the
I. INTRODUCTION authenticator.The EAPoL frame format consists of
MAC header, Ethernet type, version, packet type,
In the world of information security, words like 'threat' packet body length, packet body, frame check sequence
or „vulnerability‟ or „risk‟mean anyone or anything that with length respectively 1, 2, 2, 1, 1, 2, variable, 4
poses danger to the information,software or hardware or bytes. EAP packets are also carried in the 802.11 by
infact the users themselves. These threats or the EAPoL protocol as defined by Dot1x standard[8].
RADIUS [22] is a client/server protocol which operates environments while others ensure a great deal of
between the authenticator server/RADIUS server and security and auditing information of the users.
the switch. Radius protocol helps in identifying
users/clients based on their login credentials. Only upon A. Physical Network Security
successful authentication, the users/clients can use the The physical security of network and its devices
authorized resources. There are 3 key functions that is also very crucialto protectagainst local threats and
uniquely define the Radius protocol, namely social engineering attacks. A nearby script-kiddie or
authentication, authorization, and accounting (AAA). even a grunted employee cancause harm to the proper
RADIUS packet format includes code, identifier, functioning of the network if strong physical security of
length, authenticator and attribute, of sizes 1 byte, 1 your premises and network devices is not warranted. It
byte, 2 bytes, 16 bytes, and variable respectively. is very essential to guarantee that all the places where
the network components are kept are physically
A. Network Access Control
securedfrom anyone without access rights using smart
From startups to multinational organizations, all
doors and cabinet locks wherever necessary. All the
have network access controls to define or guide how
cables must be well protected by a plastic case and
network access is granted to their employees. The same
ensured that they are not in easy range of anyone to
network has to reach different employees with multiple
play with either out of curiosity or for malicious
access permissions that are just sufficient enough for
purposes. Ethernet ports which are not in present use
their day-to-day jobs. Now there are network access
must be disconnected to prevent unnecessary actions
servers which help them in providing the necessary
performed on them. But this would be just a preventive
access authentication and authorization[6]. There are
measure to limit the chances of attacks or breaches on
various automated tools available which help in
your systems and nothing else.
realizing this strenuous job for network administrators.
Technology giants like Cisco and IBM have developed B. Regularly UpdatedNetwork
solutions to counter the global problems of Network The very first step is to have network auditing and
Access Controls. mapping taken care of from time to time. Software or
firmware updates for all network infrastructure
B. Pilot Implementation
components must be checked regularly. Default
The approach should be to analyze possible
passwords and configurations must be changed at any
vulnerabilities in organization‟s network and find a
cost prior to using any network component like a router
solution that could be implemented in their network
or a switch, etc. Keep a tab on all the computers and
infrastructure. So the very first task towards secured
devices connected to network. Make sure the antivirus
network environment is to get a clear understanding of
is up and running properly and is timelyupdated, also
all the network devices being deployed, their
more complex and secure passwords are used both by
configuration and understanding the importance and
the admin consoles and the employees for better
contribution of every individual component in attaining
protection against brute force attacks.Hackers or
a secure and feasible network access. It is required to
cybercriminals will intend to exploit vulnerabilities in
first have a demo of working of any such security
your operating system, software applications, web
measure before implementing it on the live network as
browsers, and browser plug-ins. Use updated
it runs the risk of affecting regular functioning of the
software/hardware as most of the renowned software
organization‟s employees. One could modify and revise
such as the Microsoft office suite, Adobe Acrobat and
the mechanism in the test environment itself that suits
reader etc. regularly fix security loopholes in their
thecompany‟s network infrastructure and policies well,
framework and ensure a safe working environment to
before deploying iton to the main network.Once the
their customers.But it would be a mistake to consider
pilot implementation is successful, the same could
yourself secured by merely updating your devices on a
bedeployed on the company‟s network and monitored
regular basis. It‟s just a preventive measure towards
for proper functioning.
safeguarding your systems from attacks.
III. EXPLORING POSSIBLE SECURITY C. Implement MAC Address Filtering
MEASURES FOR ETHERNET Generally, in the case of a wired network, it‟s just
plug and play for the network access which poses a
Every organization has its unique network major security issue for the wired networks. As
infrastructure with varied networking devices from compared to WEP, then WPA/WPA2 standards in
varied vendors/companies, so there is no rock solid wireless networks, the wired networks lack such well-
solution for network security. Some of these solutions defined security standards.MAC address filtering is
are preliminary steps towards more secured basically allowing network access to devices whose
MAC addresses are stored by the server. A table of
MAC addresses of all the devices in network perimeter Client: The user device (workstation) that requests
is prepared and network access is granted only to those access to the LAN network and switch. Often regarded
devices. Although it can be bypassed by a beginner as the „supplicant‟. Client workstation must be
level hacker by forging a legit MAC address, it could configured with802.1X-compliant client software. It is
just serve as the first layer of security. It could help easily available in Windows operating systems.
prevent an employee, a guest or an outsider to plug into
the private network directly. The administrators will Authentication server: The Radius server is the one
also have more control over devices on the network. which performs the actual authentication of the client. It
But don‟t let it give you a false sense of security as validates the identity of the client through login
MAC address could be very easily forged by any information and notifies the switch whether or not the
determined hacker, and also be prepared to regularly client is authorized to access the LAN and
update the MAC address list every now and then if you switchservices. [1]. The authentication data between the
opt for MAC address filtering. Radius-server and its clients is exchanged securely.
D. Network Traffic Encryption Switch: The switch is often termed as the authenticator
If security requirements are significantly high, and is basically a proxy between the RADIUS
consider encrypting your entire network traffic. server(authenticator) and the client. On connecting to a
Remember even with various security features in place, switch port, it seeks login credentials from the
if your network traffic is not encrypted, it is very easy client/user and then sends the data to the server for
for an intermediate level hacker to just capture your verification. After the server has successfully
traffic that might have user accounts, passwords, and authenticated the particular client/user, network access
other sensitive information.There are many proprietary is allowed on that port depending upon the access rights
network encryption solutions available nowadays, many defined for that user by the admin.
of which operate at data link layerinstead of network
layer, like IPsec to help reduce latency and
overhead.But it runs the drawback of severe network
lagging, hindering day to day functioning of all your
employees. Encrypting data is only advisable in case of
very sensitive data to share across and if you could
afford a dime to ensure its security.
B. RADIUS and its Application in 802.1X implementation of this protocol that could be
The RADIUS client is typically a NAS and the incorporated with it depending upon the organization‟s
RADIUS server is usually a daemon process running on requirements.
either a UNIX or a Windows NT machine.A Windows
NT or a UNIX machine may usually support the V.IMPLEMENTATION OF 802.1X
RADIUS server while RADIUS client is typically a AUTHENTICATION
NAS [1, 2]. RADIUS servers receive network access
request, authenticates the user, and allows network A. Requirements for Testing
access or other resources that are meant for that user, as The following are required for testing 802.1x in a
defined in the security policies by the Admin.RADIUS safe “off the grid” network.
server and its clients share a secret key [15].Radius is 1) Windows Server 2012 R2 -Authentication Server
the “backend server”(Authentication Server)in nearly 2) Cisco Catalyst 2960x-48ts-ll Switch - Authenticator
all the 802.1X implementations. The client is referred to 3) Windows 10 Test PC – user
as “the supplicant” in EAP/802.1X terminology. Wired 4) Connecting RJ-45 cables.
Ethernet switches typically implement EAP-PEAP
(Microsoft, password-based authentication), EAP- B. Configuring the Windows Sever by Sever
TTLS (vendor-neutral, password-based and/or client- Manager
certificate-based) and EAP-TLS (client-certificate- The following steps are a detailed guide to
based) protocols[4].For EAP/802.1X protocols, the successfully deploying the 802.1X port authentication
NAS (a wired Ethernet switch) relays the EAP/802.1X (server side)
messages between the wired client and the RADIUS 1) Open Control Panel > Change Adapter Settings >
server. [16, 18]. RADIUS server holds a database of Right click on Ethernet > Properties >IP Version 4
users/clients containing their usernames and the (TCP/IPV4) > properties. Now, enter the IP address
passwords as stored by the network manager, and also which is in the same groups as your cisco switch ie.
the policies that define network access based on the 192.168.100.2, and subnet mask as 255.255.255.0 and
employee that is seeking network access. There are the DNS server IP must also be the same as the IP.
numerous variations and customizations that could be
achieved by the use of RADIUS SERVER and Dot1x
implementation but discussing them all are out of scope
in the current report but some of them are really useful
that could be implemented with great ease.
D. IEEE 802.1x with Inaccessible Authentication Fig.3 IP configuration of Windows server machine
Bypass
For all the cases where the switch fails to connect 2) Open Server Manager – Dashboard > Add roles and
with the RADIUS server, inaccessible authentication features > Install Active Directory Domain Services
bypass feature is configured and the client is directed to 3) Promote this Server to the Domain Controller and
a critical VLAN with restricted access rights [1]. add the Domain name and other relevant details.
4) The Server System will reboot after this. Again open
E. IEEE 802.1x with MAC Authentication Bypass Server Manager > Add roles or feature> Add Active
For cases where the Dot1x enabled ports are Directory Certificate Services.Similar Steps would be
connected to devices such as printers, IP telephones or followed.This would serve as the Active Directory
some server etc, it is very important to deploy the MAC Certificate Authority that would help in authenticating
authentication bypass feature as these devices cannot the users as they attempt to connect to the network.
authenticate themselves. The MAB feature would allow 5) Now again, open Server Manager > Add roles or
bypassing for these devices based on their MAC feature> Add Network Policy and Access Services
addresses that are stored in a separate table on the (NAP)
RADIUS server. Apart from the mentioned above,
there are numerous other add-ons with the
generated by saving the running configuration of the Click on Configure – And uncheck Automatically use
switch: Windows Login Name and Password while
connecting.Go to settings > Uncheck All Options.
MySwitch# show running-config Select Authentications Method as Microsoft-Secured
interface GigabitEthernet0/45 password(EAP-MSCHAP v2). Click Ok and open
switchport mode access additional settings to specify the authentication mode.
authentication host-mode multi-host User authentication and click on OK for test setup.
authentication order dot1x mab
authentication port-control auto
dot1x pae authenticator
ip address 192.168.100.15 255.255.255.0
radius server hzl
address ipv4 192.168.100.2 auth-port 1812 acct-port
1813
key secret
4) The status will finally change from identifying [10] Cisco, “OpenFlow,” in Consolidated Platform Configuration
Guide, Cisco IOS Release 15.2(5)E (Catalyst 2960-X Switches),
network to connect to an unidentified network which 2017.
results the successfully authentication and joined the [11] D. Hannifin, N. J. Alpern, and J. Alpern, Microsoft Windows
company‟s network. NPS server allows us to monitor Server 2008 R2 Administrator‟s Reference. 2010.
the events on the Radius server. The admin can monitor [12] E. Vyncke and C. Paggen, LAN switch security: what hackers
know about your switches. 2008.
from the server the login details of all the users(their IP [13] Y. Zou, J. Zhu, X. Wang, and V. C. M. Leung, “Improving
address and other details) who attempt to login to the physical-layer security in wireless communications using
company‟s network through event viewer in windows diversity techniques,” IEEE Network, 2015.
server manager. [14] C. Rigney, “RFC 2866 - RADIUS Accounting,” Network
Working Group, 2000.
[15] K. Y. Park, Y. S. Kim, and J. Kim, “Security enhanced IEEE
802.1x authentication method for WLAN mobile router,”
Advanced Communication Technology (ICACT), 2012 14th
International Conference, 2012.
[16] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H.
Levkowetz, “Rfc 3748,” Extensible Authentication Protocol
(EAP), 2004.
[17] J. C. Chen and Y. P. Wang, “Extensible Authentication Protocol
(EAP) and IEEE 802.1x: Tutorial and Empirical Experience,”
IEEE Communications Magazine, 2005.
[18] X. Huang, S. Wijesekera, and D. Sharma, “Secure
communication in 802.11 networks with a novel protocol using
quantum cryptography,” in Proceedings 2010 4th International
Conference on Network and System Security, NSS 2010, 2010.
[19] Md. Hashmathur Rehman, Dr.A. Govardhan T. Venkat
Narayana Rao, “Design and Implementation of RADIUS, An
Fig. 10Event viewer- monitoring user activity Network Security Protocol”, Global Journal of Computer
Science and Technology,Page 48, vol. 10, issue 7, 2010.
[20] B. Shojaie, I. Saberi, and M. Salleh, “Enhancing EAP-TLS
Also, an additional Log File is generated of every single authentication protocol for IEEE 802.11i,” Wireless Networks,
attempt to login, which the admin can go through in 2017.
case of any discrepancy in the company‟s network.
REFRENCES