Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
25 views20 pages

Wired Post Connect

The document outlines best practices for deploying the Forescout Platform using a wired post-connect approach, detailing its advantages, challenges, and policy flow. It emphasizes the importance of initial network access for endpoints, allowing for profiling and compliance checks while maintaining user productivity. Additionally, it covers integration with network switches and the necessary configurations for effective endpoint visibility and access control.

Uploaded by

obada hazayma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views20 pages

Wired Post Connect

The document outlines best practices for deploying the Forescout Platform using a wired post-connect approach, detailing its advantages, challenges, and policy flow. It emphasizes the importance of initial network access for endpoints, allowing for profiling and compliance checks while maintaining user productivity. Additionally, it covers integration with network switches and the necessary configurations for effective endpoint visibility and access control.

Uploaded by

obada hazayma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Forescout

Best Practices for Forescout Platform® Deployment:


Wired Post-Connect
Contact Information
Forescout Technologies, Inc. 190 West Tasman Drive
San Jose, CA 95134 USA
https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771
Tel (Intl): 1.408.213.3191
Support: 1.708.237.6591

About the Documentation


• Refer to the Documentation Portal for additional technical documentation: https://
docs.forescout.com/
• Have feedback or questions? Write to us at [email protected]

Legal Notice
© 2021 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware
corporation. A list of our trademarks and patents can be found at https://www.forescout.com/
company/legal/intellectual-property-patents-trademarks.
Other brands, products, or service names may be trademarks or service marks of their respective
owners.

2
Table of Contents
Introduction ........................................................................................................... 4
Purpose ........................................................................................................... 4
Audience ......................................................................................................... 4

About Wired Post-Connect Deployment ............................................................. 5


Advantages of this approach............................................................................... 5
Challenges of this approach ................................................................................ 6
Policy flow ........................................................................................................ 6

Switch Integration................................................................................................. 8
Switch integration basics .................................................................................... 8
Data gathering .................................................................................................. 8
Initial detection ................................................................................................. 9
Switch port detection ....................................................................................... 10
IP-to-MAC address mapping .............................................................................. 10
Switch port controls ......................................................................................... 11
Summary ....................................................................................................... 12

Notifications and Redirects ................................................................................ 13


Email notifications ........................................................................................... 13
Managed systems ............................................................................................ 13
Unmanaged systems ........................................................................................ 13
Summary ....................................................................................................... 14

Solution Architecture .......................................................................................... 15

Workflow Diagrams and Flowcharts ................................................................. 15


Sample policy flow .......................................................................................... 15
Switch communication ...................................................................................... 16

Environment Requirements ................................................................................ 17


Forescout Platform requirements ........................................................................ 17
Customer environment requirements ................................................................... 17

Configuring the Forescout Platform................................................................... 17


Forescout Platform console .............................................................................. 18
Special situation configurations.......................................................................... 19

For More Information........................................................................................... 20

3
Best Practices for Forescout Platform Deployment: Wired Post-Connect

Introduction
Forescout Platform® deployment scenario documents provide an overview of the different
approaches employed when implementing Forescout Platform as a network visibility and
access control solution, including the advantages, potential constraints, and best practices
associated with each method. Our goal is to help your organization determine which
approach best suits your environment and security policy. Wired post-connect is one of
the various deployment scenarios supported by ForeScout. Visit
http://www.forescout.com/company/resources/ for additional deployment scenario
guides.

Purpose
This document will describe the Forescout Platform post-connect deployment on wired
networks, including design considerations, requirements, and an overview of Forescout
Platform operation within this specific methodology.

Audience
This guide’s targets are security managers, architects, designers, and other security
professionals. It can help you determine how best to implement a Forescout Platform
network visibility and access control strategy for your organization and assumes you are
familiar with the following basic concepts:

• The four primary areas of Forescout Platform policies

- Discover

- Clarify

- Assess

- Control

• Physical Forescout Platform deployment architectures

- Centralized

- Distributed

- Hybrid

• Forescout Platform deployment phases

- Visibility

- Control

- Orchestrate

• Forescout Platform endpoint inspection and management

- Remote inspection

- SecureConnector™

ForeScout Technologies, Inc. 4


Best Practices for Forescout Platform Deployment: Wired Post-Connect

• Standard data center network models

- Core layer

- Distribution layer

- Access layer

About Wired Post-Connect Deployment


Wired post-connect deployment of the Forescout Platform is a visibility and access
control strategy in which endpoints are initially allowed access to the network. Then the
Forescout Platform profiles them to determine ownership and compliance. Access to the
wired network is then adjusted based on profile and security policy.

Advantages of this approach

Optimal user experience and productivity


Because endpoints are granted initial network access during the profiling process, this
approach helps minimize the impact on the user experience. Avoiding onboarding delays
in user access to network resources helps maintain productivity for your organization.

Ease of deployment
A post-connect deployment may involve less pre-configuration of network devices and
reduce some of the strain on operational staff. Pre-connect environments or 802.1x
configurations are not required.

Network access control fails open.


A post-connect model implies initial trust when an endpoint first connects to the
network. If connectivity to the Forescout Platform is lost—by a single site or by the
entire enterprise network—endpoints retain regular access to network resources.

Gradual rollout
A post-connect model allows more flexibility during deployment and simplifies the
transition from See to Control; The Forescout Platform can first acquire complete
visibility of endpoints on the network, then enforcement actions can be overlaid
incrementally as environmental readiness increases.
Because endpoints are initially permitted, the Forescout Platform can provide visibility
while your access control strategy matures. Use this visibility to determine what devices
connect to the network and their access requirements. Access controls can then be
configured for specific device types and enabled separately in stages. Your security
team can better focus on the appropriate strategy for particular device types and the
desired conditions for and types of controls to use.

ForeScout Technologies, Inc. 5


Best Practices for Forescout Platform Deployment: Wired Post-Connect

Challenges of this approach

Time to enforcement delay


The initial trust implicit in a post-connect model means that a non-compliant endpoint
will be allowed on the network for a brief interval while the Forescout Platform
completes its profile and discovers the need to restrict access. This interval can vary
depending on an organization’s policy flow and security policy, which dictates what is
allowed on the network and what is not.

Policy flow
Basic policy flow concepts are at the core of the Forescout Platform policy methodology,
and it is crucial to understand how different deployment approaches affect the flow of a
policy. This section covers these concepts as they pertain to a wired post-connect
scenario. Before an endpoint is subjected to a policy, and before the Forescout Platform
profiles a device it has not previously seen on the network, there is a built-in,
configurable, 30-second delay. The admission delay allows time for systems to boot
completely and return accurate external profiling results.
All through the policy flow, Forescout recommends the best practice of assigning
endpoints to groups and then having those groups feed endpoints into policies
appropriate for those groups. For example, Forescout discovers a Windows PC and the
discovery policy assigns that endpoint to the “Windows” group. Then, the Windows PC is
evaluated as to whether or not Forescout can interact with it. If it does, it goes to the
“Managed Windows” group; if not, then it goes to the “Unmanaged Windows” group.
Endpoints in the “Managed Windows” group are then further checked for compliance,
and could be placed in groups that deal with non-compliant devices. Endpoints in the
“Unmanaged Windows” group are put through a policy that checks for exceptions, with
the remainder that is not subject to an exception placed in a group that will go on to a
control policy.
We will examine this policy flow in the next few sections.

Discover
Discover is the first Forescout Platform policy endpoints encounter. In a post-connect
model, it is imperative to follow best practices for a clean and efficient Discover
policy, as this strongly affects the eventual time to control. Because Discover sets
the stage for the rest of the policy set, speed is important, but accuracy is essential.
Keeping the discovery policy to as few subrules as possible helps with the speed of
evaluation. Simple checks to determine device types are all that are needed in the
discovery policy. Checks for conditions that involve direct queries to endpoints could
result in timeouts if the endpoint is not configured to respond to such queries – those
timeouts, in turn, result in unnecessary delays in evaluation.
Each discovery policy subrule will assign endpoints to a group for further evaluations
that are appropriate for that group. A printer, for example, will have different
evaluations than a VoIP device.

ForeScout Technologies, Inc. 6


Best Practices for Forescout Platform Deployment: Wired Post-Connect

Clarify
In the clarification portion of the policy flow, devices such as Windows, MacOS, and
Linux endpoints that can be accessed via an agent or credential are assessed as to
whether or not the Forescout Platform can communicate with them. Endpoints that
have the Forescout SecureConnector agent or which allow for agentless access are
considered to be “managed” by Forescout.
Other devices, such as printers, network devices, or some IoT devices, can be
configured to permit Forescout management via SNMP or SSH credentials. If such
credentials are provisioned, these devices can also be placed in the “managed”
category.
With managed device classes, there are three possible outcomes. One, corporate
devices that allow Forescout access are considered fully managed. Two, corporate
devices that do not allow Forescout access are either remediated so that they do
allow access, or they are manually exempted from management requirements.
Three, non-corporate devices are either exempted from management requirements
or are assigned to a Forescout group that will feed into a network access control
policy.
Non-manageable systems recognized as corporate endpoints (VoIP phones, printers,
or IoT devices) typically end their policy flow here. At early levels of Forescout
platform maturity, they will remain on the network as-is. In later levels of Forescout
platform maturity, they will be monitored via eyeSegment and have their
communications regulated through a segmentation strategy based on eyeSegment
observations.

Assess
Managed endpoints are assessed for their overall security posture. This is a matter of
determining which endpoints are running required security agents and which are not.
Devices that are deemed compliant typically end their policy flow here, retaining
network access as usual. Those deemed non-compliant will be subject to remediation
actions. Remediation actions can range from notification to automatic remediation to
network restrictions.
Typically, remediation actions are set up to match the severity of the non-compliance
and whether or not an automated response is possible. In minor cases, such as a
service simply not running, Forescout can be set to start the required service and to
generate a syslog to record the event. In more advanced cases, such as where a
required software package requires installation and the endpoint presents a threat to
other devices, Forescout can be configured to move such endpoints to a remediation
network. A remediation network would be where the endpoint will not be able to
access the network as a whole, but will have access to software distribution servers
for downloading required software.

Control
During control, devices are removed from the network, quarantined, or otherwise

ForeScout Technologies, Inc. 7


Best Practices for Forescout Platform Deployment: Wired Post-Connect

restricted as required by their circumstances or conditions. The types of control


actions available correspond to the organization’s switch framework and the
Forescout Platform’s level of integration with that vendor. See the Compatibility
Matrix for additional details.
The best practice for control policy implementation is to have policies configured
during initial deployment but with their enforcement actions disabled. This approach
provides time for the security and operations teams to determine which endpoints
would be restricted by a policy, whether to refine the policy accordingly and what
endpoint issues are present. To optimize the end user’s experience during
deployment control actions should only be enabled after policy testing with
notification-only actions for both users and IT personnel. This allows support
personnel to resolve issues at large, so that there is no major disruption on the day
scheduled for enforcement actions to be made active.
If Forescout is used to notify end users with a web page, Forescout recommends that
a valid SSL web certificate be installed on the Forescout appliances that will present
such a page. The web certificate needs to be one that can be validated by end users
receiving the web page display. Internal-only users will be serviced properly with an
internal web certificate, issued from an internal certificate authority (CA). External
users will require a certificate from an external CA. In both cases, restrictions on
traffic in such environments must permit certificate validation traffic, typically port
TCP 443 to the IP address of the CA.

Switch Integration
The Forescout Platform integrates natively with more than 25 switch vendors and
provides generic integration with Linux-based systems. Depending on the vendor,
various methods are used individually or in combination, including Simple Network
Management Protocol (SNMP), command-line interface (CLI) and Network Configuration
Protocol (NETCONF). For any given vendor, allowing the Forescout Platform read/write
access with all management methods results in the most efficient use of resources when
gathering data, and the widest range of potential endpoint control options. This section
describes how the Forescout Platform will interact with your organization’s switch
framework, including the options available for endpoint access control.

Switch integration basics


Three capabilities become important in a wired, post-connect environment: (1) the ability
to quickly detect an endpoint entering the network, (2) the ability to map IP and MAC
addresses together, and (3) the ability to attribute a MAC address to a specific switch
port. The speed at which these functions occur will play a major role in how quickly the
Forescout Platform will discover the switch port to which an endpoint has connected,
which is necessary for control action application.

Data gathering
Depending on the vendor, the Forescout Platform uses SNMP, CLI, NETCONF or a
combination thereof to gather data from an organization’s switch framework, including

ForeScout Technologies, Inc. 8


Best Practices for Forescout Platform Deployment: Wired Post-Connect

routers and firewalls.

MAC tables
The Forescout Platform will gather MAC tables from access layer switches and from
other switches where endpoints are connected or may connect. This is done at a default
interval of 60 seconds (configurable per-switch).

ARP tables
The Forescout Platform will gather Address Resolution Protocol (ARP) tables from
network devices that contain ARP information, including layer 3 switches, routers, and
firewalls. This is required for the Forescout Platform to map an endpoint’s IP address to
a MAC address. The combination of the MAC and ARP table information tells the
Forescout Platform the physical switch port to which an endpoint is connected, allowing
it to place access controls on that port.

Initial detection
The Forescout Platform sees real-time endpoints as real-time IP addresses. An endpoint
without an IP address severely hampers profiling and cannot be evaluated by most
policies. In essence, the challenge of initial detection is in how quickly the Forescout
Platform can find an IP address when a device joins the network.

ARP table queries


Initially, The Forescout Platform discovers IP addresses by querying ARP tables through
its core integration with switches and other network devices. This provides both the IP
and MAC address for endpoints whose traffic is routing throughout the network and
achieves both initial detection and IP-to-MAC address mapping. These tables and values
are rechecked once every 600 seconds by default. This value should be increased if
Expedite IP Discovery is enabled or decreased if the network device being queried has
the resources to support a shorter interval. Because of the 600-second gap between
queries, the Forescout Platform employs additional methods to supplement initial
discovery, identifying IP addresses on a more immediate basis.

Mirrored traffic monitoring


The Forescout Platform’s initial discovery process can be enhanced by using common
switch vendor features that enable mirrored traffic monitoring. This also provides The
Forescout Platform with several extra capabilities that can be helpful in a wired post-
connect scenario, and for this reason, allowing the Forescout Platform to monitor
mirrored network traffic is considered best-practice design. These benefits include:
• Packets sourced by an IP address that are not currently known by the Forescout
Platform trigger an admission event, achieving initial detection
• Actionable, session-based properties can be created so that the Forescout Platform
can monitor and take action on network behaviors

ForeScout Technologies, Inc. 9


Best Practices for Forescout Platform Deployment: Wired Post-Connect

• Threat Protection watches for network probing and can create virtual systems to bait
and confirm malicious behavior, creating an actionable property on the attacking
endpoint
• HTTP redirection allows the Forescout Platform to force endpoints to a captive portal
for any purpose
• ForeScout Virtual Firewall (VFW) technology enables the Forescout Platform to block
systems at layer 4 of the Open Systems Interconnect (OSI) model though the use of
Transmission Control Protocol (TCP) resets

NetFlow data
In addition to monitoring mirrored traffic, the Forescout Platform also collects Netflow
data from network devices, providing another source of actionable session-based
properties for use in network behavior control. Flows that show an IP address of which
the Forescout Platform was not previously aware will trigger an admission event and
initial detection. Other advantages of mirrored traffic monitoring do not exist with
NetFlow, however, so it is typically used only as a supplemental data source where
mirroring traffic is not possible.

Switch port detection


Switch port detection begins with the knowledge of what MAC addresses are connected
to which switch ports. For the Forescout Platform to know the switch port to which an
endpoint is connected, it must constantly communicate with your organization’s switch
framework to remain apprised of ongoing changes in MAC address connectivity.

MAC table queries


Through its core integration with switches, the Forescout Platform will query MAC
address tables on switches at a default interval of 60 seconds. This value may be
increased if SNMP traps are in use or decreased if they are not available and the switch
can support more frequent queries.

Switch SNMP traps


Using SNMP traps is considered best practice in wired post-connect design. The fastest
way for the Forescout Platform to stay on top of changing connections in a switch
framework is to receive MAC address notification and linkUp SNMP traps from all
switches. This provides instant change notification and is available with all switch
vendors that the Forescout Platform supports.

IP-to-MAC address mapping


When the Forescout Platform knows the MAC addresses on the switch framework and it
detects a new IP address, all that remains is to associate the unknown IP address to a
known MAC address. At a basic level, this is accomplished by querying ARP tables as
discussed in previous sections. Other methods exist to expedite this process and are
discussed below.

ForeScout Technologies, Inc. 10


Best Practices for Forescout Platform Deployment: Wired Post-Connect

DHCP requests and replies


A common way to associate IP addresses with MAC addresses is by viewing both sides
of a DHCP conversation, which requires mirrored traffic monitoring. In each request, the
connecting system announces several properties that the Forescout Platform policy can
use, including its MAC address. The reply provides the IP address to which the
connecting system has been assigned, allowing the Forescout Platform to correlate
these addresses simultaneously with the endpoint itself.
Expedite IP Discovery
Developed specifically to eliminate the challenge presented by the 600-second default
interval for ARP table queries, this feature allows the Forescout Platform to configure
switches in connectivity groups. When the Forescout Platform discovers a new MAC
address within a connectivity group, it interrogates other group devices that are
configured for ARP table queries. The switch containing the relevant ARP table will
aggregate requests within a configurable 10-second interval, helping to reduce the
potential time to obtain this information. Expedite IP Discovery helps accelerate IP
address collection by creating a targeted, as-needed discovery process.

Switch port controls


Switch integration affords the Forescout Platform several endpoint control options, at
multiple layers of the OSI model.

Layer 1 controls
Switch block – The switch block action shuts a port off, effectively severing
communication over the wire as if the network cable were disconnected. It is
available on all supported switch vendors. This control is not optimal due to its
simple on-off nature and is typically used only when no other options exist. The
Forescout Platform must re-enable a port periodically to see if the unwanted
endpoint is still connected, so a port may be disabled even after the unwanted
endpoint has disconnected. Also, switch logs reporting endpoint disconnect times
will be inaccurate, reducing their forensic usefulness.

Layer 2 controls
MAC ACL – With vendors that support it, this control causes a switch to drop
Ethernet frames from the blocked device right at the network edge, while retaining
visibility of the device’s connectivity for release of the action when the device
disconnects. This control is best used in any scenario where the desired effect is to
completely remove an endpoint’s network access.
Assign to VLAN – The Forescout Platform’s Assign to VLAN action is available on all
supported switch vendors and is commonly used in a post-connect model to move
non-compliant devices to a restricted or quarantine VLAN. These VLANs must be
pre-configured, and the Forescout Platform must manage their IP address space.
This control is best used on networks where a robust, properly segmented VLAN
infrastructure is already in place, where only one device is assigned to each switch
port, or where the use of DNS enforcement for redirection is necessary.

ForeScout Technologies, Inc. 11


Best Practices for Forescout Platform Deployment: Wired Post-Connect

There are additional considerations for the Assign to VLAN control in two common
special cases:

VoIP VLANs – Some switch vendors can differentiate voice and normal data VLANs
on a single port. In these instances, the Forescout Platform will reassign the data
VLAN, presenting a unique challenge. Affected endpoints will not recognize the
switch port change, and in turn they will not request a new IP address for the data
VLAN. Therefore, as part of the normal VLAN change process, the Forescout
Platform will disable and re-enable the port. The endpoint sees the connection go
down and requests a new IP address on reconnect. Connected devices utilizing PoE,
such as a VoIP phone, will lose power temporarily. The Forescout Platform software
agent, SecureConnector™, while not required in any other circumstance presented
within this document, has the ability to overcome this issue by forcing an endpoint
to renew its DHCP lease.

Null VLAN – A null VLAN is a specific, near-connectionless VLAN configured for


endpoints that should not be on the network, creating a full quarantine without
resorting to the switch block action. This concept is best implemented where MAC
ACLs cannot be used.

Layer 3 Controls
IP ACL – With supported vendors, this control gives the Forescout Platform the
ability to dynamically regulate granular access controls specific to a blocked
endpoint without the need to pre-configure VLANs. It can be used to drop some IP
packets right at the network edge, effectively creating a dynamic, endpoint-specific
quarantine that can be tailored to a specific non-compliance issue. As a layer 3
control, it allows endpoints to continue passing Ethernet frames, so it is best used
for compliance-based actions or when dynamic network segmentation is desired
among known internal assets.

Layer 4 Controls
Virtual Firewall – This feature, which requires the Forescout Platform to see
mirrored network traffic, resets TCP traffic and attempts to terminate any UDP
traffic by sending a “destination host unreachable” result to the sender. It does not
require switch management, and there may be limitations on traffic visibility based
on the availability and visibility of mirrored traffic. For example, if the Forescout
Platform is distributed to all physical locations and receives mirrored traffic at each,
there is more coverage than if it is deployed centrally, within a data center, and
unable to see external site traffic. If the Forescout Platform only sees traffic that
crosses the core switch, it will not see traffic that remains localized to the
distribution or access layers. Virtual firewall is often used as a best-effort block
where a switch port cannot be directly modified. It is not recommended as a
primary control method.

Summary
Before the Forescout Platform can control the endpoints connecting to switches it
must first manage the switches themselves. In a post-connect model, the speed at
which the Forescout Platform can identify the switch where an endpoint connects

ForeScout Technologies, Inc. 12


Best Practices for Forescout Platform Deployment: Wired Post-Connect

strongly affects the length of time a potential threat remains online. The functions of
discovering an endpoint’s IP address as it comes online, mapping that IP address to
a MAC address, and knowing to which port the MAC address connects all contribute
to the output of this equation. Ideally, the entire process should take no more time
than is required to evaluate an endpoint against policy and determine whether it
poses a potential threat. Finally, the control methods used and the strategy for
deploying them should be aligned with the capabilities of the switches themselves,
the security goals of the organization, and the end user experience impacts they
may impose.

Notifications and Redirects


Because post-connect methodology begins with network access and restricts only
after inspection, it becomes possible to notify users of actions being taken on their
endpoints simultaneously, prior to or in place of enforcement. These actions assist in
the deployment of the Forescout Platform across the enterprise by ensuring that
users at various levels are informed of new security policies as they are
implemented. Best practice is to have all control policies first utilize notification
actions during initial rollout rather than control actions, changing to control actions
as environmental and user readiness dictate.
Email notifications
Forescout Platform can send email notifications based on policy rules or sub-rules,
to users or groups, using custom messages and including detected endpoint
properties, inspection results, policy results or switch information. This powerful
ability puts precise, actionable knowledge into the correct hands.

Managed systems
Forescout Platform provides multiple options for direct notification of devices under
its management to inform users of upcoming actions to address non-compliance or
other endpoint conditions. These include:
• Opening a web browser to any address

• Opening a balloon or banner notification with SecureConnector

• Sending an email to the logged-in user

Unmanaged systems
Because the Forescout Platform cannot take direct action on endpoints that it does
not manage, external methods of notification must be used. Forescout Platform can
intercept a device’s network traffic in two different ways.

Redirects
The most efficient way to intercept and therefore redirect traffic is through the
Forescout Platform’s native ability to monitor mirrored traffic. Forescout Platform

ForeScout Technologies, Inc. 13


Best Practices for Forescout Platform Deployment: Wired Post-Connect

can redirect traffic from a target endpoint to either a URL on the Forescout Platform
appliance itself, or to a URL on another system. In this way the endpoint’s web-
based traffic is initially funneled to a captive portal, a method frequently used to
force guest systems through a mandatory registration process as they connect.

DNS enforcement
DNS enforcement was developed to overcome a limitation inherent in HTTP
redirection—the inability to see network traffic in some locations. This method
requires the Forescout Platform to be the endpoint’s primary DNS server. It
responds to target endpoints showing itself as the DNS result for queries, forcing
the endpoint to an internal website and effectively forcing it through a captive
portal. Potential challenges associated with having the Forescout Platform function
as the primary DNS server on a network can be overcome in various ways.
• Forescout Platform can forward DNS queries to another server by default
• Forescout Platform can respond with an “unknown” result, forcing the endpoint to
the secondary DNS server
• Target endpoints can first be moved into a dedicated VLAN where the Forescout
Platform is the primary DNS server
• Forescout Platform can take a tertiary or later DNS server position, and an ACL
can be applied to a target endpoint’s switch port, denying it access to the typical
DNS servers.

Summary
The primary method used to inform IT staff of access control actions is email
notification. Managed systems can be directly controlled to affect internal user
notification, and unmanaged systems can be redirected either through HTTP redirect
or DNS enforcement to achieve external user notification. Using notifications both
before and after control actions are enabled raises security awareness at all levels
and plays a key role in ensuring a smooth Forescout Platform deployment.

ForeScout Technologies, Inc. 14


Best Practices for Forescout Platform Deployment: Wired Post-Connect

Solution Architecture
Figure 1 depicts a typical hybrid deployment, showing one example of how the Forescout Platform
can interface with a switch framework.

REMOTE SITE 1

Figure 1: Switch communications.

Workflow Diagrams and Flowcharts


Sample policy flow
Figure 2 depicts a typical high-level flow of the basic Forescout Platform policy set, showing an
endpoint connecting to the production network and the circumstances under which it may be
removed.

QUARANTINE

Figure 2: A sample wired post-connect policy flow.

ForeScout Technologies, Inc. 15


Best Practices for Forescout Platform Deployment: Wired Post-Connect

This policy flows shows a sequence in which the Forescout Platform first detects a new
endpoint connecting to the network, and then determines the device type (Discover). Next,
the Clarify policy stage determines whether the device is owned by the organization, in
which case it is passed on to Assess and remediation (or IT staff notification) if necessary.
Guest and BYOD devices are checked for registration credentials and either connected to a
limited-access subnet or blocked (denied access). A guest registration process is available
with the Forescout Platform as shown in this example, but guest registration is not unique
to wired post-connect and not covered in this document.

Switch communication
Figure 3 illustrates a sample communication sequence between the Forescout Platform and a
network switch framework as a new endpoint joins the network, is inspected, and evaluated by the
Forescout Platform and subjected to an access control action. SNMP traps are configured on the
switch device in this example.

Forescout Platform Core Switch Access Switch Endpoint

CONNECTS
TRAP CONTAINING PORT & MAC 2
COMMUNICATES OVER NETWORK

PROFILING & POLICY


EVALUATION
ARP QUERY

Figure 3: A sample Forescout Platform control flow.

The sequence of events and communications in this example is as follows:


1. An endpoint connects to an access switch port.
2. The access switch sends an SNMP trap to the Forescout Platform, which is now aware of a new
MAC address online and the port to which it is connected.
3. The endpoint communicates through the network and the core switch sees its traffic.
4. Forescout Platform monitors mirrored traffic from the core switch and sees the endpoint’s IP
address.
5. The Forescout Platform profiles the endpoint’s IP address to determine what it is and
begins policy evaluation to ascertain ownership and compliance.
6. Simultaneously, the Forescout Platform queries the relevant ARP table residing on the same or a

ForeScout Technologies, Inc. 16


Best Practices for Forescout Platform Deployment: Wired Post-Connect

separate network device using Expedite IP Discovery, mapping the known MAC address and switch
port to the IP address that is being profiled.
7. Forescout Platform places a control action on the switch port, provided the endpoint falls
within an active control policy.

Environment Requirements
This section provides an overview of what must be in place for the wired post-connect
scenario to operate successfully within an enterprise network.

Forescout Platform requirements


Forescout Platform must have the ability to read ARP and MAC address tables from switches and
routers. This requires the Switch plugin, a core component that is supplied with a basic Forescout
Platform install. The latest release should always be used to ensure that the full range of features
is available. Each switch must be added into the plugin, a process that is covered in more detail
later in this document.

Customer environment requirements


Integrating the Forescout Platform with the existing switch framework, it may be necessary
to configure the following items, depending on switch capabilities and the features required
to achieve the desired outcome:
• SNMP access to all switches for queries and configurations

• CLI access to all switches for queries and configurations

• SNMP trap configuration to the Forescout Platform to speed discovery of connecting endpoints.

• Pre-configured VLANs for any network where the Forescout Platform will be reassigning endpoints.

Configuring the Forescout Platform


Configuring the Forescout Platform to interact with switches and provide controls in a post-
connect model is a straightforward process. Configuration instructions may vary with Switch
plugin versions, and specific instructions are provided in the Switch plugin help file, which is
accessible directly from the Forescout Platform management software.

• Enter the IP address of the switch.

• Select the managing appliance.

- To reduce dependencies, it is best practice to, wherever possible, assign switches to the same
appliance that manages the network ranges which may connect to it.
• Select the switch vendor.

• Enter CLI management credentials.

• Enter SNMP version and management credentials.

• Enter permissions.

ForeScout Technologies, Inc. 17


Best Practices for Forescout Platform Deployment: Wired Post-Connect

- Enable discovery permissions.

- Enable MAC permissions when the network device contains relevant MAC tables.

- Enable ARP permissions when the network device contains relevant ARP tables.

• Configure ACL settings

Figure 4: The switch plugin configuration screen.

Forescout Platform console


Figure 4 depicts the Forescout Platform console’s switch plugin configuration screen, showing all
switches managed by the Forescout Platform. From here you can see alerts showing any
configuration issues, as well as edit or test individual or groups of switches.
Figure 5 shows the configuration screen for an individual switch’s permissions. Each network
device managed by the Forescout Platform should have both the read and the write checkboxes
selected for MAC if endpoints connect to it, for ARP if it serves as a gateway for any networks,
and for both if needed. Except in rare circumstances, allowing the Forescout Platform to
automatically use SNMP, CLI or NETCONF ensures that the most efficient method is used for the
specific query or command being performed. All of the checkboxes, from top to bottom, do the
following:

• Enable Cisco Discovery Protocol (CDP) / Link Layer Discovery Protocol (LLDP) / Foundry Discovery

ForeScout Technologies, Inc. 18


Best Practices for Forescout Platform Deployment: Wired Post-Connect

Protocol (FDP) to automatically detect new switches as they are connected to the network. If the
organization has fully integrated switches with Forescout, there is no need to activate this feature.
Forescout recommends using this feature in environments where all managed switches are not
known to an organization’s network management team, for example, after a merger with a firm that
did not maintain good documentation.
• Enable MAC read permissions, allowing Forescout Platform to query the device’s MAC table.

• Enable MAC write permissions, allowing Forescout Platform to perform blocking actions on switch
ports.
• Enable ARP read permissions, allowing Forescout Platform to query the device’s ARP table.

• Enable ARP write permissions, allowing Forescout Platform to clean up duplicate ARP entries.

Figure 5: Configuring switch permissions.

Special situation configurations


Forescout Platform offers some additional features and capabilities that can be configured to
support switch management and control development for certain situations.

Switch auto discovery


To help operators stay on top of a growing environment where new network devices are added
regularly, Forescout Platform has the ability to detect new switches as they are added and
connected to existing switches that it currently manages. This helps to ensure complete and

ForeScout Technologies, Inc. 19


Best Practices for Forescout Platform Deployment: Wired Post-Connect

continuous switch integration across the entire enterprise. Based on the vendor, this is done with
CDP, FDP or LLDP.
Auto discovery will also locate additional management IP addresses on switches, so it will be
important to mark those IP addresses as “not a switch” or “disabled” to prevent Forescout from
continuing to display these additional IPs as duplicates of existing switches.

VoIP detection
In order to effectively build wired post-connect control policies in organizations where VoIP
phones are in use, Forescout Platform can use this property to identify which switch ports have
VoIP phones on them. This information can be used, for example, in a control policy to apply
different actions to ports with and without a VoIP phone.

PoE connected device


Forescout Platform can obtain this property from switch ports on select vendors. It can be
used, for example, to help identify device types such as VoIP phones in the Discover policy, or
simply as an information policy that shows what VoIP phone models are on the network, and
where. Similar to VoIP detection, these properties can be used to fine tune wired post-connect
control policies.

For More Information


This completes our overview of design considerations and best practice tips for deploying
ForeScout Platform in a wired post-connect scenario. For
additional information on this deployment scenario or other network visibility and access
control strategies based on Forescout Platform, current ForeScout customers should contact
ForeScout Customer Support. Other interested parties should visit
http://www.forescout.com/contact-us/ for more information.

ForeScout Technologies, Inc. 20

You might also like