Wired Post Connect
Wired Post Connect
Legal Notice
© 2021 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware
corporation. A list of our trademarks and patents can be found at https://www.forescout.com/
company/legal/intellectual-property-patents-trademarks.
Other brands, products, or service names may be trademarks or service marks of their respective
owners.
2
Table of Contents
Introduction ........................................................................................................... 4
Purpose ........................................................................................................... 4
Audience ......................................................................................................... 4
Switch Integration................................................................................................. 8
Switch integration basics .................................................................................... 8
Data gathering .................................................................................................. 8
Initial detection ................................................................................................. 9
Switch port detection ....................................................................................... 10
IP-to-MAC address mapping .............................................................................. 10
Switch port controls ......................................................................................... 11
Summary ....................................................................................................... 12
3
Best Practices for Forescout Platform Deployment: Wired Post-Connect
Introduction
Forescout Platform® deployment scenario documents provide an overview of the different
approaches employed when implementing Forescout Platform as a network visibility and
access control solution, including the advantages, potential constraints, and best practices
associated with each method. Our goal is to help your organization determine which
approach best suits your environment and security policy. Wired post-connect is one of
the various deployment scenarios supported by ForeScout. Visit
http://www.forescout.com/company/resources/ for additional deployment scenario
guides.
Purpose
This document will describe the Forescout Platform post-connect deployment on wired
networks, including design considerations, requirements, and an overview of Forescout
Platform operation within this specific methodology.
Audience
This guide’s targets are security managers, architects, designers, and other security
professionals. It can help you determine how best to implement a Forescout Platform
network visibility and access control strategy for your organization and assumes you are
familiar with the following basic concepts:
- Discover
- Clarify
- Assess
- Control
- Centralized
- Distributed
- Hybrid
- Visibility
- Control
- Orchestrate
- Remote inspection
- SecureConnector™
- Core layer
- Distribution layer
- Access layer
Ease of deployment
A post-connect deployment may involve less pre-configuration of network devices and
reduce some of the strain on operational staff. Pre-connect environments or 802.1x
configurations are not required.
Gradual rollout
A post-connect model allows more flexibility during deployment and simplifies the
transition from See to Control; The Forescout Platform can first acquire complete
visibility of endpoints on the network, then enforcement actions can be overlaid
incrementally as environmental readiness increases.
Because endpoints are initially permitted, the Forescout Platform can provide visibility
while your access control strategy matures. Use this visibility to determine what devices
connect to the network and their access requirements. Access controls can then be
configured for specific device types and enabled separately in stages. Your security
team can better focus on the appropriate strategy for particular device types and the
desired conditions for and types of controls to use.
Policy flow
Basic policy flow concepts are at the core of the Forescout Platform policy methodology,
and it is crucial to understand how different deployment approaches affect the flow of a
policy. This section covers these concepts as they pertain to a wired post-connect
scenario. Before an endpoint is subjected to a policy, and before the Forescout Platform
profiles a device it has not previously seen on the network, there is a built-in,
configurable, 30-second delay. The admission delay allows time for systems to boot
completely and return accurate external profiling results.
All through the policy flow, Forescout recommends the best practice of assigning
endpoints to groups and then having those groups feed endpoints into policies
appropriate for those groups. For example, Forescout discovers a Windows PC and the
discovery policy assigns that endpoint to the “Windows” group. Then, the Windows PC is
evaluated as to whether or not Forescout can interact with it. If it does, it goes to the
“Managed Windows” group; if not, then it goes to the “Unmanaged Windows” group.
Endpoints in the “Managed Windows” group are then further checked for compliance,
and could be placed in groups that deal with non-compliant devices. Endpoints in the
“Unmanaged Windows” group are put through a policy that checks for exceptions, with
the remainder that is not subject to an exception placed in a group that will go on to a
control policy.
We will examine this policy flow in the next few sections.
Discover
Discover is the first Forescout Platform policy endpoints encounter. In a post-connect
model, it is imperative to follow best practices for a clean and efficient Discover
policy, as this strongly affects the eventual time to control. Because Discover sets
the stage for the rest of the policy set, speed is important, but accuracy is essential.
Keeping the discovery policy to as few subrules as possible helps with the speed of
evaluation. Simple checks to determine device types are all that are needed in the
discovery policy. Checks for conditions that involve direct queries to endpoints could
result in timeouts if the endpoint is not configured to respond to such queries – those
timeouts, in turn, result in unnecessary delays in evaluation.
Each discovery policy subrule will assign endpoints to a group for further evaluations
that are appropriate for that group. A printer, for example, will have different
evaluations than a VoIP device.
Clarify
In the clarification portion of the policy flow, devices such as Windows, MacOS, and
Linux endpoints that can be accessed via an agent or credential are assessed as to
whether or not the Forescout Platform can communicate with them. Endpoints that
have the Forescout SecureConnector agent or which allow for agentless access are
considered to be “managed” by Forescout.
Other devices, such as printers, network devices, or some IoT devices, can be
configured to permit Forescout management via SNMP or SSH credentials. If such
credentials are provisioned, these devices can also be placed in the “managed”
category.
With managed device classes, there are three possible outcomes. One, corporate
devices that allow Forescout access are considered fully managed. Two, corporate
devices that do not allow Forescout access are either remediated so that they do
allow access, or they are manually exempted from management requirements.
Three, non-corporate devices are either exempted from management requirements
or are assigned to a Forescout group that will feed into a network access control
policy.
Non-manageable systems recognized as corporate endpoints (VoIP phones, printers,
or IoT devices) typically end their policy flow here. At early levels of Forescout
platform maturity, they will remain on the network as-is. In later levels of Forescout
platform maturity, they will be monitored via eyeSegment and have their
communications regulated through a segmentation strategy based on eyeSegment
observations.
Assess
Managed endpoints are assessed for their overall security posture. This is a matter of
determining which endpoints are running required security agents and which are not.
Devices that are deemed compliant typically end their policy flow here, retaining
network access as usual. Those deemed non-compliant will be subject to remediation
actions. Remediation actions can range from notification to automatic remediation to
network restrictions.
Typically, remediation actions are set up to match the severity of the non-compliance
and whether or not an automated response is possible. In minor cases, such as a
service simply not running, Forescout can be set to start the required service and to
generate a syslog to record the event. In more advanced cases, such as where a
required software package requires installation and the endpoint presents a threat to
other devices, Forescout can be configured to move such endpoints to a remediation
network. A remediation network would be where the endpoint will not be able to
access the network as a whole, but will have access to software distribution servers
for downloading required software.
Control
During control, devices are removed from the network, quarantined, or otherwise
Switch Integration
The Forescout Platform integrates natively with more than 25 switch vendors and
provides generic integration with Linux-based systems. Depending on the vendor,
various methods are used individually or in combination, including Simple Network
Management Protocol (SNMP), command-line interface (CLI) and Network Configuration
Protocol (NETCONF). For any given vendor, allowing the Forescout Platform read/write
access with all management methods results in the most efficient use of resources when
gathering data, and the widest range of potential endpoint control options. This section
describes how the Forescout Platform will interact with your organization’s switch
framework, including the options available for endpoint access control.
Data gathering
Depending on the vendor, the Forescout Platform uses SNMP, CLI, NETCONF or a
combination thereof to gather data from an organization’s switch framework, including
MAC tables
The Forescout Platform will gather MAC tables from access layer switches and from
other switches where endpoints are connected or may connect. This is done at a default
interval of 60 seconds (configurable per-switch).
ARP tables
The Forescout Platform will gather Address Resolution Protocol (ARP) tables from
network devices that contain ARP information, including layer 3 switches, routers, and
firewalls. This is required for the Forescout Platform to map an endpoint’s IP address to
a MAC address. The combination of the MAC and ARP table information tells the
Forescout Platform the physical switch port to which an endpoint is connected, allowing
it to place access controls on that port.
Initial detection
The Forescout Platform sees real-time endpoints as real-time IP addresses. An endpoint
without an IP address severely hampers profiling and cannot be evaluated by most
policies. In essence, the challenge of initial detection is in how quickly the Forescout
Platform can find an IP address when a device joins the network.
• Threat Protection watches for network probing and can create virtual systems to bait
and confirm malicious behavior, creating an actionable property on the attacking
endpoint
• HTTP redirection allows the Forescout Platform to force endpoints to a captive portal
for any purpose
• ForeScout Virtual Firewall (VFW) technology enables the Forescout Platform to block
systems at layer 4 of the Open Systems Interconnect (OSI) model though the use of
Transmission Control Protocol (TCP) resets
NetFlow data
In addition to monitoring mirrored traffic, the Forescout Platform also collects Netflow
data from network devices, providing another source of actionable session-based
properties for use in network behavior control. Flows that show an IP address of which
the Forescout Platform was not previously aware will trigger an admission event and
initial detection. Other advantages of mirrored traffic monitoring do not exist with
NetFlow, however, so it is typically used only as a supplemental data source where
mirroring traffic is not possible.
Layer 1 controls
Switch block – The switch block action shuts a port off, effectively severing
communication over the wire as if the network cable were disconnected. It is
available on all supported switch vendors. This control is not optimal due to its
simple on-off nature and is typically used only when no other options exist. The
Forescout Platform must re-enable a port periodically to see if the unwanted
endpoint is still connected, so a port may be disabled even after the unwanted
endpoint has disconnected. Also, switch logs reporting endpoint disconnect times
will be inaccurate, reducing their forensic usefulness.
Layer 2 controls
MAC ACL – With vendors that support it, this control causes a switch to drop
Ethernet frames from the blocked device right at the network edge, while retaining
visibility of the device’s connectivity for release of the action when the device
disconnects. This control is best used in any scenario where the desired effect is to
completely remove an endpoint’s network access.
Assign to VLAN – The Forescout Platform’s Assign to VLAN action is available on all
supported switch vendors and is commonly used in a post-connect model to move
non-compliant devices to a restricted or quarantine VLAN. These VLANs must be
pre-configured, and the Forescout Platform must manage their IP address space.
This control is best used on networks where a robust, properly segmented VLAN
infrastructure is already in place, where only one device is assigned to each switch
port, or where the use of DNS enforcement for redirection is necessary.
There are additional considerations for the Assign to VLAN control in two common
special cases:
VoIP VLANs – Some switch vendors can differentiate voice and normal data VLANs
on a single port. In these instances, the Forescout Platform will reassign the data
VLAN, presenting a unique challenge. Affected endpoints will not recognize the
switch port change, and in turn they will not request a new IP address for the data
VLAN. Therefore, as part of the normal VLAN change process, the Forescout
Platform will disable and re-enable the port. The endpoint sees the connection go
down and requests a new IP address on reconnect. Connected devices utilizing PoE,
such as a VoIP phone, will lose power temporarily. The Forescout Platform software
agent, SecureConnector™, while not required in any other circumstance presented
within this document, has the ability to overcome this issue by forcing an endpoint
to renew its DHCP lease.
Layer 3 Controls
IP ACL – With supported vendors, this control gives the Forescout Platform the
ability to dynamically regulate granular access controls specific to a blocked
endpoint without the need to pre-configure VLANs. It can be used to drop some IP
packets right at the network edge, effectively creating a dynamic, endpoint-specific
quarantine that can be tailored to a specific non-compliance issue. As a layer 3
control, it allows endpoints to continue passing Ethernet frames, so it is best used
for compliance-based actions or when dynamic network segmentation is desired
among known internal assets.
Layer 4 Controls
Virtual Firewall – This feature, which requires the Forescout Platform to see
mirrored network traffic, resets TCP traffic and attempts to terminate any UDP
traffic by sending a “destination host unreachable” result to the sender. It does not
require switch management, and there may be limitations on traffic visibility based
on the availability and visibility of mirrored traffic. For example, if the Forescout
Platform is distributed to all physical locations and receives mirrored traffic at each,
there is more coverage than if it is deployed centrally, within a data center, and
unable to see external site traffic. If the Forescout Platform only sees traffic that
crosses the core switch, it will not see traffic that remains localized to the
distribution or access layers. Virtual firewall is often used as a best-effort block
where a switch port cannot be directly modified. It is not recommended as a
primary control method.
Summary
Before the Forescout Platform can control the endpoints connecting to switches it
must first manage the switches themselves. In a post-connect model, the speed at
which the Forescout Platform can identify the switch where an endpoint connects
strongly affects the length of time a potential threat remains online. The functions of
discovering an endpoint’s IP address as it comes online, mapping that IP address to
a MAC address, and knowing to which port the MAC address connects all contribute
to the output of this equation. Ideally, the entire process should take no more time
than is required to evaluate an endpoint against policy and determine whether it
poses a potential threat. Finally, the control methods used and the strategy for
deploying them should be aligned with the capabilities of the switches themselves,
the security goals of the organization, and the end user experience impacts they
may impose.
Managed systems
Forescout Platform provides multiple options for direct notification of devices under
its management to inform users of upcoming actions to address non-compliance or
other endpoint conditions. These include:
• Opening a web browser to any address
Unmanaged systems
Because the Forescout Platform cannot take direct action on endpoints that it does
not manage, external methods of notification must be used. Forescout Platform can
intercept a device’s network traffic in two different ways.
Redirects
The most efficient way to intercept and therefore redirect traffic is through the
Forescout Platform’s native ability to monitor mirrored traffic. Forescout Platform
can redirect traffic from a target endpoint to either a URL on the Forescout Platform
appliance itself, or to a URL on another system. In this way the endpoint’s web-
based traffic is initially funneled to a captive portal, a method frequently used to
force guest systems through a mandatory registration process as they connect.
DNS enforcement
DNS enforcement was developed to overcome a limitation inherent in HTTP
redirection—the inability to see network traffic in some locations. This method
requires the Forescout Platform to be the endpoint’s primary DNS server. It
responds to target endpoints showing itself as the DNS result for queries, forcing
the endpoint to an internal website and effectively forcing it through a captive
portal. Potential challenges associated with having the Forescout Platform function
as the primary DNS server on a network can be overcome in various ways.
• Forescout Platform can forward DNS queries to another server by default
• Forescout Platform can respond with an “unknown” result, forcing the endpoint to
the secondary DNS server
• Target endpoints can first be moved into a dedicated VLAN where the Forescout
Platform is the primary DNS server
• Forescout Platform can take a tertiary or later DNS server position, and an ACL
can be applied to a target endpoint’s switch port, denying it access to the typical
DNS servers.
Summary
The primary method used to inform IT staff of access control actions is email
notification. Managed systems can be directly controlled to affect internal user
notification, and unmanaged systems can be redirected either through HTTP redirect
or DNS enforcement to achieve external user notification. Using notifications both
before and after control actions are enabled raises security awareness at all levels
and plays a key role in ensuring a smooth Forescout Platform deployment.
Solution Architecture
Figure 1 depicts a typical hybrid deployment, showing one example of how the Forescout Platform
can interface with a switch framework.
REMOTE SITE 1
QUARANTINE
This policy flows shows a sequence in which the Forescout Platform first detects a new
endpoint connecting to the network, and then determines the device type (Discover). Next,
the Clarify policy stage determines whether the device is owned by the organization, in
which case it is passed on to Assess and remediation (or IT staff notification) if necessary.
Guest and BYOD devices are checked for registration credentials and either connected to a
limited-access subnet or blocked (denied access). A guest registration process is available
with the Forescout Platform as shown in this example, but guest registration is not unique
to wired post-connect and not covered in this document.
Switch communication
Figure 3 illustrates a sample communication sequence between the Forescout Platform and a
network switch framework as a new endpoint joins the network, is inspected, and evaluated by the
Forescout Platform and subjected to an access control action. SNMP traps are configured on the
switch device in this example.
CONNECTS
TRAP CONTAINING PORT & MAC 2
COMMUNICATES OVER NETWORK
separate network device using Expedite IP Discovery, mapping the known MAC address and switch
port to the IP address that is being profiled.
7. Forescout Platform places a control action on the switch port, provided the endpoint falls
within an active control policy.
Environment Requirements
This section provides an overview of what must be in place for the wired post-connect
scenario to operate successfully within an enterprise network.
• SNMP trap configuration to the Forescout Platform to speed discovery of connecting endpoints.
• Pre-configured VLANs for any network where the Forescout Platform will be reassigning endpoints.
- To reduce dependencies, it is best practice to, wherever possible, assign switches to the same
appliance that manages the network ranges which may connect to it.
• Select the switch vendor.
• Enter permissions.
- Enable MAC permissions when the network device contains relevant MAC tables.
- Enable ARP permissions when the network device contains relevant ARP tables.
• Enable Cisco Discovery Protocol (CDP) / Link Layer Discovery Protocol (LLDP) / Foundry Discovery
Protocol (FDP) to automatically detect new switches as they are connected to the network. If the
organization has fully integrated switches with Forescout, there is no need to activate this feature.
Forescout recommends using this feature in environments where all managed switches are not
known to an organization’s network management team, for example, after a merger with a firm that
did not maintain good documentation.
• Enable MAC read permissions, allowing Forescout Platform to query the device’s MAC table.
• Enable MAC write permissions, allowing Forescout Platform to perform blocking actions on switch
ports.
• Enable ARP read permissions, allowing Forescout Platform to query the device’s ARP table.
• Enable ARP write permissions, allowing Forescout Platform to clean up duplicate ARP entries.
continuous switch integration across the entire enterprise. Based on the vendor, this is done with
CDP, FDP or LLDP.
Auto discovery will also locate additional management IP addresses on switches, so it will be
important to mark those IP addresses as “not a switch” or “disabled” to prevent Forescout from
continuing to display these additional IPs as duplicates of existing switches.
VoIP detection
In order to effectively build wired post-connect control policies in organizations where VoIP
phones are in use, Forescout Platform can use this property to identify which switch ports have
VoIP phones on them. This information can be used, for example, in a control policy to apply
different actions to ports with and without a VoIP phone.