Configuration Guide for RFMS 3.0 Initial Configuration WiNG 5 How-To Guide Role-Based Firewall June 2011 Revision 1.0 XXX-XXXXXX-XX MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © 2011 Motorola, Inc. All rights reserved. Table of Contents: 1. 2. Introduction: ........................................................................................................................ 4 1.1 Overview: ..................................................................................................................... 4 1.2 Distributed Stateful Inspection:..................................................................................... 4 1.3 Role Based Firewall ..................................................................................................... 5 1.4 Components: ............................................................................................................... 7 Use and Configuration: ....................................................................................................... 7 2.1 Scenario 1 ................................................................................................................... 8 2.2 Scenario 2 ..................................................................................................................17 3. Verification .........................................................................................................................26 4. Troubleshooting .................................................................................................................28 5. Reference Documentation: ................................................................................................30 WiNG 5 Role-Based Firewall How-To Guide 1. Introduction: To augment the firewall services of WiNG 5, one may add on the Advanced Security license to enable role-based firewall. The Advanced Security licensing is included with the purchase of the RFS4000 series switches for smaller wireless deployments and can be purchased as add-on licensing for the higher-end models. Role-based firewall gives enhanced security to the standard firewall features of WiNG 5. Whereas the standard IP and MAC based firewall rules are applied to physical and logical interfaces as well as WLANs, role-based rules are applied to the wireless clients and follow them as they roam on the network. For further information on the standard Firewall features of WiNG 5, please see the document at: http://compass.mot-solutions.com/doc/392577167/WiNG5_Firewall_How-To.pdf 1.1 Overview: Roles allow for dynamic assignment of IP and MAC firewall rules to wireless clients based on one or more match conditions that are evaluated when the client associates to the wireless network. These dynamic rules follow the clients, being migrated to other access points as the clients roam. If a role is established that would affect already connected clients, these roles will be evaluated immediately and put into effect against the client traffic. Match criteria include: Location: AP or group of AP’s the wireless client is connected to Authentication: The authentication method used by the client during association Encryption: The encryption type used by the client (not configured on the WLAN) Group Membership: The local group the wireless client is assigned to as obtained from AAA Captive Portal Authentication State MAC Address: MAC address or range of the wireless client(s) SSID: The SSID the wireless client is associated to 1.2 Distributed Stateful Inspection: The major new feature in WiNG 5 is distribution of services or services at the edge. Since controllers and access points alike run the same OS and thus feature set, processing of traffic for various services is pushed to the edge where it can be performed in real-time and done so dynamically. WiNG 5 Role-Based Firewall How-To Guide Figure 1: Distributed Stateful Inspection The distributed nature of the firewall allows stateful flows to migrate with clients as they roam between access points. Rules are made up of one or more traffic matching conditions, for which an action is then performed (permit, deny, mark, log). As is the case with firewalls, at least one permit action must be met in order for traffic to be forwarded and at the end of a rule set, there is an implied deny for all traffic not meeting a match condition. 1.3 Role Based Firewall Roles based firewall was designed to meet the security needs of the mobile enterprise. WiNG 5 Role-Based Firewall How-To Guide User Roles to Security Policies User Role Default Engineering Sales Guest Location Location Location Location Group Membership Group Membership Group Membership Group Membership Hot-Spot State Hot-Spot State Hot-Spot State Hot-Spot State Encryption Encryption Encryption Encryption Authentication Authentication Authentication Authentication SSID SSID SSID SSID MAC-Address MAC-Address MAC-Address MAC-Address Inbound ACLs Inbound ACLs Inbound ACLs Inbound ACLs ACL ACL ACL ACL ACL ACL ACL ACL Security Policies It is possible from time to time that while a role is being evaluated, multiple matches may be found. In this case, the role with the lowest precedence will be assigned to the wireless client. For each user role administrators can define match criteria and values that can individually be ignored, matched and partially matched. For example a group name could be defined in a user role to exactly match the value Sales which would apply to all users in the Sales group. Likewise an ESSID could be defined to partially match the value Corp which would match any devices associated with the ESSIDs named CorpUsers and CorpGuest. Alternatively specific strings can be ignored by selecting a match of Not Contains or all criteria can be matched using a match condition Any. Role based firewall requires the Advanced Security licensing on the controller, which is an added cost. The Advanced Security licensing is not shared among devices in a cluster, so in order for dynamic rules to follow a wireless client that roams from an access point on one controller in a cluster to an access point on another controller in the cluster, both controllers must have the added Advanced Security license. WiNG 5 Role-Based Firewall How-To Guide 1.4 Components: The components of role-based firewall are listed below: Firewall Rules (Access Control Lists) o IP Firewall Rules o MAC Firewall Rules Wireless Client Roles (Role-policy) AAA Policy (optional based on match criteria) 1) CLI Role-Policy options rfs4000# conf t rfs4000(config)#role-policy firewalled-users rfs4000(config-role-policy-firewalled-users)#? Role Policy Mode commands: default-role Configuration for Wireless Clients not matching any role no Negate a command or set its defaults user-role Create a role clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal 2. Use and Configuration: We will examine two scenarios; an easy method based on SSID followed by a slightly more complex method based on the user’s group assignment. During the configuration of the role-policy, the necessary IP or MAC access lists will be specified, so it is helpful to have these created already. Thus, following is a preferred order-ofconfiguration. This assumes that the general configuration of the wireless switch and necessary WLAN’s already exist. In the case of our second scenario, this document will also include the configuration of AAA and RADIUS policies. 1. Configure IP / MAC based access lists 2. Configure the Role-policy 3. Apply the role-policy to the device(s) WiNG 5 Role-Based Firewall How-To Guide 2.1 Scenario 1 2.1.1 CLI Configuration 1) CLI IP Access List configuration rfs4000# conf t rfs4000(config)#ip access-list restricted-allow rfs4000(config-ip-acl-restricted-allow)#permit icmp any any 8 0 log rule-precedence 10 rule-description icmp allow rfs4000(config-ip-acl-restricted-allow)#permit tcp any any eq ssh log rule-precedence 20 rule-description ssh allow rfs4000(config-ip-acl-restricted-allow)#deny ip any any log rule-precedence 30 rfs4000(config-ip-acl-restricted-allow)#commit write In the above example we have created an ACL named “restricted-allow” and we are allowing ICMP echo-request traffic from the wireless clients, as specified by icmp type 8, code 0. We are also allowing SSH traffic as this will be the method of access to the wireless switch from the role-based user. Finally, we are denying any other IP traffic and logging hits. Next we will create the role-policy and apply it to the access point profile: 1) CLI Role policy configuration rfs4000# conf t rfs4000(config)#role-policy firewalled-users rfs4000(config-role-policy-firewalled-users)#user-role fw-role precedence 10 rfs4000(config-role-policy-firewalled-users-user-role-fw-role)#ssid contains vlan64 rfs4000(config-role-policy-firewalled-users-user-role-fw-role)#use ip-access-list in restricted-allow precedence 10 rfs4000(config-role-policy-firewalled-users-user-role-fw-role)#exit rfs4000(config-role-policy-firewalled-users)show context role-policy firewalled-users user-role fw-role precedence 10 ssid exact vlan64 use ip-access-list in restricted-allow precedence 10 rfs4000(config-role-policy-firewalled-users)#commit write 2) Access Point profile application rfs4000(config)#profile ap650 default-ap650 rfs4000(config-profile-default-ap650)#use role-policy firewalled-users rfs4000(config-profile-default-ap650)#show context WiNG 5 Role-Based Firewall How-To Guide profile ap650 default-ap650 autoinstall configuration autoinstall firmware interface radio1 wlan packetstorm bss 1 primary wlan vlan64-wlan bss 2 primary interface radio2 wlan PacketStorm-5G bss 1 primary interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface vlan1 ip address dhcp ip dhcp client request options all use firewall-policy default ntp server 138.236.128.112 prefer use role-policy firewalled-users logging on service pm sys-restart rfs4000(config-profile-default-ap650)# commit write 2.1.2 Web UI Configuration Following the order that was previously listed, navigate to “Configuration > Security > IP Firewall Rules” (or MAC Firewall Rules is so inclined). Click on “Add” WiNG 5 Role-Based Firewall How-To Guide Web-UI: Adding role-based access list Give your ACL a name and begin adding rules, clicking “+Add Row” for each new line. Web-UI: Adding ACL Rules Once you have added all of your rules, click “>> Ok”, then commit and save your work. WiNG 5 Role-Based Firewall How-To Guide Web-UI: Adding ACL Rules 2.1.3 Role Policy Creation Next, navigate to “Configuration > Security > Wireless Client Roles” and click on “Add” to create a new role policy: WiNG 5 Role-Based Firewall How-To Guide Web-UI: Role Policy Configuration Name the role policy and then click “Add” to begin adding match criteria for the user role: WiNG 5 Role-Based Firewall How-To Guide Web-UI: Role Policy Configuration WiNG 5 Role-Based Firewall How-To Guide Web-UI: Role Policy Configuration As can be seen, you may select a number of variations for match criteria. We have selected an exact match on the SSID, however other options exist as shown below: Web-UI: Match Criteria WiNG 5 Role-Based Firewall How-To Guide After selecting your match criteria, go to the “Firewall Rules” tab and select the previously configured IP access list or whatever firewall rules you have previously configured. Add additional rows for additional firewall rules as needed by clicking “+Add Row” Web-UI: Adding Firewall Rules One other note; on the “Default Firewall Rules” tab of your role policy, you may select default access lists to be applied whether or not match criteria have been met. Realize that these rules are applied at the level where the role policy has been applied (access point level). Exercise caution to ensure traffic is not interrupted inadvertently due to a default rule. In our case we have specified no defaults, as seen below: WiNG 5 Role-Based Firewall How-To Guide Web-UI: Default Firewall Rules 2.1.4 Apply Policy The final step is to apply the role policy to your devices. This will usually be done at the access point level (profile or device override) as that is the point of ingress for the wireless clients. It may also be done at an RFS4011, which has a built-in access point. Navigate to “Configuration > Profiles” and select / edit the profile you wish to apply the role policy to. Within the profile, navigate to “Security > Settings” and select your policy from the “Wireless Client Role Policy” drop-down box: WiNG 5 Role-Based Firewall How-To Guide Web UI: Applying the Role Policy Click “>>Ok: and then Commit and Save your work. 2.2 Scenario 2 Scenario 2 is the same basic setup, except for now our match criteria will be based on groupmembership as gathered from AAA. The following sections will just show the configuration of the additional components (in order of configuration), which are: Radius Services (Server, Group, and User-pool policies) AAA Policy WLAN Authentication WiNG 5 Role-Based Firewall How-To Guide 2.2.1 CLI Configuration In this scenario, we configured RADIUS in the following order (due to later configuration): 1. Group policy 2. User-pool policy 3. Radius Server policy 1) CLI Running RADIUS Configuration rfs4000# show running-config | begin radius-group no-internet-users radius-group no-internet-users policy ssid vlan64 policy day mo policy day tu policy day we policy day th policy day fr policy time start 06:00 end 17:00 ! radius-user-pool-policy role-users user user2 password 0 Password2 group no-internet-users user user1 password 0 Password group no-internet-users ! radius-server-policy local-rad-server use radius-user-pool-policy role-users authentication eap-auth-type peap-mschapv2 no ldap-group-verification use radius-group no-internet-users Following the radius configuration, we then create our AAA policy: 2) CLI Running AAA Policy Configuration rfs4000# show running-config | begin aaa-policy local-aaa aaa-policy local-aaa authentication server 1 onboard controller authentication server 1 retry-timeout-factor 150 accounting server 1 onboard controller authentication eap wireless-client timeout 5 WiNG 5 Role-Based Firewall How-To Guide Then we modify the security on our WLAN to utilize EAP and the new RADIUS / AAA policies: 3) CLI Running WLAN Configuration rfs4000# show running-config | begin wlan vlan64-wlan wlan vlan64-wlan ssid vlan64 vlan 64 bridging-mode tunnel encryption-type ccmp authentication-type eap use aaa-policy local-aaa Finally, we modify our role policy that was created in the first scenario to include the new match criteria. In this way, not all users who associate to the WLAN have the role policy applied to them; only users belonging to the specified group. 4) CLI Running Role-Policy Configuration rfs4000# show running-config | begin role-policy firewalled-users role-policy firewalled-users user-role fw-role precedence 10 ssid exact vlan64 group exact no-internet-users use ip-access-list in restricted-allow precedence 10 WiNG 5 Role-Based Firewall How-To Guide 2.2.2 Web-UI Configuration We will configure in the same order as was executed at the CLI. Navigate to “Configuration > Services > RADIUS > Groups” and add a new group policy. One item of note when configuring the group policy WLAN SSID – this box is for administratorinput. The SSID of your WLAN is what is needed, not the WLAN-name as WiNG 5 sees it. Ensure that the SSID is typed correctly, including case or it will be incorrect and the policy will not work. This is denoted in the screenshot below with the numbers 1 and 2: Type in your SSID and click the down-arrow to apply said SSID to the group policy. Web UI: RADIUS Group Policy WiNG 5 Role-Based Firewall How-To Guide Navigate to “Configuration > Services > RADIUS > User Pools” and create your pool of users. When creating your users, select the RADIUS Group they are to belong to, as shown: Web UI: RADIUS User-Pool Policy Navigate to “Configuration > Services > RADIUS > Server Policy” and add your new RADIUS server policy. The (1) RADIUS User Pool, (2) RADIUS Group (specified LDAP Group) and (3) Authentication source and type must be specified: WiNG 5 Role-Based Firewall How-To Guide Web UI: RADIUS Server Policy Once RADIUS has been configured, we then add the AAA Policy. Navigate to “Configuration > Wireless > AAA Policy” and add a new policy: WiNG 5 Role-Based Firewall How-To Guide Web UI: AAA Policy WiNG 5 Role-Based Firewall How-To Guide Web UI: AAA Policy We now apply this new security to our WLAN; navigate to “Configuration > Wireless > Wireless LANs” select to edit the WLAN, then navigate to “Security” in the middle working pane. Under “Select Authentication” apply the new method. WiNG 5 Role-Based Firewall How-To Guide Web UI: WLAN Authentication Remember to Commit and Save your work as you complete these tasks. Finally navigate to “Configuration > Security > Wireless Client Roles” and select to edit the “firewalled-users” policy that was created for scenario 1. We will add match-criteria for the user group and specify the “no-internet-users” group policy that was configured during the RADIUS setup: WiNG 5 Role-Based Firewall How-To Guide Web UI: Role Policy Modification 3. Verification The configuration has been completed and now we can test. We expect that clients connecting to SSID “vlan64” will match our role-policy and will thus only be allowed to send ping requests and perform SSH based sessions. We connect a client to our SSID and then view the role policy state: WiNG 5 Role-Based Firewall How-To Guide 1) CLI Role Policy Verification rfs4000# connect ap650-85CD9C ~~~ login output omitted ~~~ ap650-85CD9C#show role wireless-clients Role_policy: firewalled-users Role: fw-role 00-27-10-94-B8-5C Wireless Clients not matching any Role: 1C-4B-D6-55-D0-2C 00-25-00-48-BB-AE 64-A7-69-7C-71-A5 ap650-85CD9C# Next we will test and verify that the rules are actually working. We will initiate a ping from our wireless client to the RFS, followed by an SSH session: Web UI: Testing the Role Policy Finally, we will attempt an HTTPS session to our RFS Web interface: WiNG 5 Role-Based Firewall How-To Guide Web UI: Testing the Role Policy 4. Troubleshooting Remember that the role policy has been applied to the profile for the access points. Thus, we can connect to an access point to which an expected role-based user is associating and determine if the role is being set: WiNG 5 Role-Based Firewall How-To Guide 1) CLI Role Policy Verification ap650-85CD9C#show wireless client ---------------------------------------------------------------------------------------------------------------MAC VLAN IP VENDOR RADIO-ID WLAN STATE ---------------------------------------------------------------------------------------------------------------00-27-10-94-B8-5C 192.168.150.126 Intel Corp 64 Data-Ready 00-23-68-85-CD-9C:R1 vlan64-wlan ---------------------------------------------------------------------------------------------------------------Total number of wireless clients displayed: 1 ap650-85CD9C#show wireless client detail 00-27-10-94-B8-5C ADDRESS : 00-27-10-94-B8-5C - 00-27-10-94-B8-5C USERNAME : user2 WLAN : vlan64-wlan (ssid:vlan64) ACCESS-POINT : Name:ap650-85CD9C Location:Gilbert, AZ RADIO-ID : 00-23-68-85-CD-9C:R1, alias ap650-85CD9C:R1 RADIO-NAME : radio1 Bss:00-23-68-73-BA-11 STATE : Data-Ready CLIENT-INFO : 802.11bgn, vendor: Intel Corp SECURITY : Authentication: eap Encryption: ccmp DATA-RATES : 1 2 5.5 6 9 11 12 18 24 36 48 54 mcs0-15 MAX-PHY_RATE : 300 M MAX-USER_RATE : 225 M 802.11n 40Mhz) 192.168.150.126 (vlan:64) : Short guard interval: Y Channel width (capability: 40Mhz Current: : AMSDU Max-Size: 7935 AMPDU Max-Size: 65535 AMPDU Min-Spacing: 0 uSec QoS : WMM: Y Type: Non Voice POWER-MGMT : PS-Mode: N ACTIVITY : Last Active: 00:00.00 ago SESSION INFO : Session Timeout: RF-DOMAIN : default MCAST STREAMS : ROLE : fw-role/firewalled-users ap650-85CD9C# Spatial-Multiplexing-PS: off WMM-PS/U-APSD: Disabled 0 days 06:08.00 Idle Timeout: 00.:30.00 WiNG 5 Role-Based Firewall How-To Guide 5. Reference Documentation: Description Location WiNG 4 Wired / Wireless Firewall http://compass.mot.com/doc/316513023/WiNG_How_To__Wired_Wireless_Firewall.pdf Role Based Firewall WiNG 5 Functional Spec
© Copyright 2024