FreeNAC – Network Access Control

FreeNAC provides Virtual LAN assignment, LAN access control, VLAN management. This tool is a must-have for Network Administrator.

PROS:
– Dynamic VLAN assignment: based on MAC address of the client’s computer, it will be assigned to the associate VLAN. Traditionally network access layer requires network engineers to assign a VLAN to a specific access port that linked to a socket on the wall.
– VLAN access control: prevent unauthorized access to the network even he physically access to the network socket in your company, as his MAC address not associated with any VLAN
– VLAN management: when users change their position or move to another department, Network Administrator only need to change MAC/VLAN mapping to a new VLAN, no need for network engineers to look for the user’s new position, socket on the wall, configure new VLAN to the access switch port.

CONS:
– Network inaccessible for the whole company in case the FreeNAC unreachable, you need to plan HA for the tool.
– Wifi user will access the public internet and use VPN to access internal resources

CONCLUSION :
For a strict network, high-security environment, you can consider implementing this NAC (Network Access Control), it will improve your network security

[OTP] One-time password . Multi-factor authentication

Nowadays, not even simple passwords like 123456 are easy to break. With modern technologies and the power of computer hardware, breaking strong passwords including special characters and symbols is only a matter of time. More specifically, with “Dictionary” attacks, simple passwords can be break just in a second. For stronger passwords, just weeks or few months at most is enough thanks to “Brute-Force” attacks. Many companies require users to change their passwords every few months. ISO 27001, for example, also requires applying this policy. This is quite annoying for our users to remember all their new complex passwords, so some just write down their passwords, hide them under the desk or simply stick them on monitors which then become a big risk instead of a security enhancement.

In contrast to static passwords, One-time passwords, which are changed twice every minute, are not vulnerable even with replay attacks. That means a potential intruder who manages to record an OTP that was already used to log into a service or to conduct a transaction will not be able to abuse it, since it will no longer be valid.

Now instead of remembering a complex password, our users can simply install a software token on their phone or receive an SMS OTP upon request, compile it with their secret static PIN, the password security break has been solved on those systems which applied Multi-factor authentication.

Unfortunates, not all the system have build-in multi-factor authentication function, but as many of them ready to intergraded with RADIUS or LDAP, we choose RADIUS as our solution below:

1/ User -> PIN + software token -> server -> radius -> OTP module
2/ User -> PIN -> server -> radius -> OTP module -> sms token -> user -> PIN + sms token -> server -> radius -> OTP module

We did successfully intergrade our application and devices listed below with OTP, they are working well in the production environment for years without any complaint from our clients
– Linux sshd servers: with pam_radius module
– Cisco network devices 28xx, 3750, 4507, 6509, 7609: with radius and TACAS+
– Cisco ACS
– Juniper network devices : EX4200, EX4300,EX9200, QFX5100, MX80, MX480, MX960, SRX3600, SRX5600, SRX5800
– Apache web servers 2.2 and 2.4: required LinOTP_auth module installed on the server
– SoftEther VPN server: using external radius authentication.
– Our software development team they also happy to use radius client library instead of storing a static password database.

If your company have not got OTP/Multi-factor authentication yet and you interested in this solution, please contact and I will be pleased to help

Cacti

Cacti is a web-based network monitoring and graphing tool which allows a user to poll services at predetermined intervals and graph the resulting data