Exsecutio notionis valde firmae accessus remoti

Continuans seriem articulorum in thema regiminis Longinquus Access VPN accessum adiuvare non possum sed meam commodam instruere experientiam communicare non possum VPN configuratione maxime secure. Munus non-triviale ab uno emptore (sunt inventores in villas Russiae), sed provocatio accepta est et effective impletur. Eventus est conceptus interesting cum notis sequentibus:

  1. Plures factores tutelae contra substitutionem machinae terminalis (cum stricto ligamine utentis);
    • Perpendendis obsequio PC usoris cum assignatis UDID de PC permissi in datorum authenticationum;
    • Cum MFA utens PC UDID a certificatorio pro secundario authenticas per Cisco DUO (Adiungere potes aliquem SAML/Radii compatible one);
  2. Multi- factor authenticas:
    • Testimonium usoris cum verificatione campi et authenticae secundae contra unum eorum;
    • Tessera (immutabilis, e libello sumpta) et tessera fuit;
  3. Aestimandis de re publica exercitum connectens (Posture)

Solu- tium usus est:

  • Cisco ASA (VPN Gateway);
  • Cisco ISE (Auctentio / Autorizācija / Rationem, Publica Aestimatio, CA);
  • Cisco Duo (Multi-Factor Auctorizo) (Adiungere potes aliquem SAML/Radii compatible one);
  • Cisco AnyConnect (agens multi-propositum pro operibus et mobilibus OS);

Sit scriptor mos scriptor satus cum requisitis:

  1. Usor debet, per suum Login/Password authenticas, aliquem Connect clientem de VPN porta detrahere posse, omnia necessaria Moduli AnyConnect automatice secundum consilium usoris institui debent;
  2. Usor sponte testimonium ferat (pro uno e missionibus, principale est missionis manualis editae et imposuistis in PC), sed automatice exitus demonstrandi (numquam sero est ut id removeat) exsecutioni mandavi.
  3. Authenticatio fundamentalis pluribus gradibus fieri debet, primum certificatorium authenticas cum analysi necessariarum agrorum eorumque valorum, deinde login/password, hoc tantum tempore nomen usoris determinatum in agro certificatorio inserendum est in fenestra login Sub nomine (CN) sine facultate edit.
  4. Facere debes ut machinamentum unde colligas in corpore sit laptop usori pro remotis accessus latis, et non aliud. (Plures optiones factae sunt ad hanc postulationem satisfaciendam)
  5. Status connectens fabrica (hoc PC scaenae) aestimari debet cum perscriptio totius hefty mensae emptoris requisitis (summaizing);
    • Lima earumque possessiones;
    • Registro entries;
    • OS inaequaliter e indice provisum (post SCCM integrationem);
    • Availability of Anti-Virus from a specific manufacturer and relevance signatures;
    • Actio quarundam muneris;
    • Availability quorumdam programmatum inauguratus;

Imprimis, admoneo te definite intueri demonstrationem video deductionis inde Youtube (5 minutes).

Nunc propono singula exsecutionem considerare quae in clipeo cinematographico non obtectae sunt.

Praeparet AnyConnect profile:

Antea dedi exemplum efficiendi figuram (per menu item in ASDM) in articulo occasu VPN Load-Conparatio botrus. Nunc singula optiones notare velim, quibus opus erit;

In profano, portam VPN indicabimus et nomen profile coniungendi cum fine clientis:

Exsecutio notionis valde firmae accessus remoti

Configurare latae sententiae libellum e latere profano, nominatim parametri libellum significans et, notabiliter, operam ad campum. Initials (I)Ubi certum valorem manually ingressus est UDID machina test (Unica fabrica identifier quae a Cisco AnyConnect client generatur).

Exsecutio notionis valde firmae accessus remoti

Hic lyricam digressionem facere volo, quia conceptum hic articulus describit, ad demonstrationem proposita, UDID libellum emittentes in Initials profile campi AnyConnect ingressus est. Utique in vita reali, si hoc feceris, omnes clientes libellum cum eodem UDID in hoc campo accipient et nihil pro illis operabitur, cum UDID specifica PC egent. AnyConnect, proh dolor, nondum effectum deducendi substitutionem agri UDID in libellum rogationis profile per ambitum variabilem, sicut facit, exempli gratia, cum variabili % USUFRUCTUARIUS%.

Notatu dignum est emptorem (huius missionis) initio consilia independenter nuntiare libellos dato UDID in manu manuali ad tales PCs Protectos, quod pro eo non est quaestio. Maxime autem nos volumus automationem (bene, mihi verum est =)).

Et hoc est quod offerre possum secundum automationem. Si AnyConnect nondum potest testimonium emittere automatice substituendo UDID dynamice, tunc est alius modus qui parvam cogitationem creatrix et manus peritissimas requiret - conceptum dicam tibi. Primum videamus quomodo UDID generatur in diversis systematibus operantibus ab agente AnyConnect:

  • Fenestra - SHA-256 Nullam coniunctionis DigitalProductID et Machina SID subcriptio key
  • OS X β€” SHA-256 Nullam PlatformUUID
  • Linux β€” SHA-256 Nullam UUID radicis partitionem.
  • Apple iOS β€” SHA-256 Nullam PlatformUUID
  • Android - Vide documentum on Link

Proinde scriptionem pro corporato nostro OS Fenestram creamus, cum hoc scripto localiter UDID utentes notis inputibus computamus et postulamus ut libellum ediderit intrando hunc UDID in campum inquisitum, obiter machinam uti potes. edita ab AD libellum (addendo duplex authenticas utens libellum ad propositum Plures certificatorium).

Praeparent occasus in Cisco ASA parte:

Fiduciam faciamus pro servo CA ISE, erit ille qui libellos clientibus dabit. Non considerans key-catenae import procedure VPN Load-Conparatio botrus.

crypto ca trustpoint ISE-CA
 enrollment terminal
 crl configure

Distributionem a Tunnel-Group configuramus secundum regulas secundum agros in certificatorio quod ad authenticas adhibetur. In profile AnyConnect quod fecimus in scaena priore etiam hic configuratur. Lorem quod usus sum pretii SECUREBANK-RA, transferre users cum edita libellum ad cuniculum group SECURIS-RIPA-VPN, nota quod campum in AnyConnect profile libellum rogationis columnae habeo.

tunnel-group-map enable rules
!
crypto ca certificate map OU-Map 6
 subject-name attr ou eq securebank-ra
!
webvpn
 anyconnect profiles SECUREBANK disk0:/securebank.xml
 certificate-group-map OU-Map 6 SECURE-BANK-VPN
!

authenticas erigere servers. In casu meo, haec ISE est primo stadio authenticitatis et DUO (Radius Proxy) ut MFA.

! CISCO ISE
aaa-server ISE protocol radius
 authorize-only
 interim-accounting-update periodic 24
 dynamic-authorization
aaa-server ISE (inside) host 192.168.99.134
 key *****
!
! DUO RADIUS PROXY
aaa-server DUO protocol radius
aaa-server DUO (inside) host 192.168.99.136
 timeout 60
 key *****
 authentication-port 1812
 accounting-port 1813
 no mschapv2-capable
!

Coetus rationes et cuniculum coetus creamus eorumque auxiliares;

Tunnel group DefaultWEBVPNGroup adhibebitur imprimis ad clientem AnyConnect detrahendum et adhibendum libellum usoris utens munus SCEP-Proxy in ASA, hoc enim habemus optiones correspondentes tum in ipso cuniculi coetu, tum in consilio coetus consociati. AC-Downloadet onusto AnyConnect profile (agros ad libellum ferendi, etc.). Etiam in hoc coetu consiliorum necessitatem download indicamus ISE Positio amet.

Tunnel group SECURIS-RIPA-VPN automatice a cliente adhibebitur cum authenticas authenticas editas in priore stadio, cum, secundum tabulam certificalem, nexus in hoc cuniculo coetus specie cadet. Dicam tibi hic de interesting optiones:

  • secundarium authenticas server coetus DUO # Pone secundarium authenticas in Duo servo (Radius Proxy)
  • username-e-certificateCN # Ad authenticationem primariam, CN agri libellum utimur ut login utentis possideat
  • secundarium-usoris-e, testimonium I # Pro secundario authenticas in DUO server, usoris extractis et initialibus (I) campis libellum utimur.
  • prior satietatem, Username clientis # Facies usoris pre-repleti in fenestra authenticas sine facultatem ad mutationem
  • secundo, pre-satiatus Username clientem pellem usui communis ignoro dis # Celamus login/password initus fenestra pro secundario authenticas DUO et utimur notificatione methodo (sms/dis/phone) - navale ad petendam authenticas pro tessera agri hic

!
access-list posture-redirect extended permit tcp any host 72.163.1.80 
access-list posture-redirect extended deny ip any any
!
access-list VPN-Filter extended permit ip any any
!
ip local pool vpn-pool 192.168.100.33-192.168.100.63 mask 255.255.255.224
!
group-policy SECURE-BANK-VPN internal
group-policy SECURE-BANK-VPN attributes
 dns-server value 192.168.99.155 192.168.99.130
 vpn-filter value VPN-Filter
 vpn-tunnel-protocol ssl-client 
 split-tunnel-policy tunnelall
 default-domain value ashes.cc
 address-pools value vpn-pool
 webvpn
  anyconnect ssl dtls enable
  anyconnect mtu 1300
  anyconnect keep-installer installed
  anyconnect ssl keepalive 20
  anyconnect ssl rekey time none
  anyconnect ssl rekey method ssl
  anyconnect dpd-interval client 30
  anyconnect dpd-interval gateway 30
  anyconnect ssl compression lzs
  anyconnect dtls compression lzs
  anyconnect modules value iseposture
  anyconnect profiles value SECUREBANK type user
!
group-policy AC-DOWNLOAD internal
group-policy AC-DOWNLOAD attributes
 dns-server value 192.168.99.155 192.168.99.130
 vpn-filter value VPN-Filter
 vpn-tunnel-protocol ssl-client 
 split-tunnel-policy tunnelall
 default-domain value ashes.cc
 address-pools value vpn-pool
 scep-forwarding-url value http://ise.ashes.cc:9090/auth/caservice/pkiclient.exe
 webvpn
  anyconnect ssl dtls enable
  anyconnect mtu 1300
  anyconnect keep-installer installed
  anyconnect ssl keepalive 20
  anyconnect ssl rekey time none
  anyconnect ssl rekey method ssl
  anyconnect dpd-interval client 30
  anyconnect dpd-interval gateway 30
  anyconnect ssl compression lzs
  anyconnect dtls compression lzs
  anyconnect modules value iseposture
  anyconnect profiles value SECUREBANK type user
!
tunnel-group DefaultWEBVPNGroup general-attributes
 address-pool vpn-pool
 authentication-server-group ISE
 accounting-server-group ISE
 default-group-policy AC-DOWNLOAD
 scep-enrollment enable
tunnel-group DefaultWEBVPNGroup webvpn-attributes
 authentication aaa certificate
!
tunnel-group SECURE-BANK-VPN type remote-access
tunnel-group SECURE-BANK-VPN general-attributes
 address-pool vpn-pool
 authentication-server-group ISE
 secondary-authentication-server-group DUO
 accounting-server-group ISE
 default-group-policy SECURE-BANK-VPN
 username-from-certificate CN
 secondary-username-from-certificate I
tunnel-group SECURE-BANK-VPN webvpn-attributes
 authentication aaa certificate
 pre-fill-username client
 secondary-pre-fill-username client hide use-common-password push
 group-alias SECURE-BANK-VPN enable
 dns-group ASHES-DNS
!

Deinde progredimur ad ISE:

Usorem localem configuramus (ad/LDAP/ODBC, etc.), pro simplicitate, usum localem in ipso ISE creavi et in agro assignavi. Description UDID PC unde in via VPN aperi licet. Si loci authenticitate in ISE utar, ad unam tantum notam circumscribam, cum multi agri non sint, sed in tertia factione databases authenticas has restrictiones non habebo.

Exsecutio notionis valde firmae accessus remoti

Intueamur auctoritas consilii, dividitur in quattuor nexus gradus;

  • scaena 1 - Policy pro downloading in AnyConnect agente et fiebant certificatorium
  • scaena 2 - Primae authenticas consilium Login (ex certificatorium)/Password + certificatorium cum UDID validation
  • scaena 3 - Secundae authenticas per Cisco Duo (MFA) usura UDID ut username + publicae taxationem
  • scaena 4 - Ultima auctoritas est in civitate;
    • Obsequens;
    • UDID sanatio (ex certificatorio login ligamen)
    • Cisco DUO MFA;
    • Authentication by login;
    • Testimonia authentica;

Exsecutio notionis valde firmae accessus remoti

Intueamur an interesting conditio UUID_VALIDATED, solum spectat ut user authenticating actualiter e PC cum permisso UDID in agro sociato Description rationem, conditiones huius modi:

Exsecutio notionis valde firmae accessus remoti

Auctoritas profile adhibita in gradibus 1,2,3 talis est:

Exsecutio notionis valde firmae accessus remoti

Prorsus inspicias quomodo UDID ex cliente AnyConnect ad nos pervenerit videndo singula sessionis clientis in ISE. In speciali videbimus quod AnyConnect per mechanismum ACIDEX non solum informationes de suggestu mittit, sed etiam UDID de fabrica Cisco-AV-BIG:

Exsecutio notionis valde firmae accessus remoti

Attendamus ad libellum edito ad usorem et ad campum Initials (I), qui eam ut login pro secundario MFA authenticitatis in Cisco DUO accipere solebat;

Exsecutio notionis valde firmae accessus remoti

De DUO Radius Proxy in parte stipendii perspicue perspicere possumus quomodo petitio authentica fit, venit utens UDID sicut usoris:

Exsecutio notionis valde firmae accessus remoti

Ex DUO portae eventum authenticum conspicimus felicissimum:

Exsecutio notionis valde firmae accessus remoti

Et in usoris proprietates eam habeo ALIAS, quam pro login usa sum vicissim, haec est UDID PC pro login:

Exsecutio notionis valde firmae accessus remoti

Quam ob rem obtinuit;

  • Multi-factor usor et fabrica authenticas;
  • Praesidium contra spoofing machinae utentis;
  • Perpensis conditionis cogitatus;
  • Potentia pro aucta potestate cum certificatorio domicilii, etc.;
  • Comprehensiva remota fabrica praesidia cum automatice securitatem modulorum explicavit;

Cisco VPN vasa seriei nexus:

Source: www.habr.com