RE: Allow only Domain PCs to access Network
Taco,
What's the business case behind this requirement? Although what you require
may be technically doable, it makes sense to analyse how this benefits
business.
If you want to use IAS, I see the following somewhat reasonable option:
Configure 802.1x on Cisco switches and then set IAS to use EAP-TLS for client
authentication, and require client certificates (as in - Computer
certificates - see the Smart Card or Other Certificate option). Make sure
that users haven't got admin access to computer certificate stores (this may
be tricky - see note below) and can't export client certificates and
associated private keys. Configure automatic provisioning for computer
certificates.
Another option that doesn't require certificates would be to request PEAP
authentication for computer accounts. Configure all the domain members to
only use PEAP and use ONLY computer credentials to authenticate. In AD, add
all the computer accounts (and only computer accounts) to a global or
universal group (say - Domain Computers). In IAS, allow PEAP as the only
authentication method, and only allow this for the Domain Computer accounts.
Now users can't authenticate to the network using their user accounts and
passwords, as they are not allowed to authenticate on IAS. Obtaining the
computer account password is only possible if they have local admin rights
(please see my note below on obtaining admin access), or by offline attacks
(if they manage to steal a backup of the computer SAM database).
Now, the issue is that you CAN'T take away admin access from users unless
they really have no physical access to computers. If they have physical
access, they can always boot from a CD into another OS, or boot from the
network, or disconnect the hard disk from the local computer and acquire
admin access to the operating system, then potentially export the computer
certificate from the local computer store, then potentially circuimvent the
above IAS/802.1x controls. Alternatively, you may consider storing computer
certificates on SmartCards, or in TPMs but this may require an admin to start
the computer every time it is used, which is definitely cumbersome. Full Disk
Encryption software may also be an option here, and help you protect the
integrity of the operating system and associated data.
--
HTH,
Dob
Visit
http://www.iamechanics.com
"taco" wrote:
> I have been searching for a solution using MS IAS and cisco switches to allow
> only PCs that are JOINED to the domain to get access to the network (using
> 8021.x and MD5 password authentication).
>
> Using Mac security was ok but if a user formats his PC he will gain access
> to the network without be joined to the domain, since by entering only
> credentials (while leaving the domain field blank) opens the connection.
>
> I want some advice on the proper approach required to solve this problem
>
> Thanks in advance