on 04-07-2025 06:34 AM
The objective of this Article is to propose suggestions for the evolution of Network Authentication from MAB to 802.1x in IoT Devices, with the aim of mitigating the exploitation of Layer 2 Attacks such as MAC-Address Cloning and Man in the Middle. It is worth remembering that this evolution does not eliminate the need for Segmentation, whether done by ACL, Firewall between VLANs or ServiceTag.
Currently, most IoT devices support the 802.1x Protocol, therefore, Cameras, DRVs, Printers, Telephones, Temperature and Light Controllers, among others, already have in their firmware the possibility of working in a better way (not MAB) with Networks protected with NAC.
The most common Protocol options for implementing 802.1x on a Wired Network are:
Sometimes, due to the lack of a Digital Certificate auto-enrollment system in the IoT software, the challenge of keeping Digital Certificates updated will have a high operational cost depending on their validity period. As a result of this absence, we chose to use Credentials from a Directory Service together with the CA Certificate, both trusted by the NAC. This way, we will have Encryption and Security in storing Credentials.
Therefore, we will use EAP-PEAP using the CA certificate that the NAC trusts and a Service Account in the Directory (AD or LDAP).
Important: If you use this Directory Service to provide access to other Network equipment such as Workstations, take measures to ensure that this Account does not log in to the Workstations and that it is also not possible to escalate privileges from it. This is due to the risk of Data (Credentials) being extracted from the IoT after it has been configured in the event of theft, for example.
Verify that NAC can understand the PEAP protocol (at Policy > Policy Elements > Authentication > Allowed Protocols) and is connected to External Identity Sources (at Administration > Identity Management > External Identity Sources), such as Active Directory:
Verify that the Authentication Policy of your Policy Set points to the chosen Directory Service.
The Authorization Policy is as shown in the image below:
To automate this process we will need:
Given the prerequisites met, a script can be developed according to the flow in the image below:
The credentials will be provided by the Password vault via API.
The Session Data such as IP for remote connection and Device Profile, to know which API will be used by the IoT device, will be queried via the REST API of the NAC controls – Cisco ISE.
Note: In this step, a temporary MAB assignment must be assigned for the initial entry of this device into the network.
With the Credentials obtained from the vault and the Network Data obtained from ISE, the API language for which the IoT device should be configured is selected and this process is started.
Once configured, a check on ISE can confirm whether authentication has evolved to 802.1x.
With these suggestions, I hope to have helped create an additional layer of Network Protection, especially focusing on these Devices that are increasingly growing in number on Corporate Networks.
@Renato Guardia ... thanks for sharing !!!
Very helpful! Thanks
@Leonardo Almeida thanks
thanks for the info!
@Martin L thank you!
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: