SlideShare une entreprise Scribd logo
1  sur  85
Télécharger pour lire hors ligne
© 2016 Cisco and/or its affiliates. All rights reserved. 1
Cisco
Connect
Cloud and On Premises
Collaboration Security explained
Joseph Bassaly
Architect
Oct 12th 2017
© 2016 Cisco and/or its affiliates. All rights reserved. 2
What will we cover today ?
• Cisco Collaboration Elements
• Managing Identity
• Cisco Spark Security and Compliance
• Cisco Spark Network Security
© 2016 Cisco and/or its affiliates. All rights reserved. 3
Continuous Workstreams
© 2016 Cisco and/or its affiliates. All rights reserved. 4
Messaging Call ControlMeetings
Seamless Collaboration Experience
Link on-premises assets to the cloud
© 2016 Cisco and/or its affiliates. All rights reserved. 5
Cisco Spark
© 2016 Cisco and/or its affiliates. All rights reserved. 6
Hybrid Call
Service
Hybrid Calendar
Service
Hybrid Directory
Service
Directory Connector
Cisco Expressway
Cisco
Call
Control
Call Connector Calendar Connector
Hybrid Collaboration
Hybrid Media
Service
MEDIA
NODES
MEDIA
NODES
7© 2016 Cisco and/or its affiliates. All rights reserved.
Managing Identity
© 2016 Cisco and/or its affiliates. All rights reserved. 8
IdP – Identity Provider: RP – Relying Party
Users
Explicit Initial Trust
Agreement
Identity Framework
8
© 2016 Cisco and/or its affiliates. All rights reserved. 9
Paulo
Authentication and Authorization
(AuthN and AuthZ)
Authentication
When you enter a hotel and
walk up to reception, the
receptionist authenticates
you by checking your
passport
Authorization
After authentication has
taken place, the receptionist
gives you a room key
Your room key is your
authorization token to enter
your room and any resource
that you are entitled to in the
Hotel
You do not need your passport to enter your room.
Your room key authorizes you to enter your room
only, and not any other rooms. The room key
(authorization token) does not identify the holder of
the key/token.
9
Authentication verifies that
“you are who you say you are”
Authorization verifies that
“you are permitted to do what you are trying to do”
© 2016 Cisco and/or its affiliates. All rights reserved. 10
Authentication and Authorization
(SAML and OAuth)
Authorization
Client Services
IdP
Authentication
© 2016 Cisco and/or its affiliates. All rights reserved. 11
SAML 2.0 Cookies to prevent re-authentication
CUCM
Identity Provider
2. Redirect with SAML
authentication request
6. POST signed response
3.GET with SAML
authentication request
1. Resource Request
Cisco Jabber
5. Signed response in hiden HTML form with IdP
cookie
IdP
Cookie
7. Supply resource
with cookie
CUCM Cookie
4. Authentication method
define by IdP
IdP
Cookie
WebEx MC
Unity Connections
© 2016 Cisco and/or its affiliates. All rights reserved. 12
SAML 2.0 Cookies to prevent re-authentication
CUCM
Identity Provider
2. Redirect with SAML
authentication request
5. POST signed response
1. Resource Request
Cisco Jabber
4. Signed response in hidden HTML form
IdP
Cookie
CUCM Cookie
3.GET with SAML
authentication request
with IdP Cookie
IdP
Cookie
No Authentication needed
since IdP Cookie is valid
6. Supply resource
with cookie
WebEx
Cookie
WebEx MC
Unity Connections
© 2016 Cisco and/or its affiliates. All rights reserved. 13
An application would like
to connect to your account
The application “XYZ” would like to access
your basic account information.
Allow application “XYZ” access?
AllowDeny
Do these look familiar?
Authorize “XYZ” Application?
This application will be able to:
• Access your basic account information
• Read your posts
• See your list of contacts
Authorize app No, thanks
“XYZ” Application
This application would like to:
• Read and manage your files and documents
• View your email address
AcceptCancel
OAuth
Spark
Service
Customer IdP
Access Service
Common IdentityCisco Spark
Spark
Thick Client
Embedded
Browser
Redirect to Authorization Service’
Provides SAML cookie and UID to OAuth Service
AuthZ URL
Redirect to the AuthN
SAML GET
Authentication request
Authentication Provided
SAML POST with uid and IdP cookie
POST SAML Assertion
Redirect to the Oauth Service with SAML cookie and UID of the user
Identity Broker
Send back OAuth Token
Access_token
Access to the Spark Service
Authz URL
AuthN Request
Provide IdP URL for SAML Exchange
Validates Assertion
and create the
SAML SP cookie
Verifies Entitlement and Scope for the user and
generate OAuth Token
15© 2016 Cisco and/or its affiliates. All rights reserved.
Cisco Spark Security
© 2016 Cisco and/or its affiliates. All rights reserved. 16
Spark Clients
The scenario
Spark Board Video End Points
MEDIA
NODES
Expressway
Existing Services
Hybrid Calendar Service
Hybrid Call Service
Hybrid Directory Service
Hybrid Media Service
© 2016 Cisco and/or its affiliates. All rights reserved. 17
Spark – User Identity Sync and Authentication
Directory
Sync
User Info can be
synchronized to Spark
from the Enterprise
Active Directory
Multiple User attributes
can be synchronized
Passwords are not
synchronized - User :
1) Creates a Spark
password or
2) Uses SSO for Auth
Identity Service
© 2016 Cisco and/or its affiliates. All rights reserved. 18
Spark – SAML SSO Authentication
Directory
Sync
SAML
SSO
Administrators can
configure Spark to
work with their existing
SSO solution
Spark supports Identity
Providers using SAML
2.0 and OAuth 2.0
Identity Service
IdP
© 2016 Cisco and/or its affiliates. All rights reserved. 19
Client Connection
Spark Service
IdP
Identity Service
1) Customer downloads and installs Spark
Client (with Trust anchors)
2) Spark Client establishes a secure TLS
connection with the Spark Cloud
3) Spark Identity Service prompts for an e-
mail ID
4) User Authenticated by Spark Identity
Service, or the Enterprise IdP (SSO)
5) OAuth Access and Refresh Tokens created
and sent to Spark Client
• The Access Tokens contain details of the
Spark resources the User is authorized to
access
5) Spark Client presents its Access Tokens to
register with Spark Services over a secure
channel
© 2016 Cisco and/or its affiliates. All rights reserved. 20
Spark Device connection
Spark ServiceIdentity Service
1) User enters 16 digit activation code
received via e-mail from the Spark
provisioning service
2) Device authenticated by Identity
Service (Trust anchors sent to device
and secure connection established)
3) OAuth Access and Refresh Tokens
created and sent to Spark Client
• The Access Tokens contain details of
the Spark resources the User is
authorized to access
5) Spark Client presents its Access
Tokens to register with Spark
Services over a secure channel
1234567890123456
21© 2016 Cisco and/or its affiliates. All rights reserved.
Spark
Secure Messages and Content
© 2016 Cisco and/or its affiliates. All rights reserved. 22
Content Server Key Mgmt Service
message messagemessage
filefile
message
Spark - Encrypting Messages and Content
Spark Clients request a
conversation encryption key from
the Key Management Service
Any messages or files sent by a
Client are encrypted before being
sent to the Spark Cloud
Each Spark Room uses a different
Conversation Encryption key
Key Management Service
AES256-GCM cipher used for Encryption
© 2016 Cisco and/or its affiliates. All rights reserved. 23
Encrypted messages sent by a Client
are stored in the Spark Cloud and also
sent on to every other Client in the
Spark Room
Key Mgmt Service
messagemessagemessage
Content Server
message messagemessage
Spark - Decrypting Messages and Content
If needed, Spark Clients can retrieve
encryption keys from the Key
Management Service
Key Management Service
The encrypted message also contains
a link to the conversation encryption
key
24© 2016 Cisco and/or its affiliates. All rights reserved.
Spark
Secure Search and Indexing
© 2016 Cisco and/or its affiliates. All rights reserved. 25
Indexing Service
Spark IS the messageSparkIS themessage
Content Server
Spark IS the message
Key Mgmt Service
###################
Searching Spark Rooms : Building a Search Index
The Indexing Service :
Enables users to search for
names and words in the
encrypted messages stored
in the Content Server
A Search Index is built by
creating a fixed length
hash* of each word in each
message within a Room
###################
B957FE48
B9 57 FE 48
Hash
Algorithm
###################
Indexing Service
The hashes for each Spark
Room are stored by the
Content Service
###################
* A new (SHA-256 HMAC) hashing key (Search Key) is used for each room
© 2016 Cisco and/or its affiliates. All rights reserved. 26
Indexing Service
“Spark”Spark
Content Server Key Mgmt Service
###################
Searching Spark Rooms : Querying a Search Index
Search for the word “Spark”
Client sends search request
over a secure connection to
the Indexing Service
The Content Server
searches for a match in it’s
Hash tables and returns
matching content to the
client *
###################
B957FE48
B9 57 FE 48
Hash
Algorithm
Indexing Service
“Spark”
Search for the word “Spark”
“B9”
B9 57 FE 48
######################################
Spark IS the Message
B9
The Indexing Service uses
Per Room Search keys to
hash the search terms
*A link to Conversation Encryption Key is sent with encrypted message
27© 2016 Cisco and/or its affiliates. All rights reserved.
Spark E-Discovery
© 2016 Cisco and/or its affiliates. All rights reserved. 28
Cloud Collaboration
Management Portal
Indexing Service
Jo Smith’s ContentJo Smith’s Content
Content Server Key Mgmt Service
###################
Spark Compliance Service : E-Discovery
Administrator selects a
group of messages and files
to be retrieved for E-
Discovery e.g. : based on
date range/ content type/
user(s)
The Content Server returns
matching content to the
Compliance Service
###################
X1GFT5YYHash
Algorithm
Indexing Service
Jo Smith’s Content
“X1GFT5YY”
Jo Smith’s Content
###################
X1GFT5YY
The Indexing Service
searches Content Server for
related content
Compliance Service
###################
Jo Smith’s Content
###################
Jo Smith’s Content
###################
© 2016 Cisco and/or its affiliates. All rights reserved. 29
E-Discov. Storage
Compliance ServiceContent Server Key Mgmt Service
Spark Compliance Service : E-Discovery
The Compliance Service :
Decrypts content from the
Content Server, then
compresses and re-encrypts
it before sending it to the E-
Discovery Storage Service
The E-Discovery Storage
Service :
Sends the compressed and
encrypted content to the
Administrator on request
Compliance Service
Cloud Collaboration
Management Portal
Jo Smith’s Content###################
Jo Smith’s Content###################
Jo Smith’s Content###################
Jo Smith’s Messages
and Files
###################
###################
################
###################
###################
################
Jo Smith’s Messages
and Files
E-Discovery
Content Ready
© 2016 Cisco and/or its affiliates. All rights reserved. 30
3rd Party Integrations
Cisco has developed key relationships with leading Cloud Access Security Brokers (CASB), compliance,
archival and security vendors to enhance Cisco Spark and deliver key enterprise-grade features:
Compliance and Archiving
Archive content to comply with retention
requirements and enable eDiscovery
Data Loss Prevention
Apply policies to content, violation
alerts, and take remediation actions
Identity Management
Single Sign-On via SAML, Mobile Device
Management (MDM), SCIM user
provisioning and deactivation
31© 2016 Cisco and/or its affiliates. All rights reserved.
Spark Hybrid Data Security
© 2016 Cisco and/or its affiliates. All rights reserved. 32
Secure Data Center
Content Server
Key Mgmt Service
Spark – Hybrid Data Security (HDS)
Compliance ServiceIndexing Service
Hybrid Data Security
Hybrid Data Services
=
On Premise :
Key Management Server
Indexing Server
E-Discovery Service
© 2016 Cisco and/or its affiliates. All rights reserved. 33
Secure Data Center
Content Server
Key Mgmt Service
Hybrid Data Security traffic and Firewalls
Compliance ServiceIndexing Service
Hybrid Data Services
make outbound connections
only from the Enterprise to the
Spark cloud, using HTTPS and
Secure WebSockets (WSS)
No special Firewall
configuration required
Firewall
Hybrid Data Security
© 2016 Cisco and/or its affiliates. All rights reserved. 34
Secure Data Center
Content Server Key Mgmt Server
Spark – Hybrid Data Security: Key Management
The Hybrid Key Management
Server performs the same
functions as the Cloud based Key
Management Server
Now all of the keys for messages
and content are owned and
managed by the Customer
BUT
Key Management Service
Key Mgmt Service
© 2016 Cisco and/or its affiliates. All rights reserved. 35
Secure Data Center
Content Server
The Hybrid Data Security is
managed and upgraded from the
cloud
Customer’s can access usage
information for the HDS Servers
via the cloud management portal
Multiple HDS servers can be
provisioned for
Scalability & Load Sharing
Key Mgmt ServerKey Mgmt Service
Hybrid Data Security - Scalability
Hybrid Data Security
Hybrid Data Security
Hybrid Data Security
© 2016 Cisco and/or its affiliates. All rights reserved. 36
Secure Data Center
Key Mgmt Service
Content Server Key Mgmt Service
message messagemessagemessage
HDS - Encrypting Messages & Content
Spark Clients request an encryption
key from the Hybrid Key Management
Server
Any messages or files sent by a Client
are encrypted before being sent to the
Spark Cloud
Encrypted messages and content
stored in the cloud
Key Management Service
Encryption Keys stored locally
© 2016 Cisco and/or its affiliates. All rights reserved. 37
Secure Data Center
Key Mgmt Service
Encrypted messages from Clients are
stored in the Spark Cloud
Key Mgmt Service
message
Content Server
message messagemessage
If needed, Spark Clients can retrieve
encryption keys from the Hybrid Key
Management Server
Key Management Service
These messages are sent to every
other Client in the Spark Room and
contain a link to their encryption key
on the Hybrid Key Management Server
HDS - Decrypting Messages & Content
© 2016 Cisco and/or its affiliates. All rights reserved. 38
Secure Data Center
Indexing Service
Spark IS the messageSparkIS themessage
Content Server
Spark IS the message
Key Mgmt Service
###################
The Indexing Service :
Enables users to search for
names and words in the
encrypted messages stored
in the Content Server
###################
B957FE48
B9 57 FE 48
Hash
Algorithm
###################
Indexing Service
###################
* A new hashing key (Search Key) is used for each room
Hybrid Data Security: Search Indexing Service
© 2016 Cisco and/or its affiliates. All rights reserved. 39
Secure Data Center
Indexing Service
“Spark”Spark
Content Server
Key Mgmt Service
###################
Hybrid Data Security: Querying a Search Index
Search for the word “Spark”
Client sends its search
request over a secure
connection to the Indexing
Service
###################
B9
B9 57 FE 48
Hash
Algorithm
Indexing Service
“Spark”
Search for the word “Spark”
“B9”
B9 57 FE 48
######################################
Spark IS the Message B9
*A link to Conversation Encryption Key is sent with the encrypted message
© 2016 Cisco and/or its affiliates. All rights reserved. 40
Secure Data Center
Indexing Service
Content Server
Spark Compliance Service : E-Discovery
X1GFT5YY
Indexing Service
Jo Smith’s ContentJo Smith’s ContentJo Smith’s Content
Key Mgmt ServiceCompliance Service
Cloud Collaboration
Management Portal
############################################################################
######################################Jo Smith’s Content Jo Smith’s ContentJo Smith’s Content“X1GFT5YY”X1GFT5YY
Hash
Algorithm
Admin selects a group of
messages and files to be
retrieved for E-Discovery
e.g. : based on date range/
content type/ user(s)
The Content Server returns
matching content to the
Compliance Service
The Indexing Service
searches the Content
Server for selected content
© 2016 Cisco and/or its affiliates. All rights reserved. 41
Secure Data Center
Key Mgmt ServiceCompliance Service
Cloud Collaboration
Management Portal
E-Discov. StorageContent Server
Spark Compliance Service : E-Discovery
The Compliance Service :
Decrypts content from the
Content Server, then
compresses and re-encrypts it
before sending it to the E-
Discovery Storage Service
E-Discovery Storage Service :
Sends the compressed and
encrypted content to the
Administrator on request
Jo Smith’s Content###################
Jo Smith’s Content###################
Jo Smith’s Content###################
Jo Smith’s Messages
and Files
###################
###################
################
###################
###################
################
Jo Smith’s
Messages and Files
E-Discovery
Content Ready
42© 2016 Cisco and/or its affiliates. All rights reserved.
Key Management Server
Federation
© 2016 Cisco and/or its affiliates. All rights reserved. 43
Hybrid Key
Management Servers
in different Enterprises
establish a Mutual
TLS* connection via
the Spark Cloud
Key Mgmt ServiceKey Mgmt Service
Content Server Key Mgmt Service
HDS: Key Management Server Federation
Enterprise A Enterprise B
Hybrid Key
Management Servers
make outbound
connections only :
HTTPS, Web Socket
Secure (WSS)
*All connections to and within the Spark Cloud use ECDH to generate symmetric Encryption Keys
© 2016 Cisco and/or its affiliates. All rights reserved. 44
With a secure
connection between
Hybrid KMSs…
Users can be added to
rooms created by each
Enterprise
Key Mgmt ServiceKey Mgmt Service
Content Server Key Mgmt Service
HDS: Key Management Server Federation
Enterprise A Enterprise B
Mutually Authenticated
Hybrid KMSs can
request Room
Encryption Keys from
one another on behalf
of their Users
45© 2016 Cisco and/or its affiliates. All rights reserved.
Cloud Collaboration Network
Security
© 2016 Cisco and/or its affiliates. All rights reserved. 46
• VLANs
• Switch Port VLAN configuration and device requirements
• Firewalls
• Whitelists for Spark clients, devices and Services
• Media support – UDP/TCP/HTTP
• HTTP Proxies
• Proxy Types and Proxy Detection
• Proxy Authentication Methods ( Basic/Digest/ NTLM/ Negotiate/Kerberos) Auth Bypass
• Proxy TLS/ HTTPS traffic inspection – Certificate Pinning
• 802.1X – Authentication Methods EAP-FAST/ EAP-TLS, MAC Address Bypass
Cloud Collaboration Network Security Primer
47© 2016 Cisco and/or its affiliates. All rights reserved.
Cisco Spark Cloud Access
Enterprise VLANs
© 2016 Cisco and/or its affiliates. All rights reserved. 48
Connecting from the Enterprise - VLANs
How are the switch ports configured ?
Minimum Enterprise Network Requirements :
Internet Access
DHCP, DNS server access
Internal TCP connectivity and ICMP to devices for support
???
• Single static untagged VLAN ?
• Dynamic VLAN assignment based on CDP/LLDP TLV values ?
• Multiple static VLANs (e.g. Data VLAN & Aux VLAN) ? –
802.1Q VLAN tagging required for the Auxiliary VLAN
© 2016 Cisco and/or its affiliates. All rights reserved. 49
Network Capabilities Spark Devices – CDP/LLDP, 802.1Q
Spark Device Protocol Software Train CDP/ LLDP 802.1Q Ethernet
PC Port
Granular Configuration
Windows, Mac,
iOS, Android, Web
HTTPS WME No/ No N/A N/A Static Untagged (Data) VLAN
DX HTTPS Room OS Yes/ No Yes Yes Dynamic VLAN assignment, 802.1Q
Tagging, Connected PC supported
Room Kit, MX, SX HTTPS Room OS Yes/ No Yes No Dynamic VLAN assignment, 802.1Q
Tagging
Spark Board HTTPS Spark Board OS Yes/ No Yes No Dynamic VLAN assignment, 802.1Q
Tagging
© 2016 Cisco and/or its affiliates. All rights reserved. 50
Connecting from the Enterprise - Firewalls
Whitelisted Ports and Destinations :
Media Port Ranges:
Source UDP Ports : Voice 52000 - 52099, Video 52100- 52299
Source TCP/ HTTP Ports : Ephemeral ( => No DSCP re-marking)
Destination UDP/ TCP/ HTTP Port : 5004, 5006
Destination IP Addresses : Any
• Spark Call (7800, 8800 Phones)
• Spark Desk and Room Devices
• Spark Clients
• See following slides for details
Signalling
Media
© 2016 Cisco and/or its affiliates. All rights reserved. 51
Voice and Video Classification and Marking
Port Range Summary – Endpoints and Clients
Audio:
52000-52099
Spark Soft Clients Spark Devices
Video:
52100-52299
52000 - 52049 52050 - 52099 52100 - 52199 52200 - 52299
© 2016 Cisco and/or its affiliates. All rights reserved. 52
Spark Apps : Network Port and Whitelist Requirements
Spark Device Protocol Source Ports Destination
Ports
Destination Function
Spark applications :
Windows,
Mac,
iOS,
Android,
Web
UDP Voice 52000 – 52049
Video 52100 – 52199
Exception - Windows
(OS Firewall issue)
Ephemeral source ports
used today (Fix due by
Q3 CY '17)
5004 &
5006
Any IP Address SRTP over UDP to Spark Cloud Media
Nodes
TCP Ephemeral 5004 &
5006
Any IP Address SRTP over TCP or HTTP to Spark Cloud
Media Nodes
TCP Ephemeral 443
identity.webex.com
idbroker.webex.com
*.wbx2.com
*.webex.com
*.ciscospark.com
*.clouddrive.com
*.rackcdn.com
*.crashlytics.com
*.mixpanel.com
*.appsflyer.com
*.adobetm.com
*.omtrdc.net
*.optimizely.com
HTTPS
Spark Identity Service
OAuth Service
Core Spark Services
Identity management
Core Spark Services
Content and Space Storage
Content and Space Storage
Anonymous crash data
Anonymous Analytics
Mobile Clients only - Ad Analytics
Web Clients only - Analytics
Web Clients only - Telemetry
Web Clients only - Metrics
© 2016 Cisco and/or its affiliates. All rights reserved. 53
Spark Devices : Network Port and Whitelist Requirements
Spark Device Protocol Source Ports Destination
Ports
Destination Function
Desktop and Room
Systems :
SX Series
DX Series
MX Series
Room Kits
Spark Boards*
UDP Voice 52050 – 52099
Video 52200 – 52299
EFT Today
GA Q3 CY '17
5004 &
5006
Any IP Address SRTP over UDP to Spark Cloud
Media Nodes
TCP Ephemeral 5004 &
5006
Any IP Address SRTP over TCP or HTTP to Spark
Cloud Media Nodes* (Not Spark
Board)
TCP Ephemeral 443
identity.webex.com
idbroker.webex.com
*.wbx2.com
*.webex.com
*.ciscospark.com
*.clouddrive.com
*.rackcdn.com
*.crashlytics.com
*.mixpanel.com
*dropboxusercontent.com
HTTPS
Spark Identity Service
OAuth Service
Core Spark Services
Identity management
Core Spark Services
Content and Space Storage
Content and Space Storage
Anonymous crash data
Anonymous Analytics
*Spark Board (firmware updates)
© 2016 Cisco and/or its affiliates. All rights reserved. 54
Connecting from the Enterprise - Firewalls
Media Port Ranges:
Source UDP Ports : Voice and Video 33434 - 33598
Source TCP/ HTTP Ports : Ephemeral ( => No DSCP re-marking)
Destination UDP/ TCP/ HTTP Port : 5004
Destination IP Addresses : Any
Hybrid Media Node (HMN) :
• Can be used to limit source IP address range to HMNs only
• Hybrid Media Node Source UDP ports for voice and video are different to
those used by endpoints – Used for cascade links to the Spark Cloud
• Voice and Video use a common UDP source port range : 33434 - 33598
Signalling
Media
© 2016 Cisco and/or its affiliates. All rights reserved. 55
Connecting from the Enterprise - Firewalls
Hybrid Data Security Node (HDS) :
• Key Management Service
• Indexing (Search) Service
• E-Discovery Service
Signalling
Media
Hybrid Data Services
• HDS Signaling Traffic Only
• Outbound HTTPS and WSS Signaling Only
© 2016 Cisco and/or its affiliates. All rights reserved. 56
HMN & HDS Nodes: Network Port & Whitelist Requirements
Spark Device Protocol Source Ports Destination
Ports
Destination Function
Hybrid Media
Node (HMN)
UDP Voice and Video use a
common UDP source port
range :
33434 - 33598
5004
Cascade
Destination
Any IP Address Cascaded SRTP over UDP
Media Streams to Cloud Media
Nodes
TCP Ephemeral 5004
Cascade
Destination
Any IP Address Cascaded SRTP over
TCP/HTTP Media Streams to
Cloud Media Nodes
TCP Ephemeral 123, 53, 444 Any NTP, DNS, HTTPS
TCP Ephemeral 443 *wbx2.com
*idbroker.webex.com
HTTPS Configuration Services
Hybrid Data
Security Node
(HDS)
TCP Ephemeral 443 *.wbx2.com
idbroker.webex.com
identity.webex.com
index.docker.io
Outbound HTTPS and WSS
© 2016 Cisco and/or its affiliates. All rights reserved. 57
What do we send to Third Party sites?
Site Clients that Access It What is sent there User
PII?
Anonymized
Usage info?
Encrypted
User
Generated
Content
*.clouddrive.com Win, Mac, iOS, Android,
Web, Spark Board
Encrypted files for Spark file sharing.
Part of Rackspace content system.
N N Y
*.rackcdn.com Win, Mac, iOS, Android,
Web, Spark Board
Encrypted files for Spark file sharing.
Part of Rackspace content system.
N N Y
*.mixpanel.com Win, Mac, iOS, Android,
Web
Anonymous usage data N Y N
*.appsflyer.com iOS, Android Anonymous usage data related to
onboarding
N Y N
*.adobedtm.com Web Anonymous usage data N Y N
*.omtrdc.net Web Anonymous usage data N Y N
*.optimizely.com Web Anonymous usage data for AB
testing
N Y N
58© 2016 Cisco and/or its affiliates. All rights reserved.
Cisco Spark Cloud Access
Enterprise Proxies
© 2016 Cisco and/or its affiliates. All rights reserved. 59
• Proxy Address given to Device/Application……….
Connecting from the Enterprise - Proxy Types
Proxy Types:
• Transparent Proxy (Device/Application is unaware of Proxy existence)
• In Line Proxies (e.g. Combined Proxy and Firewall)
• Traffic Redirection (e.g. Using Cisco WCCP)
Signalling
UDP Media
HTTP/HTTPS traffic only sent to the Proxy server e.g.
Destination ports 80, 443, 8080, 8443
© 2016 Cisco and/or its affiliates. All rights reserved. 60
• Proxy Detection (Proxy Address given to Device/Application)
Connecting from the Enterprise – Proxy Detection
• Manual Configuration
• Auto Configuration (Proxy Auto Conf (PAC) files)
Proxy
Address
Proxy
Address
Proxy
Address
PACPACPAC
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 61
Network Capabilities Spark Devices – Proxy Detection
Spark Device Protocol Software Train Proxy Detection Granular Configuration
Windows, Mac,
iOS, Android, Web
HTTPS WME Yes : Manual
Yes : PAC Files
Manually Configure Proxy Address or
Use PAC files (or Windows GPO)
DX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device
Web interface
SX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device
Web interface
MX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device
Web interface
Room Kits HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device
Web interface
Spark Board HTTPS Spark Board OS Yes : Manual Configuration Manual Configuration of Proxy
Address
© 2016 Cisco and/or its affiliates. All rights reserved. 62
• Proxy Authentication
Connecting from the Enterprise – Proxy Authentication
• Proxy intercepts outbound HTTP request
• Authenticates the User (Username & Password)
• Authenticated User’s traffic forwarded
• Unauthenticated User’s traffic dropped/blocked
Signalling
UDP Media
Proxy Authentication is not mandatory, Many
Enterprises do No Authentication
© 2016 Cisco and/or its affiliates. All rights reserved. 63
• Basic Authentication
Common Proxy Authentication Methods
• Digest Authentication
• NTLMv2 Authentication
• Negotiate Authentication
• Kerberos
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 64
• Basic Authentication
Proxy Authentication Methods – Basic Authentication
• Uses standard HTTP Headers
• Username and Password Base64 encoded
• Username and Password are NOT
encrypted or hashed
• Basic Username and Password challenge for devices
• i.e. Devices are not Users (no human interaction)
• Create one account (e.g. LDAP account) for all devices
• Create an account per device
• No Password Expiration
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 65
• Digest Authentication
Proxy Authentication Methods – Digest Authentication
• Uses standard HTTP Headers
• Username and Password are not sent
• A Hash of the Username and Password is
sent instead
• Basic Username and Password challenge for devices
• i.e. Devices are not Users (no human interaction)
• Create one account (e.g. LDAP account) for all devices
• Or create an account per device
• No Password Expiration
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 66
• NT LAN Manager (NTLM) Authentication
Proxy Authentication Methods – NTLMv2 (Windows Only)
• Microsoft Challenge/Response AuthN. protocol
• Username sent in plain text
• Challenge/Nonce sent from the server
• Password hash used to encrypt the
challenge and return it to the server
• Password hashed but not sent
• Windows based Username and Password challenge for devices
• i.e. Devices are not Users (no human interaction)
• Create one account (AD account) for all devices
• Or create an account per device
• No Password Expiration
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 67
Proxy Authentication Methods – Negotiate/IWA (Windows
Only) • Negotiate Authentication
• Microsoft implementation of SPNEGO
• Simple and Protected GSSAPI Negotiation
Mechanism. (Generic Security Service API)
• Kerberos or fallback to
• NTLM
• Negotiates the use of either :
• Windows based Username and Password challenge for devices
• i.e. Devices are not Users (no human interaction)
• Create one account (AD account) for all devices
• Or create an account per device
• No Password Expiration
Signalling
UDP Media
IWA - Integrated Windows Access
© 2016 Cisco and/or its affiliates. All rights reserved. 68
• Kerberos Authentication
Proxy Authentication Methods – Kerberos
• Strongest Security
• Client, Authentication Key Distribution Service, Ticket
Granting Service, Application Server
• Encrypted communication based on shared Secrets
• Client authenticates with the Authentication service
• Once authenticated, receives a Ticket Granting Ticket (TGT)
• Client requests access to a service (e.g. the Proxy) by presenting the TGT to
the Ticket Granting Service – the TGS authenticates the client and returns an
encrypted Service Ticket
• The Client presents the Service Ticket to Proxy which validates the user
(using the shared secret)
• HTTPS connection proceeds
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 69
Proxy Authentication Bypass Methods
Manually Configure Proxy Server with :
• Device IP Address
IP Address 10.100.200.1
Signalling
UDP Media
10.100.200.3
identity.webex.com
idbroker.webex.com
*.wbx2.com
*.webex.com
*.ciscospark.com
*.clouddrive.com
*.crashlytics.com
*.mixpanel.com
*.rackcdn.com
• Whitelisted Destinations (e.g. *ciscospark.com)
© 2016 Cisco and/or its affiliates. All rights reserved. 70
Network Capabilities Spark Devices – Proxy Authentication
Spark Device Protocol Software Train Proxy Authentication Granular Configuration
Windows, Mac, iOS,
Android, Web
HTTPS WME Basic - No
Digest - No
NTLM - Yes (Windows)
Kerberos - No
Windows Only Today
Others OSs use Authentication By Pass
(Basic/ Digest/ Kerberos – Planned)
DX HTTPS Room OS Yes : Basic Auth – Web based Config
Digest Auth - planned
Configure Username and Password for
Proxy Authentication (Basic Auth)
SX HTTPS Room OS Yes : Basic Auth – Web based Config
Digest Auth - planned
Configure Username and Password for
Proxy Authentication (Basic Auth)
MX HTTPS Room OS Yes : Basic Auth – Web based Config
Digest Auth - planned
Configure Username and Password for
Proxy Authentication (Basic Auth)
Room Kits HTTPS Room OS Yes : Basic Auth – Web based Config
Digest Auth - planned
Configure Username and Password for
Proxy Authentication (Basic Auth)
Spark Board HTTPS Spark Board OS Yes : Basic Auth - Manual Configuration Configure Username and Password for
Proxy Authentication (Basic Auth)
© 2016 Cisco and/or its affiliates. All rights reserved. 71
• HTTPS/TLS Inspection
Proxy TLS/HTTPS Inspection – Non Spark Apps (1)
• Private CA signed Certificate sent to client on connection establishment
• Client compares Private CA Root Cert with those received in Cert Chain
• If they match – accept and proceed with the TLS connection
Private CA Root Certificate sent to client
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 72
• HTTPS/TLS Inspection
Proxy TLS/HTTPS Inspection – Non Spark Apps (2)
• Proxy starts new HTTPS/TLS connection to Web/Cloud Service
• Proxy receives Certificate from Web/Cloud Service
• Proxy uses the Certificate to establish Secure TLS/HTTPS connection
• Proxy can now Decrypt, Inspect and Re-Encrypt session traffic
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 73
• Certificate Pinning
HTTP Proxy - No HTTPS Inspection – Spark
Certificate Pinning
• CA signed Cisco Spark Certificate sent by HTTPS/TLS server
• Client creates a hash of the Cert’s Public Key
• If they match – accept and proceed with the TLS connection
Certificate Pin =
SHA 256 Hash of CA Root Certificate Public Key
VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8=• Client compares the hash with the Certificate Pin in its Trust Store
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 74
• Certificate Pinning
Proxy - HTTPS Inspection – Spark Certificate Pinning
• Proxy sends Private CA signed Certificate during HTTPS/TLS set up
• Client creates a hash of the Private CA signed Cert’s Public Key
• They DO NOT Match : TLS connection terminated
• Client compares the hash with the Certificate Pin in its Trust Store
Certificate Pin =
SHA 256 Hash of CA Root Certificate Public Key
VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8=
Signalling
UDP Media
© 2016 Cisco and/or its affiliates. All rights reserved. 75
• Certificate Pinning
HTTPS Inspection – Spark Devices Cert. Pinning Fix
• Proxy sends Private CA signed Certificate during HTTPS/TLS set up
• Client creates a hash of the Private CA signed Cert’s Public Key
• They DO Match : Proceed with TLS connection
• Client compares the hash with the Certificate Pin in its Trust Store
Certificate Pin =
SHA 256 Hash of Private CA Root Certificate Public Key
VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8=
• HTTPS/TLS Inspection possible
Signalling
UDP Media
• Private CA Cert copied to Spark Cloud
© 2016 Cisco and/or its affiliates. All rights reserved. 76
• Certificate Pinning
HTTPS Inspection – Spark Clients Cert. Pinning Fix
• Proxy sends Private CA signed Certificate during HTTPS/TLS set up
• Spark App checks to see if a copy of the Private CA Cert exists in
the OS Trust Store
• Proceed with TLS connection
• If the Cert exists – skip Certificate pinning process
Certificate Pin =
SHA 256 Hash of Spark CA Root Certificate Public Key
VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8=
• HTTPS/TLS Inspection possible
Signalling
UDP Media
• Private CA Cert copied to Client OS Trust Store
© 2016 Cisco and/or its affiliates. All rights reserved. 77
Network Capabilities Spark Devices – HTTPS Inspection
Spark Device Protocol Software Train Supports TLS /HTTPS Inspection Cert Validation Method
Windows, Mac, Web HTTPS WME Yes : Win/Mac/Browser If Enterprise Certificate exists, then bypass
Certificate Pinning process
iOS, Android HTTPS WME No : iOS Android HTTPS Inspection By-Pass
DX HTTPS Room OS Yes – Requires Per Org Config of
Identity Service
Load Private CA Certs in Spark Service Download
Trust List with Private Certs
SX HTTPS Room OS Yes – Requires Per Org Config of
Identity Service
Load Private CA Certs in Spark Service
Download Trust List with Private Certs
MX HTTPS Room OS Yes – Requires Per Org Config of
Identity Service
Load Private CA Certs in Spark Service
Download Trust List with Private Certs
Room Kits HTTPS Room OS Yes – Requires Per Org Config of
Identity Service
Load Private CA Certs in Spark Service
Download Trust List with Private Certs
Spark Board HTTPS Spark Board OS No (Planned Q3 CY '17) HTTPS Inspection By-Pass
78© 2016 Cisco and/or its affiliates. All rights reserved.
Cisco Spark Cloud Access
Network Access Control 802.1X
© 2016 Cisco and/or its affiliates. All rights reserved. 79
Connecting from the Enterprise – 802.1X
802.1X Operation
???
• Switch port network access restricted
• Client presents credentials to Authentication Server
• After successful Authentication – switch port configured for the
Device e.g. VLAN(s), ACLs
Authentication
Server
© 2016 Cisco and/or its affiliates. All rights reserved. 80
802.1X Network Authentication Methods
802.1X Network Authentication Methods :
?
• There are many options….
• Two key Authentication methods :
• EAP-FAST
• EAP-TLS
Authentication
Server
Username
Password
© 2016 Cisco and/or its affiliates. All rights reserved. 81
802.1X Network Authentication : EAP-FAST
802.1X Extensible Authentication Protocol - FAST
?
• Flexible Authentication via Secure Tunneling
• Username and Password based
• Does not require Certificates
Username
Password
Username
Password
Authentication
Server
© 2016 Cisco and/or its affiliates. All rights reserved. 82
802.1X Network Authentication : EAP-TLS
802.1X Extensible Authentication Protocol - TLS
?
• Transport Layer Security
• Requires Digital Certificates
• Mutual Client - Server Authentication
Authentication
Server
© 2016 Cisco and/or its affiliates. All rights reserved. 83
802.1X Fallback - MAC Address Bypass (MAB)
Bypasses 802.1X Authentication Mechanisms
?
• Uses the Device MAC Address
• Commonly used for Non 802.1X capable devices
• MAC address manually entered into Auth. Server
Phone 1 MAC AA:BB:CC:11:22:33
Authentication
Server
Phone 1
AA:BB:CC:11:22:33
© 2016 Cisco and/or its affiliates. All rights reserved. 84
Network Capabilities Spark Devices – 802.1X
Spark Device Protocol Software
Train
EAP-FAST EAP-TLS MIC Non CUCM
LSC
Certificate
Installation
Capability
Granular Configuration
Windows,
Mac, iOS,
Android, Web
HTTPS WME Wi-Fi - Yes
Wired - Yes
Wi-Fi - Yes
Wired - Yes
N/A Yes Yes Manually Install LSC (Windows
GPO, Mac – Configuration
Profiles)
DX HTTPS Room OS Wi-Fi - Yes
Wired - Yes
Wi-Fi - Yes
Wired – Yes
2H
CY17
Yes Yes
Web Based
Install Enterprise LSC via
device Web Interface
SX HTTPS Room OS Wired - Yes Wired – Yes No Yes Yes
Web Based
Install Enterprise LSC via
device Web Interface
MX HTTPS Room OS Wired - Yes Wired – Yes No Yes Yes
Web Based
Install Enterprise LSC via
device Web Interface
Room Kits HTTPS Room OS Wi-Fi - Yes
Wired - Yes
Wi-Fi - Yes
Wired – Yes
Yes Yes Yes
Web Based
Install Enterprise LSC via
device Web Interface
Spark Board HTTPS Spark Board
OS
No (Planned
Q3 CY '17)
No (Planned
Q3 CY '17)
No No (Planned
Q3 CY '17)
Use MAC Address By-Pass
Thank you.

Contenu connexe

Tendances

Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Canada
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Canada
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCisco Canada
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Canada
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Canada
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Canada
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
How To Have Magical Meeting Experiences
How To Have Magical Meeting ExperiencesHow To Have Magical Meeting Experiences
How To Have Magical Meeting ExperiencesCisco Canada
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data centerCisco Canada
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact centerCisco Canada
 

Tendances (20)

Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
 
Cisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex updateCisco Connect Toronto 2017 - UCS and Hyperflex update
Cisco Connect Toronto 2017 - UCS and Hyperflex update
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
Cisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is nowCisco Connect Toronto 2017 - Your time is now
Cisco Connect Toronto 2017 - Your time is now
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
How To Have Magical Meeting Experiences
How To Have Magical Meeting ExperiencesHow To Have Magical Meeting Experiences
How To Have Magical Meeting Experiences
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC Networking
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Cisco contact center
Cisco contact centerCisco contact center
Cisco contact center
 

En vedette

Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Guido Schmutz
 
Big Data - in the cloud or rather on-premises?
Big Data - in the cloud or rather on-premises?Big Data - in the cloud or rather on-premises?
Big Data - in the cloud or rather on-premises?Guido Schmutz
 
Spatial Cloud Computing And Gis Web Version, Urisa October 2012
Spatial Cloud Computing And Gis Web Version, Urisa October 2012Spatial Cloud Computing And Gis Web Version, Urisa October 2012
Spatial Cloud Computing And Gis Web Version, Urisa October 2012HughPW
 
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...vasuballa
 
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SC
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SCGIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SC
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SCJim Tochterman
 
David Overton: GIS in the cloud
David Overton: GIS in the cloudDavid Overton: GIS in the cloud
David Overton: GIS in the cloudAGI Geocommunity
 
Cloud GIS Software – GEOCIRRUS
Cloud GIS Software – GEOCIRRUSCloud GIS Software – GEOCIRRUS
Cloud GIS Software – GEOCIRRUSGeoCirrus
 
How to Build Modern Data Architectures Both On Premises and in the Cloud
How to Build Modern Data Architectures Both On Premises and in the CloudHow to Build Modern Data Architectures Both On Premises and in the Cloud
How to Build Modern Data Architectures Both On Premises and in the CloudVMware Tanzu
 
Cloud GIS - GIS in the Rockies 2011
Cloud GIS - GIS in the Rockies 2011Cloud GIS - GIS in the Rockies 2011
Cloud GIS - GIS in the Rockies 2011chelm
 

En vedette (12)

Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
 
GIS Into to Cloud Microsoft Azure
GIS  Into  to Cloud Microsoft Azure GIS  Into  to Cloud Microsoft Azure
GIS Into to Cloud Microsoft Azure
 
Big Data - in the cloud or rather on-premises?
Big Data - in the cloud or rather on-premises?Big Data - in the cloud or rather on-premises?
Big Data - in the cloud or rather on-premises?
 
Spatial Cloud Computing And Gis Web Version, Urisa October 2012
Spatial Cloud Computing And Gis Web Version, Urisa October 2012Spatial Cloud Computing And Gis Web Version, Urisa October 2012
Spatial Cloud Computing And Gis Web Version, Urisa October 2012
 
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...
OOW16 - Deploying Oracle E-Business Suite for On-Premises Cloud and Oracle Cl...
 
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SC
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SCGIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SC
GIS & Cloud Computing - GAASC 2010 Fall Summit - Florence, SC
 
David Overton: GIS in the cloud
David Overton: GIS in the cloudDavid Overton: GIS in the cloud
David Overton: GIS in the cloud
 
Cloud GIS Software – GEOCIRRUS
Cloud GIS Software – GEOCIRRUSCloud GIS Software – GEOCIRRUS
Cloud GIS Software – GEOCIRRUS
 
How to Build Modern Data Architectures Both On Premises and in the Cloud
How to Build Modern Data Architectures Both On Premises and in the CloudHow to Build Modern Data Architectures Both On Premises and in the Cloud
How to Build Modern Data Architectures Both On Premises and in the Cloud
 
Cloud GIS - GIS in the Rockies 2011
Cloud GIS - GIS in the Rockies 2011Cloud GIS - GIS in the Rockies 2011
Cloud GIS - GIS in the Rockies 2011
 
GIS and the Cloud
GIS and the CloudGIS and the Cloud
GIS and the Cloud
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similaire à Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Explained

Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...Cisco Canada
 
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic #CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic ITSitio.com
 
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...Cisco Canada
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCisco Canada
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...Cisco Canada
 
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018   Cisco Spark hybrid services architectural designCisco Connect Halifax 2018   Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural designCisco Canada
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignMark Milton, PMP
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Canada
 
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural Design
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural DesignCisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural Design
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural DesignCisco Canada
 
Cisco connect winnipeg 2018 hybrid collaboration
Cisco connect winnipeg 2018   hybrid collaborationCisco connect winnipeg 2018   hybrid collaboration
Cisco connect winnipeg 2018 hybrid collaborationCisco Canada
 
18 facets of the OpenAPI specification - Cisco Live US 2023
18 facets of the OpenAPI specification - Cisco Live US 202318 facets of the OpenAPI specification - Cisco Live US 2023
18 facets of the OpenAPI specification - Cisco Live US 2023Cisco DevNet
 
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...Amazon Web Services
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveCisco DevNet
 
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017Cisco
 
AWS November meetup Slides
AWS November meetup SlidesAWS November meetup Slides
AWS November meetup SlidesJacksonMorgan9
 
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIs
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIsForge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIs
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIsAutodesk
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud AgeArtur Alves
 
Coding 102 REST API Basics Using Spark
Coding 102 REST API Basics Using SparkCoding 102 REST API Basics Using Spark
Coding 102 REST API Basics Using SparkCisco DevNet
 

Similaire à Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Explained (20)

Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
 
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic #CiscoLiveLA 2017 Presentacion de Miro Polakovic
#CiscoLiveLA 2017 Presentacion de Miro Polakovic
 
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...Cisco Connect Toronto 2018   cloud and on premises collaboration security exp...
Cisco Connect Toronto 2018 cloud and on premises collaboration security exp...
 
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018   Cisco Spark hybrid services architectural designCisco Connect Halifax 2018   Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural Design
 
Cisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural DesignCisco Spark Hybrid Services Architectural Design
Cisco Spark Hybrid Services Architectural Design
 
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural Design
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural DesignCisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural Design
Cisco Connect Vancouver 2017 - Cisco Spark Hybrid Services Architectural Design
 
Cisco connect winnipeg 2018 hybrid collaboration
Cisco connect winnipeg 2018   hybrid collaborationCisco connect winnipeg 2018   hybrid collaboration
Cisco connect winnipeg 2018 hybrid collaboration
 
18 facets of the OpenAPI specification - Cisco Live US 2023
18 facets of the OpenAPI specification - Cisco Live US 202318 facets of the OpenAPI specification - Cisco Live US 2023
18 facets of the OpenAPI specification - Cisco Live US 2023
 
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...
User Management and App Authentication with Amazon Cognito - SID343 - re:Inve...
 
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep diveTargeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
Targeted Threat (APT) Defense for Applications Featuring pxGrid: a deep dive
 
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017
Embed Spark calling SDK in Your App - Olivier PROFFIT - Cisco Live Berlin 2017
 
AWS November meetup Slides
AWS November meetup SlidesAWS November meetup Slides
AWS November meetup Slides
 
AWS User Group November
AWS User Group NovemberAWS User Group November
AWS User Group November
 
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIs
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIsForge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIs
Forge - DevCon 2016: Building Value-Added Integrations with Autodesk’s IoT APIs
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud Age
 
Coding 102 REST API Basics Using Spark
Coding 102 REST API Basics Using SparkCoding 102 REST API Basics Using Spark
Coding 102 REST API Basics Using Spark
 

Plus de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Dernier (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Explained

  • 1. © 2016 Cisco and/or its affiliates. All rights reserved. 1 Cisco Connect Cloud and On Premises Collaboration Security explained Joseph Bassaly Architect Oct 12th 2017
  • 2. © 2016 Cisco and/or its affiliates. All rights reserved. 2 What will we cover today ? • Cisco Collaboration Elements • Managing Identity • Cisco Spark Security and Compliance • Cisco Spark Network Security
  • 3. © 2016 Cisco and/or its affiliates. All rights reserved. 3 Continuous Workstreams
  • 4. © 2016 Cisco and/or its affiliates. All rights reserved. 4 Messaging Call ControlMeetings Seamless Collaboration Experience Link on-premises assets to the cloud
  • 5. © 2016 Cisco and/or its affiliates. All rights reserved. 5 Cisco Spark
  • 6. © 2016 Cisco and/or its affiliates. All rights reserved. 6 Hybrid Call Service Hybrid Calendar Service Hybrid Directory Service Directory Connector Cisco Expressway Cisco Call Control Call Connector Calendar Connector Hybrid Collaboration Hybrid Media Service MEDIA NODES MEDIA NODES
  • 7. 7© 2016 Cisco and/or its affiliates. All rights reserved. Managing Identity
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. 8 IdP – Identity Provider: RP – Relying Party Users Explicit Initial Trust Agreement Identity Framework 8
  • 9. © 2016 Cisco and/or its affiliates. All rights reserved. 9 Paulo Authentication and Authorization (AuthN and AuthZ) Authentication When you enter a hotel and walk up to reception, the receptionist authenticates you by checking your passport Authorization After authentication has taken place, the receptionist gives you a room key Your room key is your authorization token to enter your room and any resource that you are entitled to in the Hotel You do not need your passport to enter your room. Your room key authorizes you to enter your room only, and not any other rooms. The room key (authorization token) does not identify the holder of the key/token. 9 Authentication verifies that “you are who you say you are” Authorization verifies that “you are permitted to do what you are trying to do”
  • 10. © 2016 Cisco and/or its affiliates. All rights reserved. 10 Authentication and Authorization (SAML and OAuth) Authorization Client Services IdP Authentication
  • 11. © 2016 Cisco and/or its affiliates. All rights reserved. 11 SAML 2.0 Cookies to prevent re-authentication CUCM Identity Provider 2. Redirect with SAML authentication request 6. POST signed response 3.GET with SAML authentication request 1. Resource Request Cisco Jabber 5. Signed response in hiden HTML form with IdP cookie IdP Cookie 7. Supply resource with cookie CUCM Cookie 4. Authentication method define by IdP IdP Cookie WebEx MC Unity Connections
  • 12. © 2016 Cisco and/or its affiliates. All rights reserved. 12 SAML 2.0 Cookies to prevent re-authentication CUCM Identity Provider 2. Redirect with SAML authentication request 5. POST signed response 1. Resource Request Cisco Jabber 4. Signed response in hidden HTML form IdP Cookie CUCM Cookie 3.GET with SAML authentication request with IdP Cookie IdP Cookie No Authentication needed since IdP Cookie is valid 6. Supply resource with cookie WebEx Cookie WebEx MC Unity Connections
  • 13. © 2016 Cisco and/or its affiliates. All rights reserved. 13 An application would like to connect to your account The application “XYZ” would like to access your basic account information. Allow application “XYZ” access? AllowDeny Do these look familiar? Authorize “XYZ” Application? This application will be able to: • Access your basic account information • Read your posts • See your list of contacts Authorize app No, thanks “XYZ” Application This application would like to: • Read and manage your files and documents • View your email address AcceptCancel
  • 14. OAuth Spark Service Customer IdP Access Service Common IdentityCisco Spark Spark Thick Client Embedded Browser Redirect to Authorization Service’ Provides SAML cookie and UID to OAuth Service AuthZ URL Redirect to the AuthN SAML GET Authentication request Authentication Provided SAML POST with uid and IdP cookie POST SAML Assertion Redirect to the Oauth Service with SAML cookie and UID of the user Identity Broker Send back OAuth Token Access_token Access to the Spark Service Authz URL AuthN Request Provide IdP URL for SAML Exchange Validates Assertion and create the SAML SP cookie Verifies Entitlement and Scope for the user and generate OAuth Token
  • 15. 15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Spark Security
  • 16. © 2016 Cisco and/or its affiliates. All rights reserved. 16 Spark Clients The scenario Spark Board Video End Points MEDIA NODES Expressway Existing Services Hybrid Calendar Service Hybrid Call Service Hybrid Directory Service Hybrid Media Service
  • 17. © 2016 Cisco and/or its affiliates. All rights reserved. 17 Spark – User Identity Sync and Authentication Directory Sync User Info can be synchronized to Spark from the Enterprise Active Directory Multiple User attributes can be synchronized Passwords are not synchronized - User : 1) Creates a Spark password or 2) Uses SSO for Auth Identity Service
  • 18. © 2016 Cisco and/or its affiliates. All rights reserved. 18 Spark – SAML SSO Authentication Directory Sync SAML SSO Administrators can configure Spark to work with their existing SSO solution Spark supports Identity Providers using SAML 2.0 and OAuth 2.0 Identity Service IdP
  • 19. © 2016 Cisco and/or its affiliates. All rights reserved. 19 Client Connection Spark Service IdP Identity Service 1) Customer downloads and installs Spark Client (with Trust anchors) 2) Spark Client establishes a secure TLS connection with the Spark Cloud 3) Spark Identity Service prompts for an e- mail ID 4) User Authenticated by Spark Identity Service, or the Enterprise IdP (SSO) 5) OAuth Access and Refresh Tokens created and sent to Spark Client • The Access Tokens contain details of the Spark resources the User is authorized to access 5) Spark Client presents its Access Tokens to register with Spark Services over a secure channel
  • 20. © 2016 Cisco and/or its affiliates. All rights reserved. 20 Spark Device connection Spark ServiceIdentity Service 1) User enters 16 digit activation code received via e-mail from the Spark provisioning service 2) Device authenticated by Identity Service (Trust anchors sent to device and secure connection established) 3) OAuth Access and Refresh Tokens created and sent to Spark Client • The Access Tokens contain details of the Spark resources the User is authorized to access 5) Spark Client presents its Access Tokens to register with Spark Services over a secure channel 1234567890123456
  • 21. 21© 2016 Cisco and/or its affiliates. All rights reserved. Spark Secure Messages and Content
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. 22 Content Server Key Mgmt Service message messagemessage filefile message Spark - Encrypting Messages and Content Spark Clients request a conversation encryption key from the Key Management Service Any messages or files sent by a Client are encrypted before being sent to the Spark Cloud Each Spark Room uses a different Conversation Encryption key Key Management Service AES256-GCM cipher used for Encryption
  • 23. © 2016 Cisco and/or its affiliates. All rights reserved. 23 Encrypted messages sent by a Client are stored in the Spark Cloud and also sent on to every other Client in the Spark Room Key Mgmt Service messagemessagemessage Content Server message messagemessage Spark - Decrypting Messages and Content If needed, Spark Clients can retrieve encryption keys from the Key Management Service Key Management Service The encrypted message also contains a link to the conversation encryption key
  • 24. 24© 2016 Cisco and/or its affiliates. All rights reserved. Spark Secure Search and Indexing
  • 25. © 2016 Cisco and/or its affiliates. All rights reserved. 25 Indexing Service Spark IS the messageSparkIS themessage Content Server Spark IS the message Key Mgmt Service ################### Searching Spark Rooms : Building a Search Index The Indexing Service : Enables users to search for names and words in the encrypted messages stored in the Content Server A Search Index is built by creating a fixed length hash* of each word in each message within a Room ################### B957FE48 B9 57 FE 48 Hash Algorithm ################### Indexing Service The hashes for each Spark Room are stored by the Content Service ################### * A new (SHA-256 HMAC) hashing key (Search Key) is used for each room
  • 26. © 2016 Cisco and/or its affiliates. All rights reserved. 26 Indexing Service “Spark”Spark Content Server Key Mgmt Service ################### Searching Spark Rooms : Querying a Search Index Search for the word “Spark” Client sends search request over a secure connection to the Indexing Service The Content Server searches for a match in it’s Hash tables and returns matching content to the client * ################### B957FE48 B9 57 FE 48 Hash Algorithm Indexing Service “Spark” Search for the word “Spark” “B9” B9 57 FE 48 ###################################### Spark IS the Message B9 The Indexing Service uses Per Room Search keys to hash the search terms *A link to Conversation Encryption Key is sent with encrypted message
  • 27. 27© 2016 Cisco and/or its affiliates. All rights reserved. Spark E-Discovery
  • 28. © 2016 Cisco and/or its affiliates. All rights reserved. 28 Cloud Collaboration Management Portal Indexing Service Jo Smith’s ContentJo Smith’s Content Content Server Key Mgmt Service ################### Spark Compliance Service : E-Discovery Administrator selects a group of messages and files to be retrieved for E- Discovery e.g. : based on date range/ content type/ user(s) The Content Server returns matching content to the Compliance Service ################### X1GFT5YYHash Algorithm Indexing Service Jo Smith’s Content “X1GFT5YY” Jo Smith’s Content ################### X1GFT5YY The Indexing Service searches Content Server for related content Compliance Service ################### Jo Smith’s Content ################### Jo Smith’s Content ###################
  • 29. © 2016 Cisco and/or its affiliates. All rights reserved. 29 E-Discov. Storage Compliance ServiceContent Server Key Mgmt Service Spark Compliance Service : E-Discovery The Compliance Service : Decrypts content from the Content Server, then compresses and re-encrypts it before sending it to the E- Discovery Storage Service The E-Discovery Storage Service : Sends the compressed and encrypted content to the Administrator on request Compliance Service Cloud Collaboration Management Portal Jo Smith’s Content################### Jo Smith’s Content################### Jo Smith’s Content################### Jo Smith’s Messages and Files ################### ################### ################ ################### ################### ################ Jo Smith’s Messages and Files E-Discovery Content Ready
  • 30. © 2016 Cisco and/or its affiliates. All rights reserved. 30 3rd Party Integrations Cisco has developed key relationships with leading Cloud Access Security Brokers (CASB), compliance, archival and security vendors to enhance Cisco Spark and deliver key enterprise-grade features: Compliance and Archiving Archive content to comply with retention requirements and enable eDiscovery Data Loss Prevention Apply policies to content, violation alerts, and take remediation actions Identity Management Single Sign-On via SAML, Mobile Device Management (MDM), SCIM user provisioning and deactivation
  • 31. 31© 2016 Cisco and/or its affiliates. All rights reserved. Spark Hybrid Data Security
  • 32. © 2016 Cisco and/or its affiliates. All rights reserved. 32 Secure Data Center Content Server Key Mgmt Service Spark – Hybrid Data Security (HDS) Compliance ServiceIndexing Service Hybrid Data Security Hybrid Data Services = On Premise : Key Management Server Indexing Server E-Discovery Service
  • 33. © 2016 Cisco and/or its affiliates. All rights reserved. 33 Secure Data Center Content Server Key Mgmt Service Hybrid Data Security traffic and Firewalls Compliance ServiceIndexing Service Hybrid Data Services make outbound connections only from the Enterprise to the Spark cloud, using HTTPS and Secure WebSockets (WSS) No special Firewall configuration required Firewall Hybrid Data Security
  • 34. © 2016 Cisco and/or its affiliates. All rights reserved. 34 Secure Data Center Content Server Key Mgmt Server Spark – Hybrid Data Security: Key Management The Hybrid Key Management Server performs the same functions as the Cloud based Key Management Server Now all of the keys for messages and content are owned and managed by the Customer BUT Key Management Service Key Mgmt Service
  • 35. © 2016 Cisco and/or its affiliates. All rights reserved. 35 Secure Data Center Content Server The Hybrid Data Security is managed and upgraded from the cloud Customer’s can access usage information for the HDS Servers via the cloud management portal Multiple HDS servers can be provisioned for Scalability & Load Sharing Key Mgmt ServerKey Mgmt Service Hybrid Data Security - Scalability Hybrid Data Security Hybrid Data Security Hybrid Data Security
  • 36. © 2016 Cisco and/or its affiliates. All rights reserved. 36 Secure Data Center Key Mgmt Service Content Server Key Mgmt Service message messagemessagemessage HDS - Encrypting Messages & Content Spark Clients request an encryption key from the Hybrid Key Management Server Any messages or files sent by a Client are encrypted before being sent to the Spark Cloud Encrypted messages and content stored in the cloud Key Management Service Encryption Keys stored locally
  • 37. © 2016 Cisco and/or its affiliates. All rights reserved. 37 Secure Data Center Key Mgmt Service Encrypted messages from Clients are stored in the Spark Cloud Key Mgmt Service message Content Server message messagemessage If needed, Spark Clients can retrieve encryption keys from the Hybrid Key Management Server Key Management Service These messages are sent to every other Client in the Spark Room and contain a link to their encryption key on the Hybrid Key Management Server HDS - Decrypting Messages & Content
  • 38. © 2016 Cisco and/or its affiliates. All rights reserved. 38 Secure Data Center Indexing Service Spark IS the messageSparkIS themessage Content Server Spark IS the message Key Mgmt Service ################### The Indexing Service : Enables users to search for names and words in the encrypted messages stored in the Content Server ################### B957FE48 B9 57 FE 48 Hash Algorithm ################### Indexing Service ################### * A new hashing key (Search Key) is used for each room Hybrid Data Security: Search Indexing Service
  • 39. © 2016 Cisco and/or its affiliates. All rights reserved. 39 Secure Data Center Indexing Service “Spark”Spark Content Server Key Mgmt Service ################### Hybrid Data Security: Querying a Search Index Search for the word “Spark” Client sends its search request over a secure connection to the Indexing Service ################### B9 B9 57 FE 48 Hash Algorithm Indexing Service “Spark” Search for the word “Spark” “B9” B9 57 FE 48 ###################################### Spark IS the Message B9 *A link to Conversation Encryption Key is sent with the encrypted message
  • 40. © 2016 Cisco and/or its affiliates. All rights reserved. 40 Secure Data Center Indexing Service Content Server Spark Compliance Service : E-Discovery X1GFT5YY Indexing Service Jo Smith’s ContentJo Smith’s ContentJo Smith’s Content Key Mgmt ServiceCompliance Service Cloud Collaboration Management Portal ############################################################################ ######################################Jo Smith’s Content Jo Smith’s ContentJo Smith’s Content“X1GFT5YY”X1GFT5YY Hash Algorithm Admin selects a group of messages and files to be retrieved for E-Discovery e.g. : based on date range/ content type/ user(s) The Content Server returns matching content to the Compliance Service The Indexing Service searches the Content Server for selected content
  • 41. © 2016 Cisco and/or its affiliates. All rights reserved. 41 Secure Data Center Key Mgmt ServiceCompliance Service Cloud Collaboration Management Portal E-Discov. StorageContent Server Spark Compliance Service : E-Discovery The Compliance Service : Decrypts content from the Content Server, then compresses and re-encrypts it before sending it to the E- Discovery Storage Service E-Discovery Storage Service : Sends the compressed and encrypted content to the Administrator on request Jo Smith’s Content################### Jo Smith’s Content################### Jo Smith’s Content################### Jo Smith’s Messages and Files ################### ################### ################ ################### ################### ################ Jo Smith’s Messages and Files E-Discovery Content Ready
  • 42. 42© 2016 Cisco and/or its affiliates. All rights reserved. Key Management Server Federation
  • 43. © 2016 Cisco and/or its affiliates. All rights reserved. 43 Hybrid Key Management Servers in different Enterprises establish a Mutual TLS* connection via the Spark Cloud Key Mgmt ServiceKey Mgmt Service Content Server Key Mgmt Service HDS: Key Management Server Federation Enterprise A Enterprise B Hybrid Key Management Servers make outbound connections only : HTTPS, Web Socket Secure (WSS) *All connections to and within the Spark Cloud use ECDH to generate symmetric Encryption Keys
  • 44. © 2016 Cisco and/or its affiliates. All rights reserved. 44 With a secure connection between Hybrid KMSs… Users can be added to rooms created by each Enterprise Key Mgmt ServiceKey Mgmt Service Content Server Key Mgmt Service HDS: Key Management Server Federation Enterprise A Enterprise B Mutually Authenticated Hybrid KMSs can request Room Encryption Keys from one another on behalf of their Users
  • 45. 45© 2016 Cisco and/or its affiliates. All rights reserved. Cloud Collaboration Network Security
  • 46. © 2016 Cisco and/or its affiliates. All rights reserved. 46 • VLANs • Switch Port VLAN configuration and device requirements • Firewalls • Whitelists for Spark clients, devices and Services • Media support – UDP/TCP/HTTP • HTTP Proxies • Proxy Types and Proxy Detection • Proxy Authentication Methods ( Basic/Digest/ NTLM/ Negotiate/Kerberos) Auth Bypass • Proxy TLS/ HTTPS traffic inspection – Certificate Pinning • 802.1X – Authentication Methods EAP-FAST/ EAP-TLS, MAC Address Bypass Cloud Collaboration Network Security Primer
  • 47. 47© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Spark Cloud Access Enterprise VLANs
  • 48. © 2016 Cisco and/or its affiliates. All rights reserved. 48 Connecting from the Enterprise - VLANs How are the switch ports configured ? Minimum Enterprise Network Requirements : Internet Access DHCP, DNS server access Internal TCP connectivity and ICMP to devices for support ??? • Single static untagged VLAN ? • Dynamic VLAN assignment based on CDP/LLDP TLV values ? • Multiple static VLANs (e.g. Data VLAN & Aux VLAN) ? – 802.1Q VLAN tagging required for the Auxiliary VLAN
  • 49. © 2016 Cisco and/or its affiliates. All rights reserved. 49 Network Capabilities Spark Devices – CDP/LLDP, 802.1Q Spark Device Protocol Software Train CDP/ LLDP 802.1Q Ethernet PC Port Granular Configuration Windows, Mac, iOS, Android, Web HTTPS WME No/ No N/A N/A Static Untagged (Data) VLAN DX HTTPS Room OS Yes/ No Yes Yes Dynamic VLAN assignment, 802.1Q Tagging, Connected PC supported Room Kit, MX, SX HTTPS Room OS Yes/ No Yes No Dynamic VLAN assignment, 802.1Q Tagging Spark Board HTTPS Spark Board OS Yes/ No Yes No Dynamic VLAN assignment, 802.1Q Tagging
  • 50. © 2016 Cisco and/or its affiliates. All rights reserved. 50 Connecting from the Enterprise - Firewalls Whitelisted Ports and Destinations : Media Port Ranges: Source UDP Ports : Voice 52000 - 52099, Video 52100- 52299 Source TCP/ HTTP Ports : Ephemeral ( => No DSCP re-marking) Destination UDP/ TCP/ HTTP Port : 5004, 5006 Destination IP Addresses : Any • Spark Call (7800, 8800 Phones) • Spark Desk and Room Devices • Spark Clients • See following slides for details Signalling Media
  • 51. © 2016 Cisco and/or its affiliates. All rights reserved. 51 Voice and Video Classification and Marking Port Range Summary – Endpoints and Clients Audio: 52000-52099 Spark Soft Clients Spark Devices Video: 52100-52299 52000 - 52049 52050 - 52099 52100 - 52199 52200 - 52299
  • 52. © 2016 Cisco and/or its affiliates. All rights reserved. 52 Spark Apps : Network Port and Whitelist Requirements Spark Device Protocol Source Ports Destination Ports Destination Function Spark applications : Windows, Mac, iOS, Android, Web UDP Voice 52000 – 52049 Video 52100 – 52199 Exception - Windows (OS Firewall issue) Ephemeral source ports used today (Fix due by Q3 CY '17) 5004 & 5006 Any IP Address SRTP over UDP to Spark Cloud Media Nodes TCP Ephemeral 5004 & 5006 Any IP Address SRTP over TCP or HTTP to Spark Cloud Media Nodes TCP Ephemeral 443 identity.webex.com idbroker.webex.com *.wbx2.com *.webex.com *.ciscospark.com *.clouddrive.com *.rackcdn.com *.crashlytics.com *.mixpanel.com *.appsflyer.com *.adobetm.com *.omtrdc.net *.optimizely.com HTTPS Spark Identity Service OAuth Service Core Spark Services Identity management Core Spark Services Content and Space Storage Content and Space Storage Anonymous crash data Anonymous Analytics Mobile Clients only - Ad Analytics Web Clients only - Analytics Web Clients only - Telemetry Web Clients only - Metrics
  • 53. © 2016 Cisco and/or its affiliates. All rights reserved. 53 Spark Devices : Network Port and Whitelist Requirements Spark Device Protocol Source Ports Destination Ports Destination Function Desktop and Room Systems : SX Series DX Series MX Series Room Kits Spark Boards* UDP Voice 52050 – 52099 Video 52200 – 52299 EFT Today GA Q3 CY '17 5004 & 5006 Any IP Address SRTP over UDP to Spark Cloud Media Nodes TCP Ephemeral 5004 & 5006 Any IP Address SRTP over TCP or HTTP to Spark Cloud Media Nodes* (Not Spark Board) TCP Ephemeral 443 identity.webex.com idbroker.webex.com *.wbx2.com *.webex.com *.ciscospark.com *.clouddrive.com *.rackcdn.com *.crashlytics.com *.mixpanel.com *dropboxusercontent.com HTTPS Spark Identity Service OAuth Service Core Spark Services Identity management Core Spark Services Content and Space Storage Content and Space Storage Anonymous crash data Anonymous Analytics *Spark Board (firmware updates)
  • 54. © 2016 Cisco and/or its affiliates. All rights reserved. 54 Connecting from the Enterprise - Firewalls Media Port Ranges: Source UDP Ports : Voice and Video 33434 - 33598 Source TCP/ HTTP Ports : Ephemeral ( => No DSCP re-marking) Destination UDP/ TCP/ HTTP Port : 5004 Destination IP Addresses : Any Hybrid Media Node (HMN) : • Can be used to limit source IP address range to HMNs only • Hybrid Media Node Source UDP ports for voice and video are different to those used by endpoints – Used for cascade links to the Spark Cloud • Voice and Video use a common UDP source port range : 33434 - 33598 Signalling Media
  • 55. © 2016 Cisco and/or its affiliates. All rights reserved. 55 Connecting from the Enterprise - Firewalls Hybrid Data Security Node (HDS) : • Key Management Service • Indexing (Search) Service • E-Discovery Service Signalling Media Hybrid Data Services • HDS Signaling Traffic Only • Outbound HTTPS and WSS Signaling Only
  • 56. © 2016 Cisco and/or its affiliates. All rights reserved. 56 HMN & HDS Nodes: Network Port & Whitelist Requirements Spark Device Protocol Source Ports Destination Ports Destination Function Hybrid Media Node (HMN) UDP Voice and Video use a common UDP source port range : 33434 - 33598 5004 Cascade Destination Any IP Address Cascaded SRTP over UDP Media Streams to Cloud Media Nodes TCP Ephemeral 5004 Cascade Destination Any IP Address Cascaded SRTP over TCP/HTTP Media Streams to Cloud Media Nodes TCP Ephemeral 123, 53, 444 Any NTP, DNS, HTTPS TCP Ephemeral 443 *wbx2.com *idbroker.webex.com HTTPS Configuration Services Hybrid Data Security Node (HDS) TCP Ephemeral 443 *.wbx2.com idbroker.webex.com identity.webex.com index.docker.io Outbound HTTPS and WSS
  • 57. © 2016 Cisco and/or its affiliates. All rights reserved. 57 What do we send to Third Party sites? Site Clients that Access It What is sent there User PII? Anonymized Usage info? Encrypted User Generated Content *.clouddrive.com Win, Mac, iOS, Android, Web, Spark Board Encrypted files for Spark file sharing. Part of Rackspace content system. N N Y *.rackcdn.com Win, Mac, iOS, Android, Web, Spark Board Encrypted files for Spark file sharing. Part of Rackspace content system. N N Y *.mixpanel.com Win, Mac, iOS, Android, Web Anonymous usage data N Y N *.appsflyer.com iOS, Android Anonymous usage data related to onboarding N Y N *.adobedtm.com Web Anonymous usage data N Y N *.omtrdc.net Web Anonymous usage data N Y N *.optimizely.com Web Anonymous usage data for AB testing N Y N
  • 58. 58© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Spark Cloud Access Enterprise Proxies
  • 59. © 2016 Cisco and/or its affiliates. All rights reserved. 59 • Proxy Address given to Device/Application………. Connecting from the Enterprise - Proxy Types Proxy Types: • Transparent Proxy (Device/Application is unaware of Proxy existence) • In Line Proxies (e.g. Combined Proxy and Firewall) • Traffic Redirection (e.g. Using Cisco WCCP) Signalling UDP Media HTTP/HTTPS traffic only sent to the Proxy server e.g. Destination ports 80, 443, 8080, 8443
  • 60. © 2016 Cisco and/or its affiliates. All rights reserved. 60 • Proxy Detection (Proxy Address given to Device/Application) Connecting from the Enterprise – Proxy Detection • Manual Configuration • Auto Configuration (Proxy Auto Conf (PAC) files) Proxy Address Proxy Address Proxy Address PACPACPAC Signalling UDP Media
  • 61. © 2016 Cisco and/or its affiliates. All rights reserved. 61 Network Capabilities Spark Devices – Proxy Detection Spark Device Protocol Software Train Proxy Detection Granular Configuration Windows, Mac, iOS, Android, Web HTTPS WME Yes : Manual Yes : PAC Files Manually Configure Proxy Address or Use PAC files (or Windows GPO) DX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device Web interface SX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device Web interface MX HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device Web interface Room Kits HTTPS Room OS Yes : Manual using Web access Configure Proxy Address via device Web interface Spark Board HTTPS Spark Board OS Yes : Manual Configuration Manual Configuration of Proxy Address
  • 62. © 2016 Cisco and/or its affiliates. All rights reserved. 62 • Proxy Authentication Connecting from the Enterprise – Proxy Authentication • Proxy intercepts outbound HTTP request • Authenticates the User (Username & Password) • Authenticated User’s traffic forwarded • Unauthenticated User’s traffic dropped/blocked Signalling UDP Media Proxy Authentication is not mandatory, Many Enterprises do No Authentication
  • 63. © 2016 Cisco and/or its affiliates. All rights reserved. 63 • Basic Authentication Common Proxy Authentication Methods • Digest Authentication • NTLMv2 Authentication • Negotiate Authentication • Kerberos Signalling UDP Media
  • 64. © 2016 Cisco and/or its affiliates. All rights reserved. 64 • Basic Authentication Proxy Authentication Methods – Basic Authentication • Uses standard HTTP Headers • Username and Password Base64 encoded • Username and Password are NOT encrypted or hashed • Basic Username and Password challenge for devices • i.e. Devices are not Users (no human interaction) • Create one account (e.g. LDAP account) for all devices • Create an account per device • No Password Expiration Signalling UDP Media
  • 65. © 2016 Cisco and/or its affiliates. All rights reserved. 65 • Digest Authentication Proxy Authentication Methods – Digest Authentication • Uses standard HTTP Headers • Username and Password are not sent • A Hash of the Username and Password is sent instead • Basic Username and Password challenge for devices • i.e. Devices are not Users (no human interaction) • Create one account (e.g. LDAP account) for all devices • Or create an account per device • No Password Expiration Signalling UDP Media
  • 66. © 2016 Cisco and/or its affiliates. All rights reserved. 66 • NT LAN Manager (NTLM) Authentication Proxy Authentication Methods – NTLMv2 (Windows Only) • Microsoft Challenge/Response AuthN. protocol • Username sent in plain text • Challenge/Nonce sent from the server • Password hash used to encrypt the challenge and return it to the server • Password hashed but not sent • Windows based Username and Password challenge for devices • i.e. Devices are not Users (no human interaction) • Create one account (AD account) for all devices • Or create an account per device • No Password Expiration Signalling UDP Media
  • 67. © 2016 Cisco and/or its affiliates. All rights reserved. 67 Proxy Authentication Methods – Negotiate/IWA (Windows Only) • Negotiate Authentication • Microsoft implementation of SPNEGO • Simple and Protected GSSAPI Negotiation Mechanism. (Generic Security Service API) • Kerberos or fallback to • NTLM • Negotiates the use of either : • Windows based Username and Password challenge for devices • i.e. Devices are not Users (no human interaction) • Create one account (AD account) for all devices • Or create an account per device • No Password Expiration Signalling UDP Media IWA - Integrated Windows Access
  • 68. © 2016 Cisco and/or its affiliates. All rights reserved. 68 • Kerberos Authentication Proxy Authentication Methods – Kerberos • Strongest Security • Client, Authentication Key Distribution Service, Ticket Granting Service, Application Server • Encrypted communication based on shared Secrets • Client authenticates with the Authentication service • Once authenticated, receives a Ticket Granting Ticket (TGT) • Client requests access to a service (e.g. the Proxy) by presenting the TGT to the Ticket Granting Service – the TGS authenticates the client and returns an encrypted Service Ticket • The Client presents the Service Ticket to Proxy which validates the user (using the shared secret) • HTTPS connection proceeds Signalling UDP Media
  • 69. © 2016 Cisco and/or its affiliates. All rights reserved. 69 Proxy Authentication Bypass Methods Manually Configure Proxy Server with : • Device IP Address IP Address 10.100.200.1 Signalling UDP Media 10.100.200.3 identity.webex.com idbroker.webex.com *.wbx2.com *.webex.com *.ciscospark.com *.clouddrive.com *.crashlytics.com *.mixpanel.com *.rackcdn.com • Whitelisted Destinations (e.g. *ciscospark.com)
  • 70. © 2016 Cisco and/or its affiliates. All rights reserved. 70 Network Capabilities Spark Devices – Proxy Authentication Spark Device Protocol Software Train Proxy Authentication Granular Configuration Windows, Mac, iOS, Android, Web HTTPS WME Basic - No Digest - No NTLM - Yes (Windows) Kerberos - No Windows Only Today Others OSs use Authentication By Pass (Basic/ Digest/ Kerberos – Planned) DX HTTPS Room OS Yes : Basic Auth – Web based Config Digest Auth - planned Configure Username and Password for Proxy Authentication (Basic Auth) SX HTTPS Room OS Yes : Basic Auth – Web based Config Digest Auth - planned Configure Username and Password for Proxy Authentication (Basic Auth) MX HTTPS Room OS Yes : Basic Auth – Web based Config Digest Auth - planned Configure Username and Password for Proxy Authentication (Basic Auth) Room Kits HTTPS Room OS Yes : Basic Auth – Web based Config Digest Auth - planned Configure Username and Password for Proxy Authentication (Basic Auth) Spark Board HTTPS Spark Board OS Yes : Basic Auth - Manual Configuration Configure Username and Password for Proxy Authentication (Basic Auth)
  • 71. © 2016 Cisco and/or its affiliates. All rights reserved. 71 • HTTPS/TLS Inspection Proxy TLS/HTTPS Inspection – Non Spark Apps (1) • Private CA signed Certificate sent to client on connection establishment • Client compares Private CA Root Cert with those received in Cert Chain • If they match – accept and proceed with the TLS connection Private CA Root Certificate sent to client Signalling UDP Media
  • 72. © 2016 Cisco and/or its affiliates. All rights reserved. 72 • HTTPS/TLS Inspection Proxy TLS/HTTPS Inspection – Non Spark Apps (2) • Proxy starts new HTTPS/TLS connection to Web/Cloud Service • Proxy receives Certificate from Web/Cloud Service • Proxy uses the Certificate to establish Secure TLS/HTTPS connection • Proxy can now Decrypt, Inspect and Re-Encrypt session traffic Signalling UDP Media
  • 73. © 2016 Cisco and/or its affiliates. All rights reserved. 73 • Certificate Pinning HTTP Proxy - No HTTPS Inspection – Spark Certificate Pinning • CA signed Cisco Spark Certificate sent by HTTPS/TLS server • Client creates a hash of the Cert’s Public Key • If they match – accept and proceed with the TLS connection Certificate Pin = SHA 256 Hash of CA Root Certificate Public Key VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8=• Client compares the hash with the Certificate Pin in its Trust Store Signalling UDP Media
  • 74. © 2016 Cisco and/or its affiliates. All rights reserved. 74 • Certificate Pinning Proxy - HTTPS Inspection – Spark Certificate Pinning • Proxy sends Private CA signed Certificate during HTTPS/TLS set up • Client creates a hash of the Private CA signed Cert’s Public Key • They DO NOT Match : TLS connection terminated • Client compares the hash with the Certificate Pin in its Trust Store Certificate Pin = SHA 256 Hash of CA Root Certificate Public Key VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8= Signalling UDP Media
  • 75. © 2016 Cisco and/or its affiliates. All rights reserved. 75 • Certificate Pinning HTTPS Inspection – Spark Devices Cert. Pinning Fix • Proxy sends Private CA signed Certificate during HTTPS/TLS set up • Client creates a hash of the Private CA signed Cert’s Public Key • They DO Match : Proceed with TLS connection • Client compares the hash with the Certificate Pin in its Trust Store Certificate Pin = SHA 256 Hash of Private CA Root Certificate Public Key VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8= • HTTPS/TLS Inspection possible Signalling UDP Media • Private CA Cert copied to Spark Cloud
  • 76. © 2016 Cisco and/or its affiliates. All rights reserved. 76 • Certificate Pinning HTTPS Inspection – Spark Clients Cert. Pinning Fix • Proxy sends Private CA signed Certificate during HTTPS/TLS set up • Spark App checks to see if a copy of the Private CA Cert exists in the OS Trust Store • Proceed with TLS connection • If the Cert exists – skip Certificate pinning process Certificate Pin = SHA 256 Hash of Spark CA Root Certificate Public Key VjLZe/p3W/PJnd6lL8JVNBCGQBZynFLdZSTIqcO0SJ8= • HTTPS/TLS Inspection possible Signalling UDP Media • Private CA Cert copied to Client OS Trust Store
  • 77. © 2016 Cisco and/or its affiliates. All rights reserved. 77 Network Capabilities Spark Devices – HTTPS Inspection Spark Device Protocol Software Train Supports TLS /HTTPS Inspection Cert Validation Method Windows, Mac, Web HTTPS WME Yes : Win/Mac/Browser If Enterprise Certificate exists, then bypass Certificate Pinning process iOS, Android HTTPS WME No : iOS Android HTTPS Inspection By-Pass DX HTTPS Room OS Yes – Requires Per Org Config of Identity Service Load Private CA Certs in Spark Service Download Trust List with Private Certs SX HTTPS Room OS Yes – Requires Per Org Config of Identity Service Load Private CA Certs in Spark Service Download Trust List with Private Certs MX HTTPS Room OS Yes – Requires Per Org Config of Identity Service Load Private CA Certs in Spark Service Download Trust List with Private Certs Room Kits HTTPS Room OS Yes – Requires Per Org Config of Identity Service Load Private CA Certs in Spark Service Download Trust List with Private Certs Spark Board HTTPS Spark Board OS No (Planned Q3 CY '17) HTTPS Inspection By-Pass
  • 78. 78© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Spark Cloud Access Network Access Control 802.1X
  • 79. © 2016 Cisco and/or its affiliates. All rights reserved. 79 Connecting from the Enterprise – 802.1X 802.1X Operation ??? • Switch port network access restricted • Client presents credentials to Authentication Server • After successful Authentication – switch port configured for the Device e.g. VLAN(s), ACLs Authentication Server
  • 80. © 2016 Cisco and/or its affiliates. All rights reserved. 80 802.1X Network Authentication Methods 802.1X Network Authentication Methods : ? • There are many options…. • Two key Authentication methods : • EAP-FAST • EAP-TLS Authentication Server Username Password
  • 81. © 2016 Cisco and/or its affiliates. All rights reserved. 81 802.1X Network Authentication : EAP-FAST 802.1X Extensible Authentication Protocol - FAST ? • Flexible Authentication via Secure Tunneling • Username and Password based • Does not require Certificates Username Password Username Password Authentication Server
  • 82. © 2016 Cisco and/or its affiliates. All rights reserved. 82 802.1X Network Authentication : EAP-TLS 802.1X Extensible Authentication Protocol - TLS ? • Transport Layer Security • Requires Digital Certificates • Mutual Client - Server Authentication Authentication Server
  • 83. © 2016 Cisco and/or its affiliates. All rights reserved. 83 802.1X Fallback - MAC Address Bypass (MAB) Bypasses 802.1X Authentication Mechanisms ? • Uses the Device MAC Address • Commonly used for Non 802.1X capable devices • MAC address manually entered into Auth. Server Phone 1 MAC AA:BB:CC:11:22:33 Authentication Server Phone 1 AA:BB:CC:11:22:33
  • 84. © 2016 Cisco and/or its affiliates. All rights reserved. 84 Network Capabilities Spark Devices – 802.1X Spark Device Protocol Software Train EAP-FAST EAP-TLS MIC Non CUCM LSC Certificate Installation Capability Granular Configuration Windows, Mac, iOS, Android, Web HTTPS WME Wi-Fi - Yes Wired - Yes Wi-Fi - Yes Wired - Yes N/A Yes Yes Manually Install LSC (Windows GPO, Mac – Configuration Profiles) DX HTTPS Room OS Wi-Fi - Yes Wired - Yes Wi-Fi - Yes Wired – Yes 2H CY17 Yes Yes Web Based Install Enterprise LSC via device Web Interface SX HTTPS Room OS Wired - Yes Wired – Yes No Yes Yes Web Based Install Enterprise LSC via device Web Interface MX HTTPS Room OS Wired - Yes Wired – Yes No Yes Yes Web Based Install Enterprise LSC via device Web Interface Room Kits HTTPS Room OS Wi-Fi - Yes Wired - Yes Wi-Fi - Yes Wired – Yes Yes Yes Yes Web Based Install Enterprise LSC via device Web Interface Spark Board HTTPS Spark Board OS No (Planned Q3 CY '17) No (Planned Q3 CY '17) No No (Planned Q3 CY '17) Use MAC Address By-Pass