Lab Guide ISE 1 2 Bootstrap
Lab Guide ISE 1 2 Bootstrap
Lab Guide ISE 1 2 Bootstrap
Nexus
Lab Overview
The student will install ISE, and use the Setup Wizard to get the basic configuration needed for
wired user authentication and verify the user authentication. The student will also configure a
wired switch using the CLI commands list generated by the Setup Wizard.
Lab participants should be able to complete the lab within the allotted lab time of 2 hours.
Lab Exercises
This lab guide includes the following exercises:
Product Overview
The Cisco Secure Access and TrustSec is the Borderless Network access control solution,
providing visibility into and control over devices and users in the network.
Within this solution, Cisco Identity Service Engine (ISE) is a context aware identity-based platform
that gathers real-time information from the network, users, and devices. ISE then uses this
information to make proactive governance decisions by enforcing policy across the network
infrastructure utilizing built in standard based controls. Cisco ISE offers:
Security: Secures your network by providing real-time visibility into and control over the users
and devices on your network.
Compliance: Enables effective corporate governance by creating consistent policy across an
infrastructure.
Efficiency: Helps increase IT and network staff productivity by automating traditionally laborintensive tasks and streamlining service delivery.
Enablement: Allows IT to support a range of new business initiatives, such as bring your own
device (BYOD), through policy-enabled services.
Lab Topology
Name/Hostname
IP Address
3k-access.demo.local
10.1.100.1
3k-data.demo.local
10.1.129.3
wlc.demo.local
10.1.100.61
ap.demo.local
10.1.90.x/24 (DHCP)
ASA (5515-X)
asa.demo.local
10.1.100.2
ISE Appliance
ise-1.demo.local
10.1.100.21
ise-feedserver.demo.local
10.1.100.41
AD (AD/CS/DNS/DHCP)
ad.demo.local
10.1.100.10
NTP Server
ntp.demo.local
128.107.212.175
MobileIron
mobileiron.demo.local
10.1.100.15
mail.demo.local
10.1.100.40
LOB Web
lob-web.demo.local
10.1.129.12
portal.demo.local, updates.demo.local
10.1.129.8
business.demo.local
10.1.129.9
it.demo.local
10.1.129.10
records.demo.local
10.1.129.11
LOB DB
lob-db.demo.local
10.1.129.20
admin.demo.local
10.1.100.6
ftp.demo.local
Windows 7 Client PC
w7pc-guest.demo.local
10.1.50.x/24 (DHCP)
VLAN Name
IP Subnet
Description
10
ACCESS
10.1.10.0/24
20
MACHINE
10.1.20.0/24
IC-ASA-ACCESS
10.1.29.0/24
30
QUARANTINE
10.1.30.0/24
40
VOICE
10.1.40.0/24
Voice VLAN
50
GUEST
10.1.50.0/24
90
AP
10.1.90.0/24
Wireless AP VLAN
100
Management
10.1.100.0/24
129
WEB
10.1.129.0/24
130
DB
10.1.130.0/24
(29)
Note:
Dedicated VLANs have been preconfigured for optional access policy assignments based on user identity,
profiling, or compliance status. These VLANs include MACHINE, QUARANTINE, and GUEST. The labs will
focus on the use of downloadable ACLs (dACLs) rather than VLAN assignment for policy enforcement.
Account (username/password)
admin / ISEisC00L
admin / ISEisC00L
admin / ISEisC00L
ASA (5515-X)
admin / ISEisC00L
ISE Appliances
admin / ISEisC00L
AD (CS/DNS/DHCP/DHCP)
admin / ISEisC00L
Web Servers
admin / ISEisC00L
admin / ISEisC00L
Windows 7 Client
W7PC-1\admin / ISEisC00L
(Local = W7PC-guest )
DEMO\admin / ISEisC00L
(Domain = DEMO)
DEMO\employee1 / ISEisC00L
To access the lab, you must first connect to the Admin PC. The Admin PC provides a launching point for
access to all the other lab components
Note:
Admin PC access is through RDP, therefore you must have an RDP client installed on your computer
Connect to a POD
Step 1
In the LabOps student portal, click on the Topology tab. Click on the Admin PC, then click on
the RDP Client option that appears:
Step 2
Clicking on this option should launch your RDP client and connect you to the Admin PC. Log in
as admin / ISEisC00L
Note: All lab configurations can be performed from the Admin client PC.
During the lab exercises, you may need to access and manage the computers running as virtual
machines.
Step 1
From the Admin client PC, click the VMware vSphere Client icon on the taskbar
Step 2
Step 3
Once logged in, you will see a list of VMs that are available on your ESX server.
Note: p##_admin VM may not be visible when you login as the student.
Step 4
Note: ## refers to the pod number that you are assigned to. E.g., For POD 2, p##_ad would be p02_ad.
Step 5
You have the ability to power on, power off, or open the console (view) these VMs.
Note: This is for information purpose only. All the required VMs are already turned on. So, DONOT turn on any other
VMs.
To do so, place the mouse cursor over VM name in the left-hand pane and right-click to select
one of these options:
Step 6
Step 7
To login to a Windows VM, select Guest > Send Ctrl+Alt+del from the VM Console menu:
Step 2
Step 3
b. Select the device that youd like to log into and double click on it.
c.
If prompted, click Yes to cache the server host key and to continue login.
d. Login using the credentials listed in the Accounts and Passwords table.
To perform a basic connectivity test for the primary lab devices, run the pingtest.bat script from
the Windows desktop of the Admin client PC:
Step 2
Verify that ping succeeds for all devices tested by the script.
Note:
The ping test may fail for VMs that have not yet completed the boot process.
starting the installation process which installs the operating system and ISE application.
the installation pauses and a setup dialog must be completed before the installation
resumes and completes.
Exercise Objective
In this exercise, you will
Log in to the virtual machine console of the VM named p##_ise-1-bootstrap. You should see
the following prompt:
ise-1 login:
Step 2
Note:
Step 3
Enter show run to confirm the setup settings you entered, and also to see other settings and
their default values.
Step 4
10
refid
delay
offset
jitter
==============================================================================
127.127.1.0
.LOCL.
10 l
17
64
377
0.000
0.000
0.001
2 u
12
64
377
0.732
-9.929
3.790
*128.107.212.175 10.81.254.131
After a few minutes, ISE should synchronize with the primary NTP server. The asterisk indicates
which time server it has synchronized with:
ise-1/admin# sh ntp
Configured NTP Servers:
ntp.demo.local
synchronised to NTP server (128.107.212.175) at stratum 3
time correct to within 82 ms
polling server every 1024 s
remote
refid
delay
offset
jitter
==============================================================================
127.127.1.0
.LOCL.
10 l
*128.107.212.175 10.81.254.131
2 u
64
377
0.000
0.000
0.001
686 1024
25
377
1.004
0.876
1.182
11
If you see that ISE has synchronized to the local machine as shown below, that should be a
warning sign that NTP time synchronization is not working:
ise-pap-1/admin# show ntp
Primary NTP
: ntp.demo.local
refid
delay
offset
jitter
==============================================================================
*127.127.1.0
.LOCL.
128.107.212.175
.LOCL.
10 l
64
4 u 1026 1024
377
377
0.000
0.478
0.000
-866.81
0.001
60.476
Note:
Synchronization with the NTP server may not be immediate. You may need to wait 10-15 minutes for ISE to
select the NTP server over the local clock please be patient
12
Exercise Objective
In this exercise, your goal is to:
You will be asked to confirm a security exception confirm the security exception
i. What is the security exception?
ii. Examine the web sites certificate who is the certificate issuer?
Step 2
Step 3
When logging in for the first time, the ISE is installed with the Eval License. The below message
will pop-up.
Check the box against the Do no show this message again and Click on OK.
Note:
The above window will not appear in the lab as the ISE image has been installed with a 5 year
license.
13
Step 4
When logging in for the first time, the Setup Assistant Wizard pops up as shown below:
a. Choose the check box against Dont ask me again if you do not wish to see this for
further logins and click on Yes to launch the Setup Assistant.
b. If youve selected No for the Setup Assistant Wizard and would like to re-launch it, the
Setup Assistant Wizard can be launched from the top right hand corner. Select the Run
setup assistant option.
Step 5
The first screen on the Setup Assistant gathers the basic details about the type of deployment.
For this lab, select the options as shown below:
14
a. Since, we will not using IP phone, uncheck the box again Cisco Unified IP Phones
b. Click on Next to go to the Configure Network Access Service.
Step 6
In the Configure Network Access Service, well be selecting the various options and
specifying the required information for each option.
a. For Do you want to authenticate users using Cisco ISE?, select Yes.
b. Select the checkbox against Join the Active Directory domain and enter the following
i. Domain: demo.local
ii. Administrator Name: admin
iii. Administrator Password: ISEisC00L
c.
d. Once the join succeeds, the option for Select an AD group shows. Scroll down and
select the group as shown below
Step 7
Next proceed to selecting the other options. Since we are using the Setup Wizard to do the
Wired User Authentication, well be skipping over some of the options.
15
At this point you should be in the Select Network Devices section. Enter the information for the
Network Device under test as shown below.
a. Click on the checkbox against the Cisco Catalyst 3560 Series Switches
b. For the other details, enter the information as below :
i. Device Name: 3K-Access
ii. Device IP Address: 10.1.100.1/32
iii. Employee VLAN Id: 10
iv. Employee Switched VLAN Interface: 10.1.10.1/24
v. DHCP Server IP address: 10.1.100.10
16
c.
In this section Review and Confirm You Choices, you can review all the choices selected in
the previous screens.
17
If there are any corrections to be made, click on the Previous to change the settings.
If all the information is correct, click on Confirm Configuration Settings.
Step 10
At this point ISE will start generating the ISE and switch configurations. Youll see a progress
screen as shown below.
Step 11
After all the configurations are generated, youll see the following:
Goti
b. Go to the Network Device Configuration tab and copy and paste the switch
configuration to the notepad on the Admin PC. Well use some of these commands to
configure the switch in Lab Exercise 3.
c.
Go to ISE Configuration tab to verify the various ISE Configs that were auto generated.
18
e. Next, go to Administration > Identity Management > External Identity Sources >
Active Directory and verify the AD configuration.
f.
Go to Policy > Authentication to see the Authentication policies that were generated. All
the policies generated using the Setup Wizard will have the prefix AutoGen
g. Go to Policy > Authorization to verify the Authorization rules and policies that were auto
generated using the Setup Wizard.
19
Exercise Objective
In this exercise, your goal is to review and understand the IOS baseline configurations described
in this exercise.
The switch is already configured with the VLAN and the routing configurations. So, well only be
configuring the missing commands.
Note:
Some of the CLI commands may already be pre-configured. Verify and configure only the missing
CLI configs.
Login to the 3k-access switch from the Admin PC desktop using the PUTTY, credentials
admin/ISEisC00L.
Step 2
For this entire exercise use the Switch commands that were generated by the ISE Setup Wizard
in Step 11.b from Lab Exercise 2.
Step 3
From the section titled ! AAA Configuration in the switch commands, configure the AAA
settings
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa authorization auth-proxy default group radius
aaa accounting delay-start all
aaa accounting auth-proxy default start-stop group radius
aaa accounting dot1x default start-stop group radius
aaa accounting network default start-stop group radius
Step 4
20
Step 5
Step 6
Step 7
Step 8
The VLAN configuration should already be pre-configured on the switch. So, skip the VLAN
configuration commands
Step 9
Step 10
The routing configurations are already configured on the switch. DO NOT make any changes to
the routing configuration
Step 11
The following logging commands are for troubleshooting and POC only and not for production
networks.
logging host 10.1.100.21 transport udp port 20514
logging origin-id ip
logging source-interface Vlan100
Step 12
21
Step 14
Now, configure the interface level commands which include the basic identity settings on the
switch ports and the identity mode. Go to the GigInterface0/1 to configure all the interface
settings
switchport access vlan 10
switchport mode access
ip access-group ACL-DEFAULT in
22
Ensure that the port is not in shutdown state. If so, issue the CLI command no shutdown.
End of Exercise: You have successfully completed this exercise. Proceed to next section.
23
Exercise Objective
In this exercise, your goal is to verify the Wired User Authentication and understand the
authorization profiles that the authentication matched with.
Open and login to the VMware vSphere Client on the desktop of your lab console
Step 2
Step 3
Step 4
Login to your Windows 7 Enterprise endpoint with the credentials admin/ISEisC00L. You may
need to use the menu item (top left of vsphere client) VM > Guest > Send Ctrl+Alt+Del to
invoke the Windows login screen
Step 5
From the Windows desktop, click Start and type services.msc Scroll down until you see the
Wired AutoConfig (not WLAN AutoConfig) service.
Step 6
24
Step 7
Step 8
Step 9
From the Windows desktop, go to Start Menu > Control Panel > Network and Internet >
Network and Sharing Center
Step 10
Step 11
Step 12
Right-click again on the network adapter named w7-pc-guest-wired and select Properties
from the menu.
Step 13
Click the Authentication tab (this was enabled by starting the Wired AutoConfig service) and
verify the settings:
Step 14
Select Settings next to Microsoft: Protected EAP (PEAP) and uncheck Validate Server
Certificate.
25
Step 15
For Select Authentication Method choose Secured password (EAP-MSCHAP v2) then
select Configure
Step 16
Step 17
Select OK
Step 18
Step 19
26
Step 20
Select OK and OK again to save and exit settings. The endpoint should now be ready to
handle 802.1X user authentication.
Step 21
You should see a message popup on the Windows 7 Endpoint: Additional information is
needed to connect to this network. Click on the message to view the 802.1X user
authentication dialog.
Note:
Step 22
Note:
If you wait too long to respond, the message may disappear. If so, disable and enable the interface to get
the pop-up back.
27
Step 23
Verify your authentication passed in ISE under Operation > Authentications. You should the
authentication information in the live logs similar to below :
Verify that the authorization profile used matches the profile defined using the Setup Wizard.
End of Exercise: You have successfully completed this exercise. Proceed to next section.
End of Lab: Congratulations! You have successfully completed the lab. Please let your
proctor know you finished and provide any feedback to help improve the lab experience.