Brksec 3697 PDF
Brksec 3697 PDF
Brksec 3697 PDF
Pollev.com/(cisco30)
22333
(cisco30)
<your response>
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Aaron Woland, CCIE# 20113
Principal Engineer
Security Business Group
loxx@cisco.com
@AaronWoland
http://www.networkworld.com/blog/secure-network-access/
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Disclaimer
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Please Fill Out The Survey!
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cisco ISE & TrustSec Sessions: Building Blocks
BRKSEC-2045 -
BRKCOC-2015 BRKSEC-3697
BRKSEC-3699 Mobile Devices and
Cisco IT's Assured Advanced ISE
Designing ISE for BYOD Security -
Network Access: (ISE) Services, Tips and
Scale & High Deployment and Best
Deployment and Best Tricks
Availability Practices
Practices (Wed 8:00am)…
(Thurs 8:00 am) (Mon 4:00pm)
(Thurs 10:30am). (Thurs 8:00am)…
(Tue 4:00pm)
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Important: Hidden Slide Alert
ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Lots of NEW Content
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Watch Recordings of Prior Sessions
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Roadmap and Futures
Everything
You Want
ISE 1.0
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Roadmap and Futures
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices (Limited)
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
ISE and Certificate Usage
Your Feedback is Heard!
• Other Resources:
• http://www.networkworld.com/blog/secure-network-
access/
• Books: http://amzn.com/1587144263
• My Previous Cisco Live Sessions: http://ciscolive.com
• Public ISE Community: http://cs.co/ise-community
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Certificates
ForYour
For Your
X.509
username
organization
location
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Certificates
ForYour
For Your
Provides an
Identity
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Certificates
ForYour
For Your
Key Usages
Extended Key Usages (EKUs)
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Certificates
Authentication Server
Layer 2 Layer 3
Link Link
Authentication
Supplicant Authenticator Server
Start
EAPoL Start
EAP-Request/Identity
Port Unauthorized
Secure
EAP-Response/Identity
Web Server
RADIUS Access Request
Root CA
Internal
Communications BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Certificates
ISE 1.0-1.2
PSN #1
• Generate CSR for PSN #1
• Bind CA-signed cert for PSN #1
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Certificates
Primary
PSN #20
• Generate CSRs for ALL NODES PAN
at Primary PAN
• Bind CA-signed certs for ALL NODES at
Primary PAN
• Manage System (Local) certs for ALL
NODES at primary PAN PSN #40
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Certificates
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Certificates
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Certificates
• ‘pxGrid’ cert is the server cert for authenticating the ISE node to pxGrid clients
• ‘Portal’ cert is a server cert associated with a particular ISE portal (Guest, Sponsor,
My Devices, …)
• In a freshly installed node, the default self-signed cert has all four roles
Certificates for all roles are managed from the Primary PAN node.
1 While ISE technically allows wildcard in the CN, Microsoft supplicants will reject, so never recommended
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Certificates
X
PSN-1: Cert1
PSN-2: Cert2
PSN-3: Cert3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificates
ForYour
For Your
Group Tag
Node 2 – Sec Admin, M&T and PSN
GuestPortalCerts
(Grouping Certificates to a
Node 3 - PSN Logical Name)
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Certificates
ForYour
For Your
Reference
Reference
• For Scalability, X.509 Certificate
Certificate Chains Authorities may have hierarchy
• ISE will present full signing chain to
Root CA client during authentication
• Client must trust each CA within the chain
Subordinate
CA
Cert
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificates
Root CA
Subordinate CA
Subordinate CA
ISE Cert
If you must use a PKCS chain, it needs to be in PEM format (not DER)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificates
Convert DER to PEM: openssl x509 -inform der –in DER.cer -out NewFile.pem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificates
PSN2
X X
PSN
Trusted Certs
PSN
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Certificates
SPONSOR http://sponsor.company.com
100.1.100.6
https://sponsor.company.com:8443/sponsorportal
Load Balancer ISE-PSN-2
100.1.99.5
100.1.100.7
Name Mismatch!
Requested URL = sponsor.company.com ISE-PSN-3
Certificate Subject = ise-psn-3.company.com
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Certificates
SPONSOR http://sponsor.company.com
100.1.100.6
https://sponsor.company.com:8443/sponsorportal
Load Balancer ISE-PSN-2
100.1.99.5
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Certificates
ISE Certificate with SAN
!= psn.[ise].woland.com
Position in FQDN is fixed
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Certificates
Clients Misbehave!
Example education customer:
• ONLY 6,000 Endpoints (all BYOD style)
• 10M Auths / 9M Failures in a 24 hours!
• 42 Different Failure Scenarios – all related to
clients dropping TLS (both PEAP & EAP-TLS).
Supplicant List:
• Kyocera, Asustek, Murata, Huawei, Motorola, HTC, Samsung, ZTE, RIM, SonyEric, ChiMeiCo,
Apple, Intel, Cybertan, Liteon, Nokia, HonHaiPr, Palm, Pantech, LgElectr, TaiyoYud, Barnes&N
5411 No response received during 120 seconds on last EAP message sent to the client
• This error has been seen at a number of Escalation customers
• Typically the result of a misconfigured or misbehaving supplicant not completing the EAP process.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Certificates
1 5
NAD
SSID
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Certificates
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Certificates
/etc/hosts
1. psn.ise.local 10.1.100.1
DNS
2.
DNS Servers
Apple iOS & MacOS
Bonjour!
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Internal CA
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
NSP Flow – Internal CA Certificate Authority
PSN ForYour
For Your
SSID = CORP Reference
Reference
RA CA
Employee
PSN
CA Selection
CPP Certificate Template = Internal
RADIUS Access-Accept
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
NSP Flow – External CA Certificate Authority
PSN ForYour
For Your
SSID = CORP Reference
Reference
RA CA
Employee
PSN
RADIUS Access-Request
RADIUS Access-Accept
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Certificate Authority
ISE CA: Multiple Personalities/Identities
Root CA Subordinate CA
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
Root CA is Used to
ISE Certificate Authority Architecture Sign the certificates
for the Subordinate
CA’s.
Secondary PAN is
another Root CA!
PSN PSN PSN PSN
Ensure you export
Primary PAN and
Subordinate CA Subordinate CA Subordinate CA Subordinate CA import on
SCEP RA SCEP RA SCEP RA SCEP RA Secondary
OCSP OCSP OCSP OCSP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Issue & Revoke Endpoint Certificates Certificate Authority
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
NGFW
PSN-2
PAN
i-Net
Admin Revokes
Certificate
ISE Admin
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
PSN-1
MnT
NGFW
PSN-2
PAN
i-Net
1. Admin Revokes
Certificate
ISE Admin
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
NGFW
PSN-2
PAN
i-Net
ISE Admin
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Certificate Authority
Re-generate the Root CA ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Certificate Authority
ForYour
For Your
ISE as an Intermediate CA Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
ForYour
For Your
Reference
Certificate Revocation Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Certificate Authority
ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Certificate Authority
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Certificate Authority
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Certificate Authority
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Certificate Authority
Certificate Template(s)
• Define Internal or
External CA
• Set the Key Sizes
• SAN Field Options:
• MAC Address
• No Free-Form Adds..
ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Certificate Authority
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Certificate Authority
• Now is a different
chain of trust!
PSN PSN PSN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Certificate Authority
CA Hierarchy in 2.0+
CA Hierarchy in 2.0+
• Multi Node Deployment with 2 PANs and a Single PSN
P-PAN
S-PAN
• The NODE_CA on the Primary and Secondary PAN are signed by the ROOT_CA on the
Primary PAN
• The NODE_CA on the Primary PAN is also responsible for signing the EP_CA and
OCSP certificate for the PSNs
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Certificate Authority
Fresh Install:
Single Root Hierarchy for all New Installs.
Upgrade:
No changes on Upgrade
To switch to the Single Root Hierarchy:
Administration > System > Certificate > Certificate Signing Requests > Replace
ISE Root CA
Note: If after an upgrade, the administrator does not trigger the “Replace ISE Root
CA” operation then any new PSN registering into the deployment will get its EP_CA
and OCSP certificates signed by the ROOT CA on the Primary PAN.
This behavior is the same as 1.3/1.4
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Certificate Authority
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Certificate Authority
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
pxGrid & Grid Certificate Tips
Example pxGrid Integration: InfoBlox
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment
1. I need
pxGrid Bulk Downloads Bulk Session
(peer-to-peer) WWW
Data
2. Get it
From MnT
3. Direct
Data Transfer
FMC
Controller
MnT
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Deployment
Controller
FMC
MnT
3. Publish Topic
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Deployment
FMC
Controller
1. Subscribe
Vulnerable
Hosts
2. Direct
MnT
Transfer
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Deployment
CAVEATS ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
#1 complaint about pxGrid integration:
Certificates. Customers, Partners, other
BU’s all confused by the Certificate
usages w/ pxGrid.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
So, How to we “Certificate-ify” pxGrid?
WWW
MnT
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
So, How to we “Certificate-ify” pxGrid?
WWW
X.509
X.509
X.509
X.509X.509
pxGrid
pxGrid
pxGrid
pxGrid
X.509
pxGrid pxGrid
MnT
ISE 2.1 CA
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
ForYour
For Your
Reference
Reference
Step-by-Step Configuration of
pxGrid, Cert Portal, Firepower
Manager, & WSA Integration in
Hidden Slides
Deployment Notes ForYour
For Your
Reference
Reference
Can do CSR’s one at a time, but Bulk Download works well, too.
Pro Tip: Don’t bother with CSR’s – just generate certificate pairs from
the Portal.
Best Practice, Follow an Order of Operations:
Don’t enable pxGrid until all nodes have a pxGrid certificate.
Wait for all the services to come up on 1st PSN before you enable pxGrid on
the 2nd PSN
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Edit the Certificate Provisioning Portal ForYour
For Your
Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Setup the Portal ForYour
For Your
Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Create a Network User ForYour
Your
For
Reference
This will be used as an Admin User in Next Step Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Make an Admin User from the Network User
ForYour
For Your
Reference
Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Add User to Super Admin Group ForYour
Your
For
Reference
Only Super Admin & ERS Admin Roles can Issue pxGrid Certs Reference
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Login to the Certificate Provisioning Portal
https://certs246.securitydemo.net
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Login to the Certificate Provisioning Portal
Generate Bulk Certs w/ pxGrid Template. Prefer to use a pxGrid Prefix in CN. 1 per ISE Node
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Download the Certificates
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Extract the Zip File
There are Key-Pairs per node + ISE CA Roots + ISE Admin Roots – All PEM Encoded
ISE CA Certificates
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Delete the old, Self-Signed Cert ForYour
For Your
Reference
Reference
For Cleanliness
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
ForYour
For Your
Reference
Reference
After Services Start PAN & MnT will Automatically Publish Topics
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Enable pxGrid on the Second PSN ForYour
For Your
Reference
Reference
Use the ISE Root CA for the pxGrid servers & the MnT Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add the ISE Root CA to FMC ForYour
For Your
Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Add the pxGrid Certificate for the FMC ForYour
For Your
Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
ForYour
Your
Success
For
Reference
Reference
firesightisetest-sourcefire3d =
The Test Subscription (test button)
iseagent-sourcefire3d =
The FMC’s production Connection
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
ForYour
For Your
Reference
Reference
Use the same ISE Root CA Cert for Both Monitoring Nodes
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
WSA Configuration - Part 3/3 ForYour
For Your
Reference
Reference
Install the WSA’s pxGrid Cert & Key from the ISE CA
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Success ForYour
For Your
Reference
Reference
-pxgrid_client =
The WSA’s production Connection
-Test_client =
The WSA’s Test Connection
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Deployment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
“Fire & ISE”
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Deployment
ForYour
For Your
Reference
Reference
Remediation Options
• Quarantine- quarantines an endpoint based on
source ip address
• portBounce- temporarily bounces the endpoint or
host port
• Terminate- terminates the end-user session
• Shutdown- initiates a host port shutdown, this will
insert a “shutdown” command on the switch port
configuration
• reAuthenticate- reAuthenticates the end-user
• UnQuarantine- unquarantines the endpoint
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Deployment
Controller MnT
3. pxGrid EPS
1. Security Action: Quarantine
Events / IOCs + Re-Auth
NGFW Reported
2. Correlation
FMC
Rules Trigger
i-Net Remediation Action
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment
4. Endpoint
Assigned Quarantine
+ CoA-Reauth Sent
Controller MnT
NGFW
FMC
i-Net
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
BYOD in Practice
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
BYOD
Cough,
Cough
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
BYOD
Solution
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
BYOD
ForYour
For Your
Reference
Reference
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
BYOD
ForYour
For Your
Reference
• Multiple MDM rely on MDM redirects to find the correct MDM Server
• ISE 1.4 cannot perform a MDM API look-up with a new device without MDM
redirect.
• ISE can on-board Brown Field devices, no need to on-board devices
again
• Again, relies on the MDM redirect
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
The Opposite of BYOD:
How to differentiate corporate provisioned devices?
BYOD
Registered
Employee No No
GUEST
Yes Access-Reject
Yes
Domain
Member No
?
YES
Access-Accept
Internet Only
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
BYOD
• MAR provides a mechanism for the RADIUS server to search the previous
authentications and look for a machine-authentication with the same Calling-
Station-ID.
• This means the machine must do authenticate before the user.
• i.e. Must log out, not use hibernate, etc….
• See the reference slides for more possible limitations.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
BYOD
NAD
SWITCHPORT
PSN
RADIUS Access-Request
[EAP-ID=CorpXP-1] Matched Rule = MachineAuth
RADIUS Access-Accept
[cisco-av-pair] = dACL=Permit-All
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
BYOD
NAD
SWITCHPORT
PSN
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
BYOD
http://technet.microsoft.com/en-us/library/cc783756(WS.10).aspx
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
BYOD
With AnyConnect 3.1.1 and ISE 1.1.1 IP Phones if Cisco-IP-Phone then Cisco_IP_Phone
Employee &
2. ISE Issues Machine Employee if
Network
then Employee
Access:EAPChainingResult =
AuthZ PAC User and machine suceeded
NAD
SWITCHPORT
PSN
EAPoL Start
RADIUS Access-Request
[EAP-Tunnel = FAST]
EAP-Request:TLV RADIUS Access-Challenge
[EAP-TLV = “Machine”]
EAP-Response RADIUS Access-Request
TLV = “Machine” [EAP-TLV= “Machine”]
[EAP-ID=Corp-Win7-1] PAC
RADIUS Access-Accept
EAP Success
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
BYOD
With AnyConnect 3.1.1 and ISE 1.1.1 IP Phones if Cisco-IP-Phone then Cisco_IP_Phone
NAD
SWITCHPORT
PSN
PAC
EAPoL Start
RADIUS Access-Request
[EAP-Tunnel = FAST]
EAP-Request:TLV RADIUS Access-Challenge
PAC
[EAP-TLV = “Machine”]
EAP-Response RADIUS Access-Request
TLV = “User” [EAP-TLV= “User”]
[EAP-ID=Employee1] PAC
RADIUS Access-Accept
EAP Success
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
BYOD
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
BYOD
Mobile Device
w/ Certificate
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
BYOD
NAD
SWITCHPORT
PSN
CN=employee1 || Cert is Valid
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
BYOD
BobSmith
xxxxxxxxx
NAD
SWITCHPORT
PSN
Session Data
User Identity = employee1
RADIUS CoA
EAP-ID Req
[AVP:reauth]
User Group = employees
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
BYOD
Access-Granted
CWA Identity = BobSmith
CWA Group = employees
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
BYOD
CoA
Final Authorization
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
BYOD
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
Non-Cisco NAD Integration
Session IDs and Sessionization
Deployment
Cisco Session ID
Also Known as Audit Session ID or CPM Session ID
C0A8013C00000618B3C1CAFB
NAS IP Address Session Count Time Stamp
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Cisco Session ID Deployment
RADIUS
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Deployment
• Cisco Session ID – Also known as CPM or Audit Session ID. Can persist across
multiple RADIUS Access Requests and reauth events.
• AcsSessionID is a legacy session ID – Lifetime is from the first Access-Request
until Access-Accept/Access-Reject. AcsSessionID is constructed from ISE node
unique prefix and a counter.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment
Cisco Session ID vs IETF RADIUS Accounting
Session ID cat3750x#sh auth sess int gi1/0/9 det
Interface: GigabitEthernet1/0/9
ForYour
For Your
Reference
Reference
Server Policies:
• ISE supports BOTH since ACS ACL: xACSACLx-IP-AD_LOGIN_ACCESS-55f5cb00
• A Synthesized Cisco Session-ID is Created when NAD does not send Cisco-AV-
Pair:Audit-Session-ID
• 24-Byte ASCII String
A45E60EB9A450033AC108601
Calling-Station- NAS- NAS-IP-Addr
ID Port attr(4)
attr(31) attr(5)
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Change of Authorization
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Deployment
Step 4: CoA-DM
Step 5: Disconnected from SSID
CoA-DM
Policy
802.1X Authentication Corp
X AP
CAPWAP
WLC
Internet-Only
Traffic Flow
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
RFC 5176 (Obsoletes RFC 3576) Deployment
ForYour
For Your
Dynamic Authorization Extensions to RADIUS Reference
Reference
Disconnect-Request
Disconnect-ACK/NAK
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
RFC 5176 Deployment
ForYour
For Your
2.1. Disconnect Messages (DMs) s Reference
Reference
A Disconnect-Request packet is sent by the Dynamic Authorization Client in order to terminate user session(s) on a NAS
and discard all associated session context. The Disconnect-Request packet is sent to UDP port 3799, and identifies the NAS
as well as the user session(s) to be terminated by inclusion of the identification attributes described in Section 3.
The NAS responds to a Disconnect-Request packet sent by a Dynamic Authorization Client with a Disconnect-ACK if all
associated session context is discarded and the user session(s) are no longer connected, or a Disconnect-NAK, if the NAS
was unable to disconnect one or more sessions and discard all associated session context. A Disconnect- ACK MAY contain
the Acct-Terminate-Cause (49) Attribute [RFC2866] with the value set to 6 for Admin-Reset.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
RFC 5176 Deployment
ForYour
For Your
Reference
Reference
2.2. Change-of-Authorization (CoA) Messages
CoA-Request packets contain information for dynamically changing session authorizations. Typically, this is used to change
data filters. The data filters can be of either the ingress or egress kind, and are sent in addition to the identification attributes
as described in Section 3. The port used and packet format (described in Section 2.3) are the same as those for Disconnect-
Request packets.
Filter-ID (11) - Indicates the name of a data filter list to be applied for the session(s) that the identification attributes map to.
NAS-Filter-Rule (92) - Provides a filter list to be applied for the session(s) that the identification attributes map to [RFC4849].
The NAS responds to a CoA-Request sent by a Dynamic Authorization Client with a CoA-ACK if the NAS is able to
successfully change the authorizations for the user session(s), or a CoA-NAK if the CoA- Request is unsuccessful. A NAS
MUST respond to a CoA-Request including a Service-Type Attribute with an unsupported value with a CoA-NAK; an Error-
Cause Attribute with value "Unsupported Service" SHOULD be included.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
CoA Examples Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
CoA Examples Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
CoA Examples Deployment
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
URL Redirection
Deployment
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment
• Captive Portal
• The URL Redirection with Session Awareness is critical to a successful transition of
states (change of authorizations) during web logins and authentications
• Device Registration / Onboarding
• Mobile Device Management Integration
• Supplicant & Certificate Provisioning
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
Deployment
URL Redirection
Cisco found it was CRITICIAL to customer success to accomplish at L2 Edge
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
Deployment
X
802.1X Authentication Must have profiling replicated
To the box making the decision
Network Device Before the decision is made
How busy are boxes?
Will replication happen fast enough?
Too many unknowns!!!!
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
Deployment
Posture/Profiling is sent to
802.1X Authentication The PSN that owns the login
Automatically no replication
Race-conditions exists & no
Network Device
Replication needed.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
MAC Authentication Bypass (MAB)
MAB is NOT A
STANDARD!
Deployment
• Why?
• Security! Before this, malicious users would be able to put
a mac-address into the username & password fields of
WebAuth (or non-Cisco switches even in the supplicant
identity).
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
Deployment
Internal ID’s
Mix of Users &
Endpoints
11:22:33:44:55:66
11:22:33:44:55:66
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Deployment
Users Endpoints
= MAB
= MAC
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Deployment
ForYour
For Your
• ISE 1.2 included changes for Non-Cisco device (3rd Party MAB) handling
• Relevant for PAP, CHAP and EAP-MD5
• Identity (User-Name) = MAC Address
• Check Password
• Checking of the trivial MAB password authenticates the sending network device where
Password = User-Name = MAC address
• Check Calling-Station-Id equals MAC address.
• When Calling-Station-Id is being sent, keep this check enabled as an extra safeguard.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
Deployment
Process Host Lookup Used for mac-auth bypass of Cisco devices. Will allow User-Name
lookup of a MAC address in the endpoints store. It will also check that
RADIUS:
• Calling-Station-Id equals MAC address
• Service-type equals Call-Check
Detect <protocol> as Host Used for mac-auth bypass of non-Cisco devices. Will allow User-Name
Lookup lookup of a MAC address in the endpoints store.
Check Password Checking of the trivial MAB password authenticates the sending
network device. Disabling this setting is not recommended.
Password format The default setting “%User-Name%” uses the MAC address in the
User-Name, as the password to check. Only modify if the network
device adds other characters to the password, e.g. “.%User-Name%.”
shows the User-Name with periods (full stops) on either side.
Check Calling-Station-Id When Calling-Station-Id is being sent, keep this check enabled as an
equals MAC address extra safeguard.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
3rd Party MAB Authentication Policy Deployment
Deny non-matches
FreeRADIUS
dictionaries work
https://github.com/FreeRADIUS/freeradius-server/tree/master/share
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Deployment
Go to “Advanced
Attribute Settings” to
use the 3rd Party
Dictionaries
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
MAB and VSA Support Matrix All data subject to vendor hardware/software
versions!
ForYour
For Your
Service- CID = Reference
Reference
Vendor PW=UN? ACL VLAN Redirect CoA
Type MAC?
Alcatel Wired Call-Check N Y (CHAP) None Alcatel-Lucent:Alcatel-Auth-Group Dynamic N
ForYour
For Your
Reference
Reference
• Session ID -> IETF RADIUS Accounting Session ID (RFC 2866)
• Cisco supports both RFC 2866 and Cisco Audit Session ID
• URL Redirection/Captive Portal -> NO STANDARD, BUT…
• ISE 2.0 supports specific vendor implementations of URL Redirection
• Different Methods used by Cisco and 3rd-party vendors:
• Redirect as a RADIUS Authorization (Cisco, Motorola)
• Local NAD Redirect (Cisco-LWA, Aruba, HP, others)
• L3/Inline device (Cisco NAC Appliance, WSA, IOS/ASA Auth Proxy, IPN)
• DHCP/DNS sinkholes (PacketFence)
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
NAD Profiles
Deployment
NAD Profile
Dynamic MAB VLAN
ACL
Smart Policy Eval
URL Redirect
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
Deployment
• Match conditions on
NAD Profile user-friendly names
(attribute aliases).
• Smart policy applies
policy according to
Common or Vendor- NAD’s capabilities
Specific permissions:
• VLAN
• ACL
• URL-Redirect
• CoA
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
Network Device Profiles Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
NAD Profiles Deployment
• Define Protocols
and Services
supported by NADs
using this profile
• Specify Vendor and
select all relevant
dictionaries
• IETF RADIUS
dictionary included
by default
• Optionally change
icon associated to
vendor/profile.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
NAD Profiles Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
3rd-Party NADs – Supported Features Deployment
ForYour
For Your
Features Vary By Vendor, Platform, and Versions ! Reference
Reference
• AAA Posture
• 802.1X (since 1.0)
BYOD
• MAB (since 1.2.)
• LWA to local portal (since 1.0) Device registration
• CoA Supplicant Provisioning
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
Auth VLAN Flow Deployment
PSN Corp
Guest DHCP/ Portals /
DNS RADIUS
NAD
PSN
Connected
MAB or 802.1X RADIUS Authentication ISE stores the Web Portal
Details on the User’s
Authentication Unknown Endpoint Session in Session Cache.
phase
RADIUS: Access-Accept
Auth VLAN Applied
Auth VLAN
Limited Access
DHCP Discover
Assign IP Address.
DHCP Add to DHCP Binding Table
phase DNS = ISE PSN Itself
DHCP Offer: IP Address & Options Assigned by ISE
PSN Corp
Guest DHCP/ Portals /
DNS RADIUS
NAD
PSN
RADIUS: Access-Accept
Final VLAN Applied
Guest VLAN
Normal Guest Access
HTTP/S Get – ISE PSN IP address
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Meraki Wireless
Integration Update
No Longer a
“3rd-Party NAD”!
Deployment
Old New ForYour
For Your
ISE
Reference
Reference
Feature
Support
Wireless
Platforms Only!
Available for
beta Now!
Please request
from your
Meraki SE/
support team
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
Deployment
• BYOD
• Posture
• MDM
• Essentially anything requiring URL Redirection with ISE
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
Deployment
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
Deployment
ForYour
For Your
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Deployment
Meraki Integration
Resources
• Integrating Meraki Networks with
Cisco Identity Services Engine:
http://www.cisco.com/c/dam/en/us/td/docs/sec
urity/ise/how_to/HowTo-86-
Integrating_Meraki_Networks.pdf
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
BRKSEC-2132 What's
new in ISE Active
Directory connector
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
Serviceability: ISE 1.3+
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Serviceability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
ForYour
For Your
AuthC
Protocols
Identity
Store
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
ForYour
For Your
AuthC
Protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
Adds Right-Click > Copy for the Endpoint ID & Identity Fields in Live Log
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 235
Serviceability
Debug Endpoint
• Creates debug file of all
activity for all services
related to that specific
endpoint
• Executes and stored per
PSN
• Can be downloaded as
separate files per-PSN
• Or Merged as a single file
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 236
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Serviceability
Exportable Policy
Quick Link to
Export Page
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 238
Serviceability
ForYour
For Your
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 242
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Serviceability
Certificate Details
See Complete Chain
Certificate Status
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Serviceability
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Serviceability
Cisco
Support Tunnels
Customer Location
s.tunnels.ironport.com
Bastion
Internet
Internal
tunnels.ironport.com
Set Key
SSH Tunnel established to Cisco Datacenter
Establishes
Session
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Serviceability
Internet
TAC Automation
Server
Create the
Bundle Customer Uploads the Bundle to the TAC Case
Bundle is Automatically
Decrypted and Analyzed
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Upgrade Tips from the Field
• Conclusion
Upgrade Tips from the Field
Jesse Dubois Vivek Santuka
TAC - Leader Field Engineer
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 254
Upgrade
PAN PAN
PAN1 PAN2
MnT MnT
MNT1 MNT2
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Upgrade
MNT2
MNT1 MNT2
Optional
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
Upgrade
MNT2
MNT1
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
Upgrade
MNT2
MNT1 Install Patch
Before you Join
PSN PSNs** To Cube
MNT2
MNT1
PSN PSNs**
*Don’t allow PSN1 to receive RADIUS yet BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 261
Upgrade
Guest Upgrade/Migration
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 264
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 266
Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 267
ISE 2.0+
Better
Upgrades!
Upgrade
New Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 269
Upgrade
New Upgrade
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 270
Upgrade
New Upgrade
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Upgrade
New Upgrade
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Upgrade
New Upgrade
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Pro Tip:
Combining AND & OR
Policy Tips & Tricks
Cannot
Mix??
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 275
Policy Tips & Tricks
Advanced Editor
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 276
Policy Tips & Tricks
Simple Conditions
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
Pro Tip:
WLC Best Practices
Tips & Tricks
BRKSEC-2059 Deploying
ISE in a Dynamic Public
< Excellent Detail on
Environment the Wireless Settings
(Thurs 8:00 am) Best Practices
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 279
Tips & Tricks
Use public certificates on ISE and WLC Virtual IP to reduce client messaging.
When using an Anchor/Foreign Setup do not configure AAA on the Anchor
Controller.
BRKSEC-2059 Deploying
ISE in a Dynamic Public
< Excellent Detail on
Environment the Wireless Settings
(Thurs 8:00 am) Best Practices
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 280
Tips & Tricks
Idle timeout: Leave global at 300 seconds, Open networks 300 seconds, Dot1x
networks 3600s can be used
Client Exclusions: Enable them and set for 180 seconds
Session Timeout: Set it per security policy preferably 7200+ seconds
Aggressive Failover: Disabling reduces load on ISE but can increase failover times
Configure Fast Secure Roaming to reduce RADIUS load during roam
Advanced EAP Timers:
config advanced eap identity-request-timeout 3
config advanced eap identity-request-retries 10
config advanced eap request-timeout 3
config advanced eap request-retries 10
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 281
Agenda
• Introduction
• Certificates, Certificates, Certificates
• BYOD in Practice
• Integrating with Cisco and Non-Cisco
• Active Directory Best Practices
• Serviceability & Troubleshooting
• Staged Deployments (Time Permitting)
• Conclusion
Public ISE Community
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 283
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Table Topics
• Meet the Engineer 1:1 meetings
• Related sessions
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 284
Shameless Plug
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 285
Recommended Reading
• Buy our book, help us afford more beer!
http://amzn.com/1587144263 http://amzn.com/1587143259
Security Joins the Customer Connection Program
Customer User Group Program
19,000+
Members
• Who can join: Cisco customers, service Strong
providers, solution partners and training partners
• Private online community to connect with Join in World of Solutions
peers & Cisco’s Security product teams
Security zone Customer Connection stand
• Monthly technical & roadmap briefings via
WebEx Learn about CCP and Join
New member thank-you gift*
• Opportunities to influence product direction Customer Connection Member badge ribbon
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 287
Please Fill Out The Survey!
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 288
Complete Your Online Session Evaluation
• Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner will
receive a $750 Amazon gift card.
• Complete your session surveys
through the Cisco Live mobile
app or from the Session Catalog
on CiscoLive.com/us.
BRKSEC-3697 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 289
Please join us for the Service Provider Innovation Talk featuring:
Yvette Kanouff | Senior Vice President and General Manager, SP Business
Joe Cozzolino | Senior Vice President, Cisco Services