B Ise Admin Guide 23 Chapter 0100101
B Ise Admin Guide 23 Chapter 0100101
B Ise Admin Guide 23 Chapter 0100101
Policy Sets
Cisco ISE is a policy-based, network-access-control solution, which offers network access policy sets, allowing
you to manage several different network access use cases such as wireless, wired, guest, and client provisioning.
Policy sets (both network access and device administration sets) enable you to logically group authentication
and authorization policies within the same set. You can have several policy sets based on an area, such as
policy sets based on location, access type and similar parameters. When you install ISE, there is always one
policy set defined, which is the default policy set, and the default policy set contains within it, predefined and
default authentication, authorization and exception policy rules.
When creating policy sets, you can configure these rules (configured with conditions and results) in order to
choose the network access services on the policy set level, the identity sources on the authentication policy
level, and network permissions on the authorization policy levels. You can define one or more conditions
using any of the attributes from the Cisco ISE-supported dictionaries for a variety of different vendors. Cisco
ISE allows you to create conditions as individual policy elements that can be reused.
The network access service to be used per policy set to communicate with the network devices is defined at
the top level of that policy set. Network access services include:
• Allowed protocols—the protocols configured to handle the initial request and protocol negotiation
• A proxy service—sends requests to an external RADIUS server for processing
Note From the Device Administration work center, you can also select a relevant TACACS server sequence
for your policy set. Use the TACACS server sequence to configure a sequence of TACACS proxy servers
for processing.
You can refer to the Control Device Administration Using TACACS+ chapter for more information on device
administration.
Policy sets are configured hierarchically, where the rule on the top level of the policy set, which can be viewed
from the Policy Set table, applies to the entire set and is matched before the rules for the rest of the policies
and exceptions. Thereafter, rules of the set are applied in this order:
1 Authentication policy rules
2 Local policy exceptions
3 Global policy exceptions
4 Authorization policy rules
Note Policy Sets functionality is identical for network access and for device administration policies. All processes
described in this chapter can be applied when working with both the Network Access and the Device
Administration work centers. This chapter specifically discusses the Network Access work center policy
sets. To access this work center, choose Work Centers > Network Access > Policy Sets.
Allowed Protocols
Allowed protocols, configured on the top level of each policy set, define the set of protocols that Cisco ISE
can use to communicate with the device that requests access to the network resources. You can configure a
single allowed protocol per policy set, or alternatively, a server sequence that you define in advance.
Authentication Policy
Authentication policies are configured within policy sets. Each policy set can contain a single authentication
policy with multiple rules. Priority of the authentication rules for processing is determined based on the order
of those rules as they appear within the Authentication Policy table of the policy set itself (from the Set view
page).
The authentication policy uses the allowed protocols configured on policy set at the top level. Identity source
sequences define the order in which Cisco ISE looks for user credentials in different databases. Within the
authentication policy under the main policy set, you can define condition-based rules that configure the identity
sources or identity source sequences, as well as the identity methods, to be used for authentication.
Network Authorization
Network authorization controls user access to the network and its resources and what each user can do on the
system with those resources . Activate network authorization from Cisco ISE by defining sets of permissions
that authorize read, write, and execute privileges. Cisco ISE lets you create a number of different authorization
policies to suit your network needs. This release supports only RADIUS access to the Cisco ISE network and
its resources.
Policy Rules
Policy rules act to create a specific policy. For example, a policy set can include a rule that indicates under
which circmstances a certain allowed protocol should be used for network access. An authentication policy
can include a rule that indicates under which circumstances Active Directory is to be used for authentication
A standard authorization policy can include the rule name using an If-Then convention that links a value
entered for identity groups with specific conditions or attributes to produce a specific set of permissions that
create a unique authorization profile.
Policy Sets
A policy set is an hierarchical container consisting of a single user-defined rule that indicates the allowed
protocol or server sequence for network access, as well as authentication and authorization policies and policy
exceptions, all also configured with user-defined condition-based rules.
Policy Evaluation
Policies consist of rules, where each rule consists of conditions to be satisfied that allow actions to be performed
such as access to network resources. Rule-based conditions form the basis of policies, the sets of rules used
when evaluating requests.
At run-time, Cisco ISE evaluates the policy conditions and then applies the result that you define based on
whether the policy evaluation returns a true or a false value.
During policy-condition evaluation, Cisco ISE compares an attribute with a value. It is possible that where
the attribute specified in the policy condition may not have a value assigned in the request. In such cases, if
the operator that is used for comparison is “not equal to,” then the condition will evaluate to true. In all other
cases, the condition will evaluate to false.
For example, in the condition Radius.Calling_Station_ID Not Equal to 1.1.1.1, if the Calling Station ID is
not present in the RADIUS request, then this condition will evaluate to true. This evaluation is not unique to
the RADIUS dictionary and occurs because of the usage of the “Not Equal to” operator.
In ISE, the Policy Sets table provides a list of all policy sets currently configured in the system. The order of
the enabled policy sets determines the order by which the system searches for the relevant policy set every
time an endpoint requests access. The last row in the Policy Set table from the Policy page is the default policy
that will be applied if none of the rules match the request in any of the other configured policy sets. You can
edit the allowed protocols and identity source selection in default policy set, but you cannot delete it.
The sequence of policy set and the authentication and authorization evaluation flow is as follows:
1 Evaluate policy set (by evaluating the policy set condition). As a result, one policy set is selected.
2 Evaluate allowed protocols rules of the selected policy set.
3 Evaluate ID store rules of the selected policy set.
4 Evaluate authorization rules of the selected policy set, based on the following paradigm:
a Evaluate the local exception policy if it is defined
b If no match is found in Step a above, evaluate global exception policy if defined
c If no match is found in Step b above, evaluate authorization rules
If none of the policy sets match, the default policy set will be selected.
• Configure the external identity stores that you intend to use during the authentication process for users
and devices. You can configure the following external identity stores: Active Directory, LDAP, ODBC,
RADIUS, RSA, and SAML ID Providers.
• Define policy elements to be used in the authentication and authorization policies.
• Add all the network devices that will be controlled by Cisco ISE. Devices can be grouped by type and
location.
• Define authentication and authorization policies for users and network devices based on your requirements.
• Check default network access settings for client provisioning, protocol settings, and proxy configuration.
• Monitor network events by using RADIUS Livelog.
• Run network access reports to check access and authorization results.
• Troubleshoot network access issues using the diagnostic tools.
Policy Sets
The following figure shows the main elements of the main Policy Sets page.
The following table describes the main elements of the main Policy Sets page.
1 Policy Sets To access the Policy Sets area for network access policies, choose Work
tab Centers > Network Access > Policy Sets. To access the Policy Sets area
for device administration policies, choose Work Centers > Device
Administration > Device Admin Policy Sets.
2 Policy Sets Provides a list of all policy sets currently configured in the system. The
table order of the enabled policy sets determines the order by which the system
searches for the relevant policy set every time an endpoint requests access.
The last row in the policy page is the default policy that will be applied
if none of the rules match the request. You can edit the allowed protocols
and identity source selection for the default policy, but you cannot delete
this set.
From this table you can:
• Change the order of the policy sets, thereby changing the priority
of the sets to be checked by the system.
• Change the status of the policy set to Enabled, Disabled or
Monitored. Enabled is the default.
• Update the free text policy set name and description of the policy
sets.
• Access the Conditions Studio.
• Configure the policy set protocol.
• Create, delete and duplicate policy sets.
• Access the Set view in order to manage, update and edit the full
policy set configuration, including policies and exceptions.
Status To drag rows and change the priority order of the policy sets in the table,
column
click , hold, drag and drop.
Enabled (active) policy sets are marked with . For more information
about Status, see Policy Set Main Page—Configuration Settings.
Rows that have been edited and not yet saved are marked with . The
icon disappears when you choose Save.
3 Conditions Hover over any cell in the Conditions column and click the Edit icon
column
to open the Conditions Studio. From the Conditions Studio, edit any
of the Condition Studio conditions in order to use those conditions when
configuring policy rules, including those used for the particular policy
set from which you accessed the Studio, as well as all other conditions
that have been configured and maintained in the system library.
4 Actions
Click the cog icon from the Actions column to view and select
column
different actions:
• Insert new row above—insert a new policy set above the set from
which you opened the Actions menu.
• Insert new row below—insert a new policy set below the set from
which you opened the Actions menu.
• Duplicate above—insert a duplicate policy set of the set from which
you opened the Actions menu, above the original set.
• Duplicate below—insert a duplicate policy set of the set from which
you opened the Actions menu, below the original set.
• Delete—delete the policy set.
5 View
Click the arrow icon from the View column to open the Sets view
column
screen and view, manage, and update the authentication and authorization
policies as well as the policy exceptions.
6 Action Reset—revert the table to the last saved details, removing any changes
buttons not yet saved.
Save—save any new changes made directly from the table to any of the
policy sets and implement those changes.
Set View
To configure, manage and edit a specific policy set, ensure you have saved or reset any changes made from
the Policy Sets table and then choose the arrow icon from the View column to open the Set view.
The following figure shows the main elements of the Policy Sets - Set view page. The specific sections for
authentication and authorization are described in separate sections.
The following table describes the different elements of the Set view.
1 Set view From the Set view you can view, update and manage all of the
configurations for the selected policy set.
2 Conditions Hover over any cell in the Conditions column and click the Edit icon
column
to open the Conditions Studio. From the Conditions Studio, edit any
of the Condition Studio conditions in order to use those conditions when
configuring policy rules, including those used for the particular policy
from which you accessed the Studio, as well as all other conditions that
have been configured and maintained in the system library.
3 Policies
Expand any of the policy areas with the arrow icon in order to view,
and
update and manage all of the policy configurations (authentication,
Exceptions
exceptions, and authorization).
4 Action Reset—revert the table to the last saved details, removing any changes
buttons not yet saved.
Save—save any new changes made directly from the table to any of the
policy sets.
Authorization rules define permissions within the network for different security groups. The following table
describes the information that can be configured for each of the predefined and default authorization rules
available in Cisco ISE upon installation:
• Rule name
• Conditions—No conditions are used for any of the system defaults as described in detail below. Conditions
can be smart conditions (stored for reuse in the Library) or conditions that you create for a specific rule.
The available smart conditions used for the predefined rules are saved with unique names as indicated
accordingly for the different predefined rules below, and are as detailed in this table: Predefined Policy
Conditions (Smart Conditions), on page 17. You can also customize your own conditions. For more
information about configuring customized conditions, see Policy Conditions, on page 32.
• Authorization profiles—defines which permissions are to be provided to the configured security group.
For more information about authorization profiles, see Cisco ISE Authorization Profiles, on page 26.
You can also configure new authorization profiles inline from the Policy Set pages. For more information,
see Configure Authorization Policies, on page 30.
• Security groups—defines different groups of users based on common needs in the network, such as
Contractors, Administration, Guests, Engineers, etc. You can configure new authorization profiles inline
from the Policy Set pages. For more information, see Configure Authorization Policies, on page 30.
Note For Device Administration policies, Command Sets and Shell Profiles are configured in place of the
authorization profiles and security groups. There is only one default authorization rule, as described in
the table below, for Device Administration policy sets, and no additional predefined rules are available
at this time. For additional information about command sets and shell profiles, see Control Device
Administration Using TACACS+.
Name Description
Wired 802.1X
• Normalized Radius RadiusFlowType equals Wired802_1x
Wireless 802.1X
• Normalized Radius RadiusFlowType equals Wireless802_1x
Wired MAB
• Normalized Radius RadiusFlowType equals WiredMAB
Name Description
Wireless_MAB
• Normalized Radius RadiusFlowType equals WirelessMAB
Switch_Web_Authentication
• Normalized Radius RadiusFlowType equals WirelessWebAuth
Switch_Local_Web_Authentication
• RADIUS:Service-Type equals Outbound
• Operator: AND
• RADIUS:NAS-Port-Type equals Ethernet
Name Description
Compliance_Unknown_Devices Session PostureStatus equals Unknown
Catalyst_Switch_Local_Web_Authentication
• RADIUS:Service-Type equals Outbound
• Operator: AND
• RADIUS:NAS-Port-Type equals Ethernet
Step 1 For network access policies, choose Work Centers > Network Access > Policy Sets. For device administration policies,
choose Work Centers > Device Administration > Device Admin Policy Sets.
Step 2 From the Actions column on any row, click the cog icon and then from the dropdown menu, insert a new policy set by
selecting any of the insert or duplicate options, as necessary.
A new row appears in the Policy Sets table.
Step 3 From the Status column, click the current Status icon and from the dropdown list update the status for the policy set as
necessary. For more information about policy set status, see Policy Set Main Page—Configuration Settings.
Step 4 For any policy set in the table, click in the Policy Set Name or Description cells to make any free-text changes necessary.
Step 5
To add or change conditions, hover over the cell in the Conditions column and click . The Conditions Studio opens.
For more information, see Policy Conditions, on page 32.
Not all attributes you select will include the “Equals,” “Not Equals,” “Matches,” “Starts With,” or “Not Starts With” operator
options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
Note You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for
multi-value attributes. “Matches” operator should be used for regular expression comparison. When “Matches”
operator is used, regular expression will be interpreted for both static and dynamic values.
Step 6 From the Allowed Protocols column select the protocol or the server sequence (Radius or TACACS) to be followed for
this set or click and select Create a New Allowed Protocol, Create a New Radius Sequence or Create a TACACS
Server Sequence and follow these steps:
a) From the screen that opens, enter the details for the new protocol or sequence as follows:
• For allowed protocols settings, see Allowed Protocols.
• For Radius server sequence settings, see RADIUS Server Sequences.
• For TACACS+ server sequence settings, see TACACS+ Server Sequence Settings, on page 60 .
b) Click Submit.
Step 7 From the top right-hand side of the table, click Save.
Step 8
From the View column, click to access all of the policy set details and to create authentication and authorization rules
as well as policy exceptions. To create an authentication rule, see Configure Authentication Policies, on page 23. To
create authorization and exception rules, see Configure Authorization Policies, on page 30.
What to Do Next
1 Configure Authentication Policies, on page 23
2 Configure Authorization Policies, on page 30
Authentication Policies
Each policy set can contain multiple authentication rules that together represent the authentication policy for
that set. Priority of the authentication policies is determined based on the order to those policies as they appear
within the policy set itself (from the Set view page in the Authentication Policy area).
Cisco ISE dynamically chooses the network access service (either an allowed protocol a server sequence)
based on the settings configured on the policy set level, and thereafter checks the identity sources and results
from the authentication and authorization policy levels. You can define one or more conditions using any of
the attributes from the Cisco ISE dictionary. Cisco ISE allows you to create conditions as individual policy
elements that can be stored in the Library and then can be reused for other rule-based policies.
The identity method, which is the result of the authentication policy, can be any one of the following:
• Deny access—Access to the user is denied and no authentication is performed.
• Identity database—A single identity database that can be any one of the following:
◦Internal users
◦Guest users
◦Internal endpoints
◦Active Directory
◦Lightweight Directory Access Protocol (LDAP) database
◦RADIUS token server (RSA or SafeWord server)
◦Certificate authentication profile
• Identity source sequences—A sequence of identity databases that is used for authentication.
The default policy set implemented at initial Cisco ISE installation includes the default ISE authentication
and authorization rules. The default policy set also includes additional flexible built-in rules (that are not
defaults) for authentication and authorization. You can add additional rules to those policies and you can
delete and change the built-in rules but you cannot remove the default rules and you cannot remove the default
policy set. For more information about defaults and built-in configurations, see Predefined and Default
Configurations for Policies and Conditions, on page 9.
We recommend that you use only three, or at most four databases in an identity source sequence.
• Process failed—Unable to access the identity database or databases. The default course of action is drop.
Cisco ISE allows you to configure any one of the following courses of action for authentication failures:
• Reject—A reject response is sent.
• Drop—No response is sent.
• Continue—Cisco ISE continues with the authorization policy.
Even when you choose the Continue option, there might be instances where Cisco ISE cannot continue
processing the request due to restrictions on the protocol that is being used. For authentications using PEAP,
LEAP, EAP-FAST, EAP-TLS, or RADIUS MSCHAP, it is not possible to continue processing the request
when authentication fails or user is not found.
When authentication fails, it is possible to continue to process the authorization policy for PAP/ASCII and
MAC authentication bypass (MAB or host lookup). For all other authentication protocols, when authentication
fails, the following happens:
• Authentication failed—A reject response is sent.
• User or host not found—A reject response is sent.
• Process failure—No response is sent and the request is dropped.
Step 1 For network access policies, choose Work Centers > Network Access > Policy Sets. For device administration policies,
choose Work Centers > Device Administration > Device Admin Policy Sets.
Step 2
From the row for the policy set from which you would like to add or update an authentication policy, click from the
View column in the Policy Sets table, in order to access all of the policy set details and to create authentication and
authorization policies as well as policy exceptions.
Step 3 Click the arrow icon next to the Authentication Policy part of the page to expand and view all of the Authentication
Policy rules in the table.
Step 4 From the Actions column on any row, click the cog icon. From the dropdown menu, insert a new authentication policy
rule by selecting any of the insert or duplicate options, as necessary.
What to Do Next
1 Configure Authorization Policies, on page 30
Authentication Dashlet
The Cisco ISE dashboard provides a summary of all authentications that take place in your network and for
your devices. It provides at-a-glance information about authentications and authentication failures in the
Authentications dashlet.
The RADIUS Authentications dashlet provides the following statistical information about the authentications
that Cisco ISE has handled:
• The total number of RADIUS authentication requests that Cisco ISE has handled, including passed
authentications, failed authentications, and simultaneous logins by the same user.
• The total number of failed RADIUS authentications requests that Cisco ISE has processed.
You can also view a summary of TACACS+ authentications. The TACACS+ Authentications dashlet provides
statistical information for device authentications.
For more information about device administration authentications, see TACACS Live Logs. For additional
information about RADIUS Live Logs settings, see RADIUS Live Logs.
Step 1 For network authentications (RADIUS), choose Operations > RADIUS > Live Logs or for device authentications
(TACACS), choose Operations > TACACS > Live Logs to view the real-time authentication summaries.
Step 2 You can view the authentication summary in the following ways:
• Hover your mouse cursor over the Status icon to view the results of the authentication and a brief summary. A
pop-up with status details appears.
• Enter your search criteria in any one or more of the text boxes that appear at the top of the list, and press Enter, to
filter your results.
• Click the magnifier icon in the Details column to view a detailed report.
Note As the Authentication Summary report or dashboard collects and displays the latest data corresponding
to failed or passed authentications, the contents of the report appear after a delay of a few minutes.
Authorization Policies
Authorization policies are a component of the Cisco ISE network authorization service. This service allows
you to define authorization policies and configure authorization profiles for specific users and groups that
access your network resources.
Authorization policies can contain conditional requirements that combine one or more identity groups using
a compound condition that includes authorization checks that can return one or more authorization profiles.
In addition, conditional requirements can exist apart from the use of a specific identity group.
Authorization profiles are used when creating authorization policies in Cisco ISE. An authorization policy is
composed of authorization rules. Authorization rules have three elements: name, attributes, and permissions.
The permission element maps to an authorization profile.
Profiles consist of attributes chosen from a set of resources, which are stored in any of the available vendor
dictionaries, and these are returned when the condition for the specific authorization policy matches. Because
authorization policies can include condition mapping to a single network service rule, these can also include
a list of authorization checks.
authorization verifications must comply with the authorization profiles to be returned. Authorization
verifications typically comprise one or more conditions, including a user-defined name that can be added to
a library, which can then be reused by other authorization policies.
To work with Authorization Profiles, choose Policy > Policy Elements > Results. From the menu on the left,
choose Authorization > Authorization Profiles.
Use the Results navigation pane as your starting point in the process for displaying, creating, modifying,
deleting, duplicating, or searching policy element permissions for the different types of authorization profiles
on your network. The Results pane initially displays Authentication, Authorization, Profiling, Posture, Client
Provisioning, and Trustsec options.
Authorization profiles let you choose the attributes to be returned when a RADIUS request is accepted. Cisco
ISE provides a mechanism where you can configure Common Tasks settings to support commonly-used
attributes. You must enter the value for the Common Tasks attributes, which Cisco ISE translates to the
underlying RADIUS values.
Note Tracking multiple users will impact the performance due to frequent updates. The Track Movement option
can be used for high security locations.
The Location Tree is created by using the location data retrieved from the MSE instances. You can select the
location entries that are exposed to the authorization policy by using the Location Tree.
Note You will need ISE Plus license to use the Location Services.
Step 1 Choose Administration > Network Resources > Location Services > Location Servers.
Step 2 Click Add.
Step 3 Enter the MSE server details, such as server name, hostname/IP address, password, and so on.
Step 4 Click Test to test MSE connectivity using the server details that you have provided.
Step 5 (Optional) Enter the MAC address of an endpoint in the Find Location field and click Find to check whether the endpoint
is currently connected to this MSE.
If the endpoint location is found, it is displayed in the following format: Campus:Building:Floor:Zone. Sometimes, more
than one entry can be displayed depending on the location hierarchy and zone settings. For example, if all the floors of
a building (building1) in a campus named Campus1 are defined as non-secure zones, and the Lab Area in the first floor
is defined as a secure zone, the following entries will be displayed when the endpoint is located in the Lab Area:
Found in:
Campus1#building1#floor1#LabArea
Campus1#building1#floor1#NonSecureZone
Location Tree
The Location Tree is created by using the location data retrieved from the MSE instances. To view the Location
Tree, choose Administration > Network Resources > Location Services > Location Tree.
If one building has multiple MSEs, Cisco ISE will collate the location details from all the MSEs and present
them as a single tree.
You can select the location entries that are exposed to the authorization policy by using the Location Tree.
You can also hide specific locations based on your requirements. It is recommended to update the Location
Tree before hiding locations. Hidden locations will remain hidden even when the tree is updated.
If the location entries related to an authorization rule are modified or removed, you must disable the affected
rules and set these locations as Unknown or select a replacement location for each affected rule. You must
verify the new tree structure before applying the change or canceling the update.
Click Get Update to get the latest location hierarchy structure from all MSEs. After verifying the new tree
structure, click Save to apply your changes.
Downloadable ACLs
You can define DACLs for the Access-Accept message to return. Use ACLs to prevent unwanted traffic from
entering the network. ACLs can filter source and destination IP addresses, transport protocols, and more by
using the RADIUS protocol.
After you create DACLs as named permission objects, you can add them to authorization profiles, which you
can then specify as the result of an authorization policy.
You can duplicate a DACL if you want to create a new DACL that is the same, or similar to, an existing
downloadable ACL.
After duplication is complete, you access each DACL (original and duplicated) separately to edit or delete
them.
Note While creating DACL, the keyword Any must be the source in all ACE in DACL. Once the DACL is
pushed, the Any in the source is replaced with the IP address of the client that is connecting to the switch.
Step 1 Choose Policy > Policy Elements > Results > Authorization > Downloadable ACLs.
Step 2 Click the action icon and select Create DACL or click Add in the DACL Management page.
Step 3 Enter the desired values for the DACL. Supported characters for the name field are: space, ! # $ % & ‘ ( ) * + , - . / ; = ?
@ _ {.
Step 4 Click Submit.
• If the Calling-Station-ID value matches one found in the Cisco ISE cache, then the authorization profile
for a successful authorization is assigned.
• If the Calling-Station-ID value is not found to match one in the Cisco ISE cache, then the authorization
profile for a successful user authentication without machine authentication is assigned.
• Identity groups default to “Any” (you can use this global default to apply to all users).
• Conditions allow you to set one or more policy values. However, conditions are optional and are not
required to create an authorization policy. For more information about configuring and managing
conditions, see Policy Conditions, on page 32.These are the two methods for creating conditions:
◦Choose an existing condition or attribute from a corresponding dictionary of choices.
◦Create a custom condition that allows you to select a suggested value or use a text box to enter a
custom value.
• Condition names you create must use only the following supported characters:
◦Symbols: hyphen (-), underscore (_), and period (.).
◦Alphabetic characters: A-Z and a-z.
◦Numeric characters: 0-9.
• Permissions are important when choosing an authorization profile to use for a policy. A permission can
grant access to specific resources or allow you to perform specific tasks. For example, if a user belongs
to a specific identity group (such as Device Admins), and the user meets the defined conditions (such
as a site in Boston), then this user is granted the permissions associated with that group (such as access
to a specific set of network resources or permission to perform a specific operation on a device).
Ensure you have configured security group tags (SGTs) as necessary. For more information, see Security
Group Access Control Lists Configuration.
Step 1 For network access policies, choose Work Centers > Network Access > Policy Sets. For device administration policies,
choose Work Centers > Device Administration > Device Admin Policy Sets.
Step 2
From the View column, click to access all of the policy set details and to create authentication and authorization
policies as well as policy exceptions.
Step 3 Click the arrow icon next to the Authorization Policy part of the page to expand and view the Authorization Policy table.
Step 4 From the Actions column on any row, click the cog icon. From the dropdown menu, insert a new authorization policy
rule by selecting any of the insert or duplicate options, as necessary.
A new row appears in the Authorization Policy table.
Step 5 To set the status for a policy, click the current Status icon and from the dropdown list select the necessary status from
the Status column. For more information about statuses, see Authorization Policy Settings.
Step 6 For any policy in the table, click in the Rule Name cells to make any free-text changes necessary and to create a unique
rule name.
Step 7
To add or change conditions, hover over the cell in the Conditions column and click . The Conditions Studio opens.
For more information, see Policy Conditions, on page 32.
Not all attributes you select will include the “Equals,” “Not Equals,” “Matches,” “Starts With,” or “Not Starts With” operator
options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
Note You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for
multi-value attributes. “Matches” operator should be used for regular expression comparison. When “Matches”
operator is used, regular expression will be interpreted for both static and dynamic values.
Step 8 For network access results profiles, select the relevant authorization profile from the Results Profiles dropdown list or
choose or click , choose Create a New Authorization Profile and when the Add New Standard Profile screen opens,
perform the following steps:
a) Enter values as required to configure a new authorization profile. Supported characters for the name field are: space,
! # $ % & ‘ ( ) * + , - . / ; = ? @ _ {.
b) Click Save to save your changes to the Cisco ISE system database to create an authorization profile.
c) To create, manage, edit, and delete profiles outside of the Policy Sets area, choose Policy > Policy Elements >
Results > Authorization > Authorization Profiles.
Step 9 For network access results security groups, select the relevant security group from the Results Security Groupsdropdown
list or click , choose Create a New Security Group and when the Create New Security Group screen opens, perform
the following steps:
a) Enter a name and description (optional) for the new security group.
b) Check the Propagate to ACI check box if you want to propagate this SGT to ACI. The SXP mappings that are related
to this SGT will be propagated to ACI only if they belong to a VPN that is selected in the ACI Settings page.
This option is disabled by default.
c) Enter a Tag Value. Tag value can be set to be entered manually or autogenerate. You can also reserve a range for the
SGT. You can configure it from the General TrustSec Settings page (Work Centers > TrustSec > Settings > General
TrustSec Settings).
d) Click Submit.
in the Command Sets or Shell Profiles column to open the Add Commands Screen or Add Shell Profile respectively.
Choose Create a New Command Set or Create a New Shell Profile and enter the fields. Refer to the Create TACACS+
Command Sets or Create TACACS+ Profiles section for more information.
Step 11 Organize the order by which the policies are to be checked and matched within the table.
Step 12 Click Save to save your changes to the Cisco ISE system database and create this new authorization policy.
Policy Conditions
Cisco ISE uses rule-based policies to provide network access. A policy is a set of rules and results, where the
rules are made up of conditions. Cisco ISE allows you to create conditions as individual policy elements that
can be stored in the system library and then reused for other rule-based policies from the Conditions Studio.
Conditions can be as simple or complex as necessary using an operator (equal to, not equal to, greater than,
and so on), and a value, or by including multiple attributes, operators and complex hierarchies. At runtime,
Cisco ISE evaluates a policy condition and then applies the result that you have defined based on whether the
policy evaluation returns a true or a false value.
After you create a condition and assign it a unique name, you can reuse this condition multiple times across
various rules and policies by selecting it from the Conditions Studio Library, for example:
Network Conditions.MyNetworkCondition EQUALS true
You cannot delete conditions from the Condition Studio that are used in a policy or are part of another condition.
Each condition defines a list of objects that can be included in policy conditions, resulting in a set of definitions
that are matched against those presented in the request.
You can use the operator, EQUALS true, to check if the network condition evaluates to true (whether the value
presented in the request matches at least one entry within the network condition) or EQUALS false to test
whether the network condition evaluates to false (does not match any entry in the network condition).
Cisco ISE also offers predefined smart conditions that you can use in your policies separately or as building
blocks in your own customized conditions, and which you can update and change based on your needs. These
smart conditions are as described in Predefined and Default Configurations for Policies and Conditions, on
page 9.
You can create the following unique network conditions to restrict access to the network:
• Endstation Network Conditions—Based on endstations that initiate and terminate the connection.
Cisco ISE evaluates the remote address TO field (which is obtained based on whether it is a TACACS+
or RADIUS request) to identity whether it is the IP address, MAC address, calling line identification
(CLI), or dialed number identification service (DNIS) of the endpoint.
In a RADIUS request, this identifier is available in Attribute 31 (Calling-Station-Id).
In a TACACS+ request, if the remote address includes a slash (/), the part before the slash is taken as
the FROM value and the part after the slash is taken as the TO value. For example, if a request has
CLI/DNIS, CLI is taken as the FROM value and DNIS is taken as the TO value. If a slash is not included,
the entire remote address is taken as the FROM value (whether IP address, MAC address, or CLI).
• Device Network Conditions—Based on the AAA client that processes the request.
A network device can be identified by its IP address, device name that is defined in the network device
repository, or Network Device Group.
In a RADIUS request, if Attribute 4 (NAS-IP-Address) is present, Cisco ISE obtains the IP address from
this attribute. If Attribute 32 (NAS-Identifier) is present, Cisco ISE obtains the IP address from Attribute
32. If these attributes are not found, it obtains the IP address from the packet that it receives.
The device dictionary (NDG dictionary) contains network device group attributes such as Location,
Device Type, or other dynamically created attributes that represent NDGs. These attributes contain the
groups that the current device is related to.
• Device Port Network Conditions—Based on the device's IP address, name, NDG, and port (physical
port of the device that the endstation is connected to).
In a RADIUS request, if Attribute 5 (NAS-Port) is present in the request, Cisco ISE obtains the value
from this attribute. If Attribute 87 (NAS-Port-Id) is present in the request, Cisco ISE obtains the request
from Attribute 87.
In a TACACS+ request, Cisco ISE obtains this identifier from the port field of the start request (of every
phase).
For more information about these unique conditions, see Special Network Access Conditions , on page 47.
• When a single identity source is used during authentication, this attribute includes the name of the identity
store in which the authentication succeeded.
• When an identity source sequence is used during authentication, this attribute includes the name of the
last identity source accessed.
You can use the AuthenticationStatus attribute in combination with the AuthenticationIdentityStore attribute
to define a condition that identifies the identity source to which a user has successfully been authenticated.
For example, to check for a condition where a user authenticated using an LDAP directory (LDAP13) in the
authorization policy, you can define the following reusable condition:
Note The AuthenticationIdentityStore represents a text field that allows you to enter data for the condition.
Ensure that you enter or copy the name correctly into this field. If the name of the identity source changes,
you must ensure to modify this condition to match the change to the identity source.
To define conditions that are based on an endpoint identity group that has been previously authenticated,
Cisco ISE supports authorization that was defined during endpoint identity group 802.1X authentication status.
When Cisco ISE performs 802.1X authentication, it extracts the MAC address from the “Calling-Station-ID”
field in the RADIUS request and uses this value to look up and populate the session cache for the device's
endpoint identity group (defined as an endpointIDgroup attribute). This process makes the endpointIDgroup
attribute available for use in creating authorization policy conditions, and allows you to define an authorization
policy based on endpoint identity group information using this attribute, in addition to user information.
Note Calling-Station-ID is accepted only in AA:BB:CC:DD:EE:FF format in Cisco ISE2.3 and above. Hence,
authorization condition might fail if the Calling-Station-ID is provided in AA-BB-CC-DD-EE-FF format.
The condition for the endpoint identity group can be defined in the ID Groups column of the authorization
policy configuration page. Conditions that are based on user-related information need to be defined in the
“Other Conditions” section of the authorization policy. If user information is based on internal user attributes,
then use the ID Group attribute in the internal user dictionary. For example, you can enter the full value path
in the identity group using a value like “User Identity Group:Employee:US”.
◦Cisco-BBSM
◦Cisco-VPN3000
◦Microsoft
◦Network access
For authorization policy types, the verification configured in the condition must comply with the authorization
profiles to be returned.
Verifications typically include one or more conditions that include a user-defined name that can then be added
to a library and reused by other policies.
The following sections describe the supported attributes and dictionaries available for configuring conditions.
Software Version
Model Name
AuthenticationMethod No Yes
AuthenticationStatus No No
CTSDeviceID No No
UserName No Yes
WasMachineAuthenticated No No
Country
LocationSubject
Organization
Organization Unit
Serial Number
State or Province
Subject
Issuer
Issuer - Organization
Issuer - Location
Issuer - Country
Issuer - Email
Issuer - User ID
hover over the cell in the Conditions column and click , or click the plus sign from the Conditions
column in the Policy Set table in order to create a new condition, which you can then immediately apply to
the same policy set or alternatively you can also save in the Library for future use.
The following figure shows the main elements of the Conditions Studio.
The Condition Studio is divided into two main parts: the Library and the Editor. The Library stores condition
blocks for reuse while the Editor enables you to edit those saved blocks and create new ones.
The following table describes the different parts of the Conditions Studio:
3 Conditions The complete list of all conditions in the Library, or the list of conditions
List in the Library based on the search or filter results.
6 This area displays the options available when working with hierarchical
levels as well as multiple rules within a condition.
When you hover over any column or row the relevant actions appear.
When you select an action, it is applied to that section and all of the
children sections. For example, with five levels in Hierarchy A, if you
choose AND from any rule in the third level, then a new hierarchy,
Hierarchy B, is created under the original rule so that the original rule
becomes the parent rule for Hierarchy B, which is embedded in
Hierarchy A.
When you first open the Condition Studio in order to create a new
condition from scratch, the Editor area includes only one line for a
single rule that you can configure, as well as the option to select relevant
operators or to drag and drop relevant conditions from the Library.
Additional levels can be added to the condition with the AND and OR
operator options. Choose New to create a new rule on the same level
from which you clicked the option. The New option only appears once
you have configured at least one rule on the top level of the hieararchy.
When creating new conditions, you can use the condition blocks that you have already stored in the Library
and you can also update and change those stored condition blocks. While creating and managing conditions,
easily find the blocks and attributes that you need by using quick category filters, and more.
When creating and managing condition rules, use attributes, operators and values.
Cisco ISE also includes predefined condition blocks for some of the most common use cases. You can edit
these predefined conditions to suit your requirements. Conditions saved for re-use, including the out-of-the-box
blocks, are stored in the Library of the Condition Studio, as described in this task.
To perform the following task, you must be a Super Admin or Policy Admin.
Step 1 Access the Policy Sets area. Choose Policy > Policy Sets .
Step 2 Access the Conditions Studio to create a new condition and to edit existing condition blocks, in order to then use those
conditions as part of the rules you configure for the specific policy set (and its associated policies and rules), or in order
to save to the Library for future use:
a)
Click from the Conditions column in the Policy Set table on the main Policy Set page in order to create conditions
that are relevant for the entire policy set (conditions that are checked prior to matching authentication policy rules).
b)
Alternatively, click from a specific policy set row in order to view the Set view, including all rules for authentication
and authorization. From the Set view, hover over the cell in the Conditions column from any of the rule tables and
Step 3 Use an existing condition block from the Library as a rule in the condition that you are creating or editing.
a) Filter by selecting the relevant category from the category toolbar—in the Library, all blocks that contain an attribute
from the selected category are displayed. Condition blocks that contain more than one rule but that use an attribute
from the selected category for at least one of those rules, are also displayed. If there are additional filters added, then
the results displayed include only condition blocks from the specific filter that also match the other filters that were
included. For example, if you select the Ports category from the toolbar and you also enter "auth" as free text in the
Search by Name field, then all blocks related to ports with "auth" in their names are displayed. Click the highlighted
icon again from the category toolbar in order to deselect it, thereby removing that filter.
b) Search for condition blocks with free text—in the Search by Name free text field, enter any term, or part of a term,
that appears in the name of the block for which you are searching. As you type, the system dynamically searches for
relevant results in real time. If no category is selected (none of the icons are highlighted) then the results include
condition blocks from all categories. If a category icon is already selected (the displayed list is already filtered), then
the results displayed include only blocks in the specific category that use the specific text.
c) Once you find the condition block, drag it to the Editor and drop it in the correct level of the block that you are
building. If you drop it in the incorrect location, you can drag and drop it again from within the Editor, until it is
placed correctly.
d) Hover over the block from the Editor and click Edit to change the rule, in order make changes relevant for the
condition you are working on, to overwrite the rule in the Library with those changes or alternatively to save the rule
as a new block in the Library.
The block, which is read-only when dropped into the Editor can now be edited and has the same fields, structures,
lists and actions as all other customized rules in the Editor. Continue to the next steps for more information in editing
this rule.
Step 4 Add an operator to the current level in order to then add additional rules on the same level—choose AND, OR or Set to
'Is not'. Set to 'Is not' can also be applied to individual rules.
Step 5 Create and edit rules using the attribute dictionaries—click in the Click to add an attribute field. The Attribute Selector
opens as in the following image:
The parts of the Attribute Selector are as described in the following table:
2 Dictionary Indicates the name of the dictionary in which the attribute is stored. Select a
specific dictionary from the dropdown in order to filter attributes by vendor
dictionary.
3 Attribute Indicates the name of the attribute. Filter attributes by typing free text for the
attribute name in the available field. As you type, the system dynamically
searches for relevant results in real time.
a) From the Attribute Selector search, filter and search for the attribute you need. When you filter or enter free text in
any part of the Attribute Selector, if there are no other filters activated, then the results include all attributes relevant
for the selected filter only. If more than one filter is used, then the search results that are displayed match all filters.
For example, if you click the Port icon from the toolbar and type "auth" in the Attribute column, then only attributes
from the Port category that have "auth" in their name are displayed. When you choose a category, the icon in the
toolbar is highlighted in blue and the filtered list is displayed. Click the highlighted icon again from the category
toolbar in order to deselect it, thereby removing the filter.
b) Choose the relevant attribute in order to add it to the rule.
The Attribute Selector closes and the attribute you selected is added to the Click to add an attribute field.
c) From the Equals dropdown list, select the relevant operator.
Not all attributes you select will include the “Equals,” “Not Equals,” “Matches,” “Starts With,” or “Not Starts With”
operator options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for multi-value
attributes. “Matches” operator should be used for regular expression comparison. When “Matches” operator is used,
regular expression will be interpreted for both static and dynamic values.
d) From the Attribute value field do one of the following:
• Type a free text value in the field
• Select a value from the list that dynamically loads ( when relevant—depending on the attribute selected in the
previous step)
• Use another attribute as the value for the condition rule—choose the table icon next to the field in order to open
the Attribute Selector and then search, filter and select the relevant attribute. The Attribute Selector closes and
the attribute you selected is added to the Attribute value field.
d) Optionally, enter a description in the Description field. This description appears when you hover over the info icon
for any condition block from within the Library, enabling you to quickly identify the different condition blocks and
their uses.
e) Click Save to save the condition block in the Library.
Step 7 To create a new rule on a new child level—click AND or OR to apply the correct operator between the existing parent
hierarchy and the child hierarchy that you are creating. A new section is added to the Editor hierarchy with the selected
operator, as a child of the rule or hierarchy from which you chose the operator.
Step 8 To create a new rule on a a current existing level—click New from the relevant level. A new empty row appears for a
new rule in the same level as the level from which you began.
Step 9 Click X to remove any condition from the Editor and all of its children.
Step 10 Click Duplicate to automatically copy and paste the specific condition within the hierarchy, thereby creating additional
identical children at the same level. You can duplicate individual rules with or without their children, depending on the
level from which you click the Duplicate button.
Step 11 Click Use from the bottom of the page to save the condition you created in the Editor and to implement that condition
in your policy set.
Step 1 Choose Policy > Policy Elements > Conditions > Network Conditions > Device Network Conditions.
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—You can add a list of IP addresses or subnets, one per line. The IP address/subnet can be in IPv4 or
IPv6 format.
• Device Name—You can add a list of device names, one per line. You must enter the same device name that is
configured in the Network Device object.
• Device Groups—You can add a list of tuples in the following order: Root NDG, comma, and an NDG (that it under
the root NDG). There must be one tuple per line.
Step 1 Choose Policy > Policy Elements > Conditions > Network Conditions > Device Port Network Conditions.
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—Enter the details in the following order: IP address or subnet, comma, and a port (that is used by
the device). There must be one tuple per line.
• Devices— Enter the details in the following order: device name, comma, and a port. There must be one tuple per
line. You must enter the same device name that is configured in the Network Device object.
• Device Groups— Enter the details in the following order: Root NDG, comma, NDG (that it under the root), and a
port. There must be one tuple per line.
Step 1 Choose Policy > Policy Elements > Conditions > Network Conditions > Endstation Network Conditions.
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—You can add a list of IP addresses or subnets, one per line. The IP address/subnet can be in IPv4 or
IPv6 format.
• MAC Addresses—You can enter a list of Endstation MAC addresses and Destination MAC addresses, separated
by a comma. Each MAC address must include 12 hexadecimal digits and must be in one of the following formats:
nn:nn:nn:nn:nn:nn, nn-nn-nn-nn-nn-nn, nnnn.nnnn.nnnn, or nnnnnnnnnnnn.
If the Endstation MAC or the Destination MAC is not required, use the token "-ANY-" instead.
• CLI/DNIS—You can add a list of Caller IDs (CLI) and Called IDs (DNIS), separated by a comma. If the Caller
ID (CLI) or the Called ID (DNIS) is not required, use the token "-ANY-" instead.
Step 1 Choose Policy > Policy Elements > Conditions > Common > Time and Date > Add.
Step 2 Enter appropriate values in the fields.
• In the Standard Settings area, specify the time and date to provide access.
• In the Exceptions area, specify the time and date range to limit access.
• Login-IPv6-Host
• Framed-IPv6-Route
• Framed-IPv6-Pool
• Delegated-IPv6-Prefix
• Framed-IPv6-Address
• DNS-Server-IPv6-Address
• Route-IPv6-Information
• Delegated-IPv6-Prefix-Pool
• Stateful-IPv6-Address-Pool
Supported Cisco Attribute-Value pairs and their equivalent IETF attributes are listed in the table below:
ipv6:stateful-ipv6-address-pool=<name> Stateful-IPv6-Address-Pool
ipv6:delegated-ipv6-pool=<name> Delegated-IPv6-Prefix-Pool
The RADIUS Live Logs page, RADIUS Authentication report, RADIUS Accounting report, Current Active
Session report, RADIUS Error report, Misconfigured NAS report, EPS Audit report, and Misconfigured
Supplicant report support IPv6 addresses. You can view the details about these sessions from the RADIUS
Live Logs page or from any of these reports. You can filter the records based on IPv4, IPv6, or MAC addresses.
Note If you connect an Android device to an IPv6 enabled DHCPv6 network, it receives only the link-local
IPv6 address from the DHCP server. Hence, global IPv6 address is not displayed in the Live Logs and in
the Endpoints page (Work Centers > Network Access > Identities > Endpoints).
The following procedure describes how to configure IPv6 attributes in authorization policies.
Step 1 For network access policies, choose Work Centers > Network Access > Policy Sets. For device administration policies,
choose Work Centers > Device Administration > Device Admin Policy Sets.
Step 2 Create authorization rules. See Configure Authorization Policies, on page 30.
Step 3 When creating authorization rules, create a condition from the Conditon Studio. In the Condition Studio, from the
RADIUS dictionary, choose the RADIUS IPv6 attribute, the operator, and the value. See Configure, Edit and Manage
Policy Conditions, on page 42.
Step 4 Click Save to save the authorization rules in the policy set.
is not a separate authentication method but a shorter form of client certificate authentication that uses
the same certificate credentials type to authenticate a user but does not require to run an inner method.
• Accept client certificate on authenticated provisioning works with PAC-less full handshake and
authenticated PAC provisioning. It does not work for PAC-less session resume, anonymous PAC
provisioning, and PAC-based authentication.
• EAP attributes are displayed per identity (so in EAP chaining displayed twice) are shown in authentication
details in monitoring tool in order user then machine even if authentication happens in different order.
• When EAP-FAST authorization PAC is used then EAP authentication method shown in live logs is
equal to the authentication method used for full authentication (as in PEAP) and not as Lookup.
• In EAP chaining mode when tunnel PAC is expired then ISE falls back to provisioning and AC requests
User and Machine authorization PACs - Machine Authorization PAC cannot be provisioned. It will be
provisioned in the subsequent PAC-based authentication conversation when AC requests it.
• When Cisco ISE is configured for chaining and AC for single mode then AC response with IdentityType
TLV to ISE. However, the second identity authentication fails. You can see from this conversation that
client is suitable to perform chaining but currently is configured for single mode.
• Cisco ISE supports retrieval attributes and groups for both machine and user in EAP-FAST chaining
only for AD. For LDAP and Internal DB ISE uses only the last identity attributes.
Note “EAP-FAST cryptobinding verification failed” message might be seen if EAP-FAST authentication protocol
is used for High Sierra MAC OSX devices. We recommend that you configure the Preferred EAP Protocol
field in the Allowed Protocols page to use PEAP or EAP-TLS instead of EAP-FAST for High Sierra MAC
OSX devices.
Step 1 Choose Administration > System > Settings > Protocols > EAP-FAST > EAP Fast Settings.
Step 2 Enter the details as required to define the EAP-FAST protocol.
Step 3 Click Revoke if you want to revoke all the previously generated master keys and PACs.
Step 4 Click Save to save the EAP-FAST settings.
Note If cryptobinding is required, you must use EAP-FAST as the inner method.
Step 1 Choose Administration > System > Settings > Protocols > EAP-TTLS.
Step 2 Enter the required details in the EAP-TTLS Settings page.
Step 3 Click Save.
Step 1 Choose Administration > System > Settings > Protocols > EAP-TLS.
Step 2 Enter the details as required to define the EAP-TLS protocol.
Step 3 Click Save to save the EAP-TLS settings.
Step 1 Choose Administration > System > Settings > Protocols > Security Settings.
Step 2 In the Security Settings page, select the required options:
• Allow TLS 1.0—Allows TLS 1.0 for communication with legacy peers for the following workflows:
◦Cisco ISE is configured as EAP server
◦Cisco ISE downloads CRL from HTTPS or secure LDAP server
◦Cisco ISE is configured as secure syslog client
◦Cisco ISE is configured as secure LDAP client
Note Allow TLS 1.0 option is disabled by default in ISE 2.3 and above. TLS 1.0 is not supported for TLS based
EAP authentication methods (EAP-TLS, EAP-FAST/TLS) and 802.1X supplicants when this option is
disabled. If you want to use the TLS based EAP authentication methods in TLS 1.0, check the Allow TLS
1.0 check box in the Security Settings page ( Administration > System > Settings > Protocols > Security
Settings).
• Allow TLS 1.1—Allows TLS 1.1 for communication with legacy peers for the following workflows:
◦Cisco ISE is configured as EAP server
◦Cisco ISE downloads CRL from HTTPS or secure LDAP server
◦Cisco ISE is configured as secure syslog client
◦Cisco ISE is configured as secure LDAP client
Note Allow TLS 1.1 option is disabled by default in Cisco ISE 2.3 and above. TLS 1.1 is not supported for TLS
based EAP authentication methods (EAP-TLS, EAP-FAST/TLS) and 802.1X supplicants when this option
is disabled. If you want to use the TLS based EAP authentication methods in TLS 1.1, check the Allow
TLS 1.1 check box in the Security Settings page ( Administration > System > Settings > Protocols >
Security Settings).
• Allow SHA1 Ciphers—Allows SHA-1 ciphers for communication with peers for the following workflows:
◦Cisco ISE is configured as EAP server
◦Cisco ISE is configured as RADIUS DTLS server
◦Cisco ISE is configured as RADIUS DTLS client
◦Cisco ISE downloads CRL from HTTPS or secure LDAP server
◦Cisco ISE is configured as secure syslog client
◦Cisco ISE is configured as secure LDAP client
• Allow ECDHE-RSA Ciphers—Allow ECDHE-RSA ciphers for communication with peers for the following
workflows:
◦Cisco ISE is configured as EAP server
◦Cisco ISE is configured as RADIUS DTLS server
◦Cisco ISE is configured as RADIUS DTLS client
◦Cisco ISE downloads CRL from HTTPS or secure LDAP server
◦Cisco ISE is configured as secure syslog client
◦Cisco ISE is configured as secure LDAP client
• Allow DSS ciphers for ISE as a client—When Cisco ISE acts as a client, allow DSS ciphers for communication
with server for the following workflows:
◦Cisco ISE is configured as RADIUS DTLS client
◦Cisco ISE downloads CRL from HTTPS or secure LDAP server
◦Cisco ISE is configured as secure syslog client
◦Cisco ISE is configured as secure LDAP client
Step 1 Choose Administration > Network Resources > External RADIUS Servers.
The RADIUS Servers page appears with a list of external RADIUS servers that are defined in Cisco ISE.
Step 1 Choose Administration > Network Resources > RADIUS Server Sequences.
Step 2 Click Add.
Step 3 Enter the values as required.
Step 4 Click Submit to save the RADIUS server sequence to be used in policies.
The TACACS+ External Servers page lists all the external TACACS+ servers that you have defined in Cisco
ISE. You can use the filter option to search for specific TACACS+ servers based on the name or description,
or both.
Cisco ISE can simultaneously act as a proxy client to multiple external TACACS+ servers. In order to configure
multiple external servers, you can use the TACACS+ server sequence page. Refer to the TACACS+ Server
Sequence Settings page for more information.
Host IP Enter the IP address (IPv4 or IPv6 address) of the remote TACACS+ external
server.
Connection Port Enter the port number of the remote TACACS+ external server. The port
number is 49.
Timeout Specify the number of seconds that ISE should wait for a response from the
external TACACS+ server. The default is 5 seconds. Valid values are from 1
to 120.
Shared Secret A string of text that is used to secure a connection with the TACACS+ External
Server. The connection will be rejected by the TACACS+ External server if
this is not configured correctly.
Use Single Connect The TACACS protocol supports two modes for associating sessions to
connections: Single Connect and Non-Single Connect. Single connect mode
reuses a single TCP connection for many TACACS+ sessions that a client
may initiate. Non-Single Connect opens a new TCP connection for every
TACACS+ session that a client initiates. The TCP connection is closed after
each session.
You can check the Use Single Connect check box for high-traffic environment
and uncheck it for low-traffic environment.
Step 1 Choose Work Centers > Device Administration > Network Resources > TACACS External Servers.
The TACACS External Servers page appears with a list of external TACACS servers that are defined in Cisco ISE.
Step 2 Click Add to add an external TACACS server.
Step 3 Enter the values as required.
Step 4 Click Submit to save the external TACACS server configuration.
Server List Select the required TACACS proxy servers from the Available list. The
available list contains the list of TACACS proxy servers configured in the
TACACS External Services Page.
Step 1 Choose Work Centers > Device Administration > Network Resources > TACACS External Server Sequence.
Step 2 Click Add.
Step 3 Enter the required values.
Step 4 Click Submit to save the TACACS+ server sequence to be used in policies.
To perform the following task, you must be a Super Admin or System Admin.
Step 1 Choose Policy > Policy Elements > Results > Authentication > Allowed Protocols.
If Cisco ISE is set to operate in FIPS mode, some protocols are disabled by default and cannot be configured.
Step 1 Ensure that the MAC address of the endpoints that are to be authenticated are available in the Endpoints database. You
can add these endpoints or have them profiled automatically by the Profiler service.
Step 2 Create a Network Device Profile based on the type of MAC authentication used by the non-Cisco device (PAP, CHAP,
or EAP-MD5).
a) Choose Administration > Network Resources > Network Device Profiles.
b) Click Add.
c) Enter a name and description for the network device profile.
d) Select the vendor name from the Vendor drop-down list.
e) Check the check boxes for the protocols that the device supports. If the device supports RADIUS, select the RADIUS
dictionary to use with the network device.
f) Expand the Authentication/Authorization section to configure the device's default settings for flow types, attribute
aliasing, and host lookup.
g) In the Host Lookup (MAB) section, do the following:
• Process Host Lookup—Check this check box to define the protocols for host lookup used by the network device
profile.
Network devices from different vendors perform MAB authentication differently. Depending on the device
type, check the Check Password check box and/or Check Calling-Station-Id equals MAC Address check
box, for the protocol you are using.
• Via PAP/ASCII—Check this check box to configure Cisco ISE to detect a PAP request from the network device
profile as a Host Lookup request.
• Via CHAP—Check this check box to configure Cisco ISE to detect this type of request from the network devices
as a Host Lookup request.
• Via EAP-MD5—Check this check box to enable EAP-based MD5 hashed authentication for the network device
profile.
h) Enter the required details in the Permissions, Change of Authorization (CoA), and Redirect sections, and then click
Submit.
For information on how to create custom NAD profiles, see Network Access Device Profiles with Cisco Identity
Services Engine.
Note For Cisco NADs, the Service-Type values used for MAB and web/user authentication are different. This
allows ISE to differentiate MAB from web authentication when Cisco NADs are used. Some non-Cisco
NADs use the same value for the Service-Type attribute for both MAB and web/user authentication; this
may lead to security issues in your access policies. If you are using MAB with non-Cisco devices, we
recommend that you configure additional authorization policy rules to ensure that your network security
is not compromised. For example, if a printer is using MAB, you could configure an authorization policy
rule to restrict it to printer protocol ports in the ACL.
Step 1 Ensure that the MAC address of the endpoints that are to be authenticated are available in the Endpoints database. You
can add these endpoints or have them profiled automatically by the Profiler service.
Step 2 Create a Network Device Profile based on the type of MAC authentication used by the Cisco device (PAP, CHAP, or
EAP-MD5).
a) Choose Administration > Network Resources > Network Device Profiles.
b) Click Add.
c) Enter a name and description for the network device profile.
d) Check the check boxes for the protocols that the device supports. If the device supports RADIUS, select the RADIUS
dictionary to use with the network device.
e) Expand the Authentication/Authorization section to configure the device's default settings for flow types, attribute
aliasing, and host lookup.
f) In the Host Lookup (MAB) section, do the following:
• Process Host Lookup—Check this check box to define the protocols for host lookup used by the network device
profile.
Depending on the device type, check the Check Password check box and/or Check Calling-Station-Id equals
MAC Address check box, for the protocol you are using.
• Via PAP/ASCII—Check this check box to configure Cisco ISE to detect a PAP request from the network device
profile as a Host Lookup request.
• Via CHAP—Check this check box to configure Cisco ISE to detect this type of request from the network devices
as a Host Lookup request.
• Via EAP-MD5—Check this check box to enable EAP-based MD5 hashed authentication for the network device
profile.
g) Enter the required details in the Permissions, Change of Authorization (CoA), and Redirect sections, and then click
Submit.
For information on how to create custom NAD profiles, see Network Access Device Profiles with Cisco Identity
Services Engine.