Brksec 3432 PDF
Brksec 3432 PDF
Brksec 3432 PDF
Advanced ISE
Architect, Design and Scale ISE for
your production networks
#CLMEL
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Open the Cisco Events Mobile App
2 Find your desired session in the “Session Scheduler”
3 Click “Join the Discussion”
4 Install Webex Teams or go directly to the team space
5 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKSEC-3432
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Session Abstract
• In today’s world of constant attacks, malware and Ransomware, its important to design, deploy and manage
your network with an identity aware secure access platform. Cisco ISE is plays an architectural role for many
security solutions and is also one of the main pillars in the overall Cisco’s Software defined Access
Architecture.
• This session will show you how to deliver scalable and highly available access control services using ISE for
wired, wireless, and VPN from a single campus to a global deployment. Methodologies for increasing
scalability and redundancy will be covered such as load distribution with and without load balancers, optimal
profiling design, lessons learned from the trenches, as well as serviceability tips and tricks to help you gain
optimal value and productivity from ISE.
• Attendees of this session will gain knowledge on how to best design ISE to ensure peak operational
performance, stability, and to support large volumes of authentication activity. Various deployment
architectures will be discussed including ISE platform selection, sizing, and network placement. Cisco ISE
also enables cross-platform network system collaboration across your IT infrastructure by using pxGrid to
monitor security, detect threats, and set network policy. Manage assets, configuration, identity, and access.
The session will go through such deployment considerations and common architectures.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
ISE 2.6 Updates
• Hot off the press! Gathering new information daily!
#CLMEL Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
UPDATE! @Live Melbourne 2019
Tuesday Wednesday Friday
TECSEC-2723 BRKSEC-2721 BRKSEC-3690
Architectural Approach to Security in the Zero-Trust Model: A Model for More Advanced Security Group Tags: The
Enterprise Network, Data Centre and Cloud Efficient Security Detailed Walk Through
Jeffrey Fanelli, Brenden Buresh, Rob Tappenden, Aaron Woland Darrin Miller
Jatin Sachdeva Wednesday 4:30PM-6:00PM Friday 8:00AM-9:30AM
Tuesday 2:15PM-3:45PM
BRKSEC-3383
ISE Troubleshooting
Thursday Shrikant Sundaresh
Friday 9:40AM-11:10AM
BRKSEC-3432
Wednesday Advanced ISE – Architect, Design and
Scale ISE for your production networks
BRKSEC-2203 Jason Kunst
Segmentation in SD-Access and Beyond
Kevin Regan
Thursday 08:30-10:30 You Are Here
Wednesday 12:50PM-2:20PM
BRKSEC-2069
BRKSEC-2725
Meraki Integrations with the Cisco
Are Your Endpoints/IOT Assets Safe?
Security Architecture
Krishnan Thiruvengadam
Joseph Aronow
Wednesday 2:30PM-4:00PM
Thursday 4:30PM-6:00PM
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
A bit about your Speaker
• Jason Kunst
• Technical Marketing Engineer at Cisco
Systems.
• 13 Years with Cisco Systems
• Focus on Enterprise Security Products
• Cisco Taekwondo 10 years
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
STEAK
BANK
#CLMEL BRKSEC-3432
ORMOND!
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
SYDNEY 2019
#CLMEL Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
PARIS
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
LONDON-BERLIN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
MeLBOURNE 2019
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Community VIP
Damien Miller
https://community.cisco.com/t5/cisco-cafe-blogs/cisco-community-designated-vip-class-of-2019/ba-p/3779405
https://community.cisco.com/t5/custom/page/page-id/cisco-designated-vips
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Please fill out the survey
#CLMEL BRKSEC-2721 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Thanks to the Nidhi Pandey Krishnan Thiruvengadam
BRKSEC-2721 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
U
D P D
R
E YouL take the blue pillW– the story ends, you walkR out of E
S E O
this
R room and believe whatever P want to believe. V
you
I B F I
E O E
G A I C
A D C S A
N U L E
U I E T P
T I
T R R U
H N R
E R
H
E C Remember,
This is your lastallchance.
M
A
I'mT
I
A
E U
G E C
H
G
N
T
T
I offeringBis the
After this, theretruth F
I
–
is no T
H
I A
I
O S
I
C N nothing
turning more.
back. C
A
O
R B T
N
I
A T 1999 I Y R
- The Matrix, N
T 8 I
E S O A
G
I 0 S
S A D T
2 E I
O
. You take the red pill – you stay Tin this room, O
N I
1 and I show you how deep the rabbit hole goes. N
X O
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Important: Hidden Slide Alert
cs.co/BRKSEC-3432
Available on ciscolive.com
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
• ISE Design
Agenda • Sizing Deployments and Nodes
• Bandwidth and Latency
• Scaling ISE Services
• RADIUS, AD/LDAP, Passive ID, Guest, Web
Services, TACACS+
• Profiling and Database Replication
• MnT (Optimize Logging and Noise Suppression)
• High Availability
• Appliance Redundancy
• Admin, MnT, and pxGrid Nodes
• Certificate Services Redundancy
• PSN Redundancy with and without Load
Balancing
• NAD Fallback and Recovery
• Monitoring Load and System Health
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco ISE and Anyconnect
CISCO ISE SIEM, MDM, NBA, IPS, IPAM, etc.
WHO WHEN
Cisco ISE WHAT WHERE PxGRID
& APIs
HOW HEALTH
Context aware policy service, THREATS CVSS
to control access and threat Partner Eco System
ACCESS POLICY
across wired, wireless and
VPN networks FOR ENDPOINTS FOR NETWORK
WIRED WIRELESS VPN
Cisco Anyconnect
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Managing policy based on ‘Trust’
Connecting Trusted Devices to Trusted Services
User-Groups Device-type
Cloud
Cloud App A
Cloud App B
Server A
Server B
Partners
Location Posture
Trusted Asset ✓ ✕ ✓ ✓ ✓ ✓
On Prem
Trusted User ✕ ✓ ✓ ✓ ✓ ✕
Time Threats Partners ✕ ✕ ✓ ✓ ✕ ✕
Behavior Vulnerability
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISE 2.4 is the recommendation
Long-term (LTR) “suggested release”
• https://community.cisco.com/t5/security-blogs/announcing-the-quot-suggested- • https://www.cisco.com/c/en/us/products/collateral/security/identity-services-
release-quot-status-of-ise-2-4/ba-p/3775587 engine/bulletin-c25-740738.html
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
SNS-36xx appliances
What are we solving?
• Increased endpoint capacity per
appliance and deployment
• UCS M4 Feb 2019 End Of Sale
How do we solve it?
• New appliances based on UCS M5
Prerequisites
• Must be running ISE 2.6
• http://cs.co/ise-feedback
SNS-36xx Specifications (requires 2.6)
SNS-3615 SNS-3655 SNS-3695
Endpoints supported in a standalone 10,000 25,000 50,000
configuration
Processor Intel Xeon 2.10 GHz Intel Xeon 2.10 GHz 4116 Intel Xeon 2.10 GHz 4116
4110
Hard Disk 1 600GB, 6Gb SAS 10K 4 600GB, 6Gb SAS 10K 8 600GB, 6Gb SAS 10K
RPM RPM RPM
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISE Design
ISE Terminology
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
ISE deployment options
STANDALONE ISE Policy Services Node (PSN) MULTI-NODE ISE
- Makes policy decisions
- RADIUS / TACACS+ Servers
pXGrid Controller
- Facilitates sharing of context
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
SNS-36xx appliances scale and orderability
* - Orders placed prior to targeted availability will be on new product hold until targeted availability
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Policy Administration Node (PAN) For Your
Reference
Writeable Access to the Database
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Policy Service Node (PSN) For Your
Reference
RADIUS/TACACS+ Server for the Network Devices
PSN
Policy Sync
PSN
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Network Access Device (NAD) For Your
Reference
Also Known as the ‘RADIUS Client’ (or ‘TACACS+ Client’)
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
pxGrid Controller (PXG) For Your
Reference
Context Data Sharing
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Monitoring and Troubleshooting Node (MnT)
Logging and Reporting
For Your
Reference
• MnT node receives logging from PAN, PSN, NAD (RADIUS & TACACS)
• Each ISE deployment must have at least one MnT
• Max 1x Primary and 1x Secondary (Backup) MnT possible
PAN
Syslog
Syslog from access devices are
correlated with user/device session
MnT
PSN
Syslog from firewall is correlated Syslog from other ISE nodes are
with guest access session sent to monitoring node for reporting
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
ISE Platforms For Your
Reference
SNS 35xx/36xx or
Hardware Appliance
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
For Your
Reference
Monitoring and Troubleshooting Node
Dashboard
PAN
MnT
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Monitoring and Troubleshooting Node For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Monitoring and Troubleshooting Tools For Your
Reference
……..0101111010000…
…..
Download debugs and support package Provide API for 3rd party applications
Session
Troubleshooting
Management
Change of
CRUD
Authorization
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
ISE Reporting For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Node Types
▪ pxGrid Controller
– Facilitates sharing of information between network systems
– Context In/Context-Out information exchange
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Putting It All Together… For Your
Reference
Network Access Device Monitoring and Policy Service Node Policy Administration
Access-Layer Devices Troubleshooting The “Work-Horse”: RADIUS, Node: All Management UI Admin
Enforcement Point for all Logging and Profiling, WebAuth, Posture, Activities & synchronizing
Policy Reporting Data Sponsor Portal Client all ISE Nodes
Provisioning
Policy Sync
RADIUS from NAD to PSN Platform
eXchange Grid
Node: Share
RADIUS response from PSN to NAD PSN queries context in/out
User external database
RADIUS Accounting directly
Publish
syslog Config
Publish Sessions
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
ISE Node Personas = Functional Roles
Policy Administration Node Policy Service Node Monitoring and Network Access Device
All Management UI Activities RADIUS, Profiling, Web Auth, Troubleshooting Access-Layer Devices
Synchronizing all ISE Nodes Posture, Sponsor Portal, Client Logging and Enforcement Point for all
Provisioning Reporting Data Policy
Admin
User All Policy is Synchronized
User
from PAN to PSNs
RADIUS From NAD to Policy Service Node
AD
RADIUS From PSN to NAD w/ Enforcement Result
RADIUS Accounting
Logging
Logging
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
ISE Policy Architecture For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
For Your
Reference
ISE Design and Deployment Terms
• Persona Deployment
Standalone = All personas (Admin/MnT/pxGrid/Policy Service) located on same node
Distributed = Separation of one or more personas on different nodes
• Topological Deployment
Centralized = All nodes located in the same LAN/campus network
Distributed = One or more nodes located in different LANs/campus networks
separated by a WAN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Standalone Deployment
All Personas on a Single Node: PAN, PSN, MnT, pxGrid
pxGrid Node
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Activity Time !
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Basic 2-Node ISE Deployment (Redundant)
• Maximum sessions– 50,000 (platform dependent—same as standalone)
• Redundant sizing – 50,000 (platform dependent—same as standalone)
Primary Secondary
Monitoring Monitoring
Primary Secondary
pxGrid pxGrid
Controller Controller
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Basic 2-Node ISE Deployment (Redundant) For Your
Reference
Maximum Sessions = 50,000 (Platform dependent) Centralized
Branch B
Branch A
Switch Switch
AP 802.1X AP 802.1X
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Hybrid-Distributed Deployment
Admin + MnT on Same Appliance; Policy Service on Dedicated Appliance
• 2 x Admin+Monitor+pxGRID
PAN PAN
• Max 5 PSNs MnT
MnT
• Optional: Dedicate 2 of the 5 for pxGrid PXG PXG
AD/LDAP
(External ID/ AD/LDAP
Attribute Store) (External ID/
Data DC B Attribute Store)
Center A
WLC
ASA VPN 802.1X
w/ CoA
Switch
802.1X AP
WLC
802.1X Switch
AP 802.1X • Dedicated Management Appliances
• Primary Admin / Primary MnT
• Secondary MnT / Secondary Admin
Branch B
Branch A • Dedicated Policy Service Nodes—Up to 5 PSNs
• No more than 50,000 Sessions Supported
Switch Switch
802.1X 802.1X
• 3615 as Admin/MnT = Max 10k sessions
AP AP • 3655 as Admin/MnT = Max 25k sessions
• 3695 as Admin/MnT = Max 50k sessions
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Dedicated-Distributed Persona Deployment
Dedicated Appliance for Each Persona: Admin, Monitoring, pxGrid, Policy
• 2 x Admin and 2 x Monitoring and up to 4 x pxGrid
Optional
• Max PSNs (Platform dependent)
➢ 50 using 3595/3655/3695 as PAN and MnT
• Max sessions (Platform dependent) PAN MnT PXG
➢ 500k using 3595/3655/3695 as PAN and MnT
➢ 2M - 3695 as PAN/MNT on ISE 2.6 (DOT1X/MAB
only)
PSNs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Fully Dedicated-Distributed Deployment For Your
Reference
Maximum Sessions = 500,000 (2M dot1x/mab ONLY) / Maximum 50 PSNs
AD/LDAP
pxGrid (P) PXG (External ID/ AD/LDAP
Attribute Store) (External ID/
Data DC B Attribute Store)
Center A
WLC
ASA VPN 802.1X
w/ CoA
Switch
802.1X AP
WLC
802.1X Switch
802.1X
AP
•Redundant, dedicated Administration and Monitoring nodes split across
data centers (P=Primary / S=Secondary)
Branch A
Branch B •Policy Service cluster for Wired/Wireless services at main campus
•Distributed Policy Service clusters for DR sites or larger campuses with
higher-bandwidth, lower-latency interconnects.
AP
Switch
AP
Switch •Centralized PSN clusters for remote Wired/Wireless branch devices
802.1X 802.1X
•VPN/Wireless at main campus
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Multi-Interface Routing For Your
Reference
AD/LDAP
(External ID/ AD/LDAP
Attribute Store) (External ID/
Data DC B Attribute Store)
DNS NTP SMTP
Center A DNS NTP SMTP
WLC
802.1X
Switch
802.1X AP
WLC
802.1X Switch
AP 802.1X
Branch A
Branch B
Switch Switch
AP 802.1X AP
802.1X
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
For Your
Reference
Session Scaling by Deployment Model 35xx
Minimum Nodes (Redundancy Included) ISE <2.6
(18) SNS-3595
(10) SNS-3595 (4) PXG (optional)
(2) SNS-3515 (2) SNS-3595 (6) SNS-3595 (2) PXG (optional)
(2-5) PSNs (2-5) PSNs (2) PXG (optional)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
For Your
Reference
Session Scaling by Deployment Model 36xx
Minimum Nodes (Redundancy Included) ISE 2.6
(9) SNS-3655 (24) SNS-3695
(2) SNS-3615 (2) SNS-3655 (2) SNS-3695 (6) SNS-3655 (2) PXG (optional) (4) PXG (optional)
(2-5) PSNs (2-5) PSNs (2-5) PSNs (2) PXG (optional)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Why design is Important
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Data Center
Branch Office
Radius
PAN PAN
MnT MnT
PSN
PSN PSN
pxGrid pxGrid
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Data Center A Data Center B
pxGrid pxGrid
PSN PSN
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Data Center A Data Center B
pxGrid pxGrid
PSN PSN
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Nodes and Personas
Deployment Models and
Sizing
Scaling ISE
ISE Scaling Improvements For Your
Reference
ISE 2.1-2.4
• Max concurrent active sessions per deployment = 500k (up from 250k)
• Requires PAN and MnT nodes to be 3595 or VM equivalent
• Max Internal Endpoints = 1.5M (up from 1M)
• Max Internal Users = 300k (up from 25k)
• Max Network Access Devices = 100k (up from 30k)
• Max Network Device Groups = 10k (up from 100) ISE 2.3+
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling by Deployment/Platform/Persona (35xx)
Max Concurrent Session Counts by Deployment Model and Platform For Your
Reference
• By Deployment
Max Active Sessions Max # Dedicated Min # Nodes (no HA) /
Deployment Model Platform
per Deployment PSNs / PXGs Max # Nodes (w/ HA)
Stand- All personas on 3515 7,500 0 1/2
alone same node 3595 20,000 0 1/2
PAN+MnT+PXG on 3515 as PAN+MNT 7,500 5 / 2* 2/7
Hybrid same node;
3595 as PAN+MNT
Dedicated PSN 20,000 5 / 2* 2/7
3595 as PAN and MNT 500,000 50 / 4 3 / 58
Dedicated PAN and
Dedicated 3595 as PAN and
MnT nodes
Large MNT 500,000 50 / 4 3 / 58
• By PSN Max Active Sessions != Max Endpoints; ISE 2.1-2.4 supports 1.5M Endpoints
Max Active Sessions per
Scaling per PSN Platform PSN *Each dedicated pxGrid node
reduces PSN count by 1
Dedicated Policy nodes SNS-3515 7,500
(Max Sessions Gated by Total (Medium deployment only)
Deployment Size) SNS-3595 40,000
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Scaling by Deployment/Platform/Persona (36xx)
Max Concurrent Session Counts by Deployment Model/Platform 2.6 For Your
Reference
• By Deployment
Max Active Sessions Max # Dedicated Min # Nodes (no HA) /
Deployment Model Platform
per Deployment PSNs / PXGs Max # Nodes (w/ HA)
3615 10,000 0 1/2
Stand- All personas on
alone same node 3655 25,000 0 1/2
3695 50,000 0 1/2
PAN+MnT+PXG on 3615 as PAN+MNT 10,000 5 / 2* 2/7
Hybrid same node; 3655 as PAN+MNT 25,000 5 / 2* 2/7
Dedicated PSN 3695 as PAN+MNT 50,000 5 / 4* 2/7
Dedicated PAN and 3655 as PAN and MNT 500,000 50 / 4 3 / 58
Dedicated
MnT nodes 3695 as PAN & MNT 500k (2M RAD ONLY) 50 / 4 3 / 58
• By PSN Max Active Sessions != Max Endpoints; ISE 2.6+ supports 2M Endpoints (dot1x/mab ONLY)
Max Active Sessions per
Scaling per PSN Platform PSN *Each dedicated pxGrid node
reduces PSN count by 1
Dedicated Policy nodes SNS-3615 10,000
(Medium deployment only)
(Max Sessions Gated by Total SNS-3655 50,000
Deployment Size) SNS-3695 100,000
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Policy Service Node Sizing
Physical and Virtual Appliance Guidance
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Appliance Hardware Specifications 34/35xx For Your
Reference
Basis for Virtual Appliance Sizing and Redundancy - 35xx required for 2.4
SNS-3500 Series
• ISE SNS Appliance Specifications
SNS-3415 SNS-3495 SNS-3515 SNS-3595
Platform
(34x5 Small) (34x5 Large) (35x5 Small) (35x5 Medium)
1 x QuadCore 2 x QuadCore 1 x 6-Core 1 x 8-Core
Intel Xeon CPU E5-2609 Intel Xeon CPU E5-2609 Intel Xeon CPU E5-2620 Intel Xeon CPU E5-2640
Processor
@ 2.40 GHz @ 2.40 GHz @ 2.30 GHz @ 2.60 GHz+20MB Cache
(4 total cores) (8 total cores) (6 total cores) (8 total cores)
Memory 16 GB 32 GB 16 GB 64 GB
1 x 600-GB 10k SAS HDD 2 x 600-GB 10k SAS HDDs 1 x 600-GB 10k SAS HDD 4 x 600-GB 10k SAS HDDs
Hard disk
(600 GB total disk space) (600 GB total disk space) (600 GB total disk space) (1.2 TB total disk space)
No (1GB FBWC Yes (RAID 10)
RAID No Yes (RAID 1)
Controller Cache) (1GB FBWC Cache)
2 x Integrated GE Ports 2 x Integrated GE Ports
Ethernet
4x Integrated Gigabit NICs 4 x Integrated Gigabit NICs 4x mLOM GE Ports 4x mLOM GE Ports
NICs
(6 total LAN ports) (6 total LAN ports)
Redundant
No (2nd PSU optional) Yes No (2nd PSU optional) Yes
Power?
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Appliance Hardware Specifications 36xx For Your
Reference
Basis for Virtual Appliance Sizing and Redundancy – supports ISE 2.4+
SNS-3615 SNS-3655 SNS-3695
Platform
(36x5 Small) (36x5 Medium) (36x5 Large)
Intel Xeon CPU 4410 Intel Xeon CPU 4416 Intel Xeon CPU 4416
Processor @ 2.10 GHz @ 2.10 GHz @ 2.10 GHz
(8 total cores) (12 total cores) (12 total cores)
Memory 32 GB 96 GB 256 GB
8 x 600-GB, 6Gb 10k SAS
1 x 600-GB, 6Gb 10k SAS HDD 4 x 600-GB, 6Gb 10k SAS HDDs HDDs
Hard disk
(600 GB total disk space) (1200 GB total disk space) (2400G total disk space)
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Session Agenda
Platforms – Hardware and VM’s You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Sizing Production VMs to Physical Appliances
Summary
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Setting Memory Allocations in VMware For Your
Reference
Guest VM Resource Reservations and Limits
Set Reservation to
Minimum VM appliance Optionally set CPU allocation limit Similar settings apply to Max
specs to ensure required >= Min ISE VM specs to prevent Allocation and Min Reservations for
CPU resources available over-allocation when actual CPU Memory.
and not shared with other assigned exceeds ISE VM
VMs. requirements.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Setting CPU and Memory Allocations in VMware
Guest VM Resource Reservations and Limits
For Your
Reference
•
4
Set Reservation to Minimum VM
appliance specs to ensure required
CPU resources available and not
shared with other VMs.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
• “Eval” OVA for PoC/Lab testing up to 100 Endpoints (no resv), 8 gig min if using
dot1x/mab only
ISE OVA Templates • All 3xx5 templates reserve CPU and Memory and require hyperthreading
• If require more custom disk option, then deploy .iso
Summary • Disks up to 2.4TB supported for greater MnT storage – requires EFI BIOS in vmware
• ISE 2.6 required for 36xx specs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
ISE 2.6 OVA Files
Reduced amount of files – using deployment options
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
ISE now supports deployment options in OVA
ESX embedded UI has a bug with (doesn’t work with 2 options) 600, 1.2TB
Vcenter works for all OVA files
vCenter 6x with HTML5
ESXi embedded host client
https://kb.vmware.com/s/article/2150338 —
Supported functionality in the HTML5 vSphere
Client for vSphere 6.5 & vSphere 6.7 (2150338)
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
For Your
Reference
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
ISE Platform Properties For Your
Reference
Minimum VM Resource Allocation – OLD INFO
Minimum Minimum Minimum
Platform Profile
CPUs RAM Disk • Least Common
2 4 100 GB EVAL Denominator used to
set platform.
4 4 200GB IBM_SMALL_MEDIUM
4 4 200GB IBM_LARGE • Example:
4 cores
4 16 200GB UCS_SMALL 32GB RAM
8 32 200GB UCS_LARGE = UCS_SMALL
12 16 200GB SNS_3515
Assumes
16 64 200GB SNS_3595 HyperThreading
Enabled
16 256 200GB SNS_3595 <large>
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
ISE Platform Properties For Your
Reference
How Does ISE Detect the Size of my Virtual Machine?
• During Installation, ISE checks # CPU cores, RAM, and Disk Space allocated and
assigns platform profile
• Profile recalculated if...
• Resources change (RAM/CPU cores)
• Persona changes on ISE (node-config.rc).
• Note: Disk size changes NEVER get updated in ISE without reimage.
• Persona change from ISE deployment page will trigger profile recalculation.
• May be out of sync due to upgrade of resources after initial install
• Migration from eval/PoC
• Resources added to meet version or capacity requirements
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
• Least Common
ISE Platform Properties Denominator used to
Minimum VM Resource Allocation for SNS35xx/36xx set platform.
Minimum Minimum Minimum • Example:
Platform Profile
CPUs RAM Disk 4 cores
2 16 200GB EVAL 16 GB RAM
= EVAL
12 16 200GB SNS_3515
35xx
16 64 200GB SNS_3595
16 256 200GB “Super MnT” <custom> More to come! On
2.4
16 32 200GB SNS_3615
36xx
24 96 200GB SNS_3655
24 256 200GB SNS_3695 • Small -3515 & 3615
• Medium - 3595 & 3695
35xx/36xx Newer platforms require
• Large - 3695
hyperthreading
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
ISE OVA Templates For Your
Reference
Vmware 6.5 support for ISE 2.4, 6.x supported for 2.6 OVAs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
ISE OVA Templates For Your
Reference
Vmware 6.5
Platform.properties
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
For Your
Reference
Platform Detection and Sizing
Platform CPU CPU Total Assume Hyper- Total Logical
Slots Physical Threading Processors
Cores Enabled
SNS-3515 1 Intel Xeon E5-2620 6 Yes 12
SNS-3595 1 Intel Xeon E5-2640 8 Yes 16
SNS-3615 1 Intel Xeon 4110 8 Yes 16
SNS-3655 1 Intel Xeon 4116 12 Yes 24
SNS-3695 1 Intel Xeon 4116 12 Yes 24
EVAL < 16 GB & < 4 CPU cores
sns3515 (SNS-3515) >=16 GB RAM; >=12 CPU cores
sns3595 (SNS-3595) >=64 GB RAM; >=16 cores CPU
superMNT <custom> >=256 GB RAM; >=16 cores CPU
sns3615 (SNS-3615) >=32 GB RAM; >=16 cores CPU
sns3655 (SNS-3655) >=96 GB RAM; >=24 cores CPU
sns3695 (SNS-3695) >=256 GB RAM; >=24 cores CPU
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Platform Detection and Sizing For Your
Reference
Verify what ISE is seeing
• CPU
• # sh cpu
• Mem
• # sh mem
• Detected Platform
• # sh tech-support
PlatformProperties show inventory: Process Output:
Profile : UCS_SMALL
Current Memory Size : 15927532
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
ISE Platform Properties
Verify ISE Detects Proper VM Resource Allocation
• From CLI...
• ise-node/admin# show tech | begin PlatformProperties
UCS_SMALL
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
ISE Platform Properties For Your
Reference
Forcing ISE to Recognize New Resource Allocations
• From CLI...
• Requires TAC support to make changes
via root patch
• May be required if application server stuck
(cannot acceess Admin UI)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
ISE Hypervisor Support For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Note: NIC order normal if < 4 VM NICs.
ISE Virtual OS and NIC Support
OVAs have 4 NICs, so E1000 NICs used to
For Your avoid order confusion.
Reference
• ISE 2.0/2.1 Notes for VMware Virtual Appliance installs using ISO image
• VMware ESXi 5.x / 6.x (OVA recommended):
• Linux KVM • Choose Redhat Linux 7 (64-bit) (ISE 2.0.1+)
• Manually enter resource reservations
• ISE 2.2+
• VMware ESXi 5.x / 6.x Virtual Network Interfaces
• Linux KVM • Choose either E1000 or VMXNET3 (default)
• RHEL 7.0 or Ubuntu 14.04 LTS • ISE 2.0+ supports up to (6) Network Adapters
• Microsoft Hyper-V on 2012R2 or later • ESX Adapter Ordering Based on NIC Selection:
ADE-OS ISE E1000 VMXNET3
• ISE 2.6+
eth0 GE0 1 4
• Linux KVM RHEL 7.3
eth1 GE1 2 1
• Release notes & install guide eth2 GE2 3 2
eth3 GE3 4 3
Bootable USB: http://www.linuxliveusb.com/ eth4 GE4 5 5
eth5
#CLMEL
GE5
BRKSEC-3432
6 6
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
ISE VM Disk Storage Requirements For Your
Reference
Minimum Disk Sizes by Persona 2.x
• Upper range sets #days MnT log retention
• Min recommended disk for MnT = 600GB Persona Disk (GB)
Standalone 200+*
• Max hardware appliance disk size = 1.2TB
(3595/3655) 2.4TB (3695) Administration (PAN)
200-300**
Only
• Max virtual appliance disk size = 1.99TB (<2.6) Monitoring (MnT) Only 200+*
2.4TB (2.6) Policy Service (PSN)
200
** Variations depend on where backups saved or Only
upgrade files staged (local or repository), PAN + MnT 200+*
debug, local logging, and data retention PAN + MnT + PSN 200+*
requirements.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
ISE VM Disk Storage Requirements For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
VM Disk Allocation For Your
Reference
CSCvc57684 Incorrect MnT allocations if setup with VM
disk resized to larger without ISO re-image
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
MnT Node Log Storage Requirements for RADIUS For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
ISE VM Disk Provisioning Guidance
• Please! No Snapshots! IO Performance Requirements:
• Snapshots NOT supported; no option ➢ Read 300+ MB/sec
to quiesce database prior to snapshot.
➢ Write 50+ MB/sec
• VMotion supported but storage
motion not QA tested. Recommended disk/controller:
• Recommend avoid VMotion due to ➢ 10k RPM+ disk drives
snapshot restrictions. ➢ Supercharge with SSD !
• Thin Provisioning supported ➢ Caching RAID Controller
• Thick Provisioning highly recommended, especially for ➢ RAID mirroring
PAN and MnT) Slower writes using RAID 5*
• No specific storage media and file system
restrictions. *RAID performance levels:
http://www.datarecovery.net/articles/raid-level-
• For example, VMFS is not required and NFS allowed comparison.html
provided storage is supported by VMware and meets ISE http://docs.oracle.com/cd/E19658-01/820-4708-
IO performance requirements. 13/appendixa.html
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
ISE VM Provisioning Guidance
• Use reservations (built into OVAs)
• Do not oversubscribe!
Customers with VMware expertise may choose to
disable resource reservations and over-subscribe,
but do so at own risk.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
ISE Disk IO Performance Testing For Your
Reference
Sample Tests With and Without RAID Controller Caching
• Caching Disabled
• Average Write ~ 25 MB/s
• Caching Enabled
• Average Write ~ 300 MB/s
• > 10x increase!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
ISE Disk IO Performance Testing For Your
Reference
Sample Tests Using Different RAID Config and Provisioning Options
• 2x Write performance increase using Eager vs Lazy 0
• Note: IO performance equalizes once disk blocks written
• 5x Write performance increase using RAID 10 vs RAID 5
Write Perf ↑ Write Perf ↑ Write Perf ↑
RAID Config Read Write
over 1 over 2 over 3
1 RAID 5: 4-Disk Lazy Zero 697 MB/s 9 MB/s NA NA NA
2 RAID 5: 4-Disk Eager Zero 713 MB/s 16 MB/s 78% (~2x) NA NA
3 RAID 10: 4-Disk Eager Zero 636 MB/s 78 MB/s 767% (~10x) 388% (~5x) NA
4 RAID 10: 8-Disk Eager Zero 731 MB/s 167 MB/s 1756% (~20x) 944% (~10x) 114% (~2x)
Read Performance roughly the same Write Performance impact by RAID config
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
VM Appliance Resource Validation Before Install
For Your
Reference
Validate VM Readiness
BEFORE Install &
Deploy
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
VM Appliance Resource Validation During Install
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
VM Installation – Absolute Minimum Requirements
• ISE 2.x install will not
even proceed without:
• 4GB RAM
• 2 CPU Cores
• 100GB Disk
• Rec minimum 8GB RAM
& 200Gig Disk
• Absolute minimum
settings used for ~20
sessions in evaluation
setup only.
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
VM Appliance Resource Validation After Install
ISE continues to test I/O read/write performance on 3-hour intervals For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
VM Appliance Resource Validation After Install
ISE continues to test I/O read/write performance on 3-hour intervals For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
General ISE VM Configuration Guidelines For Your
Reference
Oversubscription of CPU, Memory, or Disk storage NOT recommended – All VMs should have 1:1
mapping between virtual hardware and physical hardware.
CPU: Map 1 VM vCPU core to 1 physical CPU core.
• Total CPU allocation should be based on physical CPU cores, not logical cores, but with HT enabled, you must
allocate double the # logical CPUs to ISE VM.
Memory: Sum of VM vRAM may not exceed total physical memory on the physical server.
• Additional 1 GB+ of physical RAM must be provisioned for hypervisor itself (this is to cover overhead to run
VMs). Refer to hypervisor release notes for actual requirements.
In general, OVAs help simplify install + reserve resources, but be aware of custom disk sizes and
CSCvh71644 – OVAs allocating only ½ required CPUs (OK in 2.4+)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Introducing “Super” MnT
For Any Deployment where High-Perf MnT Operations Required
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Introducing “Super” MnT
For Any Deployment where High-Perf MnT Operations Required
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
ISE 2.4 MnT+ Fast Access to Logs and Reports
Reports
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
ISE 2.4 MnT Vertical Scaling Scaling Enhancements
Benefits MnT
Faster Live Log Access on ALL ISE
•Run session directory tables from pinned memory platforms
•Tables optimized for faster queries
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
ISE 2.4 MnT Vertical Scaling Scaling Enhancements
Results
For Your
Scaling: Reference
• Normalisation and Deduplication helped to reduce data size drastically.
• With the separated main report data, we are able to store 20 times more than current data for same disk
usage.
• We are able to store 2 Million endpoints at least 4-6 months after the changes.
Performance:
• Search timings on the normalized tables improved from 10 min to 0.2 – 4 seconds, due to their small sized
tables(in kb and mb only)
• By reducing the data size more data is pinned to memory that improved overall performance.
• Time taken to generate report with NAD search resulted in 548409 records got reduced from 7 minutes to 3
seconds
• Time taken to generate report with Endpoint search resulted in 8 records got reduced from 8 minutes to 0.4
seconds
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
For Your
Reference
ISE 2.4 Super MnT
Scale Test Results/Observations
Scenarios Results Results Performance
(256GB RAM (256GB RAM Gain
+ 4 HDDs) + 8 HDDs)
Live Log: initial load of live log page 30 Sec 10 Sec 67%
Live Log : show 100 records within Last 3 hours 20 Sec 5 Sec 75%
Live Log with Filters: Identity (Scale) 55 Sec 25 Sec 55%
Live Log with Filters: (Network device name) 40 Sec 15 Sec 63%
Reports: single session Today Launch 42 Sec 5 Sec 88%
Reports: single session 30 Days Launch 180 Sec 75 Sec 58%
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Session Agenda
Bandwidth and Latency You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Bandwidth and Latency
Bandwidth and Latency
• Bandwidth most critical between:
• PSNs and Primary PAN (DB Replication)
• PSNs and MnT (Audit Logging)
• Latency most critical between PSNs and Primary PAN.
PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN
` PSN PSN
• Latency guidance is not a “fall off the cliff” number, but a guard rail based on what QA has
tested.
• Not all customers have issues with > 300ms while others may have issues with <100ms latency
due to overall ISE design and deployment.
• Profiler config is primary determinant in replication requirements between PSNs and PAN
which translates to latency.
• When providing guidance, max 300ms roundtrip latency is the correct response
from SEs for their customers to design against.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
What if Distributed PSNs > 300ms RTT Latency?
< 300 ms
> 300 ms
WLC
PSN PSN PSN PSN PSN
PSN PSN PSN P
PSN PSN PSN PSN PSN PSN PSN
PSN PSN PSN PSN PSN PSN Switch PSN
RADIUS
PAN MnT P
PSN PSN
< 300 ms PSN PSN
PSN P
> 300 ms WLC Switch PSN PSN
PSN PSN
WLC Switch
#CLMEL BRKSEC-3432
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Option #2: Centralize PSNs Where Latency < 300ms
For Your
Reference
RADIUS
Switch
RADIUS
< 300 ms
> 300 ms
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Deploy Local Standalone ISE Nodes as “Standby”
Local Standalone nodes can be deployed to
remote locations to serve as local backups in
case of WAN failure, but will not be synced to
centralized deployment.
PSN
Switch
PSN
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Access Devices Fallback to Local PSNs on WAN Failure
• Access Devices point to local ISE nodes as
tertiary RADIUS Servers.
• Backup nodes only used if WAN fails
• Standalone ISE Nodes can still log to
centralized MNT nodes.
-- Use TCP Syslog to Buffer logs
PSN
PSN
For Your
Reference
More on NAD Fallback and Recovery strategies
under the High Availability
#CLMEL section.
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
ISE Bandwidth Calculator (Single-Site) For Your
Reference
ISE 1.x
https://community.cisco.com/t
5/security-documents/ise-
latency-and-bandwidth-
calculators/ta-p/3641112
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
ISE Bandwidth Calculator – Updated for ISE 2.1+
ISE 2.x
Note:
Bandwidth
required for
RADIUS traffic
is not included.
Calculator is
focused on
inter-ISE node
bandwidth
requirements.
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling ISE Services Agenda
• Active Directory and LDAP Integration
• Passive Identity and Easy Connect
• Guest and Web Authentication
• Compliance Services—Posture and MDM
• TACACS+ Design and Scaling
• Profiling and Database Replication
• MnT (Optimize Logging and Noise Suppression)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
ISE Personas and Services Session Services includes base user
services such as RADIUS, Guest,
Enable Only What Is Needed !! Posture, MDM, BYOD/CA
• ISE Personas:
• PAN
• MNT
• PSN
• pxGrid
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
ISE Personas and Services For Your
Maximum Personas and PSN nodes running service Reference
Maximum
Persona / Service Comments
Nodes
PAN 2 Admin UI restricts to 2
MnT 2 Admin UI restricts to 2
pxGrid 4 Increased from 2 in ISE 2.4
PSN 50 Requires 3595/3655/3695
PAN/MnT
Session 50
Profiling 50 Typically enabled w/Session
TC-NAC 1 Admin UI restricts to 1
ISE SXP 4 Up to 2 SXPSN pairs
Device Admin (T+) 50 Typically 2 sufficient
Passive Identity Multiple 2+ recommended for WMI
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Session Agenda
Radius, Web Auth, Profiling, TACACS You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling RADIUS, Web, Profiling, and TACACS+ w/LB
• Policy Service nodes can be configured in a cluster behind a load balancer (LB).
• Access Devices send RADIUS and TACACS+ AAA requests to LB virtual IP.
PSNs (User
Services)
Network
VPN Access
Devices
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Auth Policy Optimization (ISE 2.2 and Earlier) For Your
Reference
Leverage Policy Sets to Organize and Scale Policy Processing
Policy Set
Condition
Authentication
Authorization
Policy Sets
BRKSEC-3432 #CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Policy Sets For Your
Reference
Standard Equipment under new ISE 2.3 Policy User Interface
• No Authentication Outer Rule – Now part of Policy Set
23456
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Auth Policy Optimization • Policy Logic:
Avoid Unnecessary External Store Lookups o First Match, Top Down
o Skip Rule on first negative condition
match
• More specific rules generally at top
• Try to place more “popular” rules
before less used rules.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Auth Policy Optimization For Your
Reference
Rule Sequence and Condition Order is Important!
Example #1: Employee Example #2: Employee_CWA
1. Endpoint ID Group 1. Location (Network Device Group)
2. Authenticated using AD? 2. Web Authenticated?
3. Auth method/protocol 3. Authenticated via LDAP Store?
4. AD Group Lookup 4. LDAP Attribute Comparison
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Auth Policy Policy Set
ISE 2.3 Example Condition
Authentication
Authorization
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Auth Policy Policy Set
ISE 2.3 Example Condition
Authentication
For Your
Reference Authorization
• Nested Conditions
• “IS NOT” insertion
• Simplified Boolean
(AND/OR) logic
• Condition Library
with Drag & Drop
• Rule Hit Counts
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
• Policy Logic:
Auth Policy Optimization o First Match, Top Down
o Skip Rule on first negative match
ISE 2.3 Bad Example
• More specific rules generally at top
1. AD Groups
2. AD Attributes
5. ID Group
6. SQL Attributes
7. Auth Method
8. Endpoint Profile
BRKSEC-3432
9. Location
#CLMEL BRKSEC-3699 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Auth Policy Optimization For Your
Reference
ISE 2.3 Better Example!
Block 1 1. Location
2. Auth Method
4. AD Groups
Block 3
5. AD Attributes
6. ID Group
7. Certificate
Block 4
8. SQL Attributes
9. MDM
#CLMEL BRKSEC-3699
BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
For Your
Reference
ISE 2.4+ Auth Policy Scale
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Custom User Attributes For Your
Reference
New Attribute Types in ISE 2.2 include IP / Boolean / Date
Administration > Identity Management > Settings
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Dynamic Variable Substitution For Your
Reference
Rule Reduction • Match conditions to unique values stored per-
User/Endpoint in internal or external ID stores (AD,
• Authorization Policy Conditions LDAP, SQL, etc)
• ISE supports custom User and Endpoint attributes
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Dynamic Variable Substitution - Example For Your
Reference
Define Custom User Attributes
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Dynamic Variable Substitution - Example For Your
Reference
Populate Internal / External User External User:
AD / LDAP / SQL / OTP
Internal User:
Update via Import
or ERS API
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Dynamic DACLs in Authorization Profile For Your
Reference
Per-User Policy in 1 rule
1. Populate attribute in
internal or external ID
store.
2. Reference attribute in
Authorization Profile
under dACL
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Enable EAP-Fast Session Resume For Your
Reference
Major performance boost, but not complete auth so avoid excessive timeout value
For Your
Reference
#CLMEL
BRKSEC-3432
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
For Your
Reference
Stateless Session Resume for EAP-TLS
• EAP-TLS Session resumption allows the reuse of a recently valid TLS session ticket - improving performance
for clients making multiple requests. This improves performance from the clients’ perspective, because it
eliminates the need for a new (and time-consuming) TLS handshake to be conducted each time a request is
made.
• Cisco ISE supports session ticket extension as described in RFC 5077
• When Stateless resume is enabled in ISE it allows EAP-TLS session resumption without requiring the session
state to be stored at the server
• Cisco ISE creates a ticket and sends it to an EAP-TLS client. The client presents the ticket to ISE to resume a
session
• When a user reconnects within the configured EAP-TLS session timeout period, ISE resumes the EAP-TLS
session and reauthenticates the user with TLS handshake only, without a certificate check.
• The Stateless session resumption is supported in the distributed deployment, so that a session ticket issued
by one node is accepted by another node.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
ISE Stateless Session Resume For Your
Reference
Allows Session Resume Across All PSNs
• Session ticket extension per RFC 5077
[Transport Layer Security (TLS) Session Resumption without Server-Side State]
• ISE issues TLS client a session ticket that can be presented to any PSN to shortcut
reauth process (Default = Disabled)
Allows resume with
Load Balancers
Policy > Policy Elements > Results > Authentication > Allowed Protocols
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
ISE 2.2 Stateless Session Resume For Your
Reference
Master Key Generation Period
• Master Key Generation Period = Time until new master key is regenerated.
Cancel all
previously
generated
master keys
and tickets
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
OTP Token Caching For Your
Reference
Password Caching for RSA SecureID and RADIUS Token Servers
• Allows re-use of
passcode for
specified interval.
• Per-PSN cache
—not replicated
across PSNs.
• Cache entry
deleted if pass-
word mismatch
• RFC 5077 Session Ticket Extension
supported
Administration > Identity Management > External Identity Stores
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Machine Access Restrictions (MAR) Review For Your
Reference
Couples Machine + User Authentication
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
MAR Cache Persistence and Distribution For Your
Reference
Save MAR Cache After PSN Restart / Synchronize Cache Across PSNs
Administration > System > Deployment
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Session Agenda
AD and LDAP You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling AD and LDAP
Integration
Scaling AD Integration w/ Sites & Services
How do I ensure Local PSN is connecting to Local AD controller?
Which AD
server should I
connect to?
I will connect
Which AD with local AD
server should I server X!
AD ‘X’
connect to?
AD ‘X’
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Multi–Forest Active Directory Support For Your
Reference
Scales AD Integration through Multiple Join Points and Optimized Lookups
For Your
Identity Reference
Scope AD
Rewrite
AuthC (Optional) Instance (Optional)
Policy to
AD Domain List Target AD
(Optional)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
AD Authentication Flow
For Your
Reference
Identity
Scope AD
Rewrite
AuthC (Optional) Instance (Optional)
Policy to
AD Domain List Target AD
(Optional)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Authentication Domains (Whitelisting) For Your
Reference
Enable r1.dom
And disable the rest
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Authentication Domains – Unusable Domains
For Your
• Domains that are unusable, e.g. 1-way trusts, are hidden automatically Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Run the AD Diagnostic Tool For Your
Reference
Check AD Joins at Install & Periodically to Verify Potential AD Connectivity Issues
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
AD Background Diagnostics
Schedule Periodic Testing to Verify AD Connectivity and Health
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
For Your
Reference
Validating DNS from ISE node CLI
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Enhanced AD Domain Controller Management and Failover
Preferred DC Based on Scoring System
+27 +32
+11 +6
-30 -25
+67 X
-100/+100) PSN
PSN PSN P
PSN PSN
X +58
PSN PSN
For Your
Reference #CLMEL BRKSEC-3432
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
ISE 2.4 DC Selection and Failover For Your
Reference
DC Scoring System Determines Priority List
• Scoring Rules
• DC with lowest score preferred
• Score range: -100 / +100
Scores and Scoring Events only
• System error: score +25
viewable in debug logs
• Timeout: score +10
• Slow CLDAP ping: score +1
• Successful CLDAP ping: score -1
• DC failover:
➢ Collect DCs that respond CLDAP ping during the limited time period after the first DC answered: first DC answer time +
200ms. All responded DCs will be stored and assigned an initial score or updated an existing score.
➢ If the DC site is different than the client site, run the per-site DNS query and repeat the DC discovery process as above.
➢ Select a DC with minimal score from the list of responded DCs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Per-PSN LDAP Servers For Your
Reference
• Assign unique
Primary and
Secondary to
each PSN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
Load Balancing For Your
Reference
LDAP Servers
Lookup1
Lookup2 = ldap.company.com
Response = 10.1.95.7
10.1.95.6
10.1.95.5
15 minute reconnect timer
ldap1.company.com
LDAP Query to 10.1.95.7
10.1.95.6
10.1.95.6
10.1.95.6
LDAP Response from 10.1.95.7
ldap2.company.com
PSN
10.1.95.7
ldap3.company.com
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
BRKSEC-2132 What’s new in ISE Active
AD Integration Best Practices Directory Connector
(CiscoLive.com/online) -Chris Murray
• DNS servers in ISE nodes must have all relevant AD records (A, PTR, SRV)
• Use UPN/fully qualified usernames when possible to expedite use lookups For Your
Reference
• Use AD indexed attributes* when possible to expedite attribute lookups
• Run Scheduled Diagnostics from ISE Admin interface to check for issues.
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Passive Identity / Easy Connect Architecture For Your
Reference
Publish Session
AD Logins Topic to pxGrid
PSN
SXP PXG
Cisco ASA
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
Easy Connect For Your
Reference
MAC IP
ISE Session Directory
Uname Profile Method Source SGT
Consuming Both AD and RADIUS Logins Identity
1.2.3.4 chyps
Mapping
Windows Event log
Identity
2.3.4.5 imbashir
IP Address Username Mapping
AD Logins WMI
AD Logins
PSN MnT
IdMap RADIUS Logins
SXP
Publish Session
Update SXP peers Topic to pxGrid
with SGT mappings
from RADIUS PXG
Cisco ASA
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Easy Connect Enforcement MAC IP
ISE Session Directory
Uname Profile Method Source SGT
Merging RADIUS and AD Login Identity 00:11:22:3 Windows7- Dot1x Identity
Id Map-
1.2.3.4 chyps 10
3:44:55 WS +PsvID Mapping
RADIUS
• Merge active RADIUS Windows Event log 11:22:33:4 Windows 10 MAB Id Map-
Identity
2.3.4.5 imbashir 30
IP Address Username 4:55:66 +PsvID RADIUS
Mapping
Identity with passive AD Identity
1.2.3.4 chyps 22:33:44:5 Samsung
3.4.5.6 hslai dot1x RADIUS 10
5:66:77 Galaxy
• AuthZ = RADIUS + PassiveID 2.3.4.5 imbashir
33:44:55:6
5.6.7.8 zsariedd Apple-iPad mab RADIUS 20
6:77:88
44:55:66:7 Apple-
6.7.8.9 awoland dot1x RADIUS 10
7:88:99 anything
Monitored DC2
Monitored DC5
PSN Member
(Psv ID) Server with
PIC Agent
DC4
DC6
https://blogs.technet.microsoft.com/wincat/2008/08/11/quick-
and-dirty-large-scale-eventing-for-windows
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
ISE 2.2 Passive ID and Easy Connect Multi-Service Scaling For Your
Reference
Max Concurrent Passive ID/Easy Connect Sessions by Deployment and Platform
Max # Max RADIUS Max Merged/EZC
Max Passive
Scaling per Deployment Model Platform Dedicated Sessions per Sessions (subset of
ID Sessions
PSNs Deployment RADIUS/Psv ID)
3415 0 5,000 50,000 500
Standalone:
3495 0 7,500 100,000 1,000
All personas on same node
(2 nodes redundant) 3515 0 10,000 100,000 1,000
3595 0 20,000 300,000 2,000
3415 as PAN+MNT 5/3+2 5,000 50,000 500 / 2,500
Hybrid: PAN+MnT on same node and
3495 as PAN+MNT 5/3+2 10,000 100,000 1,000 / 5,000
Dedicated PSNs
3515 as PAN+MNT 5/3+2 7,500 100,000 1,000 / 5,000
(Minimum 4 nodes redundant)
3595 as PAN+MNT 5/3+2 20,000 300,000 2,000 / 10,000
Dedicated PAN and MnT nodes 3495 as PAN and MNT 38 + 2 250,000 100,000 25,000
(Minimum 6 nodes redundant) 3595 as PAN and MNT 48 + 2 500,000 300,000 50,000
Max RADIUS Max Merged/EZC
Scaling per PSN Platform Sessions Max Passive Sessions
per PSN ID Sessions per PSN
SNS-3415 Dedicated 5,000 50,000 10,000
Dedicated Policy nodes
SNS-3495 PSNs 20,000 100,000 25,000
(Max Sessions Gated by Total
Deployment Size) SNS-3515 (2 for HA) 7,500 100,000 15,000
SNS-3595 40,000 300,000 50,000
Shared PSNs (up to 5) OR PSNs dedicated to RADIUS
#CLMEL (up to 3) and Passive
BRKSEC-3432 © 2019ID
CiscoService (2Allfor
and/or its affiliates. HA) Cisco Public
rights reserved. 184
ISE 2.4 Passive ID & Easy Connect Multi-Service Scaling
Max Concurrent Passive ID/Easy Connect Sessions by Deployment and Platform
Max # Max RADIUS Max Merged/EZC
Max Passive
Deployment Model Platform Dedicated Sessions per Sessions (subset of
ID Sessions
PSNs Deployment RADIUS/Psv ID)
Stand- All personas on 3515 0 7,500 100,000 1,000
alone same node 3595 0 20,000 300,000 2,000
PAN+MnT+PXG on 3515 as PAN+MNT 5/3+2 7,500 100,000 1,000 / 5,000
Hybrid same node;
Dedicated PSN 3595 as PAN + MNT 5/3+2 20,000 500,000 2,000 / 10,000
Each Persona on 3515 as PAN and MNT 48 + 2 500,000 500,000 500,000
Dedicated
Dedicated Node 3595 as PAN and Large MnT 48 + 2 500,000 1M 500,000
Shared PSNs (up to 5) OR PSNs dedicated to RADIUS (up to 3) Number of PSNs dedicated to Passive Identity
and Passive ID Service (2 for redundancy) (Minimum 2 for HA)
Same Still
Custom User? There?
AD AD AD AD Apps
AD AD
Almost#CLMEL
Anything
BRKSEC-3432 © 2019
© 2019 Cisco
Cisco and/or
and/or its its affiliates.
affiliates. AllAllrights
rightsreserved.
reserved. Cisco
CiscoPublic
Public 189
ISE-PIC (Passive Identity Connector) Scaling
Max Passive ID Sessions and pxGrid Subscribers by Virtual Platform 35xx 2.4 & 36xx 2.6
Max # Max RADIUS Max Passive ID Max pxGrid
ISE-PIC Deployment • ISE-PIC currently
Appliances Sessions Sessions Subscribers
delivered as virtual
35/615 Virtual Appliance 1 (2 for HA) 0 100,000 20 appliance only
3595/3655 1 (2 for HA) 0 300k/500k 20
3695 Virtual Appliance 1 (2 for HA) 0 2M 20 • Sizing based on
SNS-3515/3595
35xx/36xx specifications
ISE Passive ID / ISE-PIC
Virtual Appliance
Max AD Forest/Domain Join Points (user/group queries) 50
Max AD Domain Controllers supported via WMI or ISE AD Agent 100
Max AD Agents (assuming 1:1 agent to DC) 100
Recommended # DCs per Agent (agent on DC) 1 Passive ID scale
Recommended # DCs per Agent (agent on member server) 10 applies to BOTH
Recommended # PSNs enabled for WMI (Passive ID service) 2 ISE 2.6 and ISE-
Max REST API Providers 50 PIC
Max REST API EPS 1,000
Max Syslog Providers 70
Max Syslog EPS 400
Max Endpoints Probed per Interval 100,000
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
Session Agenda
Guest and WebAuth You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling Guest and
Web Authentication
Services
192
Scaling Global Sponsor / MyDevices DNS SERVER: DOMAIN =
COMPANY.COM
Use Global Load Balancing / intelligent DNS to direct traffic to closest VIP.
Local Web Load-balancing distributes request to single PSN.
Local LB
Load Balancing simplifies and scales ISE Web Portal Services
#CLMEL BRKSEC-3432
10.3.0.100
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
Activity Time !
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Scaling Global Sponsor / MyDevices DNS SERVER: DOMAIN =
COMPANY.COM
10.1.0.100
10.1.0.100
• Guests auth with 802.1X using EAP methods like PEAP-MSCHAPv2 / EAP-GTC
• 802.1X auth performance generally much higher than web auth
Warning:
Watch for
expired guest
accounts, else
high # auth
failures !
Note: AUP and Password Change cannot be enforced since guest bypasses portal flow.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Scaling Web Auth
“Remember Me” Guest Flows
• User logs in to Hotspot/CWA portal and MAC address auto-registered into
GuestEndpoint group
• AuthZ Policy for GuestEndpoints ID Group grants access until device purged
ISE 2.4 see Work Centers > Guest Access > Settings > Logging
reporting
communit
y post
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
Automated Device Registration and Purge For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
Endpoint Purging For Your
Reference
Matching Conditions
Purge by:
▪ # Days After
Creation
▪ # Days Inactive
▪ Specified Date
Matching Conditions
Purge by:
▪ # Days After
Creation
▪ # Days Inactive
▪ Specified Date
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Scaling Posture & MDM
202
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL Presentation ID © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
ISE 2.6 Lightweight Session Directory
User device session information shared across the deployment
• Avoids using MnT or PAN nodes as a
single point of truth or failure.
• LSD stores a light session information
and replicates it across the
deployment using RabbitMQ
• Allows future Infrastructure
development for WAN survivability –
PAN/MnT unreachable
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISE Architecture before LSD (2.6)
Session exists in local PSN and MnT node
• Services including posture, profiling
require frequent sessions information
from MnT > PSN
• MnT Overload & performance
degradation
• Delays (System Responsiveness)
• Limited Scale
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
ISE Architecture on LSD (2.6)
Session exists in local PSN and MnT node
• Each new session data propagated to all PSNs using Rabbit MQ
• Sessions data cached locally via Redis DB
• Full-Mesh Routing Message Bus
• No bottlenecks, one hop delivery, truly distributed, persona agnostic
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
Posture Lease
Once Compliant, user may leave/reconnect multiple times before re-posture
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
MDM Scalability and Survivability
What Happens When the MDM Server is Unreachable?
• ISE 1.4+ supports multiple MDM servers – could be same or different vendors.
• All attributes retrieved & reachability determined by single API call on each new session.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
ISE 2.4 adds support for managing MDM
Scaling MDM Attributes via ERS API
Prepopulate MDM Enrollment and/or Compliance via ERS API
<groupId>groupId</groupId>
<identityStore>identityStore</identityStore>
<identityStoreId>identityStoreId</identityStoreId>
<customAttributes>
<mac>00:01:02:03:04:05</mac>
<customAttributes>
<mdmComplianceStatus>false</mdmComplianceStatus> <entry>
<mdmEncrypted>false</mdmEncrypted> <key>MDM_Registered</key>
<mdmEnrolled>true</mdmEnrolled> <value>true</value>
<mdmIMEI>IMEI</mdmIMEI> </entry>
<mdmJailBroken>false</mdmJailBroken> <entry>
<mdmManufacturer>Apple Inc.</mdmManufacturer> <key>MDM_Compliance</key>
<mdmModel>iPad</mdmModel> <value>false</value>
<mdmOS>iOS</mdmOS> </entry>
<mdmPhoneNumber>Phone Number</mdmPhoneNumber> <entry>
<mdmPinlock>true</mdmPinlock> <key>Attribute_XYZ</key>
<mdmReachable>true</mdmReachable> <value>Value_XYZ</value>
<mdmSerial>AB23D0E45BC01</mdmSerial> </entry>
<mdmServerName>AirWatch</mdmServerName>
</customAttributes>
<portalUser>portalUser</portalUser>
</customAttributes>
<profileId>profileId</profileId>
<staticGroupAssignment>true</staticGroupAssignment>
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
<staticProfileAssignment>false</staticProfileAssignment>
TACACS+ Scaling
Session Agenda
Compliance Services: Posture and MDM You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Design #1 – RADIUS & TACACS+ Share PSNs
For Your
Reference
ISE Deployment
PSN-1
PAN
MNT
PSN-2
RAD
RADIUS & T+
T+
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Design #2 – RADIUS & T+ Use Dedicated PSNs
For Your
Reference
ISE Deployment
PSN-1
PSN-3
PSN-5
PAN
PSN-2 MNT
PSN-4
PSN-6
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
#2 Option – Separate Services in Steady State…
For Your
Reference
ISE Deployment
PSN-1
PAN
MNT
PSN-2
RAD
RADIUS & T+
T+
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
Design #3 – Separate Deployments for RAD & T+
For Your Dev Admin Only
Reference
PSN-1
PSN-3 MNT
PSN-5
PAN
RADIUS Only
PSN-2
PSN-4 MNT
PSN-6
T+ TACACS+ Only
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
…Fallback to other Service Node on Failure For Your
Reference
ISE Deployment
PSN-1
PAN
MNT
PSN-2
RAD
RADIUS & T+
T+
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Options for Deploying Device Admin
https://community.cisco.com/t5/security-documents/ise-tacacs-deployment-amp-sizing-guidance/ta-p/3612253
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
RADIUS Only PSNs For Your
Reference
Administration > System > Deployment > [ISE node]
TACACS+ Disabled
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
TACACS+ Only PSNs For Your
Reference
Administration > System > Deployment > [ISE node]
Device Admin = T+
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
TACACS+ Design For Your
Reference
3 Basic ISE Deployment Models for Device Administration
Dedicated Deployments Dedicated PSNs Integrated
Whether you dedicate a separate instance for TACACS+ is more of a security and operational policy decision. If separated in ACS today,
then continue doing so if that model serves you well. If you wish to combine both TACACS+ Device Administration and RADIUS into
same deployment, then dedicating nodes to TACACS+ service may be the best option for a large organization to prevent user services
from impacting device admin services and vice versa.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 221
ISE 2.3 TACACS+ Scaling (RADIUS and T+) For Your
Reference
Max Concurrent TACACS+ TPS by Deployment Model and Platform
Max # Dedicated Max RADIUS Sessions per Max TACACS+
Deployment Model Platform
PSNs Deployment TPS
3415 0 5,000 50
All personas on same
Stand- 3495 0 10,000 50
node
alone 3515 0 7,500 50
(2 nodes redundant)
3595 0 20,000 50
PAN + MnT on same node; 3415 as PAN+MNT * 5 / 3+2 5,000 100 / 500
Dedicated PSN 3495 as PAN+MNT * 5 / 3+2 10,000 100 / 1,000
Hybrid
(Minimum 4 nodes 3515 as PAN+MNT * 5 / 3+2 7,500 100 / 1,000
redundant) 3595 as PAN+MNT * 5 / 3+2 20,000 100 / 1,500
Each persona dedicated 3495 as PAN and MNT * 40 / 38+2 250,000 1,000 / 2,000
Dedicated
(Min 6 nodes redundant) 3595 as PAN and MNT * 50 / 48+2 500,000 1,000 / 3,000
Max RADIUS Sessions per Max TACACS+
Scaling per PSN Platform
PSN TPS per PSN
SNS-3415 5,000 500
Dedicated Policy nodes
SNS-3495 20,000 1,000
(Max Sessions Gated by Deployment
Maximums) SNS-3515 7,500 1,000
SNS-3595 40,000 1,500
* Device Admin service enabled on same PSNs also used for RADIUS OR Split RADIUS and T+ PSNs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
ISE 2.4 TACACS+ Multi-Service Scaling (RADIUS and T+)
Max Concurrent RADIUS + TACACS+ TPS by Deployment Model and Platform
• By Deployment
Max # Dedicated Max RADIUS Sessions Max TACACS+ TPS per
Deployment Model Platform
PSNs per Deployment Deployment
Standa- All personas on 3515 0 7,500 100
alone same node 3595 0 20,000 100
PAN+MnT+PXG 3515 as PAN+MNT * 5 / 3+2 7,500 250 / 2,000
Hybrid on same node;
Dedicated PSN 3595 as PAN+MNT * 5 / 3+2 20,000 250 / 3,000
Each Persona on 3595 as PAN and MNT * 50 / 47+3 500,000 2,500 / 4,000
Dedicated
Dedicated Node 3595 as PAN and Large MNT * 50 / 47+3 500,000 2,500 / 6,000
* Device Admin service enabled on same PSNs also used for RADIUS OR Split RADIUS and T+ PSNs
• By PSN Each dedicated T+ PSN node reduces dedicated RADIUS PSN count by 1
Max RADIUS Sessions Max TACACS+ TPS per
Scaling per PSN Platform
per PSN PSN
Dedicated Policy nodes SNS-3515 7,500 2,000
(Max Sessions Gated by Total
Deployment Size) SNS-3595 40,000 3,000
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
ISE 2.6 TACACS+ Multi-Service Scaling (RADIUS and T+)
Max Concurrent RADIUS + TACACS+ TPS by Deployment Model and Platform
Max # Dedicated Max RADIUS Sessions Max TACACS+ TPS per
Deployment Model Platform
PSNs per Deployment Deployment
3615 0 10,000 100
Standa- All personas on
3655 0 25.000 100
alone same node
3695 0 50,000 100
PAN+MnT+PXG 3655 as PAN+MNT * 5 / 3+2 25,000 250 / 3,000
Hybrid on same node;
Dedicated PSN 3695 as PAN+MNT * 5 / 3+2 50,000 250 / 3,000
Each Persona on 3655 as PAN and MNT * 50 / 47+3 500,000 2,500 / 6,000
Dedicated
Dedicated Node 3595 as PAN and MNT * 50 / 47+3 500,000 (2M) 2,500 / 6,000
* Device Admin service enabled on same PSNs also used for RADIUS OR Split RADIUS and T+ PSNs
Each dedicated T+ PSN node reduces dedicated RADIUS PSN count by 1
Max RADIUS Sessions Max TACACS+ TPS per
Scaling per PSN Platform
per PSN PSN
SNS-3615 10,000 2,000
Dedicated Policy nodes
(Max Sessions Gated by Total SNS-3655 50,000 3,000
Deployment Size)
SNS-3695 100,000 3,000
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
ISE 2.3 TACACS+ Scaling (TACACS+ Only)
Max Concurrent TACACS+ TPS by Deployment Model and Platform
Max # Dedicated Max RADIUS Sessions Max TACACS+ TPS per
Deployment Model Platform
PSNs per Deployment Deployment
3415 0 N/A 500
All personas on same
Stand- 3495 0 N/A 1,000
node
alone 3515 0 N/A 1,000
(2 nodes redundant)
3595 0 N/A 1,500
PAN + MnT on same 3415 as PAN+MNT * 5 (2 rec.) N/A 2,500 (1,000)
node; Dedicated PSN 3495 as PAN+MNT * 5 (2 rec.) N/A 5,000 (2,000)
Hybrid
(Minimum 4 nodes 3515 as PAN+MNT * 5 (2 rec.) N/A 5,000 (2,000)
redundant) 3595 as PAN+MNT * 5 (2 rec.) N/A ** 7,500 (3,000)
Each persona dedicated 3495 as PAN and MNT * 40 (2 rec.) N/A ** 20,000 (2,000)
Dedicated
(Min 6 nodes redundant) 3595 as PAN and MNT * 50 (2 rec.) N/A ** 25,000 (3,000)
Max RADIUS Sessions Max TACACS+ TPS per
Scaling per PSN Platform
per PSN PSN
SNS-3415 5,000 500
Dedicated Policy nodes
SNS-3495
** Currently 20,000 1,000
(Max Sessions Gated by Total exceeds max
Deployment Size) SNS-3515 MNT log capacity 7,500 1,000
SNS-3595 40,000 1,500
* Device Admin service can be enabled on each PSN; minimally 2 for redundancy, but 2 often sufficient.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
ISE 2.4 TACACS+ Multi-Service Scaling (TACACS+ Only)
Max Concurrent TACACS+ TPS by Deployment Model and Platform
• By Deployment
Max # Dedicated Max RADIUS Sessions Max TACACS+ TPS
Deployment Model Platform
PSNs per Deployment per Deployment
Stand- All personas on 3515 0 N/A 1,000
alone same node 3595 0 N/A 1,500
PAN+MnT+PXG on 3515 as PAN+MNT *5/2 N/A 2,000 / 2,000
Hybrid same node; **
Dedicated PSN 3595 as PAN+MNT *5/2 N/A 3,000 / 3,000
**
Each Persona on 3595 as PAN and MNT * 50 / 4 N/A 5,000 / 5,000
Dedicated **
Dedicated Node 3595 as PAN and Large MnT * 50 / 5 N/A 10,000 / 10,000
**
* Device Admin service can be enabled on each PSN; minimally 2 for redundancy.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
TACACS+ MnT Scaling
Human Versus Automated Device Administration
• Consider the “average” size syslog from TACACS+ based on following guidance:
Each TACACS+ Session Each Command Authorization (per session)
Authentication: 2kB Command authorization: 2kB
Session authorization: 2kB Command accounting : 1kB
Session accounting: 1kB
5 <1 <1 750 1MB <1 <1 3.3k 4MB <1 <1 5.8k 9MB
10 <1 <1 1.5k 3MB <1 <1 6.5k 8MB <1 1 11.5k 17MB
25 <1 <1 3.8k 7MB <1 1 16.3k 19MB <1 2 28.8k 43MB
50 <1 1 7.5k 13MB <1 2 32.5k 37MB 1 4 57.5k 86MB
100 <1 1 15k 25MB 1 4 65k 73MB 2 8 115k 171MB
# NADs Based on 4 Scripted Sessions per Day
500 <1 5 6k 10MB <1 22 26k 30MB 1 38 46k 70MB
1,000 <1 10 12k 20MB 1 43 52k 60MB 1 77 92k 140MB
Script Admin
5,000 <1 50 60k 100MB 3 217 260k 300MB 5 383 460k 700MB
10,000 1 100 120k 200MB 6 433 520k 600MB 11 767 920k 1.4GB
20,000 3 200 240k 400MB 12 867 1.04M 1.2GB 21 1.5k 1.84M 2.7GB
30,000 5 300 480k 600MB 18 1.3k 1.56M 1.7GB 32 2.3k 2.76M 4.0GB
50,000 7 500 600k 1GB 30 2.2k 2.6M 2.9GB 53 3.8k 4.6M 6.7GB
Peak values based on 5-minute burst to complete each batch request.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
TACACS+ Multi-Service Scaling For Your
Reference
Required TACACS+ TPS by # Admins and # NADs
Session Authentication and Command Accounting Only Command Authorization + Acctg
Accounting Only (10 Commands / Session) (10 Commands / Session)
Avg Peak Storage/ Avg Peak Storage/ Avg Peak Storage/
Logs/Day Logs/Day Logs/Day
TPS TPS day TPS TPS day TPS TPS day
# Admins Based on 50 Admin Sessions per Day
1 <1 <1 150 < 1MB <1 <1 650 1MB <1 <1 1.2k 2MB
Human Admin
5 <1 <1 750 1MB <1 <1 3.3k 4MB <1 <1 5.8k 9MB
10 <1 <1 1.5k 3MB <1 <1 6.5k 8MB <1 1 11.5k 17MB
25 <1 <1 3.8k 7MB <1 1 16.3k 19MB <1 2 28.8k 43MB
50 <1 1 7.5k 13MB <1 2 32.5k 37MB 1 4 57.5k 86MB
100 <1 1 15k 25MB 1 4 65k 73MB 2 8 115k 171MB
# NADs Based on 4 Scripted Sessions per Day
500 <1 5 6k 10MB <1 22 26k 30MB 1 38 46k 70MB
1,000 <1 10 12k 20MB 1 43 52k 60MB 1 77 92k 140MB
Admin
Script Admin
5,000 <1 50 60k 100MB 3 217 260k 300MB 5 383 460k 700MB
10,000 1 100 120k 200MB 6 433 520k 600MB 11 767 920k 1.4GB
20,000 3 200 240k 400MB 12 867 1.04M 1.2GB 21 1.5k 1.84M 2.7GB
30,000 5 300 480k 600MB 18 1.3k 1.56M 1.7GB 32 2.3k 2.76M 4.0GB
50,000 7 500 600k 1GB 30 2.2k 2.6M 2.9GB 53 3.8k 4.6M 6.7GB
Peak values based on 5-minute burst to complete each batch request.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Scaling PSNs vs Logs per day For Your
Reference
8
Number of PSNs
7
6.44
6
5
4.6
4
3 2.76
2
1 0.92
0
0 10 20 30 40 50 60 70 80 90 100
Logs > 5M/day Number of Network devices (in Thousands)
9 7670 8000
8 7000
7
5369 6000
6
(millions) 5000
5 3835 4330
4000
4
3031 3000
3 2301
2165
2 2000
1299 1000
767 700
1 500 1000
433 300
100 0.6 4.6 0.84 3.64 6.44 1.2 5.2 9.2
2.6
0 0.12 0.52 0.92 0.36 1.56 0
10000 30000 50000 70000 100000
# of Network Devices (Single deployment) Log capacity > 5M logs/day
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Scaling Profiling and
Database Replication
Session Agenda
Profiling & Database Replication You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
ISE profiles based on ‘profiling policies’
The minimum ‘certainty metric’ in the profiling policy
evaluates the matching profile for an endpoint.
Certainty
Factor
DHCP Class-ID: MSFT
+10
HTTP User Agent: Windows
+10
RESULT
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Profiles Precedence
Cisco Provided Custom
Profile Profile
RESULT
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Endpoint Attribute Filter and Whitelist Attributes
Reduces Data Collection and Replication to Subset of Profile-Specific Attributes
• Whitelist Filter limits profile attribute collection to those required to support default
(Cisco-provided) profiles and critical RADIUS operations.
• Filter must be disabled to collect and/or replicate other attributes.
• Attributes used in custom conditions are automatically added to whitelist.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Significant Attributes For Your
Reference
When Does Database Replication Occur?
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
Significant Attributes vs. Whitelist Attributes For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Replication using JGroups For Your
Reference
PSN1 4 9 PSN2
Global Replication
1. First profile attributes (RADIUS) received for an endpoint by PSN1 and saved in local DB.
2. New endpoint so PSN1 declares ownership to local node group over local cluster channel.
3. PSN1 syncs all attributes for endpoint to PAN; PAN creates endpoint in DB.
4. PAN replicates all attributes for the endpoint to all other nodes via Global Replication channel.
5. New profile attributes (DHCP) for same endpoint received by PSN2 in same node group.
6. PSN2 communicates with PSN1 over local cluster channel to determine if change to white list attribute. In this case, yes, so PSN2
requests all attributes for endpoint from PSN1.
7. PSN2 declares ownership change to local node group.
8. PSN2—did significant attribute change? Yes, since profile updated. PSN2 syncs all attributes to PAN.
9. PAN saves to central DB and replicates all attributes to all other secondary nodes in deployment over global channel.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
JGroups Overview For Your
Reference
Software for reliable group(cluster) communication
Keeps track of member joins, leaves or crashes and notifies group members
Membership “View” shows who is currently part of the group
Members can send messages to all the members or to specific members and receive messages
Sending messages to all members is called multicast and specific members is called unicast
Supports different transports:
• UDP multicast
• UDP unicast
• TCP mesh
• TCP hub-and-spoke (gossip router); also referred to as tunneled mode
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Replication/Global Cluster For Your
Reference
• Replication Cluster is a group with all nodes in the ISE deployment, i.e. PANs, MnTs,
and PSNs
• Mainly used for the replication of configuration and runtime data from Primary PAN
to all other nodes
• Also used by Profiler for fetching attributes from current owner and updating
endpoint ownership changes; for example, when node is not a node group member
or loses connection to its local node group.
• Uses TCP Hub and Spoke (Gossip Router) transport with Primary PAN as the hub over
port TCP/12001
• All nodes should have connectivity to TCP/12001 on both Primary and Secondary
PAN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
ISE Inter-Node Communications For Your
Reference
Database Operations
PSN1 PSN2
PSN3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
Inter-Node Communications
TCP/12001 JGroups Tunneled
JGroup Connections – Global Cluster
MnT (P) MnT (S)
• All Secondary nodes* establish
connection to Primary PAN (JGroup
Controller) over tunneled connection
(TCP/12001) for config/database sync.
• Secondary Admin also listens on
Admin (P) Admin (S) TCP/12001 but no connection established
GLOBAL unless primary fails/secondary promoted
JGROUP
CONTROLLER • All Secondary nodes participate in the
Global JGroup cluster.
PSN1 PSN2
PSN1 PSN2
NODE GROUP A
(JGROUP A)
PSN3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 253
Inter-Node Communications TCP/7800 JGroup Peer Communication
JGroup Failure Detection
Local JGroups and Node Groups For Your
Reference
TCP/12001 JGroups Tunneled
PSN3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 254
Inter-Node Communications TCP/7800 JGroup Peer Communication
JGroup Failure Detection
Local JGroups and Node Groups TCP/12001 JGroups Tunneled
PSN3
PSN6
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Periodic Sync For Your
Reference
Normalize endpoint attributes between Redis and Oracle
• Approximately every 12 hrs, PSNs sync endpoint attributes with Primary PAN.
• Related Bug IDs:
• CSCuz44971 ISE 1.3 Inconsistent Endpoint inactivity timer causing purge issues
• CSCuu60871 Profiler: DNS Reverse Lookup Averted if less than 1 hour
• Solution:
• Periodically synchronize Oracle with the current endpoint owner's Redis cache so that Oracle information is
reasonably up to date. In order for this not to swamp the deployment with replication traffic, period syncs
of endpoint data to the PAN will be done without replicating the endpoint to all of the PSNs. The result is
that the PAN will have reasonably up-to-date information, while the PSNs will have the same stale
endpoint data that they have now. To make sure purging happens with reasonably accurate information,
PSNs will fetch endpoint data either from the local cache or from the PAN. If the endpoint cannot be
read from either source, then it will be skipped during that purge cycle.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
Node Groups and Session Recovery
Dynamic Clean Up for Orphaned URL-Redirected Sessions
Primary Primary
PAN PSN3 not responding!
MnT
Hey Primary MnT!
Did PSN3 have any active
sessions with pending
redirect?
JGroup “Master”
CoA Session
Terminate
PSN1 PSN2
RADIUS
Portal Redirect to
PSN3 PSN3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Inter-Node Communications TCP/7800 JGroup Peer Communication
TCP/7802 JGroup Failure Detection
Local JGroups and Node Groups TCP/12001 JGroups Tunneled
PSN3
PSN6
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
DNS: tcp-udp/53
NTP: udp/123
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 262
Profiling and Data Replication PAN(S)
MNT(P) MNT(S)
Ownership
# Change
Global
Replication
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
Impact of Ownership Changes
Before Tuning
PAN(Primary)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 264
Profiling and Data Replication PAN(S)
MNT(P) MNT(S)
DHCP 1
RADIUS Auth
RADIUS Acctng pxGrid
NMAP
Ownership
# Change
Global
Replication
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Impact of Ownership Changes
After Tuning PAN(Primary)
Owner
Node Group = DC1-group Node Group = DC2-group
PSN Clusters PSN
DHCP 1
RADIUS Auth
RADIUS Acctng pxGrid
NMAP
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 266
ISE Profiling Best Practices
Whenever Possible…
• Use Device Sensor on Cisco switches & Wireless Controllers to optimize data collection.
• Ensure profile data for a given endpoint is sent to a single PSN (or maximum of 2)
Do
• NOT
Sending send
same profile dataprofile data
to multiple PSNs tointer-PSN
increases multipletraffic and PSNs
contention!for endpoint ownership.
• For redundancy, consider Load Balancing and Anycast to support a single IP target for RADIUS or profiling using…
• DHCP IP Helpers
DO send profile data to single and same PSN or Node
• SNMP Traps
• DHCP/HTTP with ERSPAN (Requires validation)
•
Group !
Ensure profile data for a given endpoint is sent to the same PSN
• Same issue as above, but not always possible across different probes
• DOnode
Use usegroups
Device Sensor
and ensure ! data for a given endpoint is sent to same node group.
profile
• Node Groups reduce inter-PSN communications and need to replicate endpoint changes outside of node group.
• DO enable
Avoid probes thatthe Profiler
collect the sameAttribute Filter
endpoint attributes !
• Example: Device Sensor + SNMP Query/IP Helper
• Enable Profiler Attribute Filter
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 267
ISE Profiling Best Practices For Your
Reference
Whenever Possible…
• Use Device Sensor on Cisco switches & Wireless Controllers to optimize data collection.
• Ensure profile data for a given endpoint is sent to a single PSN (or maximum of 2)
• Sending same profile data to multiple PSNs increases inter-PSN traffic and contention for endpoint ownership.
• For redundancy, consider Load Balancing and Anycast to support a single IP target for RADIUS or profiling using…
• DHCP IP Helpers
• SNMP Traps
• DHCP/HTTP with ERSPAN (Requires validation)
• Ensure profile data for a given endpoint is sent to the same PSN
• Same issue as above, but not always possible across different probes
• Use node groups and ensure profile data for a given endpoint is sent to same node group.
• Node Groups reduce inter-PSN communications and need to replicate endpoint changes outside of node group.
• Avoid probes that collect the same endpoint attributes
• Example: Device Sensor + SNMP Query/IP Helper
• Enable Profiler Attribute Filter
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 268
ISE Profiling Best Practices
General Guidelines for Probes
• HTTP Probe:
• Use URL Redirects instead of SPAN to centralize collection and reduce traffic load related to SPAN/RSPAN.
• Avoid SPAN. If used, look for key traffic chokepoints such as Internet edge or WLC connection; use intelligent SPAN/tap options or
VACL Capture to limit amount of data sent to ISE. Also difficult to provide HA for SPAN.
• DHCP Probe:
Do
•UseNOT
IP Helpersenable all aware
when possible—be probes by serving
that L3 device default ! not relay DHCP for same!
DHCP will
• Avoid DHCP SPAN. If used, make sure probe captures traffic to central DHCP Server. HA challenges.
• Avoid SPAN, SNMP Traps, and NetFlow probes !
SNMP Probe:
• For polled SNMP queries, avoid short polling intervals. Be sure to set optimal PSN for polling in ISE NAD config.
• SNMP Traps primarily useful for non-RADIUS deployments like NAC Appliance—Avoid SNMP Traps w/RADIUS auth.
Limit pxGrid probe to two PSNs max for HA – possibly dedicated !
• NetFlow Probe:
• Use only for specific use cases in centralized deployments—Potential for high load on network devices and ISE.
• pxGrid Probe:
• Limit # PSNs enabled for pxGrid as each becomes a Subscriber to same data. 2 needed for redundancy.
• Dedicate PSNs for pxGrid Probe if high-volume data from Publishers.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 269
ISE Profiling Best Practices For Your
Reference
General Guidelines for Probes
• HTTP Probe:
• Use URL Redirects instead of SPAN to centralize collection and reduce traffic load related to SPAN/RSPAN.
• Avoid SPAN. If used, look for key traffic chokepoints such as Internet edge or WLC connection; use intelligent SPAN/tap options or
VACL Capture to limit amount of data sent to ISE. Also difficult to provide HA for SPAN.
• DHCP Probe:
• Use IP Helpers when possible—be aware that L3 device serving DHCP will not relay DHCP for same!
• Avoid DHCP SPAN. If used, make sure probe captures traffic to central DHCP Server. HA challenges.
• SNMP Probe:
• For polled SNMP queries, avoid short polling intervals. Be sure to set optimal PSN for polling in ISE NAD config.
• SNMP Traps primarily useful for non-RADIUS deployments like NAC Appliance—Avoid SNMP Traps w/RADIUS auth.
• NetFlow Probe:
• Use only for specific use cases in centralized deployments—Potential for high load on network devices and ISE.
• pxGrid Probe
• Limit # PSNs enabled for pxGrid as each becomes a Subscriber to same data. 2 needed for redundancy.
• Dedicate PSNs for pxGrid Probe if high-volume data from Publishers.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 270
Profiling Redundancy – Duplicating Profile Data
Different DHCP Addresses
- Provides Redundancy but Leads to Contention for Ownership = Replication
• Common config is to duplicate IP helper data
PSN-CLUSTER1 PSN1 (10.1.99.5)
at each NAD to two different PSNs or PSN LB (10.1.98.8)
Clusters
PSN2 (10.1.99.6)
• Different PSNs receive data
Load Balancer
DC #1 PSN3 (10.1.99.7)
int Vlan10
DHCP Request
PSN-CLUSTER2 PSN1 (10.2.101.5)
User DC #2 (10.2.100.2)
PSN2 (10.2.101.6)
PSN2 (10.2.101.6)
RADIUS
Switch
BRKSEC-3432 #CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 273
Profiler Tuning for Polled SNMP Query Probe For Your
Reference
#CLMEL BRKSEC-3432
BRKSEC-3699 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 274
274
pxGrid Profiler Probe (Context In)
First Integration is with Industrial Network Director (IND)
• IND communicates with Industrial Switches and Security Devices and collects detailed
information about the connected manufacturing devices.
• IND vX adds pxGrid Publisher interface to communicate IoT attributes to ISE.
IND ISE
• MAC Address Profiler Attributes
• IP Address Publisher • MAC Address
Subscriber
• iotAssetDeviceType • IP Address
• iotAssetProductCode • iotAssetDeviceType
• iotAssetProductName • iotAssetProductCode
• iotAssetRetrievedFrom • iotAssetProductName
• iotAssetSerialNumber • iotAssetRetrievedFrom
• iotAssetTrustLevel • iotAssetSerialNumber
• iotAssetTrustLevel
• iotAssetVendorName pxGrid
Controller • iotAssetVendorName
• iotAssetVendorID
• iotAssetVendorID
• iotAssetSwRevision • iotAssetSwRevision
• iotAssetHwRevision • iotAssetHwRevision
• iotAssetProtocol • iotAssetProtocol
• iotAssetBusinessOwner Custom Attributes • iotAssetBusinessOwner
• iotAssetLocation • iotAssetLocation
• iotAssetTag Supported !!! • iotAssetTag
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 275
pxGrid Profiler Probe (Context In)
First Integration with Cisco Industrial Network Director (IND)
• IND communicates with Industrial Switches and Security Devices and collects detailed information about the
connected manufacturing devices.
• IND v1.3 adds pxGrid Publisher interface to communicate IoT attributes to ISE.
For Your
ISE as pxGrid Subscriber to Reference
IND as pxGrid Publisher
Endpoint Asset topic
/topic/com.cisco.endp..
/topic/com.cisco.endpoint.asset
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 277
pxGrid Profiler Probe For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 278
Profiler Conditions Based on Custom Attributes
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 279
Profiling Based on Custom Attributes
Performance Hit if too many attibrutes, Disabled By Default
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 280
ISE 2.4 - New Profile Policies by the Numbers
Delivered Via Feed Service
• Cisco AP – 4 ▪ Lexmark – 4
• Fingerbank – 36
• Audio Code – 7
Total = 185
• Lexmark - 187
• Customer – 38
Total = 630
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 281
ISE 2.4 New Profiles For Your
Reference
Hierarchy Update
• Original issue: When new Printer model introduced, just gets profiled as
generic device such as Xerox-Device, or HP-Device.
• With new hierarchy, when a new Xerox Phaser Printer, for example, is released,
it is profiled as Xerox Phaser Printer, and later updated via Feed to specific
model.
• Hierarchy repeated for other printer company products (Xerox, HP, Brother,
Lexmark). Example:
• HP Printers: HP-Device > HP-Printer > [HP-Brand-Printer] > [Specific-HP-Brand-
Printer]
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 282
Printer Profile Hierachy For Your
Reference
New Profiles and Optimized Categories
BEFORE AFTER
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 283
New and Updated IoT Profile Libraries
Delivered via ISE Community: https://community.cisco.com/t5/security-documents/ise-endpoint-profiles/ta-p/3641187
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 284
700+ Automation and Control Profiles (1000+ inc. MedNAC)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 285
Automation and Control Profile Library For Your
Reference
https://communities.cisco.com/docs/DOC-66340
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 286
Why Do I Care about # Profiles?
• ISE 2.1 supports a MAX of 2000 profiles
• Let’s Do the Math…
• ~600 Base Profiles
• 600+ New Feed Profiles (2.4)
• 300+ Medical NAC Profiles
• 700+ Automation & Control Profiles
--------------------------------------
2300+ Profiles
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 287
Profiling Bandwidth For Your
Reference
Factors Impacting Bandwidth Consumption for Profiling (Not Logging/Replication)
• Profiling traffic will be probe specific and dependent on many factors including:
• RADIUS Probe itself does not consume additional bandwidth unless tied to Device Sensor.
• RADIUS traffic generated by Device Sensor will depend on switch DS config, i.e. all events or only changes, functions enabled, and filters set.
• SNMP Query is based on configured polling interval (NAD based) and NAD sizes (for example, bigger switches with more active ports/connections will result in higher
SNMP bandwidth).
• SNMP Query (Port based) can also be triggered by SNMP Traps or RADIUS Accounting State, but current code should limit to one query per 24hrs.
• SNMP Traps will depend on # endpoints and connection events. Note that SNMP trap processing only supported for Wired.
• DHCP-related profile traffic will be dependent on lease timers and connection and reauth rates. Reauth rates can be triggers by idle and session timers or CoA where
session terminates/port bounces and triggers DHCP). Traffic is multiplied by the number of PSN targets configured which is why I advocate limiting targets to no more
than two or possibly one using Anycast.
• DHCP SPAN option will likely consume more bandwidth, especially if not filtered on DHCP only, as it collects all DHCP including bidirectional traffic flows. Also, since
no simple methods for SPAN HA, may need to send multiple SPANs to different PSNs (not pretty and another reason why I don’t generally recommend SPAN option).
• HTTP via redirects does not consume additional bandwidth
• HTTP via SPAN may consume a lot of bandwidth and will depend on SPAN config, where placed, traffic volume, and whether capture is filtered for only HTTP. Note,
we will not parse HTTPS SPAN traffic. Like DHCP SPAN, multiple targets required for redundancy.
• NMAP is triggered, but only 3 attempts on newly discovered Unknowns or policy triggered. Additional endpoint SNMP queries will be endpoint specific. For most
part, it should be fairly quiet. There is manual nmap scan option, but this should be used with care to avoid excessive ISE or network load. As manual process,
requires deliberate admin trigger.
• DNS is triggered based on new IP discovery, but for most part should be quiet.
• Netflow can add a large amount of traffic and highly dependent on Netflow config on source and the traffic volume. Like SPAN challenges, volume is multiple by #
PSN Netflow targets unless leverage something like Anycast for redundancy.
#CLMEL BRKSEC-3432
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 288
BRKSEC-3432
Scaling MnT
(Optimize Logging and
Noise Suppression)
Session Agenda
MnT (Optimize Logging and Noise Suppression) You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
The Fall Out From the Mobile Explosion and IoT
▪ Explosion in number and type of endpoints on the network.
▪ High auth rates from mobile devices—many personal (unmanaged).
– Short-lived connections: Continuous sleep/hibernation to conserve battery power, roaming, …
▪ Misbehaving supplicants: Unmanaged endpoints from numerous mobile vendors may be misconfigured, missing
root CA certificates, or running less-than-optimal OS versions
▪ Misconfigured NADs. Often timeouts too low & misbehaving clients go unchecked/not throttled.
▪ Misconfigured Load Balancers—Suboptimal persistence and excessive RADIUS health probes.
▪ Increased logging from Authentication, Profiling, NADs, Guest Activity, …
▪ System not originally built to scale to new loads.
▪ End user behavior when above issues occur.
▪ Bugs in client, NAD, or ISE.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 291
Advice: Sizing
Endpoint Behavior
=1x
• Different Endpoints behave
differently on a network
• Because of this we need to consider
the types of endpoints when sizing
deployments =2x
• Mobile (handheld) devices are the
most demanding due to
wireless/power restrictions
• Based on observations from many
deployments, a 1x/2x/5x ratio is a
good rule of thumb
=5x
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 292
Advice: Sizing
Mobile devices typically have…
• Less RF Output power
• Fewer/Smaller Antennas
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 293
Advice: Sizing
As a Result…
• Roam more often (up to 5x)
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 294
A Few Bad Apples Can Spoil the Whole Bunch
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 295
Repeats Every 30 Seconds For Your
Reference
Client/Supplicant NAD ISE
SSID
30 seconds
30 seconds
First EAP Timeout 120sec
30 Seconds Later
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 296
No Response Received From Client For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 297
Clients Misbehave!
• Example education customer:
• ONLY 6,000 Endpoints (all BYOD style)
• 10M Auths / 9M Failures in a 24 hours!
• 42 Different Failure Scenarios – all related to
clients dropping TLS (both PEAP & EAP-TLS).
• Supplicant List:
• Kyocera, Asustek, Murata, Huawei, Motorola, HTC, Samsung, ZTE, RIM, SonyEric, ChiMeiCo, Apple, Intel,
Cybertan, Liteon, Nokia, HonHaiPr, Palm, Pantech, LgElectr, TaiyoYud, Barnes&N
• 5411 No response received during 120 seconds on last EAP message sent to the client
• This error has been seen at a number of Escalation customers
• Typically the result of a misconfigured or misbehaving supplicant not completing the EAP process.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 298
Challenge: How to reduce
the flood of log messages
while increasing PSN and MnT
MNT capacity and tolerance
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 299
Getting More Information With Less Data
Scaling to Meet Current and Next Generation Logging Demands
Rate Limiting at Source Filtering at Receiving Chain
Reauth period Heartbeat Detect and reject Count and discard repeate
Quiet-period 5 min frequency misbehaving clients events
Held-period / Exclusion 5 min
Switch Log Filter Count and discard
untrusted events
Reauth phones Load
Balancer PSN MNT
Quiet period
Misbehaving supplicant
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 300
BRKSEC-2059
Tune NAD Configuration Deploying ISE in a Dynamic Environment
Rate Limiting at Wireless Source Clark Gambrel
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 302
Wired & Wireless recommended links
Best Practices and Guides
• Top 6 settings for AireOS and ISE Wireless
• ISE and Catalyst 9800 series integration guide
• ISE Guest Access Prescriptive Deployment Guide
• Cisco ISE BYOD Prescriptive Deployment Guide
• ISE Secure Wired Access Prescriptive Deployment Guide
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 303
One-Click Setup for ISE Best Practice Config
• Checkbox to auto-
configure WLAN and
associated RADIUS
Servers to ISE best
practice.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 304
WLC – RADIUS Server Settings For Your
Reference
RADIUS Aggressive-Failover
• (Cisco Controller)>config radius aggressive-failover disable
• If this is set to 'enable‘ (default), the WLC will failover to next server after 5
retransmissions for a given client.
• Recommend disable to prevent single misbehaving client from failing over and
disrupting other client sessions
unless there are 3 consecutive tries for 3 different users (i.e. the radius-server is
unresponsive for multiple users).
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 305
RADIUS Accounting Update Behavior in WLC v8.x
Interim Update For Your
Reference
• WLC 7.6:
• Recommended setting: Disabled
• Behavior: Only send update on IP address
change
• Device Sensor updates not impacted
• WLC 8.0:
• Recommended setting: Enabled with
Interval set to 0
• Behavior: Only send update on IP address
change
• Device Sensor updates not impacted
• Upgrade maps settings correctly
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 306
For Your
Reference
WLC – Authentication Settings
Reduce the # Auths and ReAuths
• Increase Idle Timer to 1 hour (3600
sec) for secure (802.1X) SSIDs.
• Open SSIDs may require lower idle
timer to prevent overload from casual
associations.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 310
TAC Recommended AireOS Builds For Your
Reference
https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/
200046-TAC-Recommended-AireOS.html
• Recommended Releases: This document describes the way in which the customers can find the most reliable
WLC software available. The Cisco Wireless TAC recommends AireOS builds from each train of released AireOS
software. These recommendations may be updated weekly.
• Escalation Builds: In some cases, the TAC recommended build may be an "escalation" build. Such builds are not
available on CCO (Cisco.com), but have important bugfixes (beyond what is available in CCO code), and will have
been operating in production at customer sites for several weeks. Such builds are fully Business Unit (BU) and
TAC supported.
• To request a TAC recommended escalation build, open a Cisco TAC case on your WLC contract.
• AireOS 7.6: Not recommended. The recommended migration path is to AireOS 8.0.
• AireOS 8.0: TAC recommends 8.0.152.0.
• AireOS 8.1: 8.1.131.0 is final maintenance release of AireOS 8.1. Recommend upgrade to 8.2.
• AireOS 8.2: For new features or hardware after 8.0, TAC recommends 8.2.167.6 (8.2MR7).
• AireOS 8.3: For new features or hardware introduced after 8.2, TAC recommends 8.3.141.0.
• AireOS 8.4: Short lived release with no maintenance planned, and is deferred; 8.5 is recommended.
• AireOS 8.5: For new features or hardware after 8.3, TAC recommends 8.5.124.55 (8.5MR3 interim)
• AireOS 8.6: BU and TAC support the 8.6.101.0 release; required for features avail post 8.5.
• AireOS 8.6: BU and TAC support the 8.7.102.0 release; required for features avail post 8.6.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 311
Wireless Controllers Under Extreme Load (8.1+) For Your
Reference
Before 8.1, separate queues added for Auth and Accounting, but all servers share same two queues. (CSCud12582,
CSCul96254)
In 8.1, queues are not divvied or shared between Auth and Accounting–both will have separate queues
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 312
For Your
Reference
Wireless Best Practices
Anchor Configurations
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 313
Wireless Best Practices For Your
Reference
Roaming Considerations
• Session IDs can change when roam between controllers (L2 or L3 roaming); Going between APs to same
controller should fine.
• Secure SSIDs (802.1X): L2/L3 roaming between controllers should handle without reauth—all roams are
basically symmetric with tunnel back to foreign controller
• Open SSIDs (MAB, WebAuth):
• Avoid multiple controllers with open SSIDs – otherwise, will get new session ID (reauth) regardless if L2 or L3 roam.
[CSCul83594Session-id is not synchronized across mobility, if the network is open (fixed in 8.6)]
• Reauth any time change IP. For open SSID, it will always issue new SSID.
• Options:
• Stateful Controller Switchover
• Deploy higher-capacity controllers instead of many smaller ones.
• 802.11r will work with 7.6 or 8.0 and can be applied to entire WLAN—not tested under 7.6 so warning
provided.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 314
Tune NAD Configuration
Rate Limiting at Wired Source
Reauth period
Wired (IOS / IOS-XE)
Held-period 5 min • RADIUS Interim Accounting: Use newinfo parameter with long interval
Quiet-period / Exclusion 5 min (for example, 24-48 hrs), if available. Otherwise, set 15 mins. If LB
Switch present, set shorter than RADIUS persist time.
Reauth phones • 802.1X Timeouts
• held-period: Increase to 300+ sec
Quiet period • quiet-period: Increase to 300+ sec
Unknown users
• ratelimit-period: Increase to 300+ sec
• Inactivity Timer: Disable or increase to 1+ hours (3600+ sec)
Roaming supplicant
• Session Timeout: Disable or increase to 2+ hours (7200+ sec)
• Reauth Timer: Disable or increase to 2+ hours (7200+ sec)
• Bugfixes: Upgrade software to address critical defects.
Misbehaving supplicant
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 315
Wired – RADIUS Interim Accounting For Your
Reference
All IOS and IOS-XE Platforms
• Command:
switch(config)# aaa accounting update [newinfo] [ periodic number [ jitter maximum max-value ] ]
• Recommendation:
switch(config)# aaa accounting update [newinfo periodic 1440 | periodic 15]
Note: If RADIUS Load Balancing used, set lower than persistence interval to stick with same PSN.
• Reference:
• When the aaa accounting update command is activated, the Cisco IOS software issues interim accounting records for all
users on the system. If the keyword newinfo is used, interim accounting records will be sent to the accounting server every
time there is new accounting information to report.
• When used with the keyword periodic, interim accounting records are sent periodically as defined by the argument number
(in minutes). The interim accounting record contains all of the accounting information recorded for that user up to the time
the interim accounting record is sent.
• Jitter is used to provide an interval of time between records so that the AAA server does not get overwhelmed by a constant
stream of records. If certain applications require that periodic records be sent at exact intervals, you should disable jitter by
setting it to 0.
Caution: Using the aaa accounting update periodic command can cause heavy congestion when many users
are logged in to the network #CLMEL BRKSEC-3432
BRKSEC-3699 ©©
2019
2019
Cisco
Cisco
and/or
and/or
its its
affiliates.
affiliates.
AllAll
rights
rights
reserved.
reserved.Cisco
CiscoPublic
Public 316
316
Wired - 802.1X Timeout Settings For Your
Reference
All IOS and IOS-XE Platforms
held-period seconds Supplicant waits X seconds before resending credentials after a failed attempt.
Default 60.
quiet-period seconds Switch waits X seconds following failed authentication before trying to re-authenticate client.
Default: 120. • Cisco 7600 Default: 60.
ratelimit-period seconds Switch ignores EAPOL-Start packets from clients that authenticated successfully for X seconds.
Default: rate limiting is disabled.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 318
Wired – Authentication Settings For Your
Reference
Reduce the # Auths and ReAuths
• Disable or Increase Inactivity Timer to 1+ hours; Disable /increase Reauth to 2+ hours
switch(config-if)# authentication ?
• periodic Enable or Disable Reauthentication for this port
Enable inactivity timer with caution for
• timer Set authentication timer values
non-user / MAB endpoints.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 319
RADIUS Test Probes
Reduce Frequency of RADIUS Server Health Checks
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 320
NAD RADIUS Test Probes For Your
Reference
IOS Switch Test Probes
• By default, IOS Switches and WLC validate health through active authentications.
• Optional: IOS can send separate RADIUS test probes via idle-time setting.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 321
Load Balancer RADIUS Test Probes
Citrix Example F5 Example
▪ Probe frequency and retry settings: ▪ Probe frequency and retry settings:
– Time interval between probes: – Time interval between probes:
interval seconds # Default: 5 Interval seconds # Default: 10
– Number of retries – Timeout before failure = 3*(interval)+1:
retries number # Default: 3 Timeout seconds # Default: 31
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 323
PSN - Collection Filters
Static Client Suppression
Administration > System > Logging > Collection Filters
• PSN static filter based on
single attribute:
• User Name
• Policy Set Name
• NAS-IP-Address
• Device-IP-Address
• MAC (Calling-Station-ID)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 324
PSN Filtering and Noise Suppression (pre-ISE 2.2)
Misconfigured Client—Dynamic Detection and Suppression For Your
Reference
Administration > System > Settings > Protocols > RADIUS
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 326
PSN Filtering and Noise Suppression
Dynamic Client Suppression
Administration > System > Settings > Protocols > RADIUS
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 328
Enhanced EAP Session Handling
Improved Treatment for Empty NAK List
• Best Effort for Supplicants that Improperly Reply with Empty
NAK List: PSN suggests the most secure or preferred EAP
protocol configured (per Allowed Protocols list).
• Some supplicants may reply with NAK and not suggest alternative
protocol (empty NAK list).
• ISE will now suggest other supported protocols rather than fail For Your
Reference
auth.
Policy > Policy Elements > Results Authentication > Allowed Protocols
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 329
MnT Log Suppression and Smarter Logging
Drop and Count Duplicates / Provide Better Monitoring Tools
• Drop duplicates and increment counter in Live Log for “matching” passed
authentications Count and discard
• Display repeat counter to Live Sessions entries. repeated events
• Update session, but do not log RADIUS Accounting Interim Updates Count and discard
• Log RADIUS Drops and EAP timeouts to separate table for reporting purposes and untrusted events
display as counters on Live Log Dashboard along with Misconfigured Supplicants
and NADs MNT
• Alarm enhancements
• Revised guidance to limit syslog at the source.
• MnT storage allocation and data retention limits
• More aggressive purging Count and discard
repeats and unknown
• Allocate larger VM disks to increase logging capacity and retention. NAD events
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 330
MnT Noise Suppression (pre-ISE 2.2) For Your
Reference
Suppress Successful Auths and Accounting
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 332
MnT Noise Suppression Step latency is visible in
Live Logs details
Suppress Storage of Repeated Successful Auth Events
12304 Extracted EAP-Response containing> PEAP
Administration Systemchallenge-response
> Settings > Protocols > RADIUS
11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for
inner method
15041 Evaluating Identity Policy (Step latency=1048 ms)
15006 Matched Default Rule
Suppress Successful Reports 15013 Selected Identity Source - Internal Users
24430 Authenticating user against Active Directory
= Do not save repeated successful auth 24454 User authentication against Active Directory failed because of a timeout error
events for the same session to MnT DB (Step latency=30031 ms)
24210 Looking up User in Internal Users IDStore - test1
24212 Found User in Internal Users IDStore
These events will not display in Live 22037 Authentication Passed
Authentications Log but do increment 11824 EAP-MSCHAP authentication attempt passed
Repeat Counter. 12305 Prepared EAP-Request with another PEAP challenge
11006 Returned RADIUS Access-Challenge
5411 Supplicant stopped responding to ISE (Step latency=120001 ms)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 333
MnT Duplicate Passed Auth Suppression For Your
Reference
t = T1 MAB Request (22056 Subject not found) Failed Auth Log Ts Ts = Failed
Failure
Suppression
t = T2 802.1X Request (12321 Cert Rejected) Failed Auth Log T2 < Ts Interval
2 failures!
Tr Tr = Report
t = T5 MAB Request Interval
Report 5434
t = T6 802.1X Request
t = T7 MAB Request
Tr
t = T8 Total 5 failures Tx
802.1X Request
of same type! Reject Report 5449
Tx = Rejection
t = T9 Auth Request Interval
Rejection
Access-Reject Tr
Report 5449
t = T10 Auth Request
Access-Reject
Report 5449 Tr
Tr = Report
Tr Interval
Report 5449
Rejection
Tr Tx
Report 5449
Tx = Rejection
Interval
Tr
Report 5449
Tr
Report 5449
Rejection
Tr Tx
Report 5449
Tr
#CLMEL
BRKSEC-3432
Report 5449
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 336
ISE Log Suppression
“Good”-put Versus “Bad”-put
Incomplete Auth
PSN MnT
Requests
Accounting
RADIUS Failed Auth
Updates
Drops Suppressed
Suppressed
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 337
ISE Log Suppression For Your
Reference
“Behaving” Clients Impacted by “Misbehaving” Clients
PSN MnT
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 338
Typical Load Example
$$
IN OUT
$
$$
$
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 339
Extreme Noise Load Example
$$$
IN OUT
$$$
$$$
$$$
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 340
WLC – Client Exclusion
Blacklist Misconfigured or Malicious Clients
Blue entry = Most current Live Sessions entry with repeated successful auth counter
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 343
Authentication Suppression
Enable/Disable
• Global Suppression Settings: Administration > System > Settings > Protocols > RADIUS
Failed Auth Suppression Successful Auth Suppression
Caution: Do not disable suppression in deployments with very high auth rates.
It is highly recommended to keep Auth Suppression enabled to reduce MnT logging
• Selective Suppression using Collection Filters: Administration > System > Logging > Collection Filters
Configure specific traffic to bypass
Successful Auth Suppression
Useful for troubleshooting authentication for a
specific endpoint or group of endpoints, especially
in high auth environments where global suppression
is always required.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 344
Per-Endpoint Time-Constrained Suppression
Right Click
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 345
Visibility into Reject Endpoints!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 346
346
Releasing Rejected Endpoints
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 347
Releasing Rejected Endpoints
Sessions can have one of 6 states as shown in the Live Sessions drop-down.
• NAD START --> Authenticating
• NAD SUCCESS --> Authorized
• NAD FAIL / ACCT STOP / AUTH FAIL --> Terminated
• POSTURED --> Postured
• AUTH PASS --> Authenticated
• ACCT START / UPDATE --> Started
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 349
Clearing Stale ISE Sessions For Your
Reference
3. Endpoint idle—no activity (auth / accounting / posturing / profiling updates) in the last 5 days
• Note: Session is cleared from MnT but does not generate CoA to prevent negative impact to connected endpoints. In other words,
MnT session is no longer visible but it is possible for endpoint to still have network access, but no longer consumes license.
Manual Purge via REST API: HTTP DELETE API can manually delete inactive sessions.
➢ An example web utility that supports HTTP DELETE operation is cURL. It is a free 3rd-party command line tool for transferring
data with HTTP/HTTPS: http://www.cisco.com/en/US/docs/security/ise/1.2/api_ref_guide/ise_api_ref_ch2.html#wp1072950
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 350
For Your
Reference
Live Authentications Log
Dashboard Counters Drill Down on
counters
• Misconfigured Supplicants: Supplicants failing to connect to seein the last 24 hours
repeatedly
details
• Misconfigured Network Devices: Network devices with aggressive accounting updates in the
last 24 hours
• RADIUS Drops: RADIUS requests dropped in the last 24 hours
• Client Stopped Responding: Supplicants stopped responding during conversations in the last
▪ Misconfigured Supplicants: Supplicants failing to connect repeatedly in the last 24 hours
24 hours
▪ Misconfigured Network Devices: Network devices with aggressive accounting updates in the last 24
• Repeat
hours Counter: Authentication requests repeated in the last 24 hours with no change in
identity content, network device, and authorization.
▪ RADIUS Drops: RADIUS requests dropped in the last 24 hours
▪ Client Stopped Responding: Supplicants stopped responding during conversations in the last 24
hours
▪ Repeat Counter: Successful authentication requests repeated in the last 24 hours with no change in
identity content, network device, and authorization.
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
BRKSEC-3432 351
For Your
Live Authentications Log Reference
Dashboard Counters
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 354
Counters – Misconfigured NAS For Your
Reference
Access Devices That Send Excessive or Invalid RADIUS Accounting
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 355
Counters – RADIUS Drops For Your
Reference
Duplicate Session Attempts, Undefined NAD, Secret Mismatch, Non-
Conforming, Etc.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 356
Counters – Clients Stopped Responding For Your
Reference
Supplicants That Fail to Complete EAP Authentication
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 357
Counters – Repeat Count For Your
Reference
Endpoint Tally of Successful Re-authentications
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 358
Repeat Counter For Your
Reference
Successful Authentication Suppression
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 359
ISE 1.2 Alarms Do not forget aboutReference
For Your
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 360
Minimize Syslog Load on MNT For Your
Reference
Disable NAD Logging and Filter Guest Activity Logging
Guest Activity: Log only if required.
Rate Limiting at Source Filter and send only relevant logs
Disable NAD Logging unless
required for troubleshooting
Filter Syslog at
Switch Source
Roaming supplicant
Syslog Forwarder
* Filter at Relay
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 362
Guest Activity Logging For Your
Reference
Enable with purpose—only send logs of interest that apply to guest sessions.
ISE only parses log messages that include IP address of active guest account
ASA Example:
• Create Service Policy to inspect
HTTP traffic for guest subnet
• Filter messages ID # 304001:
accessed URLs
Log Filtering:
• If NAD supports, configure filters to limit logs only to those needed/usable by MnT.
• If unable to filter at NAD, use Syslog Relay to filter and forward desired messages.
MnT
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 364
BRKSEC-3432
High Availability
Session Agenda
High Availability: You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
High Availability
Agenda
• ISE Appliance Redundancy
Agenda
• ISE Node Redundancy
• Administration Nodes
• Monitoring Nodes
• pxGrid Nodes
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 367
Critical Services
External Services that can impact the Health of your ISE Deployment
• DNS and NTP
For Your
• Certificate Services: CA, OCSP/CRL Servers Reference
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
BRKSEC-3432
370
Ethernet
Yes* Yes* Yes* Yes*
4 GE NICs = 4 GE NICs = 6 GE NICs = 6 GE NICs =
Redundancy
Up to 2 bonded NICs Up to 2 bonded NICs Up to 3 bonded NICs Up to 3 bonded NICs
Redundant
No No
Power
(2ndPSU optional) Yes (2nd
PSU optional) Yes
UCSC-PSU-650W UCSC-PSU1-770W
* ISE 2.1 introduced NIC Teaming support for High Availability only (not active/active)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 371
Appliance Redundancy
In-Box High Availability
SNS-3615 SNS-3655 SNS-3695
Platform
(36x5 Small) (36x5 Medium) (36x5 Large)
Drive No Yes Yes
Redundancy (1) 600GB disk (4) 600-GB (8) 600-GB
Yes Yes
Controller Level 10 Level 10
Redundancy
No
Cisco 12G SAS Cisco 12G SAS
Modular RAID Modular RAID
Yes* Yes* Yes*
Ethernet 2 X 10Gbase-T 2 X 10Gbase-T 2 X 10Gbase-T
Redundancy 4 x 1GBase-T 4 x 1GBase-T 4 x 1GBase-T
Up to 3 bonded NICs Up to 3 bonded NICs Up to 3 bonded NICs
Redundant
No
Power
(2nd
PSU optional) Yes Yes
UCSC-PSU1-770W
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 372
NIC Redundancy Update For Your
Reference
NIC Teaming / Interface Bonding
• For Redundancy only – NOT a Performance and Scale feature in 2.1.
• Allows one interface to serve as a hot backup for another primary interface.
• Up to (3) bonds in ISE 2.1. [Up to (6) Network Interfaces supported in ISE 2.0]
• NIC Teaming pairs specific interfaces into Bonded interfaces
Individual Interfaces Bonded Interfaces Comments
Gigabit Ethernet 0
Bond 0 GE 0 is primary, GE 1 is backup
Gigabit Ethernet 1
Gigabit Ethernet 2
Bond 1 GE 2 is primary, GE 3 is backup
Gigabit Ethernet 3
Gigabit Ethernet 4
Bond 2 GE 4 is primary, GE 5 is backup
Gigabit Ethernet 5
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 373
NIC Teaming
Network Card Redundancy
• For Redundancy only–NOT for
increasing bandwidth.
GE0 Primary
• Up to (3) bonds in ISE 2.1
Bond 0 • Bonded Interfaces Preset–
GE1 Backup Non-Configurable
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 374
NIC Teaming Interfaces for Redundancy For Your
Reference
When GE0 is Down, GE1 Takes Over
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 375
NIC Teaming Interfaces for Redundancy
When GE0 is Down, GE1 Takes Over
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 376
For Your
Reference
NIC Teaming
• Bond 0 = eth0 + eth1
• Bond 1 = eth2 + eth3
• Bond 2 = eth4 + eth5
eth2 CIMC
eth3 IO
eth4 eth0
eth5 eth1
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 377
Configured at the CLI For Your
Reference
Add the Backup Interface to the Primary Interface Configuration
ise-psn1/admin(config-GigabitEthernet)# do sho int
bond0: flags=5187<UP,BROADCAST,RUNNING,MASTER,MULTICAST> mtu 1500
inet 10.1.100.245 netmask 255.255.255.0 broadcast 10.1.100.255
inet6 fe80::250:56ff:feb8:783b prefixlen 64 scopeid 0x20<link>
inet6 2001:db8::250:56ff:feb8:783b prefixlen 64 scopeid 0x0<global>
inet6 2001:db8::856d:cd6d:e5a3:155f prefixlen 64 scopeid 0x0<global> • IP on Bond Only
ether 00:50:56:b8:78:3b txqueuelen 0 (Ethernet)
RX packets 9102447 bytes 4493061475 (4.1 GiB) • Shared MAC Address
RX errors 0 dropped 48852 overruns 0 frame 0
TX packets 7634687 bytes 1939631607 (1.8 GiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
GigabitEthernet 0
flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
ether 00:50:56:b8:78:3b txqueuelen 1000 (Ethernet)
RX packets 9030026 bytes 4449311176 (4.1 GiB)
RX errors 0 dropped 20 overruns 0 frame 0
TX packets 7634687 bytes 1939631607 (1.8 GiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 • No IP address on
GigabitEthernet 1 Physical Interface
flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
ether 00:50:56:b8:78:3b txqueuelen 1000 (Ethernet) • Same MAC Address
RX packets 72421 bytes 43750299 (41.7 MiB)
RX errors 0 dropped 48832 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 378
378
NIC Teaming
NIC Teaming / Interface Bonding
• Configured using CLI only!
• GE0 + GE1 Bonding Example:
admin(config-GigabitEthernet0)# backup interface GigabitEthernet 1
• Requires service restart. After restart, ISE recognizes bonded interfaces for Deployment
and Profiling ; Guest requires manual config of eligible interfaces.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 379
Debugging NIC Bonding For Your
Reference
To help debug the assignment of interfaces to a portal on individual PSNs, detailed log messages
are written to /opt/CSCOcpm/logs/guest.log on each node.
• Example
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces specified in the portal settings: [eth0]
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces on this node: [bond0, eth2, eth3]
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces from portal settings that are available on this node:
[]
INFO [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interface eth0 is selected for portal 'Hotspot Guest Portal
(default)‘, but eth0 and eth1 are bonded together as interface bond0, so the portal cannot listen on eth0 alone. However, since bond0 is not selected for
this portal, the bonded interface will not be used.
• Another example:
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces specified in the portal settings: [eth0, bond0]
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces on this node: [bond0, eth2, eth3]
DEBUG [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interfaces from portal settings that are available on this
node: [bond0]
INFO [localhost-startStop-1][] cisco.cpm.guestaccess.portmanager.BondedInterfaceUtils -::- Interface eth0 is selected for portal 'Hotspot Guest Portal
(default)‘, but eth0 and eth1 are bonded together as interface bond0, so the portal cannot listen on eth0 alone. Since bond0 is also selected for this portal,
the bonded interface will be used instead.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 380
Virtual Appliance High Availability
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 381
BRKSEC-3432
382
ISE Node/Persona
Redundancy
Session Agenda
Node Redundancy: Admin, MnT and pxGrid You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
• Maximum two PAN nodes
per deployment
Admin Node HA and Synchronization • Active / Standby
PAN Steady State Operation
• Changes made to Primary Administration DB are automatically synced to all nodes.
Admin Node
(Secondary)
Policy Service Node
Policy Sync
Admin Node
Policy Sync
(Primary)
Policy Service Node
Admin
User Policy Policy Service Node
Logging
Sync
pxGrid Node
Monitoring Node Monitoring Node
(Primary) (Secondary)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 384
Admin Node HA and Synchronization
PAN Steady State Operation
Admin
User
Admin Node Admin Node
(Primary) (Secondary)
• Maximum two
Policy
PAN nodes per PSN
Policy Sync Sync
deployment
Policy
PSN
• Active / Sync
Standby
PSN
Monitoring Node Monitoring Node
(Primary) (Secondary)
PXG
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 385
Admin Node HA and Synchronization
Primary PAN Outage and Recovery
• Prior to ISE 1.4 or without auto failover, upon Primary PAN failure, admin user must connect to Secondary
PAN and manually promote Secondary to Primary; new Primary syncs all new changes.
• PSNs buffer endpoint Admin
updates if Primary PAN User
unavailable; buffered Admin Node Admin Node
updates sent once PAN (Primary) Policy (Secondary)
available. Sync
PSN
Policy Sync
Promoting
Policy
Secondary Admin PSN Sync
may take 10-15
minutes before
process is complete. PSN
Monitoring Node Monitoring Node
(Primary) (Secondary)
New Guest Users or Registered Endpoints PXG
cannot be added/connect to network when
Primary Administration node is unavailable! #CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 386
Policy Service Survivability When Admin Down/Unreachable
Which User Services Are Available if Primary Admin Node Is Unavailable?
Service Use case Works (Y / N)
RADIUS Auth Generally all RADIUS auth should continue provided access to ID stores Y
All existing guests can be authenticated, but new guests, self-registered guests, or
Guest N
guest flows relying on device registration will fail.
Previously profiled endpoints can be authenticated with existing profile. New
Profiler endpoints or updates to existing profile attributes received by owner should apply, Y
but not profile data received by PSN in foreign node group.
Posture Provisioning/Assessment work, but Posture Lease unable to fetch timer. Y
Device Reg Device Registration fails if unable to update endpoint record in central db. N
BYOD/NSP relies on device registration. Additionally, any provisioned certificate
BYOD/NSP cannot be saved to database. N
MDM MDM fails on update of endpoint record N
See BYOD/NSP use case; certificates can be issued but will not be saved and thus fail.
CA/Cert Services N
OCSP functions using last replicated version of database
Clients that are already authorized for a topic and connected to controller will
pxGrid N
continue to operate, but new registrations and connections will fail.
TACACS+ TACACS+ requests can be locally processed per ID store availability. Y
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 387
Automatic PAN Switchover Don’t forget, after switchover
admin must connect to PAN-2
Introduced ISE 1.4 for ISE management!
Note: Switchover is NOT immediate. Total time based on polling intervals and promotion time.
Expect ~15 - 30 minutes.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 388
ISE Admin Failover For Your
Reference
“Automated Promotion/Switchover”
• Monitor Process:
• Secondary node monitoring the health of the Primary PAN node is the Active monitor
• On Failure detection, Health Monitor for Primary PAN node initiates switchover by sending request to the
Secondary PAN to become new primary PAN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 389
PAN Failover Scenario For Your
Reference
Scenario 1
DC-1 DC-2
PAN-2 MNT-2
MNT-1 PAN-1 Secondary
Secondary
Primary Primary
over WAN
P-PAN Health
S-PAN Health
Check Node
Check Node
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 390
PAN Failover Scenario For Your
Reference
Scenario 2
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 391
PAN Failover Scenario For Your
Reference
Scenario 3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 392
PAN Failover
Health Check Node Configuration
• Configuration using GUI only under Administration > System > Deployment > PAN Failover
Requires Minimum of 3
nodes – 3rd node is
independent observer
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 393
HA Config Changes Sent via Instant Relay For Your
Reference
ISE 2.1+
Secondary
REST calls to propagate configuration Changes PAN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 394
Alarms in PAN Auto-Failover For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 395
PAN Auto-Failover Alarm Details For Your
Reference
Drill down on specific alarm to get Detailed Alarm information in a new page
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 396
MnT Distributed Log Collection For Your
Reference
• ISE supports distributed log collection across all nodes to optimize local data collection, aggregation, and
centralized correlation and storage.
• Each ISE node collects logs locally from itself; Policy Service nodes running Profiler Services may also collect
log (profile) data from NADs.
• Each node transports its Audit Logging data to each Monitoring node as Syslog—these logs are not buffered
unless use TCP/Secure Syslog
• NADs may also send Syslog directly to Monitoring node on UDP/20514 for activity logging, diagnostics, and
troubleshooting.
Policy Service Monitoring External Log
Profiler Syslog
NADs Nodes (UDP/30514)
Nodes Servers
HTTP SPAN,
DHCP
SPAN/Helper/Proxy Syslog Alarm-triggered
(UDP/20514) Syslog
NetFlow,
SNMP Traps,
RADIUS
(Not Buffered)
External Log Targets: Syslog (UDP/20514)
Syslog (UDP/20514)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 397
HA for Monitoring and Troubleshooting
Steady State Operation
• MnT nodes concurrently receive logging from PAN, PSN, NAD, and ASA
• PAN retrieves log/report data from Primary MnT node when available
Monitoring
NADs Node (Primary) MnT data
Admin
User
PAN
Syslog from access devices Syslog 20514 Syslog from ISE nodes
PSN are sent for session
are correlated with
user/device session tracking and reporting
Monitoring
FW
Node (Secondary)
PXG
Monitoring Node
FW (Secondary)
PXG
• PSN logs are not locally buffered when MnT down unless use TCP/Secure syslog.
Syslog from firewall
(or other user logging device) is • Log DB is not synced between MnT nodes.
correlated with guest session for • Upon return to service, recovered MnT node will not include data logged during outage
activity logging • Backup/Restore required to re-sync MnTBRKSEC-3432
#CLMEL
database © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 399
Log Buffering
TCP and Secure Syslog Targets <2.6
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 400
ISE 2.6: Rabbit MQ
A new type of architecture for ISE messaging services
• Move forward in terms of robustness, reliability , Scalability and code quality
• Introduced in 2.6 for Secure Syslog (WAN survivability)
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISE 2.6: Syslogs over ISE Messaging
WAN survivability and securing Syslog using Rabbit MQ
• Syslogs can use secure ISE Messaging
instead of UDP
• Messages buffered on PSN while MNT is
down
• Buffer is 4GB otherwise overflow, 200
per/sec 1kb message, 1.5 hrs filled
• DISABLED for Larger systems
performance issues needs more
hardening before allowed
• Smaller deployments ok ~500tps
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISE 2.6: Syslogs over ISE Messaging
RabbitMQ Topology for Syslogs
• Composed of federate links using AMQPS
• Links are unidirectional
• Links from all nodes to pri-MNT
• Links from all nodes to sec-MNT
• Links between the two MNTs
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Custom Logging Targets For Your
Reference
By Default, all PSNs Log to Same Logging Targets
PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN
PSN PSN
PSN PSN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 404
Custom Logging Targets For Your
Reference
Syslog Forwarder
Syslog Forwarder
PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN
Syslog Forwarder
PSN PSN
can perform
PSN PSN
custom filtering and
forwarding
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 405
Local Logging For Your
Per-PSN Log Targets Log Target = ise-logger.local Reference
10.2.1.10 10.4.1.10
PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
PSN PSN PSN PSN
(config)# ip host 10.6.1.10 ise-logger.local
If active pxGrid
Controller fails, clients
automatically attempt
connection to standby TCP/5222
pxGrid
controller. Client
(Subscriber)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 408
pxGrid • 2.3: Max two pxGrid v2 nodes/
HA for pxGrid v2 (ISE 2.3+) Clients deployment (Active/Active)
(Publishers) • 2.4: Max 4 nodes (All Active)
Steady State
Primary Primary Secondary Secondary
PAN MnT PAN MnT
• Download pxGrid Identity certs from the Primary and Secondary MnT nodes to pxGrid
clients and import both into the Trusted store.
• Specify the hostname of both pxGrid nodes in the pxGrid API.
Example:
./register.sh –keystoreFilename isekeyfile.jks –keystorePassword cisco123
–truststoreFilename rootfile.jks –truststorePassword cisco123
–hostname 10.0.1.33 10.0.2.79
• The pxGrid clients will register to both pxGrid nodes.
• If the pxGrid node registered to the primary goes down, the pxGrid client will continue
communication with the pxGrid registered to the secondary node.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 410
BRKSEC-3697 Advanced ISE Services, Tips and Tricks
(CiscoLive.com/online/connect/search.ww)
2016 Las Vegas - by Aaron Woland
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 412
CA Hierarchy For Your
Reference
Multi Node Deployment with 2 PANs and Multiple PSNs
P-PAN
S-PAN
PSN1 PSN2
• NODE_CA on Primary and Secondary PAN are signed by ROOT_CA on the Primary PAN
• NODE_CA on Primary PAN is responsible for signing EP_CA and OCSP cert for all PSNs
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 413
CA Hierarchy For Your
Reference
Multi Node Deployment with 2 PANs and Multiple PSNs
P-PAN
Promoted
S-PAN
• NODE_CA on Primary and Secondary PAN are signed by ROOT_CA on the Primary PAN
• NODE_CA on Primary PAN is responsible for signing EP_CA and OCSP cert for all PSNs
• If P-PAN fails and S-PAN promoted, new PSN certs will be signed by S-PAN NODE_CA, but same chain
of trust maintained to ROOT_CA
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 414
When Does CA Hierarchy Switch For Your
Reference
from 2 Roots to 1 Root?
• On Fresh Install: YES
• Single Root Hierarchy for all New Installs.
• On Upgrade: NO
• No changes on Upgrade – requires manual switch
• To manually switch to a Single Root Hierarchy:
• Administration > System > Certificate > Certificate Signing Requests > Replace ISE Root CA
• Note: If after an upgrade the administrator does not trigger the “Replace ISE Root CA”
operation, then any new PSN registering into the deployment will get its EP_CA and OCSP
certificates signed by the ROOT CA on the Primary PAN.
• This is same behavior as ISE 1.3/1.4.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 415
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 416
Export CA Certs from Primary PAN For Your
Reference
# application configure ise
cisco-lab-ise/admin# application configure ise
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 417
Import CA Certs from Primary to Secondary PAN
cisco-lab-ise/admin# application configure ise
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 419
Certificate Recovery for ISE Nodes For Your
Reference
Backup all System (Server) Certificates and Key Pairs
• System Certificates for all nodes can be centrally exported with private key pairs from
Primary PAN in case needed fro Disaster Recovery.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 420
OCSP Responder HA For Your
Reference
• Each PSN runs OCSP responder.
• OCSP DB replicated so can point to any PSN, or LB PSN cluster for OCSP HA.
http://ocsp.company.com ISE-PSN-1
PSN
1. Authenticator resolves ocsp.company.com to VIP @ 10.1.98.8 10.1.99.7
3
2. OCSP request sent to http://ocsp.company.com:2560/ocsp @ 10.1.98.8
ISE-PSN-3
3. Load balancer forwards request to PSN-3 (OCSP Responder) @ 10.1.99.7
4. Authentication receives OCSP response from PSN-3
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 422
Each PSN is an OCSP Responder
Load Balancing OCSP Updated Slide with New
Database replication ensures each PSN contains
Icons
same info for ISE-issued certificates.
Sample Flow
DNS Lookup = ocsp.company.com
DNS
1 DNS Response = 10.1.98.8 Server 10.1.99.5
http://ocsp.company.com ISE-PSN-1
Load Balancer
2 http://ocsp. company.com:2560/ocsp @ 10.1.98.8
10.1.99.6
https response from ise-psn-3 @ 10.1.99.7
Access VIP: 10.1.98.8
ASA 4 Device ISE-PSN-2
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 423
SCEP Load Balancing for BYOD/NSP (ISE 1.2)
If Multiple SCEP CA Servers Defined… For Your
Reference
• Multiple SCEP Profiles supported—Requests load balanced based on load factor.
• Load Factor = Average Response Time x Total Requests x Outstanding Requests
• Average Response Time = Average of last two 20 requests
• SCEP CA declared down if no response after three consecutive requests.
• CA with the next lowest load used; Periodic polling to failed server until online.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 424
SCEP Load Balancing (ISE 1.3+) For Your
Reference
If Multiple SCEP CA Servers Defined…
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 425
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 427
ISE SXP Horizontal Scaling For Your
Reference
ISE 2.1 and Above
PSN1 PSN2
HTTPS
SXPN1 SXPN2
Filtering Filtering
Max ISE SXP Bindings per SXP PSN 100k 250k 350k
In ISE 2.1+, SXP Domains allow the splitting of bindings across multiple SXPSNs.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 429
ISE 2.3 SXP Multi-Service Scaling For Your
Reference
Max SXP Bindings and Peers by Deployment Model and Platform
Max RADIUS
Max # Max ISE SXP
Deployment Model Platform Sessions per Max ISE SXP Bindings
Dedicated PSNs Peers
Deployment
3415 0 5,000 2,500 10
Standalone: 100 per
3495 0 10,000 5,000 20
All personas on same node
3515 0 7,500 3,750 SXPSN 15
(2 nodes redundant)
3595 0 20,000 10,000 pair 25
3415 as PAN+MNT 5/3+2 5,000 2,500 / 5,000 100
Hybrid: PAN + MnT on same
3495 as PAN+MNT 5/3+2 10,000 5,000 / 10,000 100
node; Dedicated PSN
(Minimum 4 nodes redundant) 3515 as PAN+MNT 5/3+2 7,500 3,750 / 7,500 100
3595 as PAN+MNT 5/3+2 20,000 10,000 / 20,000 100
Dedicated PAN and MnT 3495 as PAN and MNT 38 + 2 / 36 + 4 250,000 150,000 / 250,000 100 / 200
(Minimum 6 nodes redundant) 3595 as PAN and MNT 48 + 2 / 46 + 4 500,000 250,000 / 500,000 100 / 200
Max RADIUS Sessions Max ISE SXP
Scaling per SXPSN Platform
per PSN Max ISE SXP Bindings Peers
SNS-3415 1 or 2 5,000 100,000 100
Dedicated SXPSN nodes
SNS-3495 SXPSN 20,000 150,000 100
(Gated by Total Deployment
Scale) SNS-3515 pairs 7,500 150,000 100
SNS-3595 40,000 250,000 100
Share PSNs (up to 5) for RADIUS+SXP OR Dedicate#CLMEL
PSNs to RADIUS (up to 3)©and
BRKSEC-3432
SXP (2 for HA) Services
2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
430
430
ISE 2.4 SXP Multi-Service Scaling For Your
Reference
Max SXP Bindings and Peers by Deployment Model and Platform
• By Deployment
Max RADIUS
Max # Max ISE SXP Max ISE SXP
Deployment Model Platform Sessions per
Dedicated PSNs Bindings Peers
Deployment
All personas on same 3515 0 7,500 3,500 20
Standalone
node 3595 0 20,000 10,000 30
PAN+MnT+PXG on 3515 as PAN+MNT 5/3+2 7,500 7,500 200
Hybrid same node;
Dedicated PSN 3595 as PAN+MNT 5/3+2 20,000 20,000 220
48 + 2 / 46 + 4 350k / 500k 150 / 300
Each Persona on 3595 as PAN and MNT 44 +6 / 42 + 8 500,000 500k / 500k 450 / 600
Dedicated
Dedicated Node 3595 as PAN and Large 48 + 2 / 46 + 4 350k / 700k 200 / 400
MNT 44 +6 / 42 + 8 500,000 1050k / 1.4M 600 / 800
Share PSNs (up to 5) for RADIUS+SXP OR Dedicate PSNs to RADIUS (up to 3) and SXP (2 for HA) Services
• By Node 1, 2, 3, or 4
SXPSN pairs Max RADIUS Max ISE SXP Max ISE SXP
Scaling per SXPSN Platform
Sessions per PSN Bindings Peers
Dedicated SXPSN nodes SNS-3515 7,500 200,000 200
(Gated by Total Deployment Size) SNS-3595 40,000 350,000 220
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 431
ISE 2.6 SXP Multi-Service Scaling For Your
Reference
Max SXP Bindings and Peers by Deployment Model and Platform
• By Deployment
Max RADIUS
Max # Max ISE SXP Max ISE SXP
Deployment Model Platform Sessions per
Dedicated PSNs Bindings Peers
Deployment
All personas on same 3515 0 7,500 3,500 20
Standalone
node 3595 0 20,000 10,000 30
PAN+MnT+PXG on 3615 as PAN+MNT 5/3+2 10,000 10,000 200
Hybrid same node; 3655/3695 as
Dedicated PSN PAN+MNT 5/3+2 25,000/50,000 20,000 220
48 + 2 / 46 + 4 350k / 500k 150 / 300
Each Persona on 3655 as PAN and MNT 44 +6 / 42 + 8 500,000 500k / 500k 450 / 600
Dedicated
Dedicated Node 48 + 2 / 46 + 4 350k / 700k 200 / 400
3695 as PAN and MNT 44 +6 / 42 + 8 500,000 (2M) 1050k / 1.4M 600 / 800
Share PSNs (up to 5) for RADIUS+SXP OR Dedicate PSNs to RADIUS (up to 3) and SXP (2 for HA) Services
• By Node 1, 2, 3, or 4
SXPSN pairs Max RADIUS Max ISE SXP Max ISE SXP
Scaling per SXPSN Platform
Sessions per PSN Bindings Peers
Dedicated SXPSN nodes SNS-3615 10,000 200,000 200
(Gated by Total Deployment Size) SNS-3655/3695 50,000/100,000 350,000 220
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 432
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 434
Vulnerability Assessment Recovery Sequence
Flow Diagram For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 435
ISE 2.3 TC-NAC Multi-Service Scaling For Your
Reference
Max Concurrent TC-NAC Transactions by Deployment Model and Platform
Max PSNs Max Sessions per Max TC-NAC Max VAF Max IRF
Deployment Model Platform
(dedicated) Deployment Adapters TPM TPS
3415 0 5,000 1 5 5
Standalone: (all personas on same
3495 0 10,000 1 5 5
node)
(2 nodes redundant) 3515 0 7,500 1 5 5
3595 0 20,000 1 5 5
3415 as PAN+MNT 5/4+1 5,000 1/3 5 / 40 10 / 80
Hybrid: PAN + MnT on same node;
3495 as PAN+MNT 5/4+1 10,000 2/5 10 / 40 20 / 80
Dedicated PSN
(Minimum 4 nodes redundant) 3515 as PAN+MNT 5/4+1 7,500 1/3 5 / 40 10 / 80
3595 as PAN+MNT 5/4+1 20,000 2/5 10 / 40 20 / 80
Dedicated PAN and MnT nodes 3495 as PAN and MNT 39 + 1 250,000 5 40 80
(Minimum 6 nodes redundant) 3595 as PAN and MNT 49 + 1 500,000 5 40 80
In medium deployment, option to share PSN or dedicate PSN; large deployment assume one PSN dedicated to TC=NAC
• By PSN
Max Sessions per Max VAF Max IRF
Scaling per PSN Platform Max Adapters
PSN TPM TPS
SNS-3515 7,500 3 40 80
Dedicated TC-NAC node
SNS-3595 40,000 5 40 80
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 437
ISE 2.6 TC-NAC Multi-Service Scaling For Your
Reference
Max Concurrent TC-NAC Transactions by Deployment Model and Platform
Max PSNs Max Sessions per Max TC-NAC Max VAF Max IRF
Deployment Model Platform
(dedicated) Deployment Adapters TPM TPS
3615 0 10,000 1 5 5
Stand- All personas on
3655 0 25,000 1 5 5
alone same node
3655 0 50,000 1 5 5
PAN+MnT+PXG on 3615 as PAN+MNT+PXG 5/4+1 10,000 1/3 5 / 40 10 / 80
Hybrid same node; 3655 as PAN+MNT+PXG 5/4+1 25,000 2/5 10 / 40 20 / 80
Dedicated PSN 3655 as PAN+MNT+PXG 5/4+1 50,000 2/5 10 / 40 20 / 80
Each Persona on 3655 as PAN and MNT 49 + 1 500,000 5 40 80
Dedicated
Dedicated Node 3695 as PAN and MnT 49 + 1 500,000 (2M) 5 40 80
• By InPSN
medium deployment, option to share PSN or dedicate PSN; large deployment assume one PSN dedicated to TC=NAC
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 438
PSN Load Balancing
Session Agenda
PSN Load Balancing You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Load Balancing RADIUS, Web, and Profiling Services
• Policy Service nodes can be configured in a cluster behind a load balancer (LB).
• Access Devices send RADIUS and TACACS+ AAA requests to LB virtual IP.
PSNs
(User
Services)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 441
Configure Node Groups for LB Cluster
Place all PSNs in LB Cluster in Same Node Group
• Administration > System > Deployment
2) Assign name (and multicast address if ISE 1.2)
1) Create node group
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 442
High-Level Load Balancing Diagram For Your
Reference
DNS AD
External NTP LDAP
ISE-PAN-1 ISE-MNT-1 Logger SMTP MDM
10.1.99.5
VLAN 98 VLAN 99
(10.1.98.0/24) (10.1.99.0/24)
ISE-PSN-1
NAS IP: 10.1.50.2
VIP: 10.1.98.8 LB: 10.1.99.1
10.1.99.6
10.1.99.7
ISE-PSN-3
ISE-PAN-2 ISE-MNT-2
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 443
Traffic Flow—Fully Inline: Physical Separation
Physical Network Separation Using Separate LB Interfaces Fully Inline Traffic Flow
recommended—physical
• Load Balancer is directly inline between PSNs and rest of network. or logical
• All traffic flows through Load Balancer including RADIUS, PAN/MnT,
Profiling, Web Services, Management, 10.1.99.5
Feed Services, MDM, AD, LDAP… VLAN 98 VLAN99
VLAN 99
(10.1.98.0/24)
(External) (10.1.99.0/24)
(Internal)
ISE-PSN-1
NAS IP: 10.1.50.2
VIP: 10.1.98.8 LB: 10.1.99.1
10.1.99.6
DNS AD
NTP
10.1.99.7
External LDAP
ISE-PAN ISE-MNT Logger SMTP MDM
ISE-PSN-3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 444
Traffic Flow—Fully Inline: VLAN Separation
Logical Network Separation Using Single LB Interface and VLAN Trunking
Load Balancer
• LB is directly inline between ISE PSNs
and rest of network. VIP: 10.1.98.8
• All traffic flows through LB including RADIUS, 10.1.98.2 10.1.99.1
PAN/MnT, Profiling, Web Services, Management, Feed VLAN 98 VLAN 99 10.1.99.5
Services, MDM, AD, LDAP… (External) (Internal)
10.1.98.1 ISE-PSN-1
NAS IP: 10.1.50.2
10.1.99.6
DNS AD
NTP
10.1.99.7
External LDAP
ISE-PAN ISE-MNT Logger SMTP MDM
ISE-PSN-3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 445
Partially Inline: Layer 2/Same VLAN (One PSN Interface)
Direct PSN Connections to LB and Rest of Network
Load Balancer
• All inbound LB traffic such RADIUS, Profiling, 10.1.98.2
and directed Web Services sent to LB VIP.
10.1.98.5
• Other inbound non-LB traffic bypasses LB VIP: 10.1.98.8
including redirected Web Services, PAN/MnT, ISE-PSN-1
Management, Feed Services, MDM, AD, LDAP… VLAN 98
10.1.98.6
• All outbound traffic from PSNs NAS IP: 10.1.50.2
sent to LB as DFGW. 10.1.98.1 ISE-PSN-2
10.1.98.7
• LB must be configured
to allow Asymmetric traffic L3 Switch
End User/Device Access Device
ISE-PSN-3
Generally NOT RECOMMENDED due to
DNS AD
traffic flow complexity—must fully External NTP LDAP
understand path of each flow to ensure ISE-PAN ISE-MNT Logger SMTP MDM
proper handling by routing, LB, and
end stations.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 446
Partially Inline: Layer 3/Different VLANs (One PSN Interface)
Direct PSN Connections to LB and Rest of Network For Your
Load Balancer Reference
• All inbound LB traffic such RADIUS, Profiling, 10.1.99.2
and directed Web Services sent to LB VIP VIP: 10.1.98.8
10.1.99.5
• Other inbound non-LB traffic bypasses LB 10.1.98.2
including redirected Web Services, PAN/MnT, VLAN 98 VLAN 99 ISE-PSN-1
Management, Feed Services, MDM, AD, LDAP… (External) (Internal)
10.1.99.6
• All outbound traffic from PSNs NAS IP:
10.1.50.2 10.1.98.1
sent to LB as DFGW. ISE-PSN-2
10.1.99.1
10.1.99.7
• LB must be configured
to allow Asymmetric traffic L3 Switch
End User/Device Access Device
ISE-PSN-3
Generally NOT RECOMMENDED due to
DNS AD
traffic flow complexity—must fully External NTP LDAP
understand path of each flow to ensure ISE-PAN ISE-MNT Logger SMTP MDM
proper handling by routing, LB, and
end stations.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 447
Partially Inline: Multiple PSN Interfaces
10.1.99.5 10.1.91.5
Separate PSN Connections to LB and Rest of Network
Load Balancer
ISE-PSN-1
• All LB traffic sent to LB VIP including VIP:
RADIUS, Profiling (except SPAN data), 10.1.98.8
10.1.99.6 10.1.91.6
10.1.99.2
and directed Web Services 10.1.98.2
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 449
PSN Load Balancing For Your
Reference
Sample Topology and Flow
VLAN 98 (10.1.98.0/24) VLAN 99 (10.1.99.0/24)
Request
DNS for
request
service
sent at single
to resolve DNS Lookup = psn-vip.company.com
host ‘psn-
psn-cluster DNS 10.1.99.5
cluster’
FQDN DNS response = 10.1.98.8 Server
ISE-PSN-1
Load Balancer
Request to psn-vip.company.com
10.1.99.6
Response from psn-vip.company.com
VIP: 10.1.98.8 ISE-PSN-2
User Access Device
PSN-VIP
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 450
Load Balancing Policy Services
• RADIUS AAA Services
Packets sent to LB virtual IP are load-balanced to real PSN based on configured algorithm. Sticky algorithm determines method to ensure
same Policy Service node services same endpoint.
• Web Services:
• URL-Redirected: Posture (CPP) / Central WebAuth (CWA) / Native Supplicant Provisioning (NSP) / Hotspot / Device
Registration WebAuth (DRW), Partner MDM.
No LB Required! PSN that terminates RADIUS returns URL Redirect with its own certificate CN name substituted for ‘ip’ variable in
URL.
Direct HTTP/S: Local WebAuth (LWA) / Sponsor / MyDevices Portal, OCSP
Single web portal domain name should resolve to LB virtual IP for http/s load balancing.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 451
Load Balancing
RADIUS
Load Balancing RADIUS
Sample Flow
VLAN 98 (10.1.98.0/24) VLAN 99 (10.1.99.0/24)
10.1.99.5
1 radius-server host 10.1.98.8
ISE-PSN-1
Load Balancer
2 AUTH request
RADIUS ACCTG requesttoto10.1.98.8
10.1.98.8
10.1.99.6
AUTH response
RADIUS ACCTG responsefrom
from10.1.98.8
10.1.98.8
VIP: 10.1.98.8 ISE-PSN-2
User 4 5
Access Device
PSN-CLUSTER
ISE-PSN-1
NAS IP: 10.1.50.2
VIP: 10.1.98.8
10.1.99.1
ISE-PSN-1
10.1.99.1
F5 LTM ISE-PSN-2
Load Balancer
ISE-PSN-3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 455
Load Balancer Persistence (Stickiness) Guidelines
Persistence Attributes
• Common RADIUS Sticky Attributes
o Client Address
➢ Calling-Station-ID MAC Address=00:C0:FF:1A:2B:3C
➢ Framed-IP-Address IP Address=10.1.10.101
Device
o NAD Address 10.1.50.2 VIP: ISE-PSN-1
➢ NAS-IP-Address Session: 00aa…99ff 10.1.98.8
➢ Source IP Address
o Session ID
➢ RADIUS Session ID
Access Device Load Balancer ISE-PSN-2
➢ Cisco Audit Session ID
o Username User Username=jdoe@company.com
2. Source IP or NAS-IP-Address for persistence for all endpoints connected to same NAD
3. Audit Session ID for persistence across re-authentications
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 456
Load Balancer Stickiness Guidelines
Config Examples Based on Calling-Station-ID (MAC Address)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 457
Ensure NAD Populates RADIUS Attributes For Your
Reference
Cisco WLC Example
• WLC sets Calling-
Station-ID to MAC
Address for RADIUS
NAC-enabled WLANs
• General
recommendation is to
set Acct Call Station ID
to System MAC
Address
• Auth Call Station ID
Type may not be
present in earlier
software versions
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 458
LB Fragmentation and Reassembly
Be aware of load balancers that do not reassemble RADIUS fragments!
Also watch for fragmented packets that are too small. LBs have min allowed frag size and will drop !!!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 459
LB Fragmentation and Reassembly
Watch for packet fragments smaller than LB will accept!
LB min frag
Switch with Fragments <= 512 bytes size = 576
low MTU
bytes
• ACE: fragment min-mtu <bytes> (default 576 bytes)
• F5 LTM: # tmsh modify sys db tm.minipfragsize value 1
• Pre-11.6: Default = 576 bytes
• 11.6.0+: Default = 566 bytes
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 460
NAT Restrictions for RADIUS Load Balancing
Why Source NAT (SNAT) Fails for NADs SNAT results in less visibility as all requests appear sourced from
LB – makes troubleshooting more difficult.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 462
Allow Source NAT for PSN CoA Requests
Simplifying Switch CoA Configuration
• Match traffic from PSNs to UDP/1700 or UDP/3799
(RADIUS CoA) and translate to PSN cluster VIP.
CoA SRC=10.1.99.5
• Access switch config: 10.1.99.5
• Before:
CoA SRC=10.1.98.8 ISE-PSN-1
aaa server radius dynamic-author
client 10.1.99.5 server-key cisco123 10.1.99.6
client 10.1.99.6 server-key cisco123 10.1.98.8
client 10.1.99.7 server-key cisco123 Access Load ISE-PSN-2
client 10.1.99.8 server-key cisco123 Switch Balancer
client 10.1.99.9 server-key cisco123 10.1.99.7
client 10.1.99.10 server-key cisco123
<…one entry per PSN…> 5
ISE-PSN-3
• After:
aaa server radius dynamic-author 10.1.99.x
client 10.1.98.8 server-key cisco123
ISE-PSN-X
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 463
Allow Source NAT for PSN CoA Requests For Your
Reference
Cisco ACE Load Balancer Example
access-list NAT-COA line 5 extended permit udp 10.1.99.0 255.255.255.248 any eq 1700
class-map match-any NAT-CLASS
2 match access-list NAT-COA
policy-map multi-match NAT-POLICY
class NAT-CLASS
nat dynamic 1 vlan 98
interface vlan 98
description NAD-SIDE
nat-pool 1 10.1.98.8 10.1.98.8 netmask 255.255.255.255 pat
interface vlan 99
description PSN-CLUSTER
service-policy input NAT-POLICY
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 464
Allow Source NAT for PSN CoA Requests For Your
Reference
F5 LTM Load Balancer Example
ltm virtual /NAD_ICommon/RADIUS-COA-SNAT {
destination /Common/10.0.0.0:1700
ip-protocol udp ltm snatpool /Common/radius_coa_snatpool {
mask 255.0.0.0 members {
profiles { /Common/10.1.98.8
/Common/udp { } }
} }
source 10.1.99.0/27
source-address-translation {
pool /Common/radius_coa_snatpool
type snat
}
translate-address disabled
translate-port enabled
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 465
Allow Source NAT for PSN CoA Requests For Your
Reference
Citrix NetScaler Load Balancer Example
apply ns acls
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 466
Allow Source NAT for PSN CoA Requests
Simplifying WLC CoA Configuration Simplifies config and
reduces # ACL entries
• Before: • After required to permit access
to each PSN
One RADIUS Server entry required per One RADIUS Server entry required
PSN that may send CoA from behind per load balancer VIP.
load balancer
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 467
NAT Guidelines for ISE RADIUS Load Balancing
To NAT or Not To NAT?
That is the Question! ISE-PAN-1 ISE-MNT-1 No NAT
10.1.99.5
VLAN 98 VLAN 99
(10.1.98.0/24) (10.1.99.0/24)
ISE-PSN-1
NAS IP: 10.1.50.2 Load Balancer
VIP: 10.1.98.8 LB: 10.1.99.1
10.1.99.6
ISE-PSN-3
RADIUS COA RADIUS COA
SNAT for CoA
SRC-IP =10.1.98.8 SRC-IP =10.1.99.7
is Okay! DST-IP =10.1.50.2
DST-IP =10.1.50.2
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 468
Load Balancing
ISE Web Services
Load Balancing with URL-Redirection
URL Redirect Web Services: Hotspot/DRW, CWA, BYOD, Posture, MDM
ISE-PSN-1
Load Balancer
1 RADIUS request to psn-vip.company.com
10.1.99.6
RADIUS response from psn-vip.company.com
User
3
Access Device VIP: 10.1.98.8 ISE-PSN-2
https://ise-psn-3.company.com:8443/... PSN-CLUSTER
2
5 HTTPS response from ise-psn-3.company.com
10.1.99.7
Note: Since ISE assumes HTTPS for web access, offload cannot be used to increase SSL
performance. Load Balancer must reestablish SSL connection to real PSN servers.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 471
URL Redirection Using Static IP/Hostname
Overriding Automatic Redirection to PSN IP Address/FQDN
• Allows static IP or FQDN value to be returned for CWA or other URL-Redirected Flows
• Common use case: Public DNS or IP address (no DNS available) must be used while preserving
variable substitution for port and sessionId variables.
Policy > Policy Elements > Results > Authorization > Authorization Profiles
DMZ PSN Certificate must match IP/Static FQDN
Specified IP Address/Hostname MUST point to the same
PSN that terminates the RADIUS session.
If multiple PSNs, requires LB persistence or AuthZ Policy
logic to ensure redirect occurs to correct PSN.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 472
Load Balancing Non-Redirected Web Services For Your
Reference
Direct Web Services: Sponsor, My Devices, LWA, OCSP
https://sponsor.company.com ISE-PSN-1
Load Balancer
2 https://sponsor. company.com @ 10.1.98.8
10.1.99.6
https response from VIP @ 10.1.98.8
Access VIP: 10.1.98.8
SPONSOR ISE-PSN-2
4 Device PSN-CLUSTER
10.1.99.7
ISE-PSN-1
SPONSOR 10.1.98.8
http://sponsor.company.com
10.1.99.6
https://sponsor.company.com:8443/sponsorportal
ISE Certificate ISE-PSN-2
Load Balancer
Subject =
ise-psn-3.company.com
Name Mismatch! 10.1.99.7
Requested URL = sponsor.company.com
Certificate Subject = ise-psn-3.company.com
ISE-PSN-3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 474
ISE Certificate with SAN For Your
Reference
No Certificate Warning
ISE-PSN-1
SPONSOR 10.1.98.8
http://sponsor.company.com
10.1.99.6
https://sponsor.company.com:8443/sponsorportal
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 475
Load Balancing Preparation For Your
Reference
Configure DNS and Certificates
• Configure DNS entry for PSN cluster(s) and assign VIP IP address.
Example: psn-vip.company.com
DNS SERVER: DOMAIN = COMPANY.COM
PSN-VIP IN A 10.1.98.8
SPONSOR IN A 10.1.98.8
MYDEVICES IN A 10.1.98.8
ISE-PSN-1 IN A 10.1.99.5
ISE-PSN-2 IN A 10.1.99.6
ISE-PSN-3 IN A 10.1.99.7
*.ise.company.com
ise-psn.company.com
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 478
Load Balancer NAT Guidelines for Web Traffic For Your
Reference
URL-Redirected Traffic with Single PSN Interface
10.1.98.0/24 .5 .6 .7 .x
.1 .8 .1
10.1.10.0/24
Load Balancer ISE-PSN-1 ISE-PSN-2 ISE-PSN-3 ISE-PSN-X
User
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 479
Dedicated Web Interfaces under ISE 1.3+ For Your
Reference
Direct Access and URL-Redirected Traffic with Dedicated PSN Web Interfaces
10.1.11.0/24 Load
L3 Switch
.1 Balancer ISE-PSN-1 ISE-PSN-2 ISE-PSN-3 ISE-PSN-X
.1
User B .5 .6 .7 .x
10.1.12.0/24
10.1.91.0/24
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 480
Dedicated Web Interfaces under ISE 1.3+ For Your
Reference
Symmetric Traffic Flows
• Configure default routes for each interface to support symmetric return traffic
ise24-psn-x/admin# config t
Enter configuration commands, one per line. End with CNTL/Z.
ise13-psn-x/admin(config)# ip route 0.0.0.0 0.0.0.0 gateway 10.1.91.1
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 481
For Your
Reference
SSL Certificates for Internal Server Names
After November 1, 2015 Certificates for Internal Names Will No Longer Be Trusted
In November 2011, the CA/Browser Forum (CA/B) adopted Baseline Requirements for the Issuance
and Management of Publicly-Trusted Certificates that took effect on July 1, 2012. These
requirements state:
CAs should notify applicants prior to issuance that use of certificates with a Subject Alternative Name
(SAN) extension or a Subject Common Name field containing a reserved IP address or internal server
name has been deprecated by the CA/B
CAs should not issue a certificate with an expiration date later than November 1, 2015 with a SAN or
Subject Common Name field containing a reserved IP address or internal server Name
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 482
Use Publicly-Signed Certs for Guest Portals! For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 483
CWA Example For Your
Reference
DNS and Port Settings–Single Interface Enabled for Guest Portal
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 484
CWA Example with FQDNs in SAN For Your
Reference
URL Redirection Uses First Guest-Enabled Interface (eth1) Admin/RADIUS:
eth0: 10.1.99.5
1. RADIUS Authentication requests sent to ise-psn1 @ 10.1.99.5. ISE-PSN1
2. RADIUS Authorization received from ise-psn1 @ 10.1.99.5 with
URL Redirect to https://10.1.91.5:8443/...
3. User sends web request directly to ise-psn1 @ 10.1.99.5.
4. User receives cert name mismatch warning.
• Up to two values can be specified—hostname and/or FQDN; if specify hostname, then globally
configured ip domain-name appended for use in URL redirection.
→ FQDN can have different domain than global domain!!!
• GigabitEthernet1 (GE1) Example:
ise-psn1/admin(config)# ip host 10.1.91.5 ise-psn1-guest ise-psn1-guest.company.com
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 486
Interface Alias Example For Your
Reference
DNS and Port Settings – Single Interface Enabled for Guest
Load Balancing
SAML SSO Logins to ISE
Web Services
Load Balancing SAML Requests to ISE PSNs For Your
Reference
SAML SSO for ISE Web Portals
• Advantages:
• Easy configuration at the Identity Provider side; Ideal for multi-node deployments
• Only single ‘reply URL’ needed to be configured at the identity provider side
Azure Example
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 490
Load Balancing SAML For Your
Reference
Flow
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 491
For Your
SAML IDP Reference
Employee machine need to have
resolution of the IDP server
(could be located at the cloud)
Load Balancer
Step 5. Guest portal is called with the Step 6. request redirected to different ISE
load balancer host name node (PSN 2)
Step 7. PSN 2 portal sends HTTP redirect to the correct ISE node (PSN 1) (using SAML relay state) ….
From here the session is enabled and flow continues
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 492
Load Balancing
ISE Profiling Services
Load Balancing Profiling Services
Sample Flow
4 10.1.99.7
1. Client OS sends DHCP Request
2. Next hop router with IP Helper configured forwards DHCP request to real ISE-PSN-3
DHCP server and to secondary entry = LB VIP
3. Real DHCP server responds and provide client a valid IP address
4. DHCP request to VIP is load balanced to PSN @ 10.1.99.7 based on source IP
stick (L3 gateway) or DHCP field parsed from request.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 494
Load Balancing Simplifies Device Configuration
L3 Switch Example for DHCP Relay
• Before !
interface Vlan10
description EMPLOYEE
ip address 10.1.10.1 255.255.255.0
ip helper-address 10.1.100.100 <--- Real DHCP Server
ip helper-address 10.1.99.5 <--- ISE-PSN-1
ip helper-address 10.1.99.6 <--- ISE-PSN-2
! Settings apply to each L3
interface servicing DHCP
• After ! endpoints
interface Vlan10
description EMPLOYEE
ip address 10.1.10.1 255.255.255.0
ip helper-address 10.1.100.100 <--- Real DHCP Server
ip helper-address 10.1.98.8 <--- LB VIP
!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 495
Load Balancing Simplifies Device Configuration For Your
Reference
Switch Example for SNMP Traps
• Before !
snmp-server trap-source GigabitEthernet1/0/24
snmp-server enable traps snmp linkdown linkup
snmp-server enable traps mac-notification change move
snmp-server host 10.1.99.5 version 2c public mac-notification snmp
snmp-server host 10.1.99.6 version 2c public mac-notification snmp
snmp-server host 10.1.99.7 version 2c public mac-notification snmp
!
• After !
snmp-server trap-source GigabitEthernet1/0/24
snmp-server enable traps snmp linkdown linkup
snmp-server enable traps mac-notification change move
snmp-server host 10.1.98.8 version 2c public mac-notification snmp
!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 496
Profiling Services using Load Balancers For Your
Reference
Which PSN Services Processes Profile Data?
• Profiling Probes
The following profile data can be load balanced to PSN VIP but may not be processed by same PSN that terminated
RADIUS:
• DHCP IP Helper to DHCP probe
Option to leverage Anycast to reduce log
• NetFlow export to NetFlow Probe
targets and facilitate HA
• SNMP Traps
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 497
Profiling Services using Load Balancers (Cont.) For Your
Reference
Which PSN Services Process Profile Data?
• DNS Probe
Submitted by same PSN which obtains IP data for endpoint. Typically the same PSN that processes RADIUS, DHCP, or
SNMP Query Probe data.
• NMAP Probe
Submitted by same PSN which obtains data which matches profile rule condition.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 498
Load Balancing Sticky Guidelines
Ensure DHCP and RADIUS for a Given Endpoint Use Same PSN
Persistence Cache:
11:22:33:44:55:66 -> PSN-3 10.1.99.5
ISE-PSN-1
MAC: 11:22:33:44:55:66 F5 LTM
RADIUS request to VIP
1 2
10.1.99.6
User
NAD RADIUS response from PSN-3
VIP: 10.1.98.8 ISE-PSN-2
DHCP Request IP Helper sends DHCP to VIP
3 4
5 10.1.99.7
1. RADIUS Authentication request sent to VIP @ 10.1.98.8.
2. Request is Load Balanced to PSN-3, and entry added to Persistence Cache ISE-PSN-3
3. DHCP Request is sent to VIP @ 10.1.98.8
4. Load Balancer uses the same “Sticky” as RADIUS based on client MAC address
5. DHCP is received by same PSN, thus optimizing endpoint replication
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 499
Live Log Output for Load Balanced Sessions
Synthetic Transactions
Requests evenly
distributed across real
servers:
ise-psn-1
ise-psn-2
ise-psn-3
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 500
Live Log Output for Load Balanced Sessions For Your
Reference
Real Transactions
3
4 2
1
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 501
ISE and Load Balancers For Your
Reference
Failure Scenarios
• The VIP is the RADIUS Server, so if the entire VIP is down, then the NAD should fail over to the
secondary Data Center VIP (listed as the secondary RADIUS server on the NAD).
• Probes on the load balancers should ensure that RADIUS is responding as well as HTTPS, at a
minimum.
• Validate that RADIUS responds, not just that UDP/1812 & UDP/1813 are open
• Validate that HTTPS responds, not just that TCP/8443 is open
• Upon detection of failed node using probes (or node taken out of service), new requests will be
serviced by remaining nodes→ Minimum N+1 redundancy recommended for node groups.
• Configure LB cluster as a node group.
• If node group member fails, then another node-group member will issue CoA-reauth for Posture Pending
sessions, forcing the sessions to begin again and not be hung.
• Note: Node groups do not require load balancers
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 502
ISE and Load Balancers For Your
Reference
General Guidelines
• Do not use Source NAT(SNAT) from access layer for RADIUS; SNAT Optional for HTTP/S:
• ISE uses Layer 3 address to identify NAD, not NAS-IP-Address in RADIUS packet, so CoA fails.
• Each PSN must be reachable by the PAN / MNT directly without NAT.
• Each PSN must be reachable directly from client network for URL redirects (*Note sticky exception)
• Perform sticky (aka: persistence) based on Calling-Station-ID.
• Some load balancers support RADIUS Session ID; Others may be limited to Source IP (NAD IP).
• Optional “sticky buddies” (secondary attributes that persist different traffic to same PSN)
• *Framed-IP-Address if URL redirects must be sent through LB and not bypass LB.
• DHCP Requested IP Address to ensure DHCP Profile data hits same PSN that terminated RADIUS.
• VIP for PSNs gets listed as the RADIUS server on each NAD for all RADIUS AAA.
• Each PSN gets listed individually in the NAD CoA list by real IP address (not VIP).
• If source NAT PSN-initiated CoA traffic, then can list single VIP in NAD CoA list.
• Load Balancers get listed as NADs in ISE so their test authentications may be answered.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 503
Load Balancing
TACACS+
• Virtual IP = TACACS+ Server
Load Balancing TACACS+ • VIP listens on TCP/49
• Sticky based on source IP
Session Authentication, Authorization, and Accounting
VLAN 98 (10.1.98.0/24) VLAN 99 (10.1.99.0/24)
10.1.99.5
1 tacacs-server host 10.1.98.18
Load Balancer ISE-PSN-1
2 TACACS+Session
TACACS+ SessionAUTHC
AUTH request
request to
to10.1.98.18
10.1.98.18
10.1.99.6
TACACS+
TACACS+Session
SessionAUTHC replyfrom
AUTH reply from10.1.98.18
10.1.98.18
Access Device VIP: 10.1.98.18 ISE-PSN-2
Device Admin 4 ISE-CLUSTER
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 505
• Virtual IP = TACACS+ Server
Load Balancing TACACS+ • VIP listens on TCP/49
• Sticky based on source IP
Session Authentication, Authorization, and Accounting
VLAN 98 (10.1.98.0/24) VLAN 99 (10.1.99.0/24)
10.1.99.5
1 tacacs-server host 10.1.98.18
Load Balancer ISE-PSN-1
2 TACACS+ Session
TACACS+ Session ACCTG
AUTHZ request
AUTHC request to
to 10.1.98.18
10.1.98.18
10.1.99.6
TACACS+
TACACS+ Session
TACACS+Session AUTHC
SessionAUTHZ reply
ACCTGreply from
replyfrom 10.1.98.18
from10.1.98.18
10.1.98.18
Access Device VIP: 10.1.98.18 ISE-PSN-2
Device Admin 4 5 ISE-CLUSTER
10.1.99.5
1 tacacs-server host 10.1.98.18
Load Balancer ISE-PSN-1
2 TACACS+ CMD#2
CMD#1 AUTHZ
ACCTG request to 10.1.98.18
10.1.99.6
TACACS+ CMD#2
TACACS+ CMD#2
CMD#1 ACCTG
CMD#1 AUTHZ reply
replyfrom
from10.1.98.18
10.1.98.18
Access Device VIP: 10.1.98.18 ISE-PSN-2
Device Admin 4 5 ISE-CLUSTER
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 508
Load Balancing TACACS+ For Your
Reference
General Recommendations
1. Configure Virtual Server to LB on tcp/49.
2. SNAT should work as ISE servers do not need to initiate conversation to the TACACS+ clients like RADIUS CoA, but all
requests will appear to emanate from LB rather than from the NAD clients. In either case, LB should be physically or
logically inline with the TACACS traffic to ensure full processing of the flow and handling of the TCP session. Without
SNAT, need to make sure LB internal interface IP is the default gateway for the ISE PSNs (TACACS+ servers).
3. Persistence can be based on simple source IP address based on assumption that the number of T+ clients is high and
individual requests per client is relatively low. This should allow for sufficient distribution of requests across ISE
PSNs and help ensure Authentication, Authorization, and Accounting requests do not get load balanced between ISE
servers. More granular LB based on session ID (or even username) may be possible, but recommend keep it simple
to ensure persistence locked to given device. (Initial TCP session establishment will not have TACACS payload.
Standard T+ Packet header has Session_ID, but username would be in payload.)
4. Health monitoring can be based on response to tcp/49, or 3-way handshake based expected response, but some
customers have used more advanced checks like perl script or scripted tcp to validate full auth process.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 510
LDAP Server Redundancy
and Load Balancing
Per-PSN LDAP Servers
• Assign unique
Primary and
Secondary to
each PSN
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 512
Load Balancing
LDAP Servers
Lookup1
Lookup2 = ldap.company.com
Response = 10.1.95.7
10.1.95.6
10.1.95.5
15 minute reconnect timer
ldap1.company.com
LDAP Query to 10.1.95.7
10.1.95.6
10.1.95.6
10.1.95.6
LDAP Response from 10.1.95.7
ldap2.company.com
PSN
10.1.95.7
ldap3.company.com
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 513
For Your
Reference
Sample Vendor
Load Balancer
Configurations for
Cisco ISE
Vendor-Specific LB Configurations
• F5 LTM
• Citrix NetScaler https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-p/3648759
• Cisco ACE
• Cisco ITD (Note)
F5 LTM For Your
Reference
• Cisco Communities
https://community.cisco.com/t5/security-documents/ise-load-
balancing/ta-p/3648759
• Cisco and F5 Deployment Guide: ISE Load
Balancing using BIG-IP:
https://community.cisco.com/t5/security-documents/how-to-
cisco-amp-f5-deployment-guide-ise-load-balancing-using/ta-
p/3631159
• Linked from F5 website under Cisco Alliance
page > White Papers:
https://f5.com/solutions/technology-alliances/cisco
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 517
For Your
Reference
Cisco ACE Load Balancer
• Cisco Communities > ISE Load Balancing
• https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-
p/3648759
• Configuring ACE for Cisco ISE Load Balancing
• Complete working configuration
• https://community.cisco.com/t5/security-documents/configuring-ace-for-cisco-ise-
load-balancing/ta-p/3642008
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 518
Intelligent Traffic Director (ITD)
Can I Use Cisco ITD to Load Balance ISE Traffic?
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 519
PSN HA Without Load
Balancers
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 521
Load Balancing Web Requests Using DNS
Client-Based Load Balancing/Distribution Based on DNS Response
• Examples:
• Cisco Global Site Selector (GSS) / F5 BIG-IP GTM / Microsoft’s DNS Round-Robin feature
• Useful for web services that use static URLs including LWA, Sponsor, My Devices, OCSP.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 522
Using Anycast for ISE Redundancy For Your
Reference
Profiling Example
Provided dedicated
User
interface or LB VIPs
used, Anycast may be
used for Profiling, Web
Portals (Sponsor, Guest
LWA, and MDP) and
RADIUS AAA!
ACCESS1
ISE-PSN-1
ACCESS3
NADs are
configured with
single Anycast IP
ACCESS2 address.
ISE-PSN-2
Ex: 10.10.10.10
#CLMEL BRKSEC-3432
BRKSEC-3699 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 523
Anycast address should only be applied to ISE
ISE Configuration for Anycast secondary interfaces, or LB VIP, but never to ISE
GE0 management interface.
ISE-PSN-2 Example:
#ise-psn-1/admin# config t
#ise-psn-1/admin (config)# int GigabitEthernet1
#ise-psn-1/admin (config-GigabitEthernet)# ip address 10.10.10.10 255.255.255.0
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 524
Routing Configuration for Anycast
Sample Configuration
PSN2 (10.4.5.6)
User
PSN3 (10.7.8.9)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 526
NAD-Based TACACS+ Server Redundancy (IOS)
Multiple TACACS+ Servers Defined in Access Device
For Your
Reference
• Configure Access Devices with multiple TACACS+ Servers.
• Fallback to secondary servers if primary fails
PSN2 (10.4.5.6)
User
PSN3 (10.7.8.9)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 527
NAD-Based Redundancy to Different Data Centers
RADIUS Example – Different RADIUS VIP Addresses For Your
Reference
RADIUS Auth
LB-2 PSN1 (10.2.101.5)
User Network (10.2.100.2)
Access Device
Same principles PSN2 (10.2.101.6)
apply whether point DC #2
to individual PSNs PSN3 (10.2.101.7)
or LB VIPs!
radius-server host 10.1.98.8 auth-port 1812 acct-port 1813
radius-server host 10.2.100.2 auth-port 1812 acct-port 1813
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 528
NAD-Based Redundancy to Different Data Centers
RADIUS Example – Single RADIUS VIP Address using Anycast For Your
Reference
RADIUS Auth
LB-2 PSN1 (10.2.101.5)
User Network (10.1.98.8)
Access Device
If not using LB, then must PSN2 (10.2.101.6)
configure PSN DC #2
secondary interfaces PSN3 (10.2.101.7)
with Anycast address.
radius-server host 10.1.98.8 auth-port 1812 acct-port 1813
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 529
NAD-Based Redundancy to Different Data Centers
Profiling Example – Different DHCP VIP Addresses For Your
Reference
DHCP Relay
LB2 PSN1 (10.2.101.5)
(10.2.100.3)
User Network Access
Device PSN2 (10.2.101.6)
DC #2
interface VLAN 10 PSN3 (10.2.101.7)
ip address A.B.C.D 255.255.255.0
ip helper-address X.X.X.X # Real
ip helper-address 10.1.98.11 # LB1
ip helper-address 10.2.100.3 # LB2#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 530
NAD-Based Redundancy to Different Data Centers
Profiling Example – Single DHCP VIP Address using Anycast For Your
Reference
DHCP Relay
LB2 PSN1 (10.2.101.5)
(10.1.98.11)
User Network Access
Device PSN2 (10.2.101.6)
DC #2
cat3750x# test aaa group radius radtest cisco123 new users 4 count 50
AAA/SG/TEST: Sending 50 Access-Requests #CLMEL
@ 10/sec, 0 Accounting-Requests @ 10/sec
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 533
BRKSEC-3432
NAD-Based RADIUS Redundancy (WLC)
Wireless LAN Controller
http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a008098987e.shtml
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 534
HA/LB Summary Table For Your
Reference
Comparison of Various HA/LB Methods
HA/LB Where Configured? Primary USE Pros Cons
Method Cases
Local Load Centrally using LB RADIUS Large scaling, Fast failover, better load Higher up-front cost and
Balancers near PSN cluster HTTP/S distribution, in/out servicing, single IP, complexity
Profiling adds flexibility, lowers TCO
DNS/Global Centrally using DNS LWA / Large scaling, better load distribution, Somewhat higher cost and
LB Sponsor / in/out servicing, single URL complexity
MDP Portals
Anycast Centrally using Web Portals, Lower cost, supports simple route-based Higher complexity
routing Profiling, distribution, in/out service, single IP
RADIUS
NAD RADIUS Distributed in local RADIUS, Low cost and complexity, deterministic Management of distributed
Server List NAD config Profiling distribution lists, poor load distribution
(Sensor)
IOS RADIUS Distributed in local RADIUS Low cost and complexity, better per-NAD Management of distributed
LB NAD config load distribution lists
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 535
BRKSEC-3432
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
NAD Fallback and Recovery
Common Questions
Q: How does NAD detect failed RADIUS servers?
A: Test Probes and Test User accounts
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 538
In example, servers are marked “dead” if no response in 60
NAD Fallback and Recovery seconds (1 transmit + 3 retransmits w/15 second timeout).
After 2 minutes, RADIUS test probe will retry server and mark
Dead RADIUS Server Detection & Recovery “alive” if response; otherwise recheck every 2 minutes(deadtime).
For Your
Example using radius-server host Reference Some releases may require idle-time to be set lower than dead-
time. (CSCtr61120)
interface X
authentication event fail action next-method
authentication event server dead action reinitialize vlan 11 Move new hosts to specified critical data VLAN
authentication event server dead action authorize voice Authorize new phones to voice VLAN
authentication event server alive action reinitialize Reauthenticate endpoints on port once server “alive”
authentication violation restrict Deny access to violating host but do not disable port
radius-server dead-criteria time 30 tries 3 Conditions to mark server as “dead” (Ex: 60 sec.)
radius-server deadtime 2 Minutes before retrying server marked as “dead”
authentication critical recovery delay 1000 Throttle requests for critical ports once server “alive”
dot1x critical eapol Send EAPOL-Success when auth critical port
epm access-control open Permit access if no dACL returned with successful auth
radius-server host 10.1.98.8 auth-port 1812 acct-port 1813 test username RADIUS server definition including periodic test to detect server
radtest ignore-acct-port key cisco123 dead/alive:
username ‘radtest’: Locally defined test user to auth
radius-server host 10.2.101.3 auth-port 1812 acct-port 1813 test username idle-time: default = 60 = “Send test probe 1 per hour”
radtest ignore-acct-port key cisco123 ignore-acct-port : Test auth-port on
Fallback RADIUS server if primary server fails
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 539
NAD Fallback and Recovery For Your
Reference
‘aaa radius group’ Example
interface X
authentication event fail action next-method
• Similar configuration as previous example but authentication event server dead action reinitialize vlan 11
using aaa radius group and radius server authentication event server dead action authorize voice
authentication event server alive action reinitialize
host commands authentication violation restrict
• radius server host defines individual RADIUS authentication critical recovery delay 1000
dot1x critical eapol
servers with separate lines for config epm access-control open
parameters radius-server dead-criteria time 30 tries 3
radius-server deadtime 2
• aaa radius group defines RADIUS group with aaa group server radius psn-clusters
individual server entries listed server name psn-cluster1
server name psn-cluster2
BRKSEC-3432 #CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 540
NAD Fallback and Recovery Sequence
Endpoint Access Switch Policy Service Node
Layer 2 Point-to-Point Layer 3 Link
Auth Request Auth Request
Retry
15 sec, Auth-Timeout
Access VLAN 10 (or Authorized VLAN) Retry
15 sec, Auth-Timeout
Detection
Retry
15 sec, Auth-Timeout
radius-server dead-criteria 15 tries 3
Dead
15 sec, Auth-Timeout
SERVER DEAD
60 minute Idle-Time
Traffic permitted per RADIUS authorization
Recovery
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 542
RADIUS Test User Account
Access-Accept or Access-Reject?
• If valid user account used, how prevent unauthorized access using probe account?
If Auth Fail treated as probe failure, then need valid account in ISE db or external store.
• Match auth from probes to specific source/NDG, Service Type, or User Name.
• Allow AuthN to succeed, but return AuthZ that denies access.
Access-Accept
dACL = deny ip any any
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 543
Inaccessible Authentication Bypass (IAB)
Also Known As “Critical Auth VLAN” for Data
Critical VLAN
Access VLAN WAN or PSN Down
WAN / Internet
interface GigabitEthernet1/13
switchport access vlan 2
switchport mode access
switchport voice vlan 200
authentication event fail action next-method
authentication event server dead action authorize vlan 100
authentication event server alive action reinitialize
authentication order dot1x mab
dot1x pae authenticator
authentication port-control auto
dot1x timeout tx-period 10
dot1x max-req 2
mab
spanning-tree portfast
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 545
Critical Auth for Data
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 546
Critical Auth for Voice VLAN (CVV)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 547
Critical Auth for Data and Voice
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 548
Multiple Hosts and Critical Auth For Your
Reference
Critical Auth for Data and Voice
• Multi-MDA:
Router(config-if)# authentication event server dead action authorize vlan 10
Router(config-if)# authentication event server dead action authorize voice
Behavior: Existing data sessions stay authorized in current VLAN; New sessions authorized to VLAN 10
• Multi-Auth:
Router(config-if)# authentication event server dead action reinitialize vlan 10
Router(config-if)# authentication event server dead action authorize voice
Behavior: All existing data sessions re-authorized to VLAN 10; New sessions are authorized to VLAN 10
• Catalyst Switch Support: Series Multi-Auth w/VLAN Critical Auth for Voice
2k/3k 12.2(55)SE 15.0(1)SE
4k 15.0(2)SG 15.0(2)SG
IOS XE 3.2.0SG IOS XE 3.2.0SG
6k 12.2(33)SXJ 12.2(33)SXJ1
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 549
Default Port ACL Issues with No dACL Authorization
Limited Access If ISE Policy Fails to Return dACL! For Your
Reference
• User authentications successful, but authorization profile does not include dACL to permit
access, so endpoint access still restricted by existing port ACL!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 550
Protecting Against “No dACL” Authorization For Your
Reference
EPM Access Control
• If authentication successful and no dACL returned, a permit ip host any entry is created for the
host. This entry is created only if no ACLs are downloaded from ISE.
Critical
Access VLAN Voice VLAN WAN or PSN Down
Gi1/0/2
• One solution to dACL + Critical Auth VLAN issue is to simply remove the port ACL!
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 553
Using Embedded Event Manager with Critical VLAN
Modify or Remove/Add Static Port ACLs Based on PSN Availability
• EEM available on 3k/4k/6k
• Allows scripted actions to occur based on various conditions and triggers
event manager applet default-acl-fallback
event syslog pattern "%RADIUS-4-RADIUS_DEAD" maxrun 5
action 1.0 cli command "enable" Single RADIUS Server
action 1.1 cli command "conf t" pattern "CNTL/Z." (LB VIP) example
action 2.0 cli command "ip access-list extended ACL-DEFAULT" shown.
action 3.0 cli command "1 permit ip any any"
action 4.0 cli command "end" Multi-server option:
%RADIUS-3-
event manager applet default-acl-recovery ALLDEADSERVER
event syslog pattern "%RADIUS-4-RADIUS_ALIVE" maxrun 5
action 1.0 cli command "enable"
action 1.1 cli command "conf t" pattern "CNTL/Z."
action 2.0 cli command "ip access-list extended ACL-DEFAULT"
action 3.0 cli command "no 1 permit ip any any"
action 4.0 cli command "end"
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 554
EEM Example
Remove and Add Port ACL on RADIUS Server Status Syslogs
• Port ACLs block new user connections during Critical Auth
●
Only DHCP/DNS/PING/TFTP
All user traffic allowed allowed
● ACL-DEFAULT
●
• EEM detects syslog message %RADIUS-3- • EEM detects syslog message %RADIUS-6-
ALLDEADSERVER: Group radius: No active SERVERALIVE: Group radius: Radius server
radius servers found and removes ACL- 10.1.98.8:1812,1813 is responding again
DEFAULT. (previously dead)and adds ACL-DEFAULT.
event manager applet remove-default-acl event manager applet add-default-acl
event syslog pattern "%RADIUS-4-RADIUS_DEAD" maxrun 5 event syslog pattern "%RADIUS-4-RADIUS_ALIVE" maxrun 5
action 1.0 cli command "enable" action 1.0 cli command "enable"
action 1.1 cli command "conf t" pattern "CNTL/Z." action 1.1 cli command "conf t" pattern "CNTL/Z."
action 2.0 cli command "interface range gigabitEthernet 1/0/1 - 24" action 2.0 cli command "interface range gigabitEthernet 1/0/1 - 24"
action 3.0 cli command "no ip access-group ACL-DEFAULT in" action 3.0 cli command "ip access-group ACL-DEFAULT in"
action 4.0 cli command "end" action 4.0 cli command "end"
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 555
EEM Example 2 For Your
Reference
Modify Port ACL Based on Route Tracking
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 556
Using Embedded Event Manager with Critical VLAN
Modify or Remove/Add Static Port ACLs Based on PSN Availability
• Allows scripted actions to occur based on various conditions and triggers
track 1 ip route 10.1.98.0 255.255.255.0 reachability
event manager applet default-acl-fallback
event track 1 state down maxrun 5
action 1.0 cli command "enable"
action 1.1 cli command "conf t" pattern "CNTL/Z."
action 2.0 cli command "ip access-list extended ACL-DEFAULT" EEM available on
action 3.0 cli command "1 permit ip any any"
action 4.0 cli command "end"
Catalyst 3k/4k/6k
event manager applet default-acl-recovery switches
event track 1 state up maxrun 5
action 1.0 cli command "enable"
action 1.1 cli command "conf t" pattern "CNTL/Z."
action 2.0 cli command "ip access-list extended ACL-DEFAULT"
action 3.0 cli command "no 1 permit ip any any"
action 4.0 cli command "end"
https://supportforums.cisco.com/document/117596/cisco-eem-basic-overview-and-sample-configurations
https://supportforums.cisco.com/document/48891/cisco-eem-best-practices
#CLMEL © 2019 CiscoBRKSEC-3432
and/or its affiliates. All rights reserved. Cisco Public 557
Critical ACL using Service Policy Templates
Apply ACL, VLAN, or SGT on RADIUS Server Failure!
• Critical Auth ACL applied on Server Down
Critical
Access VLAN
VLAN Voice VLAN WAN or PSN Down
Gi1/0/2
Default ACL
Only DHCP/DNS/PING/TFTP allowed !
Critical
Access VLAN Voice VLAN WAN or PSN Down
Gi1/0/2
Default
Critical ACL
Deny PCI networks; Permit Everything
Only DHCP/DNS/PING/TFTP allowed ! Else !
policy-map type control subscriber ACCESS-POLICY
event authentication-failure match-first ip access-list extended ACL-CRITICAL
ACL-DEFAULT
10 class AAA_SVR_DOWN_UNAUTHD do-until-failure
remark Denyany
permit udp access to PCI any
eq bootpc zoneeqscopes
bootps
10 activate service-template CRITICAL_AUTH_VLAN
20 activate service-template DEFAULT_CRITICAL_VOICE_TEMPLATE deny tcpudp
permit anyany
172.16.8.0 255.255.240.0
any eq domain
30 activate service-template CRITICAL-ACCESS deny udp
permit anyany
icmp 172.16.8.0
any 255.255.240.0
service-template CRITICAL-ACCESS deny ipudp
permit any any
192.168.0.0 255.255.0.0
any eq tftp
access-group ACL-CRITICAL permit ip any any
!
service-template CRITICAL_AUTH_VLAN
vlan 10
service-template DEFAULT_CRITICAL_VOICE_TEMPLATE #CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 559
username 000c293c8dca password 0 000c293c8dca
username 000c293c8dca aaa attribute list mab-local
Critical MAB !
aaa local authentication default authorization mab-local
aaa authorization credential-download mab-local local
Local Authentication During Server Failure !
aaa attribute list mab-local
attribute type tunnel-medium-type all-802
attribute type tunnel-private-group-id "150"
000c.293c.8dca attribute type tunnel-type vlan
attribute type inacl "CRITICAL-V4"
!
policy-map type control subscriber ACCESS-POL
...
event authentication-failure match-first
WAN 10 class AAA_SVR_DOWN_UNAUTHD_HOST do-↵
until-failure
10 terminate mab
20 terminate dot1x
? 30 authenticate using mab aaa authc-↵
list mab-local authz-list mab-local
000c.293c.331e
...
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Home Dashboard - High-Level Server Health
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 563
Server Health/Utilization Reports
Operations > Reports > Diagnostics > Health Summary
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 564
For Your
Reference
Replication – Message Queue Backlog
Administration > System > Deployment
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 565
ISE Application Status (ISE 2.2) For Your
Reference
# show application status ise
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 566
ISE Application Status (ISE 2.4) For Your
Reference
# show application status ise
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 567
ISE Application Status (ISE 2.6) For Your
Reference
# show application status ise
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 568
KPM in a Nutshell For Your
Reference
• What is KPM?
• KPM stands for Key Performance Metrics. These are the metrics collected from the
MNT nodes about the Endpoints and its artifacts
• Benefits of KPM:
• Endpoints Onboarding data: Measure key performance metrics about
Endpoints, like Total, Active, Successful, Failures, Endpoints on-boarded/day
• Endpoints Transactional Load data: # radius requests at a PSN level/hr, Radius
requests to # Active EP ratio, How much of these data was persisted in the MNT
table and how many of them were suppressed to determine the suppression
ratio, what was the Avg and Max load on the PSN during that hour, what was the
latency and Avg TPS.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 569
CLI added in ISE 1.4
Key Performance Metrics (KPM) Admin UI Reports
# application configure ise (Options 12 and 13) added in ISE 2.2
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 570
KPM Attributes For Your
Reference
• KPM OnBoarding Results: • KPM Trx Load (cont)
• Total Endpoints : Total number of endpoints in the • Radius Requests : Number of Radius requests sent by the
deployment PSNs for that hour.
• Successful Endpoints : How many of them were on boarded • RR_AEP_ratio : Ratio of Radius Requests to the number of
successfully Active endpoints on an hourly basis. This will give the
number of radius request an Active EP makes on an
• Failed Endpoints : How many failed to on board
average.
• New EP/day : New endpoints seen in the deployment for a
• Logged_to_MNT/hr : Number of Radius Request persisted
given day
in the DB
• Total Onboarded/day : Total endpoints on-boarded for a
• Noise/hr : Number of Radius Request suppressed, only the
given day
counter increases but the data is not persisted in the DB.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 571
Raw Sample of KPM Stats Output For Your
Reference
• KPM_TRX_LOAD_<DATE>.xls
• KPM_ONBOARDING_RESULTS_<DATE>.xls
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 572
Key Performance Metrics (KPM)
KPM Reports added in ISE 2.2: Operations > Reports > Diagnostics > KPM
Also available from CLI (# application configure ise)
Provide RADIUS Load, Latency, and Suppression Stats
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 573
Serviceability Counter Framework For Your
Reference
Overview
• Counter Framework (CF) is a library to periodically collect different ISE attributes.
• Modules like profiler, network access, etc configured few critical attributes in CF.
• CF periodically collects all these attributes in each node and persists in MnT via syslog.
• “ISE Counters” report (Operations → Reports → Diagnostics) lists the attribute values per node.
• All counter attributes are enabled by default. To disable/enable use “application configure ise” admin
command with option number 14 ([14]Enable/Disable Counter Attribute Collection).
• Support bundle of MnT node (if “Include monitoring and reporting logs” is checked) will have the
counter attribute database table dump in csv format.
• Similar to admin “show cpu usage” command, cpu usage are displayed in “Health Summary” report
(Operations → Reports → Diagnostics).
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 574
Displaying Profiler Statistics
The Hard Way
6 <Enter>
Create an RMI connector client and connect it to the RMI connector server
• Enable/disable from
‘app configure ise’
Node specific report
• Enabled by default
• Threshold are hard
set by platform size
• Alarm sent when Thresholds
exceed threshold
• Running count
displayed per
collection interval
Detected
#CLMEL BRKSEC-3432
platform size
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 576
Disable/Enable Counter Attribute Collection For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 577
ISE Counters Example:
5-Minute and > 5-Minute Collection Results Endpoint Ownership
Changes per interval
(20 min for this metric;
threshold = 5k events)
Example:
Delta in this interval =
6 ownership changes
Note: Counters are (over 20 minutes)
cumulative so need to take
deltas to determine events
per interval
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 578
show cpu CLI and in Health Summary Report
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 579
Summary of Reports Enhancements in ISE 2.2
For Your
Reference
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 580
Summary of Reports Enhancements in ISE 2.2
Continued For Your
Reference
• Clicking on the report will generate the the report for last 7 days.
• In multi section report (e.g. -Authentication Summary)the pagination is
supported at each and every grid section(e.g – Authentications by Failure
reason) i.e navigation to next set of records for each section can be done
individually.
• Added Custom time range filter and Advance filter in all the reports
• Regex can be used for server, identity and mac address column. The supported
regex are :- (*abc -> ends with, abc* -> starts with and abc* or *abc -> ‘OR’
condition)
• Scheduled and saved reports will save the details of definition
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 581
ISE Scalability and High Availability For Your
Reference
Summary Review
• Appliance selection and persona allocation impacts deployment size.
• VM appliances need to be configured per physical appliance sizing specs.
• Profiling scalability tied to DB replication—deploy node groups and optimize PSN collection.
• Leverage noise suppression to increase auth capacity and reduce storage reqs.
• ISE enhances scalability with multi-AD and auto-device registration & purge.
• Admin, MnT, and pxGrid based on a Primary to Secondary node failover.
• Load balancers can offer higher scaling and redundancy for PSN clusters.
• Non-LB options include “smart” DNS, AnyCast, multiple RADIUS server definitions in the access
devices, and IOS RADIUS LB.
• Special consideration must be given to NAD fallback and recovery options when no RADIUS servers
are available including Critical Auth VLANs for data and voice.
• IBNS 2.0 and EEM offer advanced local intelligence in failover scenarios.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 582
Closing Comments
Session Agenda
Monitoring Load and System Health You Are Here
Sizing Deployments
Bandwidth and Latency Node Redundancy
and Nodes NAD Fallback and
Admin, MnT and pxGrid Recovery
Key Takeaway Points
• CHECK ISE Virtual Appliances for proper resources and platform detection!
• Avoid excessive auth activity through proper NAD / supplicant tuning and Log
Suppression
• Minimize data replication by implementing node groups and profiling best
practices
• Leverage load balancers for scale, high availability, and simplifying network
config changes
• Be sure to have a local fallback plan on you network access devices
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 585
Cisco Community Page on Sizing and Scalability
https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 586
ISE Performance & Scale Resources
https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148
• Cisco Live:
BRKSEC-3432
Reference version
• ISE Load Balancing Design
Guide
• Performance and Scale
guidance in HLD template
• Calculators for Bandwidth
and Logging
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 587
For Your
Reference
• Cisco Communities
https://community.cisco.com/t5/security-
documents/ise-load-balancing/ta-p/3648759
Includes Sample Working Configs, Videos, and update
notes on LB Guide.
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 588
For Your
Recommended Reading Reference
• http://www.ciscopress.com/store/cisc
o-ise-for-byod-and-secure-unified-
access-9781587144738
• http://amzn.com/1587144735
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 589
For Your
Reference
Additional Resources
Public Resources
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 590
For Your
Reference
Additional Resources
Public Resources
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 591
For Your
Reference
Additional Resources
Sales Resources (Cisco & Partners)
#CLMEL BRKSEC-3432 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 592
ISE Endpoint Analysis Tool
http://iseeat.cisco.com
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 593
ISE Portal Builder
http://isepb.cisco.com
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 594
ISE Bill Of Materials Tool
http://ise-bom.cisco.com
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 595
ISE 2.6 Update
IPv6 for ISE Management
What are we solving?
• More and more customers start using IPv6 in their
network. ISE already support RADIUS and
DNS, NTP, Portal / UI, TACACAS+, but its not enough.
Syslog & admin access
other services How do we solve it?
• This is the 3rd phase of IPv6 support (after TACACS+
and RADIUS). ISE 2.6 allows managing ISE over IPv6
network. This includes: ISE UI, NTP, DNS, Active
Directory, Syslog, Audit Logs and Reports, ERS,
SNMP, External Repositories and IPv6 Based ACLs,
DACLs and SGACLs.
RADIUS, Active Directory
TACACS+ and, transactions Prerequisites
ACLs, DACLs
• IPv6 network
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Authenticate REST Calls Against AD
App
• ISE 2.6 can authenticate REST calls against Active
ISE Active Directory
Directory external Identity store.
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Authenticate CLI Admin Against AD
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Anyconnect UDID as key (compliance)
Unique Device Identifier (UDID) What are we solving?
• Open seating environments with docking stations or
UDID MAC Address(s) Compliance shared ethernet dongles for Windows/MAC OSX
01669b65...05ee93
pose a challenge because the same MAC address is
00:1a:00:1a:11:11
00:1a:00:1a:22:22 used by different machines. Random MAC addresses
in Windows10. Not a unique ID. How do we solve
it?
• ISE can now perform authorization for managed
end-points regardless to their MAC address, even
when MAC address is not persistent.
Prerequisites
• ISE 2.6, Windows/MacOSx, AnyConnect 4.7
00:1A:00:1A:11:11 00:1A:00:1A:22:22
• Complaint MDM (JAMF/SCCM)
MAC address is not always a reliable identifier yet is used as the common identifier for external systems such as SCCM and JAMF
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Increased grace period flexibility – Phase 1
What are we solving?
• Employee goes on 2 week holiday. When the
employee returns, they may not be on-line for very
Updates are needed on your long due to things such as customer appointments.
computer before you can An employee may not have their system updated to
join the network the current patch level for much longer than just the
time on holiday given cycle times measured in days
for systems such as JAMF & SCCM
How do we solve it?
• Increased grace period flexibility provides two
customizable end-user warning notification time
periods & a customizable message
Prerequisites
• ISE 2.6, AnyConnect 4.7
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Improved AnyConnect User Interface –Phase 1
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Reports to verify TrustSec Deployment
What are we solving?
• After TrustSec Policy change and deploying it there
is no way to know if all TrustSec enabled network
devices have successfully downloaded latest policy
How do we solve it?
• A new report that shows the status of the TrustSec
Deployment
Prerequisites
• None
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Please fill out the survey
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 604
Complete Your Online Session Evaluation
• Give us your feedback and receive a
complimentary Cisco Live 2019 Power Bank
after completing the overall event
evaluation and 5 session evaluations.
• All evaluations can be completed via the
Cisco Live Melbourne Mobile App.
• Don’t forget: Cisco Live sessions will be
available for viewing on demand after the
event at:
https://ciscolive.cisco.com/on-demand-library/
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 605
Continue
your Cisco
Demos in
Labs Meet The
Expert
Related
sessions
education the World
of
Solutions
#CLMEL © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 606
Thank you
#CLMEL
#CLMEL