Cisco Identity Services Engine (ISE) v3.1: Common Criteria Operational User Guidance and Preparative Procedures
Cisco Identity Services Engine (ISE) v3.1: Common Criteria Operational User Guidance and Preparative Procedures
Cisco Identity Services Engine (ISE) v3.1: Common Criteria Operational User Guidance and Preparative Procedures
(ISE)v3.1
Common Criteria Operational User Guidance
And Preparative Procedures
Version 0.5
1
Table of Contents
1. Introduction .......................................................................................................................... 8
3.2.1 Options to be chosen during the initial setup of the ISE 3.1 ....................... 17
3
4.9.3 Administrator defined list of Endpoint IPv4 addresses and/or subnets,
IPv6 addresses and/or subnets, and/or MAC Addresses ........................................ 73
5.2.2 External Platform Logs Storage Settings and Deletion .............................. 139
4
List of Tables
5
List of Acronyms
Table 1: Acronyms
6
DOCUMENT INTRODUCTION
Prepared By:
Cisco Systems, Inc.
170 West Tasman Dr.
San Jose, CA 95134
DOCUMENT INTRODUCTION
This document provides supporting evidence for an evaluation of a specific Target
of Evaluation (TOE), the Identity Services Engine (ISE) (also referred to as ISE 3.1
in this document). This Operational User Guidance with Preparative Procedures
addresses the administration of the TOE software and hardware and describes how
to install, configure, and maintain the TOE in the Common Criteria evaluated
configuration. Administrators of the TOE will be referred to as administrators,
Security administrators, TOE administrators, semi-privileged administrators, and
privileged administrators in this document.
7
1. Introduction
This Operational User Guidance with Preparative Procedures documents the
administration of the Identity Services Engine (ISE), the TOE, as it is being certified
under Common Criteria. The Identity Services Engine (ISE) may be referenced below
as ISE 3.1, TOE, or simply ISE.
1.1 Audience
This document is written for administrators configuring the TOE. This document
assumes that you are familiar with the basic concepts and terminologies used in
internetworking and understand your network topology and the protocols that the
devices in your network can use, that you are a trusted individual, and that you are
trained to use the operating systems on which you are running your network.
1.2 Purpose
This document is the Operational User Guidance with Preparative Procedures for
the Common Criteria evaluation. It was written to highlight the specific TOE
configuration and administrator functions and interfaces that are necessary to
configure and maintain the TOE in the evaluated configuration. This document is
not meant to detail specific actions performed by the administrator but rather is a
road map for identifying the appropriate locations within Cisco documentation to get
the specific details for configuring and maintaining ISE 3.1 operations.
# Title Link
8
# Title Link
9
# Title Link
10
1.5 Operational Environment
Administrative Yes This console provides the connection to the ISE appliance
Console for administration and management. The console can
connect directly to ISE or over the network via a browser
or SSHv2 connection.
The TOE supports the following browsers:
• Microsoft Edge
Syslog Target Yes The TOE must offload syslog to an external entity, which
can be another iteration of ISE or a syslog server that
supports TLS-protected transfer.
11
1.6 Excluded Functionality
The device profiler feed service Not within the scope of the evaluation
Virtual environment Microsoft Only ESXi 6.7 and 7.0 virtual environment will be tested
Hyper-V on Microsoft Windows
Server 2012 R2 for ISE-VM
Virtual environment KVM on RHEL Only ESXi 6.7 and 7.0 virtual environment will be tested
7.3 for ISE-VM
These services will be disabled by configuration. The exclusion of this functionality does not
affect compliance to the collaborative Protection Profile for Network Devices Version 2.2e.
12
2. Secure Acceptance of the TOE
In order to ensure the correct TOE is received, the TOE should be examined to
ensure that that is has not been tampered with during delivery. Verify that the TOE
software and hardware were not tampered with during delivery by performing the
following actions:
Step 1 Before unpacking the TOE, inspect the physical packaging the equipment
was delivered in. Verify that the external cardboard packing is printed with the Cisco
Systems logo and motifs. If it is not, contact the supplier of the equipment (Cisco
Systems or an authorized Cisco distributor/partner).
Step 2 Verify that the packaging has not obviously been opened and resealed by
examining the tape that seals the package. If the package appears to have been
resealed, contact the supplier of the equipment (Cisco Systems or an authorized
Cisco distributor/partner).
Step 3 Verify that the box has a white tamper-resistant, tamper-evident Cisco
Systems bar coded label applied to the external cardboard box. If it does not,
contact the supplier of the equipment (Cisco Systems or an authorized Cisco
distributor/partner). This label will include the Cisco product number, serial number,
and other information regarding the contents of the box.
Step 4 Note the serial number of the TOE on the shipping documentation. The serial
number displayed on the white label affixed to the outer box will be that of the
device. Verify the serial number on the shipping documentation matches the serial
number on the separately mailed invoice for the equipment. If it does not, contact
the supplier of the equipment (Cisco Systems or an authorized Cisco
distributor/partner).
Step 5 Verify that the box was indeed shipped from the expected supplier of the
equipment (Cisco Systems or an authorized Cisco distributor/partner). This can be
13
done by verifying with the supplier that they shipped the box with the courier
company that delivered the box and that the consignment note number for the
shipment matches that used on the delivery. Also verify that the serial numbers of
the items shipped match the serial numbers of the items delivered. This verification
should be performed by some mechanism that was not involved in the actual
equipment delivery, for example, phone/FAX or other online tracking service.
Step 6 Once the TOE is unpacked, inspect the unit. Verify that the serial number
displayed on the unit itself matches the serial number on the shipping
documentation and the invoice. If it does not, contact the supplier of the equipment
(Cisco Systems or an authorized Cisco distributor/partner). Also verify that the unit
has the following external identification as described in Table 5 below.
SNS-3595
ISE 3.1 - 3500 Series 3595
SNS-3615
ISE 3.1 – 3600 Series 3615
SNS-3655
3655
SNS-3695
3695
14
https://software.cisco.com/download/redirect?config=a27582451f7dffb1b
af7857a5c89f0e7
• The TOE ships with the correct software images installed.
Step 9 Install the downloaded and verified software image onto your ISE 3.1 as
described in [1] under patch install or in [2] under Install a Software Patch and the
following sections.
Start your ISE 3.1 as described in [3] – Chapter 7. Confirm that your ISE 3.1 loads
the image correctly, completes internal self-checks and displays the cryptographic
export warning on the console.
Step 10 The end-user must confirm once the TOE has booted that they are indeed
running the evaluated version. Use the “show application version ise” command to
display the currently running software release version.
15
Table 6: Evaluated Software Images
6202bfff12715d3d1a8b2cee08f077fba38af2db4e5e0b
ise-apply-
bbbbac2fb6fb6c24c36ebe1ddd04878de40edd7414f8
CSCwe28719_3.1.0.518_p
5cd19ef2cd16fd28ad68be3e42f930da2c6f67
atch5-SPA.tar.gz
16
3. Secure Installation and Configuration
3.2.1 Options to be chosen during the initial setup of the ISE 3.1
When you start to configure ISE via the CLI, a number of parameters must be
configured. See [3] under Installing and Configuring a Cisco SNS-3500/3600 Series
Appliance -> Cisco ISE Setup Program Parameters.
The exception to the information given in this section is that the password must
meet the requirements in the ST:
1. Passwords shall be able to be composed of any combination of upper and
lower case letters, numbers, and the following special characters: [“!”, “@”,
“#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”];
2. Minimum password length shall be settable by the Security Administrator,
and support passwords of 15 characters or greater.
Additional setup via the HTTPS Graphical User Interface (GUI) is needed:
Administrator Password Policy: the policy may be set to enforce a minimum
password length of 15 characters:
a. Choose Administration > System > Admin Access > Authentication
b. Click the Password Policy tab.
c. On the Password Policy tab, change the Minimum Length field to 15.
d. Additional restrictions can be set per local company policy.
17
3.2.2 Saving Configuration
ISE uses both a running configuration and a starting configuration when working
with the CLI. Configuration changes affect the running configuration, in order to
save that configuration the running configuration (held in memory) must be copied
to the startup configuration. This may be achieved by either using the write memory
command or the copy running-config startup-config command. These commands
should be used frequently when making changes to the configuration of the TOE. If
the TOE reboots and resumes operation when uncommitted changes have been
made, these changes will be lost and the TOE will revert to the last configuration
saved.
When working with the GUI, the configuration is automatically saved every time
values are entered and the “Save” button is used on each screen.
18
Please find the detailed steps to configure the FIPS mode of operation in ISEv3.1
below -
19
c) Click the Submit button to persist the changes. The saved Allowed
Protocol Service is shown in the table as shown below:
20
3. Modify the Authentication Policy to use the newly created EAP-TLS Only
settings instead of the Default Network Access setting.
21
c) Mouse click on the Default Network Access Pulldown selection, then
select EAP-TLS_Only
22
4. Delete the Default Network Access settings because it uses insecure
algorithms that will prevent ISE from enabling FIPS 140 mode.
b) Check the checkbox Default Network Access then click the Delete
button.
d) The Allowed Protocols Services table will no longer show the Default
Network Access setting which was deleted.
23
5. Set ISE in FIPS 140 mode
24
d) Confirm that an automatic restart of all ISE services will take place as ISE
initializes the cryptographic library into FIPS 140 mode, by clicking on the
OK button.
e) Click the “Save” button to start the transition to FIPS 140 mode.
25
f) The user interface informs the administrator that a logout will occur.
g) The Login page appears but login will not be allowed until the web
application and all services are restarted with the cryptographic library
initialized into FIPS 140 mode.
After this period elapses at the CLI, the session times out and access is no longer
possible during this session. The administrator may re-initiate the login process to
continue work. The administrator may also resume the access from the previous
session by selecting that session after successful authentication and establishment
of a new session. See the screen shot below for the options given. Selection of both
starts a new administrative session with a new inactivity timer.
Configuration of these settings is limited to the CLI administrator and Super Admin
and System Admin group roles on the GUI (see Section 4.1). Each administrator
logged onto the TOE can manually terminate his/her session using the “Log Out”
link in the web-based GUI or the “exit” or “forceout <username>” commands at the
CLI.
27
3.3 Network Protocols and Cryptographic Settings
28
3.3.2 SSL/TLS Settings
The evaluated configuration requires that when connecting to the TOE over TLS1.2,
it must be used with one of the following algorithms-
The SSL/TLS client must be configured for one or more of the above
algorithms. See the documentation for your browser for the specific configuration
settings. Enabling FIPS mode in the TOE is the first step to limiting the TLS versions
supported to 1.2 and also limits the allowed ciphersuites to the list claimed in the
FCS_TLSS_EXT.1.2 SFR of the ST. The next step is to uncheck the “Allow TLS 1.0”
and “Allow TLS 1.1” checkboxes and check the ‘Allow SHA-1 ciphers” and “Allow
ECDHE-RSA” ciphers. This will allow ISE as TLS client to LDAPS servers to only
support TLS v1.2.
29
Firefox Example Configuration
For Firefox, you should open Firefox > Preferences > and select Use TLS 1.2. Next
type “about:config” in the address bar. A warning will come up about changing
these settings. Do a search on security and you will see the algorithms listed as:
security.ssl3.rsa_aes_128_sha. In order to only enable the mandatory ciphersuites
the other non-standard ciphersuites must be disabled in the browser. Double click
on each ciphersuite that must be disabled and the Value will turn to false. See
Table 7 below for details.
30
Table 7: Firefox Settings
31
In order to prioritize the ciphersuites that internet explorer uses > Start > Run
‘gpedit.msc’
The Local Group Policy Editor will open, then click on > Local Computer Policy >
Computer Configuration > Administrative Templates > Network > SSL Configuration
Settings – Double click on the SSL Cipher Suite Order > Click Edit Policy
Steps to Edit the SSL Cipher Suite Order
1. Click on the Enabled radio button.
2. The current cipher suites will be listed under the heading SSL Cipher Suites
3. Copy these into a notepad document and save them as a backup.
4. Open a new blank notepad document
5. Enter the following mandatory ciphersuites:
TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA
6. Place a comma at the end of every suite name except the last. Make sure there
are NO embedded spaces.
7. Remove all the line breaks so that the cipher suite names are on a single, long
line.
8. Copy the above ciphersuites (from step 5) and paste into the box that previously
had the listing of all supported TLS ciphersuites. The maximum length is 1023
characters.
9. It is necessary to restart the computer after modifying this setting for the changes
to take effect.
10. As a reference the following web page was used for these instructions:
http://msdn.microsoft.com/en-
us/library/windows/desktop/bb870930%28v=vs.85%29.aspx#adding__removing__an
d_prioritizing_cipher_suites
32
> Identity Management > External Identity Sources. Left-
Navigation: LDAP. “Connection” tab. Hostname/IP field)
• When the TOE acts as a TLS client to TLS Secure Syslog servers, it obtains
the reference identifiers from the administrator configured value in
the Remote Logging Targets IP/Host Address field. (Administration
application. Menu: Administration > System > Logging. Left-Navigation:
Remote Logging Targets. IP/Host Address field)
2. The configured TOE Server certificate for usage “EAP Authentication” must
contain one of the supported RFC 6125 reference identifiers as configured on
the LDAPS Server(s) and Secure Syslog Audit Server(s).
When the TOE acts as a TLS client to LDAPS servers, it obtains the RFC
6125 reference identifiers from the administrator configured value in the
LDAP Identity Source Hostname/IP field. (Administration application. Menu:
Administration > Identity Management > External Identity Sources. Left-
Navigation: LDAP. “Connection” tab. Hostname/IP field)
When the TOE acts as a TLS client to TLS Secure Syslog servers, it obtains
the reference identifiers from the administrator configured value in
the Remote Logging Targets IP/Host Address field. (Administration
application. Menu: Administration > System > Logging. Left-Navigation:
Remote Logging Targets. IP/Host Address field).
The TOE supports the following presented identifier types:
a) subjectAltName entry of type dNSName (DNS-ID in RFC 6125)
b) CN-ID as defined in RFC 6125,
c) subjectAltName entry of type iPAddress; and
34
d) Wildcards in DNS domain names.
When ISE acts as a TLS server, it has no prior knowledge of the domain name and
IP address of clients connecting to it. Server Identity verification methods as
described in RFC 6125, RFC 2818 and other RFCs are intended more for client’s
verification of server identity through reference identifiers to avoid man-in-the-
middle attacks.
ISE will disallow importing ISE certificates with 1024 bit RSA key sizes when ISE is
in FIPS mode. For Diffie-Hellman parameter size of 2048 bits, configuring ISE into
FIPS mode automatically always sets the TLS server ISE Administration application
to use Diffie-Hellman parameter size of 2048 bits.
When ISE (TOE) acts as a TLS client to Secure Syslog Audit Servers, Certificate
Revocation List (CRL) servers must be configured for each of the Intermediate and
Trust Anchor Root Certificate Authorities. The Certificate Revocation List
information in the X.509 CRL Distribution Points extension is not used. Certificate
revocation using OCSP responders is unsupported. when ISE acts as a TLS client to
Secure Syslog Audit Servers. The steps for configuring Certificate Revocation Lists
are detailed below in the section “Steps for Configuring X.509 Certificate Revocation
using Certificate Revocation Lists (CRLs)”.
When ISE (TOE) acts as a TLS client to LDAP Over TLS (LDAPS) servers, the
Administrator may configure revocation checks to OCSP responder(s) and/or CRL
server(s). When both OCSP responder and CRL servers are configured, OCSP
responder(s) are used to retrieve the certificate revocation status and if a status
determination cannot be made, then the CRL server(s) configured are used to check
35
revocation status. For OCSP the Administrator may either configure the OCSP
responder information or configure to use the OCSP responder information
contained in the certificate’s Authority Information Access (AIA) Extension. For CRL
Certificate Revocation List (CRL) servers must be configured for each of the
Intermediate and Trust Anchor Root Certificate Authorities. The Certificate
Revocation List information in the X.509 CRL Distribution Points extension is not
used. The steps for configuring OCSP are detailed below in the section “Steps for
Configuring X.509 Certificate Revocation using Online Certificate Status Protocol
(OCSP)”. The steps for configuring Certificate Revocation Lists are detailed below
in the section “Steps for Configuring X.509 Certificate Revocation using Certificate
Revocation Lists (CRLs)”.
Configure the CRL information for all Intermediate and Trust Anchor Root Certificate
Authority certificates
For each Intermediate Certificate Authority and Trusted Anchor Root Certificate
Authority, import the X.509 certificate and complete the following fields:
Leave the checkboxes unchecked for “Bypass CRL Verification if CRL is not
Received” and “Ignore that CRL is not yet valid or expired”.
Press the “Save” button on each of the Trusted Certificate setting pages.
36
EXAMPLE:
Enter Administrator defined values for the Name and Description fields.
37
To use the OCSP Responder information contained in the X.509 Authority
Information Access (AIA) extension, check the radio button for “Use OCSP URLs
specified in Authority Information Access (AIA)”.
Check the checkbox for “Enable Nonce Extension Support” when your OCSP
responder uses Nonces.
Check the checkbox for “Validate Response Signature”.
Scroll down and press the “Submit” button to save the configuration. Continue to
Step 2.
EXAMPLE: Screen shot showing a configuration using the OCSP URLs specified in
the Authority Information Access (AIA) extension.
38
To enter the OCSP Responder information, overriding any OCSP URLs contained in
the X.509 Authority Information Access (AIA) extension, complete the following
fields:
Primary Server
URL:
Check the checkbox “Enable Nonce Extension Support” if your
OCSP responder is configured to use Nonces.
Check the checkbox “Validate Response Signature”
Scroll down and click the “Submit” button to save the settings.
EXAMPLE:
39
2. Configure the OCSP responder for all Intermediate and Trust Anchor Root
Certificate Authority certificates
For each Intermediate Certificate Authority and Trusted Anchor Root Certificate
Authority, import the X.509 certificate and complete the following fields:
Check the checkbox “Validate against OCSP Server” and pulldown the name of the
OCSP Client Profile created in step 1.
Check the checkboxes “Reject the request if OCSP returns UNKNOWN status” and
“Reject the request if OCSP Responder is unreachable”.
40
Click the “Save” button to save the settings.
EXAMPLE:
Session Resumption – Session resumption is enabled by default for the TLS server
connections and cannot be disabled. Section 4.11 describes the configuration of the
EAP-TLS Server session resumption capabilities.
41
3.3.3 Logging Configuration
The TOE includes logging of all Identification & Authentication and relevant
administrator actions at the CLI & GUI by default, but in order to log session idle
timeouts (FTA_SSL.3), a debug level must be set:
1. In the GUI choose Administration > System > Logging.
2. Click Logging > Debug Log Configuration from the navigation panel on the
left.
3. Click the radio button 'admin-infra' then click 'Edit'.
4. Change the Log Level pulldown value to 'DEBUG'.
5. Press 'Save' button.
6. Click the radio button ‘infrastructure' then click 'Edit'.
7. Change the Log Level pulldown value to 'DEBUG'.
8. Press 'Save' button.
2. Generate SSH RSA keypair for the CLI user created in step 1.
42
On a non-TOE host generate a SSH RSA keypair using the OpenSSH 'ssh-keygen'
program or a suitable alternative that can format the public key in the format
produced by OpenSSH.
EXAMPLE showing a SSH RSA keypair created for user foobar with 4096 bits
# /usr/bin/ssh-keygen -v -b 4096 -t rsa -N K99CNYM8tQP2F8M -C foobar@ise-
administration-node -f /home/foobar/foobar_ise-administration-node.key
Generating public/private rsa key pair.
Your identification has been saved in /home/foobar/foobar_ise-administration-
node.key.
Your public key has been saved in /home/foobar/foobar_ise-administration-
node.key.pub.
The key fingerprint is:
6f:af:8c:f3:1b:6f:e0:16:22:30:22:ae:da:96:0c:46 foobar@ise-administration-node
The key's randomart image is:
+--[ RSA 4096]----+
| |
| |
| |
|.E. o |
|o. . o S |
|.o . ..o |
|oo . . o+o |
|..+ .+o+. |
|o.. .+=+o |
+-----------------+
3. Copy the public key file to a server reachable by the ISE node (TOE)
For example copy the public key file to a SFTP server location.
# cd /home/foobar
# scp foobar_ise-administration-node.key.pub sftpuser@sftp-
server:/home/sftpuser/pub/
43
sftpuser@sftp-server's password:
foobar_ise-administration-node.key.pub 100% 752 0.7KB/s 00:00
Navigate to:
Menu: Administration > System > Maintenance
Left-Side: select 'Repository'
Content: Click 'Add' button.
Repository Name: <Customer Defined Name of Repository>
Protocol: select SFTP or other desired protocol
Location:
Server Name: <hostname or IPv4 address of SFTP server>
Path: <path where the SFTP Username provided in the subsequent
fields has Read access and where the SSH RSA public key was copied in step 3>
Credentials:
User Name: <userid of SFTP server>
Password: <password for userid on SFTP server>
Click 'Submit' button to save values
Logon as an admin-role user to the CLI of the ISE node where the CLI user was
created in step 1.
Run the EXEC command 'crypto host_key add host <FQDN or IPv4 address>'
hostname/userid# crypto host_key add host <FQDN or IPv4 address> where
<FQDN or IPv4 address> MUST match the value configured under the SFTP
Repository 'Server Name' field value.
6. Authorize the use of the public key for the user created in step 1.
44
• Login to the ISE Command Line Interface (CLI) as the user created in step 1
using the password authentication method.
• Add the SFTP server host key
Run the EXEC command 'crypto host_key add host <FQDN or IPv4 address>'
hostname/userid# crypto host_key add host <FQDN or IPv4 address> where
<FQDN or IPv4 address> MUST match the value configured under the SFTP
Repository 'Server Name' field value.
• Verify that the SSH RSA public key file is accessible from the ISE SFTP client.
Run the 'crypto key import <public key filename> repository <repository
name>' command to authorize use of the SSH RSA public key in the <public
key filename> for the currently logged in CLI user.
EXAMPLE:
hostname/foobar# crypto key import foobar_ise-administration-node.key.pub
repository sftp
• Verify the authorized SSH RSA public key for the user by running the CLI
command 'show crypto authorized_keys'
EXAMPLE:
hostname/foobar# show crypto authorized_keys
Authorized keys for foobar
ssh-rsa 6f:af:8c:f3:1b:6f:e0:16:22:30:22:ae:da:96:0c:46 foobar@ise-
administration-node
hostname/foobar#
45
7. Using a non-TOE SSH client with the private key generated from Step 2
authenticate to the ISE SSH server using public key authentication.
8. Restrict the Key Exchange Methods supported for the SSH protocol via the
CLI
• Via the CLI, the admin needs to enter the following configuration commands –
hostname/admin# conf term
hostname/admin(config)# service sshd key-exchange-algorithm diffie-
hellman-group14-sha1
9. SSH connections are rekeyed before 1 hour or 1GB has been transmitted using
that key. These rekey settings are the same for all ISE installations regardless of
whether ISE is operating in FIPS 140 mode. SSH rekey thresholds are default and
cannot be configured by users.
10. SSH host key algorithms - The SSH host key algorithms on the TOE are
configured by default when the TOE is operating in the CC mode. No additional
configuration steps are required.
46
communications. This requires that the TLS remote logging target be created and
that UDP syslog be removed.
To configure ISE to send secure syslog to a log collector:
1. In the GUI choose Administration > System > Logging.
2. Click Remote Logging Targets from the navigation pane on the left.
a. Click Add.
b. Enter the desired fields for the new Remote Secure Syslog Receiver,
including Name & IP Address or Fully Qualified Hostname
In the IP/Host Address field enter the Fully Qualified Hostname when
the Secure Syslog Server’s X.509 certificate contains a subjectAltName
extension of type dNSName or when the subject Common Name value
contains the fully qualified domain name of the Secure Syslog Server.
In the IP/Host Address field enter the IPv4 address when the Secure
Syslog Server’s X.509 certificate contains a subjectAltName extension
of type iPAddress.
c. Change the pulldown menu for the Target Type to Secure Syslog.
d. Confirm that the port is set to the default standard Secure Syslog port:
TCP 6514.
e. Click the checkmark next to Buffer Messages When Server Down.
f. Click the checkmark next to Enable Server Identity Check
g. Change the pulldown menu for the Select CA Certificate to the
Certificate Authority certificate for the Secure Syslog server.
h. Leave other fields at their default value.
i. Ensure that the checkbox for “Include Alarms for this Target” remains
unchecked. If this box gets checked, it will result in UDP insecure
Alarms being sent.
47
j. Click Submit.
After the ‘Submit’ is clicked, the newly added syslog node appears in the table of
Remote Logging Targets. By default upon adding the Remote Logging Target the
Remote Logging Target is Enabled. However, syslog messages are unsent to this
Remote Logging Target until the administrator has configured which type of logging
audit records desired. The next set of steps describes how to control what types of
audit record syslog messages get sent to the Remote Logging Target just added:
1. In the GUI choose Administration > System > Logging.
2. Click Logging Categories from the navigation pane on the left.
3. For every radio button do the following:
a. Click radio button
b. Click Edit.
c. Select the Name of the secure Remote Logging Target configured
above under the Targets -> Available box (left side), and press the >
button to move it to the Selected box.
d. Click Save.
Set up Cisco peer ISE nodes to receive secure syslog (another iteration of ISE):
1. In the GUI choose Administration > System > Logging.
2. Click Remote Logging Targets from the navigation panel on the left.
3. Disable the LogCollector.
e. Click the LogCollector radio button.
f. Click Edit.
g. Choose Disabled from the Status drop-down list box.
48
h. Examine list of log collectors to determine if an additional UDP
collector exists (LogCollector2), and if so, repeat steps a-c for that
entry.
i. Click Save.
2. Enable the Secure Syslog Collector.
a. Click the TCPLogCollector radio button.
b. Click Edit.
c. Choose Enabled from the Status drop-down list box.
d. Click Save.
Other TLS-capable syslog targets can also be used as logging targets. Kiwi-syslog is
an example of a syslog server that is supports this functionality. Only the Security
Administrator role can perform modification and deletion of log files.
49
4. Secure Management
Refer to [1] for available commands and associated roles and privilege levels at the
CLI.
Warning: Usage of the Super Admin role, which has access to all functionality,
should be limited after installation, and users should be granted roles that give the
least privilege necessary to accomplish their work.
50
Table 8: Default RBAC Menu Access Permissions
Super Admin Menu Access Super Admin • Operations > All menu
items
• Policy > All menu items
• Administration > All menu
items
Policy Admin Menu Access Policy Admin • Operations > All menu
items
• Policy > All menu items
• Administration >
– Identity Management > All
menu items
– System > Settings
Helpdesk Admin Menu Helpdesk Admin • Operations > All menu
Access items
Identity Admin Menu Access Identity Admin • Operations > All menu
items
• Administration >
– Identity Management > All
menu items
Network Admin Menu Network Device Admin • Operations > All menu
Access items
• Administration >
– Network Resources > All
menu items
System Admin Menu Access System Admin • Operations >
Authentication, Alarms,
Reports, and Troubleshoot
• Administration >
51
– System > All menu items
RBAC Admin Menu Access RBAC Admin • Operations > All menu
items
• Administration >
– Admin Access > All menu
items
MnT Admin Menu Access MnT (Monitoring) Admin • Operations > All menu
items
4.2 Passwords
To prevent administrators from choosing insecure passwords, each password must
meet the following requirements:
• At least 15 characters long
• Composed of any combination of characters that includes characters for at
least 3 of these four character sets: upper case letters, lower case letters,
numbers, and the following special characters: “!”, “@”, “#”, “$”, “%”, “^”,
“&”, “*”, “(“, “)”
At: Administration > System > Admin Access > Authentication, the password length
can be set as well as additional password policies, such as enforcing the use of
multiple character sets.
Configuration of password policies is limited to the Super Admin and System Admin
group roles on the GUI.
52
• Optional: Configure the Lockout message sent to the user once the account is
locked.
To ensure the Administrator account does not get locked out by the number of failed
attempts, the Emergency account must be enabled. This requires the use of an
enabled local administrator account that has read-write access and web access.
The purpose of this account is a work around to ensure administrator access to the
TOE is available when remote authentication is not available. Access to this account
should be limited and only used in when no other option is available to gain access
to the TOE, such as another Authorized Administrator.
For instructions to manually set the local hardware clock, refer to the clock
command in [1].
Configuration of clock settings is limited to the CLI administrator and Super Admin
and System Admin group roles on the GUI.
53
o public-key based - Requires user to provide correct username and
private key combination to authenticate
To limit identification and authentication attempts by the TOE, the following items
can be configured to limit based on date/time, concurrent sessions, and IPv4/MAC
address.
• Date/Time Range - Administration > System > Admin Access >
Authentication > Account Disable Policy
• Concurrent Sessions – Administration > System > Admin Access > Settings >
Access > Session
• IPv4/MAC Address - Administration > System > Admin Access > Settings >
Access > IP Access
During each login attempt, authentication data is not revealed when credentials are
entered, and this is implemented by default. No additional preparatory steps are
required for the same.
54
5. Fill in the field with the required banner text for your organization, up to a
1520 character maximum.
6. Press the 'Save' button to commit the changes made in steps 1.3 and 1.4.
The CLI banner may also be configured by the CLI admin using the following
commands:
# banner install pre-login <filename> repository <reponame>
where filename is the file that contains the banner, and reponame is the
location of the file. The command ‘banner remove pre-login’ can be used to
remove the banner.
The GUI banner will look like the following when configured:
The SSH banner will look like the following when the CLI banner is configured:
ssh admin@generic-domain
55
4.7 Virtual Private Networks (VPN)
58
Note: the authorized administrator must ensure that the keysize for
this setting is greater than or equal to the keysize selected for ESP in
Section 4.6.2 below. If AES 128 is selected here, then the highest
keysize that can be selected on the TOE for ESP is AES 128 (either
CBC or GCM).
Note: Both confidentiality and integrity are configured with the hash
sha and encryption aes commands respectively. As a result,
confidentiality-only mode is disabled.
TOE-common-criteria (config-isakmp)# authentication pre-share
This configures IPsec to use pre-shared keys. X.509 v3 certificates are
also supported for authentication of IPsec peers. See Section 4.6.3
below for additional information.
TOE-common-criteria(config-isakmp)# exit
TOE-common-criteria(config)# Crypto isakmp key cisco123!cisco123!CISC
address 11.1.1.4
Note: Pre-shared keys on the TOE must be at least 22 characters in
length and can be composed of any combination of upper and lower
case letters, numbers, and special characters (that include: “!”, “@”,
“#”, “$”, “%”, “^”, “&”, “*”, “(“, and “)”).
The TOE supports pre-shared keys up to 128 bytes in length. While
longer keys increase the difficulty of brute-force attacks, longer keys
increase processing time.
TOE-common-criteria (config-isakmp)# group 14
This selects DH Group 14 (2048-bit MODP) for IKE, but 19 (256-bit
Random ECP), 24 (2048-bit MODP with 256-bit POS), 20 (384-bit
Random ECP), 15 (3072 bit MODP), and 16 (4096-bit MODP) are also
allowed and supported.
TOE-common-criteria (config-isakmp)# lifetime 86400
The default time value for Phase 1 SAs is 24 hours (86400 seconds),
but this setting can be changed using the command above with
different values.
59
TOE-common-criteria (config-isakmp)# crypto isakmp aggressive-mode
disable
Main mode is the default mode and the crypto isakmp aggressive-
mode disable ensures all IKEv1 Phase 1 exchanges will be handled in
the default main mode.
TOE-common-criteria(config-isakmp)#exit
Note: the authorized administrator must ensure that the keysize for
this setting is greater than or equal to the keysize selected for ESP in
Section 4.6.2 below. If AES 128 is selected here, then the highest
keysize that can be selected on the TOE for ESP is AES 128 (either
CBC or GCM).
Note: Both confidentiality and integrity are configured with the hash
sha and encryption aes commands respectively. As a result,
confidentiality-only mode is disabled.
60
TOE-common-criteria (config-ikev2-proposal)# group 14
This selects DH Group 14 (2048-bit MODP) for IKE, but 19 (256-bit
Random ECP), 24 (2048-bit MODP with 256-bit POS), 20 (384-bit
Random ECP), 15 (3072 bit MODP), and 16 (4096-bit MODP) are also
allowed and supported.
TOE-common-criteria (config)#crypto ikev2 keyring keyring-1
TOE-common-criteria (config-ikev2-keyring)# peer peer1
TOE-common-criteria (config-ikev2-keyring-peer)# address 0.0.0.0 0.0.0.0
TOE-common-criteria (config-ikev2-keyring-peer)# pre-shared-key
cisco123!cisco123!CISC
This section creates a keyring to hold the pre-shared keys referenced
in the steps above. In IKEv2 these pre-shared keys are specific to the
peer.
Note: Pre-shared keys on the TOE must be at least 22 characters in
length and can be composed of any combination of upper and lower
case letters, numbers, and special characters (that include: “!”, “@”,
“#”, “$”, “%”, “^”, “&”, “*”, “(“, and “)”).
The TOE supports pre-shared keys up to 128 bytes in length. While
longer keys increase the difficulty of brute-force attacks, longer keys
increase processing time.
HEX keys generated off system can also be input for IKEv2 using the
following instead of the pre-shared-key command above: ‘pre-shared-
key hex [hex key]’. For example: pre-shared-key hex 0x6A6B6C.
This configures IPsec to use pre-shared keys. X.509 v3 certificates are
also supported for authentication of IPsec peers. See Section 4.6.3
below for additional information.
TOE-common-criteria (config)#crypto logging ikev2
This setting enables IKEv2 syslog messages.
Note: The configuration above is not a complete IKE v2 configuration, and that
additional settings will be needed. See [18] Configuring Internet Key Exchange
Version 2 (IKEv2) for additional information on IKE v2 configuration.
61
4.7.2 IPsec Transforms and Lifetimes
Regardless of the IKE version selected, the TOE must be configured with the proper
transform for IPsec ESP encryption and integrity as well as IPsec lifetimes.
TOE-common-criteria(config)# crypto ipsec transform-set example esp-aes
128 esp-sha-hmac
Note that this configures IPsec ESP to use HMAC-SHA-1 and AES-
CBC-128. To change this to the other allowed algorithms the following
options can replace ‘esp-aes 128’ in the command above:
Encryption Algorithm Command
Note: The size of the key selected here must be less than or equal
to the key size selected for the IKE encryption setting in 4.6.1.1 and
4.6.1.2 above. If AES-CBC-128 was selected there for use with IKE
encryption, then only AES-CBC-128 or AES-GCM-128 may be
selected here.
TOE-common-criteria(config-crypto)#mode tunnel
This configures tunnel mode for IPsec. Tunnel is the default, but by
explicitly specifying tunnel mode, the router will request tunnel mode
and will accept only tunnel mode.
TOE-common-criteria(config-crypto)#mode transport
This configures transport mode for IPsec.
62
Target the crypto ipsec security-association lifetime command can be
used as specified above.
TOE-common-criteria (config)#crypto ipsec security-association lifetime
kilobytes 100000
This configures a lifetime of 100 MB of traffic for Phase 2 SAs. The
default amount for this setting is 2560KB, which is the minimum
configurable value for this command. The maximum configurable value
for this command is 4GB.
Additional information regarding configuration of IPsec can be found in [10]. The
IPSEC commands are dispersed within the Security Command References.
• This functionality is available to the Privileged Administrator. Configuration of
VPN settings is restricted to the privileged administrator.
This ensures the validation a peer certificate only if the OCSP-Signing EKU is present in the
certificate else validation fails.
64
6. Set revocation check method: revocation-check crl
Device (ca-trustpoint)#revocation-check crl
Device (ca-trustpoint)#exit
7. Create the certificate signing request: crypto pki enroll trustpoint-name
Device (config)#crypto pki enroll ciscotest
66
Configuration Guide Guidance document section "How to Configure PKI
Storage." - http://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/sec_conn_pki/configuration/xe-3s/sec-pki-xe-3s-book.pdf
The following is sample output from the show crypto pki certificates storage
command, which shows that the certificates are stored in the certs subdirectory of
disk0:
Device# show crypto pki certificates storage
Certificates will be stored in disk0:/certs/
67
If the TOE does not have the applicable CRL and is unable to obtain one, or if the
OCSP server returns an error, the TOE will reject the peer’s certificate--unless an
administrator includes the ‘none’ keyword in your configuration. If the 'none'
keyword is configured, a revocation check will not be performed and the certificate
will always be accepted.
When using OCSP, nonces, unique identifiers for OCSP requests, are sent by default
during peer communications with a OCSP server. The use of nonces offers a more
secure and reliable communication channel between the peer and OCSP server. If
the OCSP server does not support nonces, an authorized administrator may disable
the sending of nonces.
Note: The TOE supports use of OCSP only when using RSA certs.
69
TOE-common-criteria (ca-trustpoint)# match certificate <certificate map
name>
TOE-common-criteria (ca-trustpoint)#end
70
Router# show crypto ca certificates [Displays the certificates stored on
router]
Router(config)# crypto ca certificate chain name [Enters certificate chain
configuration mode]
Router(config-cert-cha)# no certificate certificate-serial-number [deletes the
certificate]
To delete the CA's certificate, the entire CA identity must be removed, which also
removes all certificates associated with the CA—router's certificate and the CA
certificate. To remove a CA identity, the following command in global configuration
mode can be used:
Router(config)# no crypto ca identity name [Deletes all identity information and
certificates associated with the CA]
The following steps need to be taken to deny user session establishment based on
Administrator-defined Time and Date Ranges –
Login to the Administration application user interface as a 'Policy Admin' role and
configure the following steps:
Define one or more date and time ranges when access must be denied
Menu: Policy > Policy Elements > Conditions
Left-Side Navigation: Common > Time and Date
Click 'Add' to add a new Time and Date condition.
Enter 'Condition Name' value.
Optionally enter 'Description' value.
Under 'Standard Settings' section specify the specific dates or time to deny
access by clicking the radio button(s) for -
71
'Specific Date Range', 'Specific Date' and/or 'Specific Hours' and/or 'Specific
Days'.
Under the 'Exceptions' section list any exceptions when access must be
allowed.
2. Create Authorization Policy Rule for the Time and Date Condition(s)
b. Optionally select which identity groups the rule applies to or leave the default
of 'All' identities for the rule to apply to all users
Multiple time and date conditions may be added with 'AND' or 'OR'.
Other conditions other than 'time and date conditions' may also be added in the
rule. For example it is possible to restrict access based on time and date
conditions to only certain types of users.
72
User session establishment can be denied based on Administrator-defined
maximum number of concurrent user sessions, maximum number of concurrent
sessions per user group and/or maximum number of concurrent sessions per user
within a certain user group. This can be achieved by logging into to the
Administration application user interface in a 'Policy Admin' role and configuring the
steps described in:
http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-
22/204463-Configure-Maximum-Concurrent-User-Sessio.html
The following steps need to be taken to deny user session establishment based on
endpoint IPV4/IPV6 addresses, MAC addresses and subnets –
Login to the Administration application user interface as a 'Policy Admin' role and
configure the following steps:
1. Create a new End Station Network Condition with IP Address(es) and/or MAC
address(es) to deny access to.
➢ Under the 'IP Addresses' tab list IPv4 address(es) or subnet(s), and/or
IPv6 address(es) or subnet(s) to deny access.
73
➢ Under the 'MAC Addresses' tab list the MAC address(es) to deny access.
74
• Choose Administration > External RADIUS Servers
• Select New
• Specify the Name
• Specify the Host IP
• Specify the Shared Secret
• Specify the Authentication Port
• Specify the Accounting Port
• Specify the Server Timeout
• Specify the Connection Attempts
• Click Submit to save the settings.
In the TOE Administration User Interface, the EAP-TLS server session resumption
can be enabled by navigation to the menu: Administration > System > Settings
Navigate on Left-Side: Protocols > EAP-TLS.
75
4.12 Verifying Software Version
The TOE allows for the CLI administrator to verify the version of software running by
entering the command
show application version ise
The console displays information similar to the following screen. The version must
be 3.1 to be in the evaluated configuration.
To check the Cisco Application Deployment Engine (ADE) Release 2.4 operating
system (ADE-OS) version, at the system prompt, enter the command
show version
The console displays an output similar to the following:
Cisco Application Deployment Engine OS Release: 2.4
ADE-OS Build Version: 2.4.0.147
76
4.14 Secure Connection Recovery
In the event of failure of the secure connections used by the TOE the following
should be done:
1. TOE to TOE for audit data and configuration data: the secure connection
will re-establish once a connection is available again between iterations of
the TOE. The administrator should confirm connection settings are still
correct for each TOE iteration per Section 3.3.5, above.
2. TOE to LDAP (and ActiveDirectory): the secure connection will re-establish
once a connection is available again between the TOE and the remote
authentication server. The administrator should confirm connection settings
are still correct per [2] as referenced in Section 3.2.4, above.
3. TOE to Syslog server: When the optional ISE Remote Logging Target
configuration field Buffer Messages When Server Down field is checked on
a Remote Logging target, during failure to reach Secure Syslog servers, the
audit data is not lost as the audit records are stored and forwarded as soon
as communications is re-established in a store-and-forward manner. When
the Buffer Messages when Server Down field is unchecked, audit records
may be lost during the period in which secure communications was lost to
any Secure Syslog server.
77
The audit fields in each audit event will contain at a minimum the following:
Example event: 2013-03-16 01:32:21.512 +00:00 0000000997 60079 NOTICE
Administrator-Login: A failure to establish an SSL session was detected,
ConfigVersionId=4, AdminIPAddress=10.34.84.155,
OperationMessageText=no cipher suites in common, PortNumber=443]
Date: In year-month-day format: 2013-03-16
Time: In hour:minute:second:millisecond format:01:32:21.512
Type of event: Administrator-Login
Subject identity: Available when the action is run by an authorized TOE
administrator user such as “user: lab”. In cases where the audit event is not
associated with an authorized user, an IP address may be provided for the Non-TOE
endpoint and/ or TOE.
IP address: (Optional) May be provided along with the subject identity of a specific
authorized TOE administrator: AdminIPAddress=10.34.84.155.
Port number: (Optional) May be provided along with the IP address for connections
to the box: PortNumber=443.
Outcome (Success or Failure): Success may be explicitly stated with “success” or
“passed” contained within the audit event or is implicit in that there is not a failure
or error message. More specifically for failed logins, “authentication failed” will
appear in the audit event. For successful logins, “authentication succeeded” will
appear in the associated audit event. For failed events “failure” will be denoted in
the audit event. For other audit events a detailed description of the outcome may
be given in lieu of an explicit success or failure. For example, for termination of an
SSH session a detailed description is given in the associated audit event: “Received
disconnect from 10.34.85.13: 11: Closed due to user request.”
Additional Audit Information: As described in Column 3 of Table 9 below.
As noted above, the information includes at least all of the required information.
Example audit events are included below by Security Functional Requirement.
Audit events can also be viewed at the GUI, where they are displayed with field
labels that closely correspond to the required logging fields in the NDcPP. Following
78
is an example log from the Configuration Audit Log that tracks changes made to the
TOE by an administrator.
In this example, the date and time are in the ‘Logged At’ field; the type of event is in
the ‘Object Type’ field; the subject identity is in the ‘Administrator’ field; and the
outcome is in the ‘Event’ field where it is noted that the configuration was changed.
No event would be generated in this log for failed configuration attempts due to the
nature of the GUI. Privileges that are not granted to an administrator role do not
even appear on their screen as an option, thus they have no access to them.
The audit server used to collect the auditable events was rsyslog version 8.32.0-
1ubuntu4 running on Ubuntu Linux 18.0.4.1.
80
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
RadiusPacketType=AccessRequest,
UserName=ValidCrtPathTest1EE@pki
ts, Protocol=Radius,
RequestLatency=2,
NetworkDeviceName=surfer_nas_sw,
User-
Name=ValidCrtPathTest1EE@pkits,
NAS-IP-Address=172.23.88.60, NAS-
Port=50004, Service-Type=Framed,
Framed-IP-Address=172.23.88.120,
Framed-MTU=1500,
State=37CPMSessionID=AC17583C0
003CD578A5976CC;35SessionID=sec
-sns-3615/343773157/21;, Called-
Station-ID=00-22-0D-10-35-04,
Calling-Station-ID=00-0C-29-E4-E7-
AC, Event-Timestamp=1554399268,
NAS-Port-Type=Ethernet, NAS-Port-
Id=GigabitEthernet0/4, EAP-Key-
Name=, cisco-av-pair=service-
type=Framed, cisco-av-pair=audit-
session-
id=AC17583C0003CD578A5976CC,
NetworkDeviceProfileName=Cisco,
NetworkDeviceProfileId=b0699505-
3150-4215-a80e-6753d45bf56c,
IsThirdPartyDeviceFlow=false,
RadiusFlowType=Wired802_1x,
SSID=00-22-0D-10-35-04,
AcsSessionID=sec-sns-
3615/343773157/21,
81
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
SelectedAccessService=EAP_TLS_onl
y, FailureReason=12968 Client didn't
provide suitable ciphers, Step=11001,
Step=11017, Step=15049,
Step=15008, Step=11507,
Step=12500, Step=12625,
Step=11006, Step=11001,
Step=11018, Step=12502,
Step=12800, Step=12805,
Step=12814, Step=12817,
Step=12817, Step=12968,
Step=12507, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=61025, Step=11504,
Step=11003,
NetworkDeviceGroups=IPSEC#Is
IPSEC Device#Yes,
NetworkDeviceGroups=Location#All
Locations,
NetworkDeviceGroups=Device
Type#All Device Types,
EapAuthentication=EAP-TLS,
OpenSSLErrorMessage=SSL alert:
code=0x228=552 ; source=local ;
type=fatal ; message="handshake
failure.s3_srvr.c:1459
error:1408A0C1:SSL
routines:ssl3_get_client_hello:no
shared cipher [error=336109761
lib=20 func=138 reason=193]",
82
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
OpenSSLErrorStack=
64915:error:1408A0C1:SSL
routines:ssl3_get_client_hello:no
shared cipher:s3_srvr.c:1459:,
CPMSessionID=AC17583C0003CD57
8A5976CC,
EndPointMACAddress=00-0C-29-E4-
E7-AC, ISEPolicySetName=Default,
TLSCipher=unknown,
TLSVersion=TLSv1.2,
DTLSSupport=Unknown, Network
Device Profile=Cisco,
Location=Location#All Locations,
Device Type=Device Type#All Device
Types, IPSEC=IPSEC#Is IPSEC
Device#Yes,
Response={RadiusPacketType=Acce
ssReject; },
83
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
PeerAddress=00-0C-29-E4-E7-AC,
PeerName=CN=Valid EE Certificate
Test1,O=Test Certificates
2011,C=US, PeerAuthenticated=true,
CertificateHash=91:94:D0:21:77:56:2
D:55:EA:BC:43:96:26:E1:14:A1:84:D4:
F1:7F, ConnectionStatus=Succeeded,
UniqueConnectionIdentifier
=200c84b3-be63-41af-8519-
6761ee8eef05, Subject - Common
Name=Valid EE Certificate
84
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Framed-MTU=1500,
State=37CPMSessionID=AC17583C0
003D0BA8F9F0481;35SessionID=sec
-sns-3615/343773157/32;, Called-
Station-ID=00-22-0D-10-35-04,
Calling-Station-ID=00-0C-29-E4-E7-
AC, Event-Timestamp=1554487585,
NAS-Port-Type=Ethernet, NAS-Port-
Id=GigabitEthernet0/4, EAP-Key-
Name=, cisco-av-pair=service-
type=Framed, cisco-av-pair=audit-
session-
id=AC17583C0003D0BA8F9F0481,
NetworkDeviceProfileName=Cisco,
NetworkDeviceProfileId=b0699505-
3150-4215-a80e-6753d45bf56c,
IsThirdPartyDeviceFlow=false,
RadiusFlowType=Wired802_1x,
SSID=00-22-0D-10-35-04,
AcsSessionID=sec-sns-
3615/343773157/32,
SelectedAccessService=EAP_TLS_onl
y, FailureReason=12003 Failed to
negotiate EAP because EAP-MD5 not
allowed in the Allowed Protocols,
Step=11001, Step=11017,
Step=15049, Step=15008,
Step=11507, Step=12500,
Step=12625, Step=11006,
Step=11001, Step=11018,
Step=12001, Step=12003,
85
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Step=11504, Step=11003,
NetworkDeviceGroups=IPSEC#Is
IPSEC Device#Yes,
NetworkDeviceGroups=Location#All
Locations,
NetworkDeviceGroups=Device
Type#All Device Types,
CPMSessionID=AC17583C0003D0BA
8F9F0481, EndPointMACAddress=00-
0C-29-E4-E7-AC,
ISEPolicySetName=Default,
DTLSSupport=Unknown, Network
Device Profile=Cisco,
Location=Location#All Locations,
Device Type=Device Type#All Device
Types, IPSEC=IPSEC#Is IPSEC
Device#Yes,
Response={RadiusPacketType=Acce
ssReject; },
Successful Authentication:
86
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
ts, Protocol=Radius,
RequestLatency=14,
NetworkDeviceName=surfer_nas_sw,
User-
Name=ValidCrtPathTest1EE@pkits,
NAS-IP-Address=172.23.88.60, NAS-
Port=50004, Service-Type=Framed,
Framed-IP-Address=172.23.88.120,
Framed-MTU=1500,
State=37CPMSessionID=AC17583C0
003D0C08FAB7614;35SessionID=sec
-sns-3615/343773157/33;, Called-
Station-ID=00-22-0D-10-35-04,
Calling-Station-ID=00-0C-29-E4-E7-
AC, Event-Timestamp=1554488410,
NAS-Port-Type=Ethernet, NAS-Port-
Id=GigabitEthernet0/4, EAP-Key-
Name=, cisco-av-pair=service-
type=Framed, cisco-av-pair=audit-
session-
id=AC17583C0003D0C08FAB7614,
NetworkDeviceProfileName=Cisco,
NetworkDeviceProfileId=b0699505-
3150-4215-a80e-6753d45bf56c,
IsThirdPartyDeviceFlow=false,
RadiusFlowType=Wired802_1x,
SSID=00-22-0D-10-35-04,
AcsSessionID=sec-sns-
3615/343773157/33,
AuthenticationMethod=x509_PKI,
SelectedAccessService=EAP_TLS_onl
87
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
y,
SelectedAuthorizationProfiles=Permit
Access, IdentityGroup=Endpoint
Identity Groups:Profiled, Step=11001,
Step=11017, Step=15049,
Step=15008, Step=11507,
Step=12500, Step=12625,
Step=11006, Step=11001,
Step=11018, Step=12502,
Step=12800, Step=12805,
Step=12806, Step=12807,
Step=12809, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12505, Step=11006,
Step=11001, Step=11018,
88
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Step=12504, Step=12571,
Step=12571, Step=12811,
Step=12812, Step=12813,
Step=12804, Step=12801,
Step=12802, Step=12816,
Step=12509, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=61025, Step=15041,
Step=15048, Step=15048,
Step=22070, Step=22037,
Step=12506, Step=24715,
Step=15036, Step=24209,
Step=24211, Step=15048,
Step=15048, Step=15048,
Step=15016, Step=22081,
Step=22080, Step=11503,
Step=11002,
SelectedAuthenticationIdentityStores
=identity_san_other_upn,
AuthenticationStatus=Authentication
Passed,
NetworkDeviceGroups=IPSEC#Is
IPSEC Device#Yes,
NetworkDeviceGroups=Location#All
Locations,
NetworkDeviceGroups=Device
Type#All Device Types,
IdentityPolicyMatchedRule=EAP_TLS
_Authentication,
AuthorizationPolicyMatchedRule=Bas
89
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
ic_Authenticated_Access,
EapAuthentication=EAP-TLS, Serial
Number=01, Subject - Common
Name=Valid EE Certificate Test1,
Subject Alternative
Name=ValidCrtPathTest1EE@pkits,
Subject - Organization=Test
Certificates 2011, Subject -
Country=US,
CPMSessionID=AC17583C0003D0C0
8FAB7614,
EndPointMACAddress=00-0C-29-E4-
E7-AC,
PostureAssessmentStatus=NotApplic
able,
EndPointMatchedProfile=VMWare-
Device, ISEPolicySetName=Default,
IdentitySelectionMatchedRule=EAP_
TLS_Authentication,
StepLatency=33=1838;38=1647;43=1
613;48=1651;68=1524,
StepData=56=certificate for Valid EE
Certificate Test1,
StepData=57=certificate for Good
CA, StepData=73= Normalised
Radius.RadiusFlowType,
StepData=74= Network
Access.EapAuthentication,
StepData=82= Radius.NAS-Port-
Type, StepData=83=
EndPoints.LogicalProfile,
90
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
StepData=84= Network
Access.AuthenticationStatus,
allowEasyWiredSession=false,
TLSCipher=AES128-SHA,
TLSVersion=TLSv1.2,
DTLSSupport=Unknown,
Subject=CN=Valid EE Certificate
Test1,O=Test Certificates
2011,C=US, Subject Alternative
Name - Other
Name=ValidCrtPathTest1EE@pkits,
Issuer=CN=Good CA,O=Test
Certificates 2011,C=US, Issuer -
Common Name=Good CA, Issuer -
Organization=Test Certificates 2011,
Issuer - Country=US, Key Usage=0,
Key Usage=1, Key Usage=2, Key
Usage=3, Extended Key Usage -
Name=130, Extended Key Usage -
OID=1.3.6.1.5.5.7.3.2, Days to
Expiry=4288,
AKI=58:01:84:24:1b:bc:2b:52:94:4a:3d
:a5:10:72:14:51:f5:af:3a:c9,
HostIdentityGroup=Endpoint Identity
Groups:Profiled, Network Device
Profile=Cisco, Location=Location#All
Locations, Device Type=Device
Type#All Device Types,
IPSEC=IPSEC#Is IPSEC Device#Yes,
Name=Endpoint Identity
Groups:Profiled,
91
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Response={Class=CACS:AC17583C0
003D0C08FAB7614:sec-sns-
3615/343773157/33; EAP-Key-
Name=0d:6b:ae:4e:3b:34:7e:e2:b3:37:
08:e2:c6:a7:d3:d3:4a:32:ba:14:23:6a:0
d:1b:6d:e6:08:39:12:fd:05:0d:41:e9:ea:
ac:c8:23:68:ca:e7:81:fd:8e:54:48:fc:ba
:40:92:98:91:1d:c3:0f:af:55:26:ab:61:d
d:c9:23:5c:de; MS-MPPE-Send-
Key=****; MS-MPPE-Recv-Key=****;
LicenseTypes=1; },
Failed Authentication:
92
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Framed-MTU=1500,
State=37CPMSessionID=AC17583C0
003D0BA8F9F0481;35SessionID=sec
-sns-3615/343773157/32;, Called-
Station-ID=00-22-0D-10-35-04,
Calling-Station-ID=00-0C-29-E4-E7-
AC, Event-Timestamp=1554487585,
NAS-Port-Type=Ethernet, NAS-Port-
Id=GigabitEthernet0/4, EAP-Key-
Name=, cisco-av-pair=service-
type=Framed, cisco-av-pair=audit-
session-
id=AC17583C0003D0BA8F9F0481,
NetworkDeviceProfileName=Cisco,
NetworkDeviceProfileId=b0699505-
3150-4215-a80e-6753d45bf56c,
IsThirdPartyDeviceFlow=false,
RadiusFlowType=Wired802_1x,
SSID=00-22-0D-10-35-04,
AcsSessionID=sec-sns-
3615/343773157/32,
SelectedAccessService=EAP_TLS_onl
y, FailureReason=12003 Failed to
negotiate EAP because EAP-MD5 not
allowed in the Allowed Protocols,
Step=11001, Step=11017,
Step=15049, Step=15008,
Step=11507, Step=12500,
Step=12625, Step=11006,
Step=11001, Step=11018,
Step=12001, Step=12003,
93
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Step=11504, Step=11003,
NetworkDeviceGroups=IPSEC#Is
IPSEC Device#Yes,
NetworkDeviceGroups=Location#All
Locations,
NetworkDeviceGroups=Device
Type#All Device Types,
CPMSessionID=AC17583C0003D0BA
8F9F0481, EndPointMACAddress=00-
0C-29-E4-E7-AC,
ISEPolicySetName=Default,
DTLSSupport=Unknown, Network
Device Profile=Cisco,
Location=Location#All Locations,
Device Type=Device Type#All Device
Types, IPSEC=IPSEC#Is IPSEC
Device#Yes,
Response={RadiusPacketType=Acce
ssReject; },
FIA_AFL.1 The reaching The claimed reaching of the threshold for the
of the identity of the user unsuccessful authentication attempts
threshold for attempting to gain
the access or the IP
Administration GUI:
unsuccessful where the
authentication attempts
2019-04-09 22:43:20.398 +00:00
attempts. originated.
0000013830 51008 NOTICE
Administrator-Login: Administrator
Disabling an
authentication failed. Account is
account due
disabled due to excessive failed
to the
authentication attempts,
94
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
threshold ConfigVersionId=125,
being reached AdminInterface=GUI,
AdminIPAddress=10.24.18.227,
AdminName=Evan_Osnos,
OperationMessageText=com.cisco.cp
m.nsf.api.exceptions.NSFAuthenticati
onFailed: Account is locked.,
FailureReason=51008 Administrator
authentication failed. Account is
disabled due to excessive failed
authentication attempts,
CLI:
Administration GUI:
95
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
CLI:
96
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
97
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Connection Refused:
handshake_failure, AcsInstance=Apr,
EAP-TLS server:
98
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
AC, Event-Timestamp=1555380639,
NAS-Port-Type=Ethernet, NAS-Port-
Id=GigabitEthernet0/4, EAP-Key-
Name=, cisco-av-pair=service-
type=Framed, cisco-av-pair=audit-
session-
id=AC17583C0003F30FC4D9C5B4,
NetworkDeviceProfileName=Cisco,
NetworkDeviceProfileId=b0699505-
3150-4215-a80e-6753d45bf56c,
IsThirdPartyDeviceFlow=false,
RadiusFlowType=Wired802_1x,
SSID=00-22-0D-10-35-04,
AcsSessionID=sec-sns-
3615/344725172/5,
SelectedAccessService=EAP_TLS_onl
y, FailureReason=12507 EAP-TLS
authentication failed, Step=11001,
Step=11017, Step=15049,
Step=15008, Step=11507,
Step=12500, Step=12625,
Step=11006, Step=11001,
Step=11018, Step=12502,
Step=12800, Step=12805,
Step=12806, Step=12807,
Step=12808, Step=12809,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
99
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=12505,
Step=11006, Step=11001,
Step=11018, Step=12504,
Step=12571, Step=12571,
Step=12811, Step=12814,
Step=12817, Step=12507,
Step=12505, Step=11006,
Step=11001, Step=11018,
Step=12504, Step=61025,
Step=11504, Step=11003,
NetworkDeviceGroups=IPSEC#Is
IPSEC Device#Yes,
NetworkDeviceGroups=Location#All
Locations,
NetworkDeviceGroups=Device
Type#All Device Types,
EapAuthentication=EAP-TLS,
OpenSSLErrorMessage=SSL alert:
code=0x22E=558 ; source=local ;
type=fatal ; message="certificate
unknown.s3_srvr.c:3581
error:14089086:SSL
routines:ssl3_get_client_certificate:ce
rtificate verify failed
100
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
[error=336105606 lib=20 func=137
reason=134]", OpenSSLErrorStack=
207687:error:14089086:SSL
routines:ssl3_get_client_certificate:ce
rtificate verify failed:s3_srvr.c:3581:,
CPMSessionID=AC17583C0003F30F
C4D9C5B4,
EndPointMACAddress=00-0C-29-E4-
E7-AC, ISEPolicySetName=Default,
StepData=47=certificate for Valid EE
Certificate Test1,
StepData=48=certificate for Good
CA, TLSCipher=unknown,
TLSVersion=TLSv1.2,
DTLSSupport=Unknown, Network
Device Profile=Cisco,
Location=Location#All Locations,
Device Type=Device Type#All Device
Types, IPSEC=IPSEC#Is IPSEC
Device#Yes,
Response={RadiusPacketType=Acce
ssReject; },
101
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
chain, ConfigVersionId=81,
DestinationPort=26514,
LoggerName=InvalidcAFalseTest2EE,
LDAPS client:
102
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Response={LdapOperationStatus=Pr
ocessError; },
103
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
104
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
r access successful. Certificate
authenticated, PortNumber=443,
105
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
SSH Username/Password –
SUCCESS:
106
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
logged in to CLI SSH session from
SSH client IP: 10.40.130.34,
AcsInstance=ise3595,
FIA_UAU_EXT.2 All use of the Origin of the See events for FIA_UIA_EXT.1 above.
identification attempt (e.g., IP
and address).
authentication
mechanism.
108
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
unknown certificate in syslog server
certificate chain,
ConfigVersionId=77,
DestinationPort=26514,
LoggerName=InvalidcAFalseTest2EE
,
110
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
CN=basicConstraints Critical cA
False CA\, Description = C=US,
O=Test Certificates 2011,
CN=basicConstraints Critical cA
False CA\, Additional details:\,
Issued To = \CN=basicConstraints
Critical cA False CA\O=Test
Certificates 2011\C=US\, Issued By
= Trust Anchor\, Serial Number =
17\, Valid From = Fri Jan 01
08:30:00 UTC 2010\, Valid To = Tue
Dec 31 08:30:00 UTC 2030,
ObjectType=Trust Certificate,
ObjectName=C=US, O=Test
Certificates 2011,
CN=basicConstraints Critical cA
False CA, UserAdminFlag=Admin,
OperatorName=foobar,
AcsInstance=ise3595,
111
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
anchor in the Configuration-Changes: Deleted
TOE's trust store configuration, ConfigVersionId=79,
AdminInterface=GUI,
AdminIPAddress=10.24.51.218,
AdminName=foobar,
ConfigChangeData=Certificate
deleted\, Certificate Name=C=US,
O=U.S. Government, OU=DoD,
OU=PKI, CN=DoD JITC Root CA 2,
ObjectType=Trust Certificate,
ObjectName=C=US, O=U.S.
Government, OU=DoD, OU=PKI,
CN=DoD JITC Root CA 2,
UserAdminFlag=Admin,
OperatorName=foobar,
AcsInstance=ise3595,
112
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
FPT_STM.1 Changes to The old and new [old time shown in preceding record
the time. values for the timestamp]
time.
113
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
OperationMessageText=Patch Install
initiated with bundle - ise-
patchbundle-2.6.0.156-Patch1-
19042908.SPA.x86_64.tar.gz, repo -
tmplocalpatchinstallrepo,
AcsInstance=ise3595,
Console:
SSH:
116
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
117
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Console:
SSH:
118
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
2019-04-01 08:05:59.007 +00:00
0000009277 60116 NOTICE
Administrator-Login: A CLI user has
logged out from SSH,
ConfigVersionId=72,
AdminInterface=CLI,
AdminIPAddress=10.40.130.34,
AdminName=foobar,
OperationMessageText=User 'foobar'
logged out from CLI SSH session from
SSH client IP: 10.40.130.34,
AcsInstance=ise3595,
119
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
CertificateHash=A4:92:28:F9:AE:1F:4
8:E0:36:C8:80:8E:61:9C:BF:B3:19:F2:5
0:32, UniqueConnectionIdentifier
=7a3fd7f2-cea8-49e2-a1ac-
15b528e2c0ea,
OperationMessageText=LDAP secure
connection established,
2019-05-17T17:59:30.632557-07:00
ipsec-sns-3615.windsurfer.cisco.com
71072: *May 18 00:59:25.652 UTC:
IKEv2-INTERNAL:(SESSION ID =
5,SA ID = 1):SM Trace-> SA:
I_SPI=9CDF607BBCC6A8B9
R_SPI=67782EF817CDD5C4 (R)
MsgID = 9 CurState: READY Event:
EV_RECV_INFO_REQ
2019-05-28T08:39:16.848754-07:00
ipsec-sns-3615.windsurfer.cisco.com
255583: *May 28 15:39:11.412 UTC:
IKEv2-INTERNAL:(SESSION ID =
5,SA ID = 4):SM Trace-> SA:
I_SPI=7180820731A05A8B
R_SPI=68F4CD4CCF698A83 (R)
MsgID = A CurState: EXIT Event:
EV_FREE_NEG
121
Requirement Auditable Additional Audit Sample Record and Location
Events Record
Contents
Failures of the ConfigVersionId=107,
trusted path AdminInterface=CLI,
functions. OperationMessageText=7728
Connection established (TLS),
AcsInstance=Apr,
122
Requirement Management Action to Log & Sample Log
2019-03-25 16:06:32.279 +00:00 0000000036 60155 NOTICE
System-Management: Secure communication with syslog
server established, ConfigVersionId=5,
OperationMessageText=Secure communication with syslog
server at 127.0.0.1:6514 established. ,
123
Requirement Management Action to Log & Sample Log
AdminIPAddress=172.23.88.45, AdminName=foobar,
ConfigChangeData=Local Storage Period = 91 days,
ObjectType=UPSLogSettings, ObjectName=LocalStore,
OperationMessageText=LoggingCategories "Administrative
and Operational Audit" has been edited successfully.,
Clearing logs:
124
Requirement Management Action to Log & Sample Log
2019-04-02 17:21:47.921 +00:00 0000000721 52001 NOTICE
Configuration-Changes: Changed configuration,
ConfigVersionId=123, FailureFlag=false,
RequestResponseType=initial, AdminInterface=GUI,
AdminIPAddress=172.23.88.45, AdminName=foobar,
ConfigChangeData=Object modified:\, Log Severity Level =
DEBUG\,Local Logging = enable\,Assigned Targets =
{InvalidcAFalseTest2EE,python_secure_syslog_svr,rsyslog_ub
untu_02}, ObjectType=UPSCategory,
ObjectName=Administrative and Operational Audit,
OperationMessageText=LoggingTargets "LogCollector" has
been edited successfully.,
125
Requirement Management Action to Log & Sample Log
AdminIPAddress=127.0.0.1, AdminName=foobar,
OperationMessageText=Service sshd configuration has been
modified to OFF, AcsInstance=ise3595,
127
Requirement Management Action to Log & Sample Log
changes were made\, Additional details:\, Issued To = SNS-
3615\, Issued By = bulabog-beach\, Subject = \CN=SNS-
3615\DC=com\DC=cisco\DC=windsurfer\, Serial Number
= 3a212db900010000002b\, Valid From = Mon Oct 29
17:05:11 UTC 2018\, Valid To = Tue Oct 27 17:05:11 UTC
2026, ObjectType=EditCertificate,
ObjectName=EditCertificate, UserAdminFlag=Admin,
OperatorName=bob@windsurfer.cisco.com, AcsInstance=sec-
sns-3615,
128
FIA_PMG_EXT.1: Password Setting length requirement for passwords:
management
129
Requirement Management Action to Log & Sample Log
Password=true\,illegalPasswordString=,
ObjectType=Password Policy,
ObjectName=NSFAdminPasswordConfig,
Component=Administration, ObjectInternalID=21013cb2-
d030-4fb1-9ba2-35757634d770,
130
Requirement Management Action to Log & Sample Log
Configuring the banner displayed prior to authentication:
See FTA_TAB.1 row below.
131
Requirement Management Action to Log & Sample Log
132
Requirement Management Action to Log & Sample Log
timeout has been modified, ConfigVersionId=4,
AdminInterface=CLI, AdminIPAddress=10.154.25.94,
AdminName=martinf43, OperationMessageText=Terminal
session-timeout is set to 0, AcsInstance=sec-sns-3595,
FTA_TAB.1: Default TOE Configuring the GUI banner displayed prior to authentication:
access banners
2. Run the command shown above each sample log in Table 10 and 11 above
(i.e. ‘show logging application localStore/iseLocalStore.log tail’).
134
3. On the left-side navigate to the ISE node where the audit event was
generated in iseLocalStore.log:
135
4. Click the ‘Debug Logs’ tab in the content area:
136
5. Scroll down the list of log files until the iseLocalStore.log filename appears.
Click on the iseLocalStore.log link.
137
6. The iseLocalStore.log file may be downloaded or viewed with any external
program.
From the Administration > System > Logging > Local Log Settings page a System
admin or a Super admin is able to configure the storage period for logs in days and
delete the existing log file. The administrator may delete all of the rolled over log
files by the "Delete Local Logs Now" selection in the administration application.
After the configured storage period of time has passed for logs the events exceeding
the age are automatically deleted.
138
TCP syslog buffers events in a local file that is limited to a total of 100MB. The limit
is specified as a file size, not a specific number of events. Overwriting is handled by
wrapping to the beginning of the file (overwriting the oldest events). The value of
100MB is configurable and the lowest value for the configuration is 10 MB and the
allowed increments need to be whole numbers. On the TOE, the local log files rotate
after a certain size threshold is reached. The TOE creates separate log files for each
day. The number of days of local log files is configurable, with the default of keeping
records only up to last 7 days. From the Administration > System > Logging > Local
Log Settings page an administrator is able to configure the storage period for logs in
days and delete the existing log file. Only the Security Administrator may delete all
of the rolled over log files by the "Delete Local Logs Now" selection in the
administration application. The ISE RBAC (Role-Based Access Control) policy does
not allow for any user that is not a Security Administrator to delete log files. No user
can modify log files because there is no mechanism that allows this.
139
[8]Rebuild M&T Unusable Indexes
[9]Purge M&T Operational Data
[10]Reset M&T Database
[11]Refresh M&T Database Statistics
[12]Display Profiler Statistics
[13]Exit
9
Enter number of days to be retained in purging MnT Operational
data [between 1 to 90 days]
For instance, Entering 20 will purge MnT Operational data older
than 20 days
Enter 'exit' to return to the main menu without purging
Enter days to be retained: 90
You are about to purge M&T data older than 90 from your database.
Are you sure you want to proceed? y/n [n]: y
M&T Operational data older than 90 is getting removed from
database
140
6. Modes of Operation
An ISE has several modes of operation, these modes are as follows:
Booting – while booting, ISE drops all network traffic until the image and
configuration has loaded. This mode of operation automatically progresses to the
Normal mode of operation. If a special image has been loaded on the system (as
received from Cisco TAC), then the system goes from booting to Rescue Admin CLI.
Rescue Admin CLI - booting to the rescue admin CLI password recovery image (on
an image received from Cisco TAC) allows modification of a CLI administrator user
in the event the password is forgotten. Once the password is reset, the ISE reloads
and enters booting mode.
Safe Mode – Once ISE has booted, a CLI admin-role user can put the device into
Safe Mode by issuing the following commands: ‘applicaton stop ise’ followed by
‘application start ise safe’.
This "safe mode" exists in the event a customer misconfigures their access controls
that prevents them from being able to administer ISE from the Administration
console GUI. Once the configuration has been corrected in safe mode, the ISE
reloads and enters booting mode.
Normal - The ISE image and configuration is loaded and the TOE is operating as
configured. It should be noted that all levels of administrative access occur in this
mode and that all ISE based security functions are operating. This is the expected
mode of operation for the TOE.
Following operational error ISE reboots (once power supply is available) and enters
booting mode.
ISE also has two modes of operation in respect to cryptographic functionality:
Non-FIPS mode – The TOE ships in non-FIPS mode, which does not place any
restrictions on the cryptography used on the system.
141
FIPS mode – In FIPS mode, the ISE utilizes the cryptography described in [ [5] for all
claimed cryptographic operations. When FIPS mode is enabled, the Cisco ISE
administrator interface displays a FIPS mode icon to the left of the node name in the
upper-right of the page. Along with Normal mode, this is the expected mode of
operation for the TOE.
ISE uses a cryptographic module, that runs a suite of self-tests during the TOE
initial start-up to verify its correct operation. These tests check the integrity of the
code, and the correct operation of each cryptographic algorithm and method used
(i.e. AES-CBC, SHA-1, etc.) If any of the tests fail, the administrative web-based UI
will not be accessible, and the security administrator will for a limited time window
be able to login to the CLI on the KVM (keyboard, video, mouse) console to run the
CLI command – “show application status ise” to determine that services have been
disabled because “FIPS INTEGRITY CHECK HAS FAILED”. Eventually the
administrator will be unable to login to the CLI even on the KVM as all services
are shutdown including the ability to login to the CLI. After authenticating, a fatal
error is displayed and the user is only allowed to press <Enter> to logout and no
other actions can be performed. The error message is: “ERROR: ISE SERVICES
HAVE BEEN DISABLED BECAUSE FIPS INTEGRITY CHECK HAS FAILED! EITHER
REIMAGE FROM ISE INSTALLATION MEDIA, OR CONTACT CISCO TECHNICAL
SUPPORT CENTER FOR INSTRUCTIONS ON DIAGNOSING THE FAILURE. Press
<Enter> to logout”.
142
7. Security Measures for the Operational Environment
Proper operation of the TOE requires functionality from the environment. It is the
responsibility of the Security administrator of the TOE to ensure that the
Operational Environment provides the necessary functions, and adheres to the
environment security objectives listed below. The environment security objective
identifiers map to the environment security objectives as defined in the Security
Target.
143
Environment Security Operational Environment Privileged and Semi-privileged
Objective Security Objective administrator responsibility
Definition
OE.NO_THRU_TRAFFIC_P The TOE does not provide Administrators need to ensure
ROTECTION any protection of traffic that the security provided by the
that traverses it. It is TOE is complemented by other
assumed that protection security measures in the
of this traffic will be operational environment that
covered by other security provides protection to the traffic
and assurance measures traversing the TOE.
in the operational
environment.
144
Environment Security Operational Environment Privileged and Semi-privileged
Objective Security Objective administrator responsibility
Definition
OE.ADMIN_CREDENTIALS The administrator’s Administrators need to ensure
_SECURE credentials (private key) to keep their credentials used to
used to access the TOE access the TOE, secure and
must be protected on any protected
other platform on which
they reside.
145
8. Related Documentation
Use this document in conjunction with the ISE 3.1 documentation at the
following location:
• http://www.cisco.com/
Obtaining Documentation
• http://www.cisco.com
• http://www-china.cisco.com
• http://www-europe.cisco.com
146
8.3 Documentation Feedback
If you are reading Cisco product documentation on the World Wide Web, you
can submit technical comments electronically. Click Feedback in the toolbar
and select Documentation. After you complete the form, click Submit to send
it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents
contain a response card behind the front cover. Otherwise, you can mail your
comments to the following address:
Cisco Systems, Inc., Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
147
9. Obtaining Technical Assistance
Cisco provides Cisco.com as a starting point for all technical assistance.
Customers and partners can obtain documentation, troubleshooting tips, and
sample configurations from online tools. For Cisco.com registered users,
additional troubleshooting tools are available from the TAC website.
Cisco.com is the foundation of a suite of interactive, networked services that
provides immediate, open access to Cisco information and resources at
anytime, from anywhere in the world. This highly integrated Internet
application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers
and partners streamline business processes and improve productivity.
Through Cisco.com, you can find information about Cisco and our networking
solutions, services, and programs. In addition, you can resolve technical
issues with online technical support, download and test software packages,
and order Cisco learning materials and merchandise. Valuable online skill
assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional
personalized information and services. Registered users can order products,
check on the status of an order, access technical support, and view benefits
specific to their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
148