TrustSec SXP Lab Book2
TrustSec SXP Lab Book2
_____________________________________________
Author Uldis Dzerkals
EVE-NG Pro, 2020
Cisco Security Lab TrustSec SXP SGT dot1x & mab
EVE-PRO, 2021
__________________________________________________________________________________
Content
Content 2
I. Lab nodes, image versions 3
II. ASAv Configuration 4
III. Install NTP and Active Directory Server 7
IV. Configure DNS Server 11
V. Configure AD Corporate users 12
VI. Create AD User Groups 13
VII. Join Win10-PC1 to the AD domain 13
VIII. ISE pre-stage 15
IX. ISE SXP Service 16
X. Active Directory joining to the ISE 16
XI. SW1 and SW2 AAA configuration 19
XII. ASAv10 AAA configuration 20
XIII. Lab devices joining to the ISE 20
XIV. Create authorization Profiles and DACLs 24
XV. Create Source Identity sequence 27
XVI. Create ISE Security groups 28
XVII. Create Policy Set 29
XVIII. Lab Switch Ports configuration DOT1x and MAB 37
XIX. Corporate-PC Dot1x Authentication 38
XX. Contractor Devices Authentication 44
XXI. ISE TrustSec Configuration 48
XXII. ASAv CTS Configuration 52
XXIII. LAN Switches CTS Configuration 53
XXIV. TrustSec SXP SGT verification 56
XXV. ASAv SGT based Access rules 58
XXVI. Final verification 59
Lab concept: Practical Cisco Security TrustSec SXP SGT ISE 3.0 configuration accordingly given
objectives.
Lab General Tasks:
3. Corporate User Employees (Jenny) Must have access to Corporate WEB Server
http://webserver.eve.lab and Internet only.
4. Corporate User Engineers (John) must have access to all resources in the lab. Engineer
network must have access to Contractors network.
5. Contractor User must have access to FTP Server ftp://data.eve.lab and DNS services and
Internet
6. Contractor User must not have access to DMZ network or to Corporate VLANs 20 and 30.
no shut
nameif dmz
security-level 80
ip address 10.1.1.254 255.255.255.0
3. Objective: Configure ASAv ASDM (optional If you prefer ASA configuration via ASDM):
Note: If you expected to activate ASAv Smart license this step is mandatory to register Cisco smart
license token. Lab itself can be used with Evaluation license which has all features enabled but limited
in throughput speed 100kbps.
https://10.1.1.254/admin/public/asdm.jnlp
aaa authentication http console LOCAL
aaa authentication login-history
http server enable
http 10.1.1.0 255.255.255.0 dmz
Note: If you expected to activate ASAv Smart license this step is mandatory to register Cisco smart
license token. Lab itself can be used with Evaluation license which has all features enabled but limited
in throughput speed 100kbps.
dns domain-lookup outside
dns server-group DefaultDNS
name-server 8.8.8.8 outside
name-server 8.8.4.4 outside
How to register your ASAv using token:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-
config/intro-license-smart.html
10. Objective: Configure ASAv DHCP pools for DMZ, Engineers, employees and Contractors:
✓ Configure the appropriate Time zone and Time on the Windows Server.
2. Configure external NTP server, Internet must be reachable from your server
✓ Open windows CMD (administrator rights!!!)
✓ Enter: External real NTP server:
w32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:MANUAL
/reliable:yes
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config\AnnounceFlags
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters\Type
5. Verify NTP
✓ Open windows CMD (administrator rights!!!)
✓ Enter:
w32tm /query /status /verbose this will display last sync status or any
error
Note: Your windows hosts must be configured to obtain IP via DHCP. The Lab switch and ISP router is
configured with proper VLANs and DHCP Pools.
Note: Your windows hosts must be configured to obtain IP via DHCP. The Lab ASAv10 has configured
DHCP Pools in previous Task.
1. Windows 10 host
✓ Navigate: Start/Settings/About
✓ Navigate: Advanced System Settings, Click
✓ Click Tab: Computer Name
✓ Click: Change
✓ Type Computer Name: Corporate-PC
✓ Select radio button: Domain
✓ Type domain: eve.lab
✓ Click OK
✓ Type your AD server administrator username and password (example:
administrator/Test123)
✓ Click OK
✓ Click Close and restart PC
IMPORTANT, create user accounts on the Win10 Corporate PC before we move forward next Lab
steps
Verification: Windows 10 host as Corporate-PC must be joined and domain eve.lab and have full
network/internet access. This host will be used to test 2 different Corporate user access. Engineers
and Employees.
✓ Hostname: ise
✓ IP address: 10.1.1.200
✓ Netmask: 255.255.255.0
✓ Default gateway: 10.1.1.254
✓ Default domain: eve.lab
✓ Primary name server: 10.1.1.201
✓ NTP Server: 10.1.1.201
✓ User: admin
✓ Password: Test123
✓ Wait till ise installs and brings up, Services must be in running state
✓ Select to enable
✓ Press Save
✓ Name: My LAN
✓ Parent Group: All Locations
✓ Click Save
✓ Name: SW1
✓ Description: LAB SW1
✓ IP Address: 10.1.1.252
✓ Model Name: IOL
✓ Version: 15.2
✓ Location: My LAN
✓ Device Type: LAN Switches
✓ Select Radius checkbox
✓ Shared Secret: eve1
✓ Click Submit
✓ Name: SW2
✓ Description: LAB SW2
✓ IP Address: 10.1.1.253
✓ Model Name: IOL
✓ Version: 15.2
✓ Location: My LAN
✓ Device Type: LAN Switches
✓ Select Radius checkbox
✓ Shared Secret: eve1
✓ Click “+ Add”
✓ Name: PERMIT_AD_ONLY
✓ IP Version: IPv4
✓ Add ACL lines
permit udp any eq 68 any eq 67
permit udp any any eq 53
permit ip any host 10.1.1.201
✓ Click “+ Add”
✓ Name: WIRED_PERMIT_ALL
✓ IP Version: IPv4
✓ Add ACL line
permit ip any any
✓ Name: Contractor-PROFILE
✓ Enable checkbox DACL
✓ Select previously created DACL: EVE_DHCP_ACL
✓ Select VLAN: ID/Name: 40
✓ Click “+ Add”
✓ Name: Employees-PROFILE
✓ Enable checkbox DACL
✓ Select previously created DACL: WIRED_PERMIT_ALL
✓ Select VLAN: ID/Name: 20
✓ Click “+ Add”
✓ Name: Engineers-PROFILE
✓ Enable checkbox DACL
✓ Select previously created DACL: WIRED_PERMIT_ALL
✓ Select VLAN: ID/Name: 30
✓ Click “+ Add”
✓ Name: WIRED_AD_ONLY_PROFILE
✓ Enable checkbox DACL
✓ Select previously created DACL: PERMIT_AD_ONLY
✓ Select VLAN: ID/Name: 10
✓ Name: EVE_Sequence
✓ Select Identity sources: ad.eve.lab and Internal Endpoints
✓ Click: Save
✓ Name: EVE-POLICY
✓ Click “+” for New conditions
✓ Click Use
✓ Select Default Network Access for allowed Protocols
✓ Name: AD_PC_RULE
✓ Click “+” For new Condition
✓ Name: Engineers
✓ Click “+” to add New conditions
✓ Equals: WiredMAB
✓ Click Use
✓ Select Profiles: Contractor-PROFILE
✓ Select Security Groups: Contractor
interface Ethernet0/1
description Contractor Win10 PC
switchport mode access
authentication open
authentication port-control auto
mab
spanning-tree portfast edge
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
Note: On Windows 10, it will ask you Administrator rights, login in PC as administrator
Username: eve\administrator, Password: Test123
✓ Click OK 2 times
✓ Reboot Windows 10
2. Objective: Corporate-PC Windows 10 Verification
Note: after reboot Windows 10 machine, do not login into it, but check results on Switch:
You must notice that DACL PERMIT_AD_ONLY is in use. Means your Windows 10 received IP address,
and can communicate with AD server
SW#sh access-lists
Extended IP access list xACSACLx-IP-PERMIT_AD_ONLY-5fdf2f06 (per-
user)
1 permit udp any eq bootpc any eq bootps
2 permit udp any any eq domain
3 permit ip any host 10.1.1.201
SW#
✓ You must see that Corporate-PC is authenticated but has assigned only to
WIRED_AD_ONLY_PROFILE
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority
150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
Vlan Group: Vlan: 30
ACS ACL: xACSACLx-IP-WIRED_PERMIT_ALL-5fe06c43
SGT Value: 16
SW1#
Extended IP access list xACSACLx-IP-WIRED_PERMIT_ALL-5fe06c43 (per-
user)
1 permit ip any any
SW#
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority
150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
Vlan Group: Vlan: 20
ACS ACL: xACSACLx-IP-WIRED_PERMIT_ALL-5fe06c43
SGT Value: 4
SW#
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority
150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
Vlan Group: Vlan: 40
ACS ACL: xACSACLx-IP-EVE_DHCP_ACL-5fe79837
SGT Value: 5
SW1#
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority
150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
Vlan Group: Vlan: 40
ACS ACL: xACSACLx-IP-EVE_DHCP_ACL-5fe79837
SGT Value: 5
SW2#
✓ IP Address: 10.1.1.254
✓ Peer role: Listener
✓ SXP Domain: Default
✓ Status Enabled
✓ Password Type: DEFAULT
✓ Version v4
✓ Save
✓ Select ASAv10/edit
✓ Navigate to Advanced TrustSec Settings, Enable it
✓ Enable Use Device ID for TrustSec Identification
✓ Password: eve1
✓ Generate PAC, File SW1.pac will be downloaded to the Mgmnt station download
directory
ASAv10#
SW1#
SW1#
Connection inst# : 1
TCP conn fd : 1
TCP conn password: default SXP password
Keepalive timer is running
Duration since last state change: 0:00:37:26 (dd:hr:mm:sec)
SGT : 5:Contractors
IPv4 : 10.1.4.10
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 4:Employees
IPv4 : 10.1.2.11
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 5:Contractors
IPv4 : 10.1.4.100
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 2:TrustSec_Devices
IPv4 : 10.1.1.252
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 2:TrustSec_Devices
IPv4 : 10.1.1.253
Peer IP : 10.1.1.200
Ins Num : 3
SGT : 5:Contractors
IPv4 : 10.1.4.10
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 17:Domain_PC
IPv4 : 10.1.2.11
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 16:Engineers
IPv4 : 10.1.3.12
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 16:Engineers
IPv4 : 10.1.1.23
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 5:Contractors
IPv4 : 10.1.4.100
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 2:TrustSec_Devices
IPv4 : 10.1.1.252
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
SGT : 2:TrustSec_Devices
IPv4 : 10.1.1.253
Peer IP : 10.1.1.200
Ins Num : 3
Status : Active
ASAv10#
1. Corporate User Employees (Jenny) Must have access to Corporate WEB Server
http://webserver.eve.lab and Internet only.
2. Corporate User Engineers (John) must have access to all resources in the lab. Engineer
network must have access to Contractors network.
3. Contractor User must have access to FTP Server ftp://data.eve.lab and DNS services and
Internet
4. Contractor User must not have access to DMZ network or to Corporate VLANs 20 and 30.
Must be success
7. Objective: Test Corporate PC Employees SGT user Jenny Access to Corporate web server
✓ Log in Corporate-PC as user jennydoe/Silver2021
✓ Open browser and test http://webserver.eve.lab
8. Objective: Test Corporate PC Employees SGT user Jenny Internet and access to Contractors
✓ Log in Corporate-PC as user jennydoe/Silver2021
✓ Open CMD and ping www.google.com
✓ Ping ftp server data.eve.lab