CiscoPress - CCNP Security Identity Management SISE 300-715 Official Cert Guide
CiscoPress - CCNP Security Identity Management SISE 300-715 Official Cert Guide
Cisco Press
CCNP Security Identity Management
SISE 300-715 Official Cert Guide
Aaron Woland
Katherine McNamara
Copyright© 2021 Cisco Systems, Inc.
Published by:
Cisco Press
All rights reserved. This publication is protected by
copyright, and permission must be obtained from the
publisher prior to any prohibited reproduction, storage in a
retrieval system, or transmission in any form or by any
means, electronic, mechanical, photocopying, recording, or
likewise. For information regarding permissions, request
forms, and the appropriate contacts within the Pearson
Education Global Rights & Permissions Department, please
visit www.pearson.com/permissions.
No patent liability is assumed with respect to the use of the
information contained herein. Although every precaution
has been taken in the preparation of this book, the publisher
and author assume no responsibility for errors or omissions.
Nor is any liability assumed for damages resulting from the
use of the information contained herein.
ScoutAutomatedPrintCode
Library of Congress Control Number: 2020913602
ISBN-10: 0-13-664294-2
ISBN-13: 978-0-13-664294-7
Trademark Acknowledgments
All terms mentioned in this book that are known to be
trademarks or service marks have been appropriately
capitalized. Cisco Press or Cisco Systems, Inc., cannot attest
to the accuracy of this information. Use of a term in this
book should not be regarded as affecting the validity of any
trademark or service mark.
Special Sales
For information about buying this title in bulk quantities, or
for special sales opportunities (which may include electronic
versions; custom cover designs; and content particular to
your business, training goals, marketing focus, or branding
interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
For government sales inquiries, please contact
[email protected].
For questions about sales outside the U.S., please contact
[email protected].
Feedback Information
At Cisco Press, our goal is to create in-depth technical books
of the highest quality and value. Each book is crafted with
care and precision, undergoing rigorous development that
involves the unique expertise of members from the
professional technical community.
Readers’ feedback is a natural continuation of this process.
If you have any comments regarding how we could improve
the quality of this book, or otherwise alter it to better suit
your needs, you can contact us through email at
[email protected]. Please make sure to include the
book title and ISBN in your message.
We greatly appreciate your assistance.
Editor-in-Chief: Mark Taub
Alliances Manager, Cisco Press: Arezou Gol Director,
ITP Product Management: Brett Bartow Executive
Editor: James Manly Managing Editor: Sandra Schroeder
Development Editor: Christopher A. Cleveland Project
Editor: Mandie Frank Copy Editor: Kitty Wilson
Technical Editor: Akhil Behl Editorial Assistant: Cindy
Teeters Designer: Chuti Prasertsith Composition:
codeMantra
Indexer: Erika Millen
Proofreader: Donna Mulder
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone
numbers, and fax numbers are listed on the Cisco Website at
www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: www.cisco.com/go/trademarks. Third party
trademarks mentioned are the property of their respective owners. The use of
the word partner does not imply a partnership relationship between Cisco and
any other company. (1110R)
Credits
Part IX Appendixes
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?”
Quizzes and Q&A Sections
Appendix B CCNP Security Implementing and Configuring
Cisco Identity Services Engine (SISE 300-715)
Exam Updates
Appendix C Sample Switch Configurations
Index
Online Element
Appendix D Study Planner
Reader Services
Register your copy at
www.ciscopress.com/title/9780136642947 for convenient
access to downloads, updates, and corrections as they
become available. To start the registration process, go to
www.ciscopress.com/register and log in or create an
account.* Enter the product ISBN 9780136642947 and click
Submit. When the process is complete, you will find any
available bonus content under Registered Products.
*Be sure to check the box that you would like to hear from
us to receive exclusive discounts on future editions of this
product.
Contents
Introduction
Part IX Appendixes
Glossary of Key Terms
Appendix A Answers to the “Do I Know This Already?”
Quizzes and Q&A Sections
Appendix B CCNP Security Implementing and Configuring
Cisco Identity Services Engine (SISE 300-715)
Exam Updates
Appendix C Sample Switch Configurations
Index
Online Element
Appendix D Study Planner
About the Authors
Aaron Woland, CCIE No. 20113, is a Principal Engineer in
Cisco’s Advanced Threat Security & Integrations group and
works with Cisco’s Largest Customers all over the world. His
primary job responsibilities include security design, solution
enhancements, standards development, advanced threat
solution design, endpoint security, and futures.
Aaron joined Cisco in 2005 and is currently a member of
numerous security advisory boards and standards body
working groups. Prior to joining Cisco, Aaron spent 12 years
as a Consultant and Technical Trainer.
Aaron’s other publications include Integrated Security
Technologies and Solutions, Volume I; both Volumes I and II
of the Cisco ISE for BYOD and Secure Unified Access book;
the All-in-one Cisco ASA Firepower Services, NGIPS and AMP
book; the CCNP Security SISAS 300-208 Official Cert Guide;
the CCNA Security 210-260 Complete Video Course; and
many published white papers and design guides.
Aaron is one of only five inaugural members of the Hall of
Fame Elite for Distinguished Speakers at Cisco Live and is a
security columnist for Network World where he blogs on all
things related to security. His other certifications include
GHIC, GCFE, GSEC, Certified Ethical Hacker, MCSE, VCP,
CCSP, CCNP, CCDP, and many other industry certifications.
You can follow Aaron on Twitter: @aaronwoland.
Katherine McNamara, CCIE No. 50931, is a
Cybersecurity Technical Solutions Architect at Cisco Systems
and has worked with large enterprise and public sector
customers.
Katherine joined Cisco in 2014 and has worked in IT since
2007 in multiple networking and security roles. She
graduated with a Bachelor of Science in IT Security and a
Master of Science in Information Security and Assurance.
Her many certifications include CCIE Data Center, CCIE
Security, MCSE, VCP, CISSP, CCNP, CCDP, and more.
Outside of her day job, she runs a blog called network-
node.com, which provides training articles and videos about
Cisco Security products. She also helps co-organize the
largest Cisco study Meetup group in the world named
Routergods.
You can follow Katherine on Twitter: @kmcnam1
About the Technical Reviewer
Akhil Behl, CCIE No. 19564, is a passionate IT executive
with a key focus on cloud and security. He has more than 16
years of experience in the IT industry working in several
leadership, advisory, consultancy, and business
development profiles with various organizations. His
technology and business specialization includes cloud,
security, infrastructure, data center, and business
communication technologies.
Akhil is a published author. Over the span of the past few
years, Akhil authored multiple titles on security and
business communication technologies. He has contributed
as technical editor for over a dozen books on security,
networking, and information technology. He has published
several research papers in national and international
journals, including IEEE Xplore, and presented at various
IEEE conferences, as well as other prominent ICT, security,
and telecom events. Writing and mentoring are his passion
and a part of his life.
He holds CCIE (Collaboration and Security), CCSK, CHFI,
PMP, ITIL, VCP, TOGAF, CEH, ISM, CCDP, and many other
industry certifications. He has Bachelor in Technology and
Masters in Business Administration degrees.
Dedications
From Aaron and Katherine: This book was written largely
during the rise of the COVID-19 worldwide pandemic. We
spent some of this time not knowing if there was going to be
a world to live in, much less if there was going to be any
readers to learn from this material. So, this book is
dedicated to all the people of the world who did not survive
the ordeal, to our friends, family, and colleagues who did
contract the virus and pulled through, and the many of us
who survived the trials and tribulations of the quarantines.
From Aaron: This book is dedicated to my amazing best
friend, fellow adventurer, and wife, Suzanne. Thank you for
your continued support, encouragement, and patience and
for putting up with all the long nights I had to be writing
while you let the twins have a “sleepover” in our room, and
let me sleep in to make up for it and for always believing in
me and supporting me. You are beyond amazing.
To Mom and Pop. You have always believed in me and
supported me in absolutely everything I’ve ever pursued
and showed pride in my accomplishments (no matter how
small). I hope I can continue to fill your lives with pride,
happiness, “nachas”; and if I succeed in my endeavors to
make you proud, it will still only be a fraction of what you
deserve.
To my four absolutely incredible daughters, Eden, Nyah,
Netanya, and Cassandra: You girls are my inspiration, pride,
and joy! I can only hope that one day you will look back at
the ridiculous man that raised you and feel a level of pride.
—Aaron
From Katherine: This book is dedicated to my wonderful,
amazing, and supportive wife, Dianne. This book is as much
yours as it is mine. I could not have done it without the
support and love you gave me through it all. Thank you for
being so amazing every day. I know life with me has been a
crazy rollercoaster of adventures but there is truly no one
else I’d rather have by my side though all of life’s surprises.
The luckiest day of my life was the day I saw you walking
toward me in Colorado all those years ago. You’re my
foundation, rock, muse, and soulmate. I love you forever.
Also, Brock is your cat.
I also want to dedicate this book to my parents—Robert and
Evelyne McNamara—and my siblings—Ryan, Jack, Cai, Mimi,
Grace, Molly, and Little Bob. I love you all, and I can’t wait
until the time we can see each other again in person.
To Rakel—It’s been a crazy few years. You have had the
monumental job of putting up with me for which I am
thankful for all you do. Thank you for grounding me so many
times when I needed it and always being a listening ear (or
text message). As far as I’m concerned, you are a part of my
tribe. Thanks for being my Jiminy Cricket. I wish you all the
lavender, crackpie, stressballs, monster salads, hot yoga,
travel, love, and happiness in the world.
To Gordon—Who will never see this. You wanted me to be a
better person and gave me another chance at life. I hope if
you were still here, you would be proud of me.
To my Secret Ninja Pirates—Dustin Schuemann, Tim
McConnaughy, Matthew McGee, Joel Sprague, Hieu Phan,
Renee Kostreva, Steven McNutt, Anthony Sytnik, Brad
Johnson, Joshua Burget, JP Cedeno, and even David Gaytan
—thank you for the many laughs and vent sessions.
I want to thank Bill Boyles Jr., Amanda Boyles, Jessica Rojas,
Lily Speerbrecker, Marshall DuVal, Simone Hirsekorn, Jenna
Bulis, Chelsea Filer, James Ziegenbalg, and Amanda La Ford.
You guys are my real-life superheroes and inspiration to
push myself in so many ways.
I want to give thanks to my very awesome SWS team who
has made me feel so welcomed in this amazing team/family.
Thank you, Isabella Yani, Oli Laurent, Greg Evans, Blake
Fletcher, Cristin Beckendorf, Dani Hemmings, Glen
Oltmanns, James Nolan, Jeff Hubbell, Jeremy Stephens, Jerod
Atkins, Tammy McKeever, Patrick Taylor, Matt Rhebeck,
Shane Hanner, Dan Turner, and Thomas Archuleta.
To Miguel de Zubeldia: You’re an amazing work partner.
Thanks to you I can never look at spicy tacos the same
again. Thank you for the all the amazing work, laughs, and
accepting me as the other half of this pant-less dynamic
duo.
Thank you to everyone in Routergods and in Cisco who
supported me along the way—especially Humphrey Cheung,
Dmitry Figol, James Schallau, Nicole Wajer, Lindsay
Simancek, Nick Russo, Francois Caen, Alex Shkolnik, Brad
Edgeworth, Carolina Terrazas, John Behen, David Peñaloza,
Joe Astorino, Kyle Winters, Joey Muniz, Moses Frost, Russell
Pope, Jeff Denton, and so many more.
To my amazing professional mentors—my amazing co-
author Aaron Woland who honored me so much by choosing
me as a co-author. Jeff Fanelli who always gives me amazing
advice and encouragement. You make me feel like I can do
anything I set my mind to. Thank you for taking a chance
with me at Cisco Live and I’ll always strive to never let you
down. Denise Fishburne who has been an awesome friend in
the last few years. You always offer great and wise advice
and I am always thankful for your insight. Willow Young—
your bravery and wit always inspire me. Jeff Moncrief who
should never shave his beard off and who vouched for me to
make the transition to a security specialist. You’re my
favorite furry, and I’m honored to call you friend. Neno
Spasov, who got me interested in ISE in the first place, has
always been patient with all my questions and literally was
in the trenches with me. I love you, big guy.
Acknowledgments
From Aaron: to my co-author, Katherine. Since you joined
me at Cisco, you have reinvigorated my passion for ISE and
security. I truly treasure our professional and personal
relationships and I especially love seeing Dianne’s and your
fun interactions online. Thank you for agreeing to do the
lion’s share of the work for this book; it’s been a true honor
collaborating with you on this book and it is also an honor to
call you a colleague and even more so to call you a friend.
To Chris Cleveland, you and I have worked on so many
projects together at this point, it is like we know each other
on a personal level, even though we’ve never met in person.
You are an amazing editor and Pearson is truly blessed to
have you! As soon as we can meet in person, my friend, the
drinks are on me!
From Aaron and Katherine:
To editors Chris Cleveland, Mandie Frank, and Kitty Wilson:
You are amazing. I hope the readers appreciate how much
you all have done to make this book what it is today:
correcting all the mistakes we made and keeping us aligned
with the Cisco Press requirements for style and content. It
must have been like herding cats!
To the technical editor, Akhil Behl, you have amazing
insights into the security industry, and we look forward to
reading your doctoral thesis someday.
To our employer, Cisco: You really are the greatest place to
work in the world. Not only are we both passionate for your
technology, but also we are patinate about the place we call
home. Chuck’s leadership in the community and in the
company is second to none.
Command Syntax Conventions
The conventions used to present command syntax in this
book are the same conventions used in the IOS Command
Reference. The Command Reference describes these
conventions as follows:
Boldface indicates commands and keywords that are
entered literally as shown. In actual configuration
examples and output (not general command syntax),
boldface indicates commands that are manually input
by the user (such as a show command).
Italic indicates arguments for which you supply actual
values.
Vertical bars (|) separate alternative, mutually exclusive
elements.
Square brackets ([ ]) indicate an optional element.
Braces ({ }) indicate a required choice.
Braces within brackets ([{ }]) indicate a required choice
within an optional element.
Introduction
The Cisco Certified Network Professional (CCNP) certification
program has several technology tracks including Enterprise,
Security, Data Center, Service Provider, and, last but not
least, Collaboration. This book will focus on one of the
optional concentration exams to achieve your CCNP Security
certification – Implementing and Configuring Cisco Identity
Services Engine (SISE 300-715).
You may already have other Cisco certifications in other
networking technologies or this may be your first foray into
the Cisco certification process. You may instead be reading
this book to enrich your skillset for your job and not even
take the exam. Whichever the case, you have chosen a
great resource to further your learning and we wish you the
best of luck in your studies.
11 Implement MAB
Certificat Exam Domain/Topic
ion Guide
Chapter
14 Implement probes
14 Implement CoA
16 Configure blacklist/whitelist
BYOD http://www.ciscopress.com/store/cisco-
Networking bring-your-own-device-byod-
LiveLessons networking-livelessons-
9781587144219
Security Specialists
Single-Answer
Multiple-Answer
Book Features
To help you customize your study time using this book, the
core chapters have several features that help you make the
best use of your time:
Note
Do not lose the activation code because it is the only
means with which you can access the QA content with the
book.
Note that if you want to use the web app only at this point,
just navigate to www.pearsontestprep.com, establish a free
login if you do not already have one, and register this book’s
practice tests using the registration code you just found.
The process should take only a couple of minutes.
Note
Amazon eBook (Kindle) customers: It is easy to miss
Amazon’s email that lists your PTP access code. Soon
after you purchase the Kindle eBook, Amazon should send
an email. However, the email uses very generic text and
makes no specific mention of PTP or practice exams. To
find your code, read every email from Amazon after you
purchase the book. Also do the usual checks for ensuring
your email arrives like checking your spam folder.
Note
Other eBook customers: As of the time of publication,
only the publisher and Amazon supply PTP access codes
when you purchase their eBook editions of this book.
Fundamentals of AAA
TACACS+ 3, 6–8
RADIUS 4, 5, 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Authentication involves validating an identity or a
credential. It is a very important step in the process of
performing any sort of secure access control, regardless of
what you are controlling. Forget about technology for a
second and consider paying for groceries with a credit card.
As a credit card owner, you have the choice to sign the back
of the card or to write “check ID” on the back. The more
secure method is to force the validation of the ID of the
person using that card and ensure that the credential
matches the name on the front of the credit card.
Having a cashier check the identity of the card user is
authentication. Ensuring that the identity matches the name
printed on the card is authorization. Say that Katherine
McNamara goes into a retail store and hands the cashier a
credit card to pay for the $10,000 of electronics she is
purchasing. She passes her driver’s license to the cashier,
and the picture matches her face. It is certainly her identity.
However, the name printed on the credit card is Aaron
Woland. Should the transaction go through? Of course not: It
should not be authorized.
After Katherine attempts to use Aaron’s credit card, records
of the attempt appear in the log files of the point-of-sale
system, the video monitoring system of the store, and other
systems. This is the accounting portion of AAA. It’s a critical
piece that is required for reporting, audits, and more.
It will become paramount for you as a security professional
and as someone who is taking the Implementing and
Configuring Cisco Identity Services Engine SISE 300-715
exam to understand the differences between and purposes
of all three As in AAA.
Note
To learn more about device administration AAA, beyond
what you need to know to pass the SISE 300-715 exam,
see the Cisco Press book AAA Identity Management
Security.
TACACS+
Note
For more information on TACACS+, see the Cisco Press
book AAA Identity Management Security.
RADIUS
AV Pairs
or
Section TACACS+ 7
Section RADIUS 12
Section AV pairs 15
Paragraph CoA 16
Define Key Terms
Define the following key terms from this chapter and check
your answers in the glossary:
device administration AAA
network access AAA
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What AAA protocol is best suited for device
administration?
2. Which AAA protocol supported by ISE combines
authentication and authorization in a single transaction?
3. Which AAA protocol supported by ISE uses TCP for
transport?
4. In AAA communication, what is the name of the
combination of an attribute and its assigned value?
5. What is the common name for the technology
extension to RADIUS that allows communication to be
initiated from the authentication server to the
authenticator (the NAD)?
Chapter 2
Identity Management
What Is an Identity? 1
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
1. What types of identities are used in Cisco ISE? (Choose
two.)
a. SSID
b. MAC address
c. Username
d. IP address
2. Which of the following are types of identity stores used
by Cisco ISE? (Choose two.)
a. Temporary
b. External
c. Internal
d. Permanent
3. Cisco ISE identity stores are used to authentication
which of the following? (Choose two.)
a. Endpoints
b. AD security groups
c. RADIUS
d. Users
4. What identity store attributes can be used in an ISE
authorization policy? (Choose two.)
a. User
b. Time
c. Accounting
d. Machine
5. Which of the following is a list of identity sources that
are checked in order as part of authentication?
a. Authentication source
b. Identity database
c. Identity source sequence
d. Authentication database
6. How is an identity store sequence processed?
a. Bottom-to-top
b. Left-to-right
c. Top-to-bottom
d. In any order
7. Which of the following does ISE support for
authentication? (Choose three.)
a. LDAP
b. DIAMETER
c. Microsoft Active Directory
d. RADIUS proxy servers
8. Which of the following can be used with an internal
identity store? (Choose two.)
a. SSID
b. Guest
c. Time
d. MAB
9. What types of internal identity stores are used in ISE?
(Choose two.)
a. User database
b. Endpoint database
c. System database
d. Admin database
10. What are the primary reasons for using external
identity stores? (Choose two.)
a. Performance
b. Monitoring
c. Scalability
d. Management
Foundation Topics
What Is an Identity?
Who are you? We’re not asking one of those existential
questions that requires deep introspection while sweating it
out in a tent with 100 other people during a heat wave.
We’re merely asking for your identity. Your identity is a
representation of who you are. It’s a simple question, and
your response might be as simple as your name. But if you
meet someone new and tell them your name, how do they
know you are who you really say you are? What about the
reverse situation? Someone could walk up to you and say
that their name is “Suzanne,” but how would you know
that’s the truth? Perhaps you could look at some form of
“trusted” evidence, such as a driver’s license or passport, to
verify their identity. Such evidence of an identity is known
as a credential.
One of the foremost uses of credentials in the world of
security and access control is to represent the identity of a
person or a device. There are typically many factors that
can make up an identity, including an employee’s username
and password that would be used to access corporate
network resources. Another form of identity could be the
use of a Media Access Control (MAC) address to uniquely
identify a specific endpoint, such as a network-based
printer.
Identity Stores
An identity store is basically a database that houses
credentials of users or endpoints. Because it contains those
values, it can be used to authenticate the identity of a user
or an endpoint. The identity store could be an internal
database that resides on the AAA server or an external
database that houses the identities.
Identity stores can also be used for the retrieval of user or
machine attributes used in authorization policies, as
discussed in Chapter 10, “Authorization Policies.” Each
individual identity store is referred to as an identity
source.
Endpoint Groups
Users are not the only entity on a network that have
identities. Endpoints also have identities, and Cisco ISE
maintains an internal endpoint database that stores
information about all the endpoint devices that connect to
the network infrastructure.
See Figure 2-4 for an example of endpoint objects in ISE’s
Internal Endpoint Database.
Active Directory
Microsoft’s Active Directory (AD) is one of the most
popular external identity stores supported with Cisco ISE. In
fact, the best estimate from Cisco’s security business unit is
that AD accounts for more than 90% of ISE deployments.
AD is arguably one of the most successful, highly available
distributed database deployments in existence today. It
follows the X.500 structure, just as DNS does. In fact, AD is
very tightly coupled with DNS and requires DNS to be robust
for AD to function normally.
Note
As of ISE Version 2.7, Microsoft’s Azure AD was not a
natively supported identity store.
LDAP
Lightweight Directory Access Protocol (LDAP) is a
standard protocol used to connect to X.500 directory
services databases and retrieve information from them;
these databases include Microsoft’s Active Directory, NetIQ
eDirectory (formerly Novell Directory Services [NDS]), Sun
Directory Server, Oracle Identity Manager, IBM Tivoli Identity
Manager (TIM), and many other identity stores.
Note
LDAP is not used very often with ISE to connect to Active
Directory because ISE has a more powerful connector
built in.
Note
The LDAP browser used in Figure 2-7 is the Softerra LDAP
browser, which is a free tool you can use to test LDAP
connections and view attributes. It’s highly recommended
to add it, or something similar, to your arsenal of tools
when deploying ISE.
Multifactor Authentication
In traditional secure enterprises, the typical user identity is
based on a username and some type of static password that
is likely required by security policy to be changed
periodically.
Passwords are often weak and, even worse, commonly
reused across multiple websites or applications. When any
of those applications are compromised, such as LinkedIn or
Facebook, the bad guys have a password that may work in
other places as well. The threat actors are likely to add the
password to a giant database of usernames and passwords
and use some form of machine learning or artificial
intelligence to help parse that vast amount of data and
come up with likely passwords for more targeted attacks.
(For more on stolen password databases, check out the
“have I been pwned” service at
http://www.haveibeenpwned.com.)
Two types of authentication that add a lot more security are
multifactor authentication (MFA) and two-factor
authentication (2FA). MFA is a security enhancement that
allows you to present two or more pieces of evidence when
logging in to an account. MFA requires that your credentials
(evidence) fall into any of these three categories:
Something you know, such as a password or PIN
Something you have, like a smart card or a smartphone
that receives push notifications or text messages
Something you are, like your fingerprint or faceprint
(biometrics)
With MFA, your credentials must come from two different
categories, so entering two different passwords would not
be considered multifactor authentication. Just remember
that MFA and 2FA require something you have and a
separate required something you know or you are.
Biometrics are becoming much more commonplace.
Technology such as Windows Hello, which uses facial
recognition or your fingerprint to log you in to Windows 10
devices, Apple’s “faceprint” in the iPhone X (and newer),
and the use of fingerprints on most Android devices have
put biometric authentication in the hand of the average
user.
In October 2018, Cisco acquired Duo Security for $2.35
billion. Duo got its start in the security space by creating a
very simple-to-use and powerful MFA solution. It then
expanded its product portfolio further into the zero trust
space. Let’s look at an example of MFA using Cisco’s Duo
Security solution. Say that a user logs in to a web
application, such as the Cisco AMP for Endpoints portal
shown in Figure 2-8. The user’s browser is redirected to the
Duo Login prompt, where the username and password are
verified, and then a push notification is sent to the Duo
Security app on the user’s phone. Figure 2-9 shows the Duo
Login prompt after the user’s credentials are accepted, and
Figure 2-10 shows the push notification on the user’s mobile
phone.
Figure 2-8 Login Page for a Web Application
Figure 2-9 Duo Security Login Page
Figure 2-10 Duo Mobile App Push Notification
Note
The terms MFA and OTP have blended in today’s world
and are often used interchangeably, but they are, in fact,
distinct. OTP is a form of MFA, but not all MFA uses OTP.
Smart Cards
Another type of identity store that Cisco ISE supports is
smart cards with embedded integrated circuits. A smart
card can be used as a form of identification to authenticate
for secure network access control systems. Smart cards
come in variety of formats, including bank credit cards
(commonly called chip cards), driver’s licenses, and hospital
patient ID cards.
A Common Access Card (CAC) is a particular type of
identification badge smart card. You can insert a CAC into a
card reader and then enter your PIN. Again, you have to
“have something” (the CAC) and “know something” (the
PIN) for the authentication to be valid.
Smart cards store a set of X.509 certificates and use a
public key infrastructure (PKI) to store the encrypted
digital certificates for the authentication process.
Certificate Authorities
In general terms, a certificate is an electronic document
designed to identify an entity (such as a device, a user, or a
website) that uses a digital signature to validate a
document. These identity documents are used within X.509,
which is a standard for PKI that specifies the format for
public key certificates, certificate authority hierarchy,
revocation checking, and more.
To understand the topic of certificates, it can be helpful to
consider a driver’s license example. When you take a
driving exam and pass the test, you are given a driver’s
license that is “signed” by a recognized and trusted
authority, such as a state agency known as the Department
of Motor Vehicles (DMV). The authority that issues your
driver’s license can use various methods to sign your
license to indicate that it came from a trusted source and is
valid and trusted. For example, a hologram may be
embedded on the driver’s license to make it difficult to
duplicate or forge the license.
An X.509 certificate is very much like a driver’s license. It is
used to identify an entity such as a user, a device, or an
application. The recognized authority signs the certificate;
with X.509, this authority is a known trusted certificate
authority (CA).
The comparison between X.509 certificates and driver’s
licenses does not end here. What happens when a police
officer stops a speeding driver? The officer asks the driver to
provide a valid driver’s license, which the police officer uses
to perform the following tasks:
Step 1. Validate that the driver’s license appears to be a
real document and not a forgery.
Step 2. Ensure that the picture does in fact look like the
person in the driver’s seat.
Step 3. Ensure that the driver’s license is valid and not
expired.
Step 4. Verify via computer query that the driver’s license
has not been suspended or revoked based on past
offenses.
Not only does Cisco ISE trust the certificates that have been
signed by the certificate authority, it must trust those
certificates for the specific required use case, such as client
authentication, as in this example. If a client presents a
certificate that has not been signed by a certificate
authority that is trusted for client authentication, the
authentication fails immediately. This authentication process
is comparable to someone entering the wrong password for
a user account.
SAML IdPs
Beginning in Version 2.6, ISE provides the ability to
authenticate a user by leveraging Security Assertion Markup
Language (SAML) IdPs. SAML is an XML-based open
standard for authentication (AuthN) and authorization
(AuthZ) for web-enabled single sign-on (SSO).
Some noteworthy definitions go along with SAML:
SAML service provider (SP): The SAML SP is the
application or service that is being accessed (for
example, the ISE web portal). AuthN and AuthZ are
required to access the SAML SP.
SAML assertion: Much like a web cookie, a SAML
assertion contains the identity and attributes of the user
and the user’s authorization for the service, which is
passed from the IdP to the SP.
SAML IdP: The IdP is a policy engine that determines
authorization and issues SAML assertions. The IdP is the
identity provider against which ISE is authenticating.
User agent: The user agent is the web browser or app
that is requesting access to the service on behalf of the
human user.
Note
As this book went to press, SAML was not an option for
the administrative login to ISE.
Social Login
Social login is a special identity source for use with guest
portals only. With social login, a guest user can click a link
such as “Log in with Facebook” and leverage his Facebook
credentials to gain guest access.
As of Version 2.6, Facebook was the only social media
source ISE supported for guest logins.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What are the three possible factors for multifactor
authentication?
2. Name two identity stores that are used only for guest
authentications.
3. What combines multiple identity sources into an
ordered list for authentication?
4. What authentication source is used for more than 90%
of production ISE deployments?
5. What is the term for the representation of a user or
device?
Chapter 3
Extensible Authentication
Protocol (EAP) over LAN:
802.1X
Supplicant Options 2, 5, 6, 8
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
EAP Types
There are many different EAP types, each with benefits and
downsides. The EAP type defines the authentication
mechanism to be used with EAP, and the type’s name
typically indicates the mechanism. Most of the many EAP
types are not discussed in this book due to lack of adoption
or lack of inclusion in the Implementing and Configuring
Cisco Identity Services Engine SISE 300-715 exam blueprint
(for example, EAP-Kerberos).
The EAP types can be broken down into two categories:
native EAP types and tunneled EAP types. A tunneled EAP
type simply uses a native EAP inside a TLS tunnel between
the supplicant and the authenticator.
Note
EAP-TLS is quickly becoming the EAP type of choice when
supporting BYOD in the enterprise.
Note
Cisco ISE currently supports EAP-MS-CHAPv2 only within
tunneled EAP and not as native EAP.
Note
Cisco ISE currently supports EAP-GTC only when it is
inside tunneled EAP and not as native EAP.
Note
It is important to understand that tunneled EAP methods
work very similarly to the way a secure tunnel is formed
between a web browser and a secure website (such as a
banking site). The tunnel is formed first, normally using
only the certificate of the server (one-way trust), and then
the user enters banking login credentials within that
secure tunnel.
PEAP
Protected EAP (PEAP) was originally proposed by Microsoft.
This EAP tunnel type has quickly become the most popular
and widely deployed EAP method in the world. PEAP forms a
potentially encrypted TLS tunnel between the client and
server, using the X.509 certificate on the server in much the
same way the SSL tunnel is established between a web
browser and a secure website.
After the tunnel has been formed, PEAP uses another EAP
type as an “inner method”—authenticating the client using
EAP within the outer tunnel.
Three inner methods are supported for PEAP:
EAP-MS-CHAPv2: Using this inner method, the client’s
credentials are sent to the server encrypted within an
MS-CHAPv2 session. This is the most common inner
method, as it allows for simple transmission of
username and password (or even computer name and
computer-password) to the RADIUS server, which in turn
authenticates them to Active Directory.
EAP-GTC: Cisco created this inner method as an
alternative to MS-CHAPv2 to allow generic
authentication to virtually any identity store, including
OTP token servers, LDAP, and Novell eDirectory.
EAP-TLS : While rarely used and not widely known, PEAP
is capable of using EAP-TLS as an inner method.
EAP-FAST
Flexible Authentication via Secure Tunneling (FAST) is very
similar to PEAP. Cisco created FAST as an alternative to PEAP
to allow for faster re-authentication and support faster
wireless roaming.
Just like PEAP, FAST forms a TLS outer tunnel and then
transmits the client credentials within that TLS tunnel.
Where FAST differs from PEAP is in the ability to use
Protected Access Credentials (PACs). A PAC can be thought
of as a secure cookie that is stored locally on the host as
proof of successful authentication. The PAC is used for rapid
session resumption when a client roams or is disconnected
from the network temporarily and to enable EAP chaining
(which is discussed later in this chapter).
FAST uses a native EAP type as an inner method to
authenticate the client using EAP within the outer tunnel.
Three inner methods are supported for FAST:
EAP-MS-CHAPv2: Using this inner method, the client’s
credentials are sent to the server encrypted within an
MS-CHAPv2 session. This is the most common inner
method, as it allows for simple transmission of
username and password (or even computer name and
computer-password) to the RADIUS server, which in turn
authenticates them to Active Directory.
EAP-GTC: Cisco created this inner method as an
alternative to MS-CHAPv2 to allow generic
authentication to virtually any identity store, including
OTP token servers, LDAP, and Novell eDirectory.
EAP-TLS : EAP-FAST is capable of using EAP-TLS as an
inner method. This has become quite popular with EAP
chaining.
EAP-TTLS
EAP Tunneled Transport Layer Security (EAP-TTLS) is another
tunneled EAP type developed mainly by Funk Software
(which has since been acquired by Juniper). It is very similar
to PEAP and EAP-FAST, as it creates a TLS outer tunnel first
and then performs the authentication within that TLS tunnel.
There are some benefits to using TTLS over PEAP: It
provides some enhancements to the simplicity of the setup,
and it has enhancements to the TLS tunnel’s capability to
resume a session.
TTLS uses a native EAP type as an inner method—
authenticating the client using EAP within the outer tunnel.
EAP-TTLS support was added in ISE Version 2.0. Six inner
methods are supported for EAP-TTLS:
PAP/ASCII: This method is not an EAP type. It simply
uses native Password Authentication Protocol (PAP) to
negotiate the authentication and transmits the
username and password in plaintext within the
encrypted EAP-TTLS outer tunnel.
CHAP: This method is not an EAP type but uses native
Challenge Handshake Authentication Protocol (CHAP) to
negotiate the authentication with added replay attack
prevention. The username is sent in plaintext within the
EAP-TTLS tunnel, and a calculated hash of the password
is sent as well (and the actual password is never sent).
MS-CHAPv1: Again, this is not an EAP type but a native
authentication protocol. Microsoft Challenge Handshake
Authentication Protocol (MS-CHAP) is an enhancement
to CHAP that enhances the protocol with more functions,
such as password change mechanisms, defined failure
codes, and retry mechanisms.
MS-CHAPv2: This is a newer version of MS-CHAP with
additional security enhancements. Again, this is not an
EAP type but a native authentication protocol.
EAP-MD5: This EAP type uses a message digest
algorithm to hide the credentials in a hash. The hash is
sent to the server, where it is compared to a local hash
to see if the credentials were accurate. However, EAP-
MD5 does not have a mechanism for mutual
authentication. This means the server is validating the
client, but the client does not authenticate the server
(that is, it does not check to see if it should trust the
server). This may be acceptable to some
implementations—especially if the TTLS outer method
has already performed the mutual authentication.
EAP-MS-CHAPv2: Using this inner method, the client’s
credentials are sent to the server encrypted within an
MS-CHAPv2 session. This is the most common inner
method, as it allows for simple transmission of
username and password (or even computer name and
computer-password) to the RADIUS server, which in turn
authenticates them to Active Directory.
Note
Many believe that the main benefit of supporting EAP-
TTLS is simply that the eduroam initiative
(www.eduroam.org) mandates the use of EAP-TTLS. The
eduroam initiative is designed to allow federating college
student identities to roam between college campuses
using their same credential.
User and ✓ — — ✓
machine EAP
chaining
FAST reconnect ✓ — — ✓*
with PAC file
Fast reconnect — — ✓ ✓
with server
Channel binding ✓ — — ✓*
to prevent MITM
Feature EAP- EAP- EAP- EAP-
FASTv2 PEAP TTLS TEAP
(propriet (RFC (RFC (RFC
ary) draft) 5281) 7170)
Protection of ✓ ✓ ✓ ✓
credential
transmission
with TLS
Multiple inner ✓ ✓ ✓ ✓
method choices
Mandated use — — ✓ —
by eduroam
initiative
Certificate — — — ✓*
provisioning
Distribution of — — — ✓*
EAP server trust
list
Feature EAP- EAP- EAP- EAP-
FASTv2 PEAP TTLS TEAP
(propriet (RFC (RFC (RFC
ary) draft) 5281) 7170)
Certificate — — — ✓*
renewals
* Not supported in ISE as of Version 2.7 but included in the RFC standard.
EAP-TLS* (native)EAP-TLS* ✓ ✓ — —
(inner method)
EAP-MD5CHAP — — ✓ —
Supplicant Options
The bulk of this chapter is about 802.1X. This topic would
not be complete without a discussion of the client side of
the authentication flow: the supplicant. As described earlier
in this chapter, a supplicant is the software on an endpoint
that understands how to communicate with EAP on the LAN.
A supplicant must be configured to use credentials—either
stored credentials (such as a certificate) or a username and
password.
User Authentication
User authentication is the authentication that people
commonly think of when discussing 802.1X and network
access control. This type of authentication provided the
identity credentials of the user to the authentication server
and allows for role-based access control to the network.
When the 802.1X standard was created, it was important to
know who was accessing networks before allowing them
network access.
User authentication on a Microsoft Windows device can
occur with a username or password, a user-issued
certificate, or even a smart card. With Windows devices,
there is a separate certificate store for user-issued
certificates. Each user who logs in to a Windows workstation
has a unique certificate store for authenticating to the
network.
Client Policy
The Client Policy view, shown in Figure 3-19, is for
configuration options for connection, wired/wireless/3G
mobile broadband, end-user, and administrative settings.
Many of the items in this section should look familiar as a
number of them are also in the Windows native supplicant.
Figure 3-19 Client Policy View
Note
There are many more complexities to FIPS mode, and
simply enabling this setting is not enough. Please see the
official Cisco AnyConnect administrative documentation
on www.cisco.com for more information on FIPS mode.
Authentication Policy
The Authentication Policy view allows you to specify what
methods are permissible for transmitting credentials to the
network. This policy is very similar to the Allowed Protocols
authentication result in ISE.
Figure 3-20 shows how you can use the Authentication
Policy view to control all sorts of network authentication,
including the type of wireless network that an employee can
connect to. For example, the company could prevent the
managed laptops from connecting to open wireless
networks (such as public hotspots) to prevent unencrypted
communications.
Figure 3-20 AnyConnect NAM Authentication Policy
Networks
In the Networks view, you can define the corporate network
and the security to use on the corporate wired and wireless
networks. Figure 3-21 shows a Networks view with a default
network named wired. This default network has all security
disabled and is there to ensure that the supplicant will work
in a plain-Jane non-authenticating wired network.
Figure 3-21 Networks View
In Figure 3-25, notice the 802.1X timers you can tune. Also
pay attention to the Security section, where key
management may be turned on for Layer 2 MACsec
encryption between the supplicant and the switch. This
provides AES-GCM 128-bit encryption over the wire. Finally,
the Port Authentication Exception Policy, when enabled,
allows the supplicant to control whether the client can send
data immediately upon link (prior to an authentication) or
after the authentication, with options about sending data
even if EAP fails and even if MACsec fails to negotiate.
Environments such as certain government institutions
require such strict controls that they must be able to deny
traffic if it cannot be encrypted.
Clicking Next takes you to the Connection Type tab. The
settings here should seem familiar as they are related to
machine authentication, user authentication, or both. If you
select Machine and User Connection, you get four new tabs
to the right side. Clicking Next takes you to the Machine
Auth tab (see Figure 3-26).
Figure 3-26 Networks View Machine Auth Tab
When you select the EAP method, the lower portion of the
tab becomes populated. For example, if you choose EAP-
FAST as the tunneled EAP method, you can then customize
the behavior of the supplicant. The inner method is fully
selectable for EAP-MS-CHAPv2 or EAP-GTC or EAP-TLS
(authenticating using a certificate).
Clicking Next takes you to the Certificates tab, shown in
Figure 3-27. You go to the Certificates tab at this point if you
chose a password-based authentication method. This tab
allows you to define the certificates to trust for the outer
method when the TLS tunnel is formed. AnyConnect NAM
provides very powerful and flexible rules for filtering what
certificates to trust, although these rules are beyond the
scope of the SISE 300-715 exam and this book. The
Certificates tab also gives you the option to trust any root
CA that is already trusted by the operating system or to
specify the trusted root CA in the profile.
Figure 3-27 Networks View Machine Authentication
Certificates Tab
Clicking Next takes you to the PAC Files tab, shown in Figure
3-28. This tab, which is specific to EAP-FAST, offers the
option of using PAC files. As mentioned earlier in this
chapter, a PAC can be thought of as a secure cookie; it is an
encrypted trusted file that can be used in lieu of or in
addition to a certificate for setting up a secure
communication channel with the RADIUS server. This
configuration option gives you a way to distribute the
server’s PAC file in the NAM profile for secure tunnel
establishment without the need for certificates.
Clicking Next takes you to User Auth, the first tab of the
user authentication, shown in Figure 3-30. Here you can see
that a different EAP method can be selected for the user
authentication. It does not have to be the same as the
machine authentication. If you select EAP-FAST, you see all
the same choices available as with the machine auth—but
with one exception. There is an option to extend user
connection beyond logoff. This option permits the supplicant
to remain authenticated as that user, even when the user is
no longer logged in.
Network Groups
As shown in Figure 3-33, the Network Groups view allows
you to organize network profiles into logical groupings for
easier use.
Figure 3-33 Network Groups View
EAP Chaining
Note
EAP chaining is revisited in Chapter 16, “Bring Your Own
Device.”
Non-802.1X Authentication
Web Authentication 6, 8, 10
EasyConnect 4, 5, 6, 8
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Devices Without a Supplicant
As described in Chapter 3 and the introduction to this
chapter, the IEEE standardized 802.1X as a port-based
network access control solution. More than a decade later,
we have seen 802.1X truly take hold and become the de
facto solution deployed everywhere, on both wired and
wireless networks.
With 802.1X, a supplicant and an authenticator exchange
EAP messages. However, if the endpoint that connected to
the authenticator (switch) did not have a supplicant, the
EAP identity request messages would go unanswered. This
would result in an authentication timeout, and with the
original concept of identity networking and 802.1X, the
endpoint would be denied access to the company network.
In other words, only devices that can authenticate and have
authenticated to the network will be allowed on the
network.
Although it was thought that all ports would need to
authenticate with 802.1X in order to gain access, this did
not happen for a myriad of reasons. When designing a
secure network access solution, there is a tendency to
consider only the managed desktops, laptops, and now
tablet-type devices when thinking about network
authentication. However, the reality is that organizations
tend to possess a plethora of devices beyond those, such as
printers, IP cameras, IP phones, thin client terminals, and
building automation and other “headless” or IoT devices
that exist in networks today.
Take Cisco IP Phones as an example. Such a device does
have a supplicant, which can be configured individually at
the keypad, but this solution does not scale very well;
imagine having to configure a supplicant on every phone in
an organization with hundreds of thousands of phones.
Cisco IP Phone supplicants may also be configured centrally
from the Call Control Server (formerly named the Cisco Call
Manager). What about the other devices? Do they also have
a central management platform that can configure each
supplicant across large numbers of devices deployed at
scale? In most cases, probably not.
One of the original ways to deal with these non-
authenticating devices was to not configure 802.1X on the
individual switch ports where the non-authenticating
endpoint would be plugged [[p80]]in to the network. This
“solution” would allow anyone to simply unplug the non-
authenticating endpoint and plug their laptop into the port
to gain full network access without any challenge
whatsoever.
What about when a device (such as a printer) needs to be
moved? The network team might need to be involved for
that move to enable 802.1X on the old switch port and
disable 802.1X on the new switch port; this would impose a
significant management burden on the IT department, it
would just not be scalable, and it would defeat the point of
network access control.
What happens when an employee who should have network
access has a misconfigured supplicant or an expired
credential or is using a temporary device? What about guest
users who only need access to the Internet? A series of
special fixes would need to be created to deal with all these
variations, and it might not be possible to deal with them in
a sustainable way.
Note
We dig more deeply into profiling in Chapter 14,
“Profiling.” Defense in depth, authorization results, and
applying the correct level of access to the correct device
types are covered in much more detail in Chapter 10,
“Authorization Policies.
Web Authentication
Just because there is no configured supplicant on an
endpoint does not mean the user of that endpoint does not
need to authenticate. Consider the use cases of guests or
visitors, or maybe just a misconfiguration or an expired
credential for the end user. The user might still require
network access and might be granted access to the
network.
This is where Web Authentication, commonly referred to
as just WebAuth, comes in. An authenticator would be able
to send a user to a locally or centrally hosted web page. In
other words, this web page could be hosted on the local
device itself—the switch, wireless controller, or even the
firewall or VPN concentrator—or it could be hosted on the
authentication server (ISE). It could be just a very basic web
page that allows a user to submit a username and
password.
The username and password submitted to the web portal
are then sent to the authentication server (ISE) for
authentication. If the portal is locally stored in the switch, in
a very similar fashion to what occurs with MAB, the switch
sends the request for the endpoint because the endpoint is
not authenticating to the switch. Figure 4-3 illustrates the
WebAuth concept.
There are pros and cons to the POST method and the iframe
method. The iframe method does not work with newer
browsers. The POST method does not work with some
mobile browsers, and it is very insecure because the user’s
credentials are passed from the central portal through the
network, destined to the authenticator. The web portal
needs to have the intelligence to determine which methods
to use with each browser type by examining the user agent
string from the browser.
Cisco Wireless LAN Controller (WLC) Version 7.0 required the
use of either POST or iframe method in order to support LWA
with a centralized portal on ISE. Traditional LWA was also still
available. Even though the portal is centralized, the same
restrictions associated with traditional LWA are still in effect.
CoA does not function, and client provisioning and other
advanced functionality are also not available. This method
isn’t widely adopted or used for these reasons.
Now that you’ve read about all the things CWA can do, you
must be wondering how it works and what makes it different
from the other WebAuth options. The authenticator only
sees a MAB, and the rest is handled on the authentication
server (ISE). Figure 4-5 shows MAB occurring with a
redirection to the centralized portal, and the switch still only
sees a MAB request, while ISE is maintaining the user
authentication.
Figure 4-5 URL-Redirected MAB with Credentials Never
Sent to the Authenticator
Remote-Access Connections
So far, this chapter has focused on wired and wireless
connections where the endpoint is not using 802.1X.
However, there is a third network access use case: remote
access. Today this trinity is commonly referred to as “wired,
wireless, and VPN.”
Connecting an endpoint to a corporate network from
another location is known as remote access (RA). RA used to
be handled mainly by dial-up networking, and this is
actually where RADIUS got its name. (RADIUS stands for
Remote Authentication Dial-In User Service.) Today it is
much more common to use a virtual private network (VPN)
to join an endpoint to a company’s network through the
public Internet. With this type of connection, the VPN
concentrator (usually a Cisco ASA) is the authenticator, and
ISE is the authentication server. The remote client forms a
secure tunnel between the VPN software (usually
AnyConnect) and the VPN headend (usually a Cisco ASA).
The tunnel may be formed using IPsec or SSL, and the user’s
credentials are passed inside that secure tunnel.
The VPN headend sends the RADIUS Access-Request to ISE,
which directs the identity lookup to the appropriate identity
store—usually a one-time password (OTP) server. With a
remote-access VPN, the user’s credentials are either sent
through PAP or MS-CHAPv2 from the ASA to ISE.
Note
802.1X is not involved with remote-access VPNs.
EasyConnect
EasyConnect is a feature that was added in ISE Version 2.1
as an alternative for user authentication without 802.1X or
WebAuth. Like 802.1X, it provides port-based
authentication, but it is much easier to implement.
EasyConnect allows users to connect a wired endpoint to
the network and grants just enough access so users can
authenticate through Active Directory. ISE collects the user
authentication information from Active Directory and issues
a CoA to the network device for further network access.
EasyConnect can be implemented on the same port as
802.1X and can provide initial authentication to a network
as an enterprise is migrating to 802.1X. Table 4-2 outlines
the advantages and disadvantages of EasyConnect.
Table 4-2 EasyConnect Advantages and Disadvantages
Advantages Disadvantages
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. Why is there a need to authenticate endpoints without
using 802.1X?
2. What are some of the advantages of using EasyConnect
in an enterprise?
3. Why is MAB alone considered insecure?
4. What are some of the advantages of CWA over LWA?
5. For remote access, how are credentials typically sent
from the VPN headend to ISE?
Chapter 5
Introduction to Advanced
Concepts
Posture Assessments 7, 8, 9
Foundation Topics
Change of Authorization
In order for a network to be secure, it is paramount that no
individuals or endpoints be allowed access to the network or
network resources until they have been sufficiently
authenticated. As discussed in Chapter 1, “Fundamentals of
AAA,” through Chapter 4, “Non-802.1X Authentication,” a
number of different identity stores and authentication
methods can be used to authenticate a user or device. This
authentication establishes who the user or endpoint is. For
instance, through authentication, it is possible to determine
whether a user is part of the network administrators group
of users or whether the user is a more basic user.
Following—and often related to or based on—authentication,
the user or endpoint is authorized to access the network at
some level. Again, as mentioned in earlier chapters,
authorization is the process of determining what resources
an authenticated user can have access to. This level of
authorization could allow the user unfettered access to all
network resources, access to none of the network resources,
or a level of access that is somewhere between these two
extremes. Being able to provide different levels of access to
network administrators and to basic users is critical for
network security; it is a best practice to give users the least
level of access that they require in order to accomplish their
duties.
However, the determination of a user’s access needs is not
always clear-cut. Sometimes a user, an endpoint, or the
network changes after the initial
authentication/authorization process. For example, an
endpoint could be stolen, become infected, or otherwise fall
out of the good graces of the network administrators. The
network must be able to react to such changes and provide
updated levels of access, or authorization, to these
endpoints.
Note
As discussed at length in Chapter 4, MAB is not a secure
technology, and it is best to leverage MAB as a secondary
“authentication” method—not the primary method for
allowing network access. Please keep this in mind as you
implement MAB on your network.
Posture Assessment
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is a Change of Authorization?
2. What can be used to help automate MAB?
3. What does profiling do?
4. What does posturing help accomplish?
5. What are some of the benefits that a mobile device
manager can provide that cannot be done with
posturing?
Part II: Cisco Identity
Services Engine
Chapter 6
Personas 2–6
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
What Is Cisco ISE?
The Cisco Identity Services Engine (ISE) is a security policy
management platform and a key component of the Cisco’s
zero trust architecture. Its role in the network is to allow the
network to be the enforcement point for network security.
Often, network security is delegated to individual devices in
the network. For instance, you might allow unfettered
access for all endpoints in the core of your corporate
network and enforce the access policy at the edge firewall.
For wireless users, you might choose to enforce a single
policy for all users—such as allowing every wireless user
access to HTTP, HTTPS, SSH, and/or Telnet—and implement
this policy at the access point (in autonomous mode) or at
the wireless LAN controller (in lightweight mode). This one-
size-fits-all approach is not the ideal way to implement
network security.
Cisco ISE helps facilitate the paradigm shift to making the
network (rather than a single device) the enforcement point
for network security. This is possible thanks to Remote
Authentication Dial-In User Service (RADIUS), which provides
the authentication, authorization, and accounting (AAA)
functions for the network (as discussed in Chapter 2,
“Identity Management”). Cisco ISE acts as a centralized
network security policy platform and RADIUS server,
extending the AAA function to all network devices. As a user
or an endpoint attempts to access the network, the network
access device (NAD) forwards all relevant authentication
parameters to Cisco ISE. Cisco ISE responds back to the NAD
with the resulting security policy to be applied to the
user/endpoint by using RADIUS attribute/value pairs (AV
pairs).
The authorization policy that is sent to the NAD is
implemented on a per-user basis. Tightly coupling the
authorization of the user with the authentication allows a
network administrator to provide differentiated network
access to all users. If you are a basic user, your level of
network access is likely going to be different than if you are
a network administrator. Your level of access may also be
different if you are accessing the network using a wireless
connection than if you are on a wired connection, and it may
be different if you are accessing the network from a remote
branch location than if you are accessing it from the campus
network. The granular policy building blocks that are
available in Cisco ISE ensure that you can implement the
best network security policy—on either a per-user or per-
group basis.
Cisco ISE also provides a number of advanced functions.
Profiling, which is natively integrated in Cisco ISE, can
dynamically identify endpoints. As an endpoint attempts to
access the network, ISE can profile the device—identifying,
managing, and taking inventory of the devices accessing
the network based on a predefined security policy. This
profiling operation can determine the manufacturer of the
endpoint, the function of the endpoint (IP phone, IP camera,
or network printer) and conduct other network-level
assessments of the endpoint. The result of this profiling
operation can also be used as one more criterion in the
authorization policy that is applied to the endpoint.
Another advanced function that is available with Cisco ISE is
posturing. Posturing can go slightly deeper than profiling,
and it uses a slightly different approach. Whereas profiling
uses network-level communications to determine
information about the endpoint, posturing leverages
information that resides on the endpoint. Using a network
access control (NAC) agent that resides on the endpoint
directly, posturing ensures that the endpoint is adhering to
security policies that have been deployed to the endpoint—
policies such as antivirus software, antispyware software,
and other security (and even non-security) software and
services. If the posture adheres to the implemented security
policy on Cisco ISE, additional network access can be
allowed via the authorization policy. Conversely, if the
endpoint posture does not adhere to the current security
policy, a reduced level of network access can be deployed
to the NAD on behalf of the endpoint—possibly forcing the
endpoint to remediate its noncompliance before it can gain
access to the network.
The depth of posturing that can be leveraged via Cisco ISE
can be further enhanced with third-party software security
systems called mobile device management (MDM) systems,
as described in Chapter 18, “Posture Assessment.”
Depending on the MDM system, Cisco ISE can leverage
additional industry compliance requirements (including
HIPAA and PCI-DSS requirements).
Much of the network security policy that we have discussed
thus far pertains to corporate-owned assets: assets that are
owned and managed by the enterprise IT department.
However, Cisco ISE has a number of features that allow a
granular network security policy to be extended to
employee-owned or guest endpoints. The employee-owned
endpoints, depending on the corporate security policy, may
be allowed trusted access equivalent to that of a corporate-
owned asset or basic Internet-level guest access.
Trusted access can be implemented in a number of different
ways—either by dynamically onboarding the endpoint into
the Cisco ISE database (possibly by using an identity
management system to identify the user of the device) or
by manually adding the device to a trusted-device
database. Both of these approaches are discussed in other
chapters, such as Chapter 16, “Bring Your Own Device,” and
Chapter 18, “Posture Assessment.”
Guest-level access, leveraging built-in guest portals, is also
available natively within ISE. The guest portals available in
ISE allow a trusted employee to create temporary guest
credentials for visitors, contractors, or other temporary
users. These guest credentials are then given to the guest
user, either manually or via email, to log in to the network.
As the guest user attempts to access the network, a second
network portal (or network-level authentication such as
PEAP) is be used to authenticate the user—pushing the
relevant guest-user access policy to the network access
device (wired or wireless) from which the user is accessing
the network.
Because Cisco ISE provides a high level of differentiated
access to corporate endpoints, employee endpoints, and
guest endpoints—enforcing profiling, posturing, and MDM
influenced authorization policy—it is paramount that
network administrators be able to monitor the level of
access granted to users/endpoints. This, too, is a feature
that is native to Cisco ISE. As each authentication,
authorization, profiling, or posturing action occurs, Cisco ISE
creates a logging event. These logging events can be
filtered, sent to syslog servers, and otherwise searched by
network administrators to see details on a user’s network
authentication and authorization.
Cisco ISE is a one-stop shop for network security policy. By
combining the industry-trusted RADIUS protocol with the
granular, context-based policy that is available with ISE, a
network administrator can distribute a unified security
policy to the far reaches of the network and ensure that the
security policy deployed to each user/endpoint is as secure
as possible.
Personas
Given the many roles that Cisco ISE may play in an
enterprise environment, it requires a distributed
architecture to handle those responsibilities at scale; these
responsibilities are known as personas.
Cisco ISE is designed with scalability in mind. To achieve
scalability, it divides the roles it provides into separate
personas. Each persona is a different function within a Cisco
ISE deployment that is required for proper operation of the
platform, and personas run within ISE nodes.
An ISE node is an individual appliance (virtual or physical)
configured to run one or more of the four personas that
exist within an ISE deployment. (An ISE deployment is
affectionately referred to an ISE cube.) A single ISE node
may be configured with just one persona, with multiple
personas, and even with all personas in the case of a
standalone or two-node deployment. The four personas are
as follows:
Administration
Monitoring
Policy Services
pxGrid
The sections that follow describe these four personas in
detail.
Administration Persona
The first, and possibly the most important, persona is the
Administration persona. This function of Cisco ISE is
important, as it enables a network administrator to
configure and administer the network security policy.
To make a change to the security policy—whether it is the
authentication, authorization, profiling, posturing, or other
policy—on Cisco ISE, a network administrator needs to
access the Administrative persona’s graphical user interface
(GUI).
Note
The administrative portal used to be a Flash-based web
interface, but all Flash was finally removed in ISE Version
2.4.
Monitoring Persona
The Monitoring persona acts as the centralized logging
server for the ISE cube. An ISE node with this persona
enabled is referred to as a Monitoring and
Troubleshooting (MnT) node. There can be a maximum
of two MnT nodes in an ISE cube: a primary MnT node and
secondary MnT node for redundancy.
The function of this node is exactly as it sounds: to provide
monitoring and troubleshooting functions for the Cisco ISE
cube. As an endpoint authenticates to the Policy Services
node (PSN), events are created to keep track of the
authentication and authorization process. These events are
forwarded to the MnT node, which consolidates and
processes these events into a legible format. When a
network administrator requires reports to be created for
whatever purpose—managerial slides and presentations,
access reports, and so on—this function is also provided by
the MnT node.
The second function of the MnT node is troubleshooting. As
each event is forwarded to the MnT node, there can be a
success or failure of the authentication or authorization
process. Due to the detailed event tracking that happens on
the PSNs, the content of the logs present on the MnT node
are also quite detailed. If a user/endpoint is having any
issue accessing the network, a network administrator can
leverage the MnT node to see the cause of the failure as the
node tracks the user’s/endpoint’s authentication in a play-
by-play manner.
There can be a large number of PSNs deployed in a single
ISE cube, and the MnT node acts as a centralized recipient
of the logs. Without the central monitoring and
troubleshooting function that the MnT node provides, each
PSN would be responsible for its own reporting—while
actively participating in ongoing authentication and
authorization processes. This can be very resource
prohibitive. Furthermore, network administrators need to
check the logs on each PSN for event correlation; the MnT
node provides this function in a single, one-stop-shop
approach.
pxGrid Persona
The final persona in an ISE cube is the pxGrid persona.
pxGrid is Cisco’s premier publish and subscribe (pub/sub)
communication bus, and it was designed from the ground
up to be a scalable secure data-sharing system. In other
words, it is designed to share a lot of security data in an
efficient and scalable manor.
Cores 8 12 12
per
process
or
Filename Description
Filename Description
Table 6-4 lists the different SNS appliance models and their
respective scalability numbers.
Table 6-4 SNS Appliance Scalability
Single-Node Deployment
A single-node, or standalone, deployment is the most basic
Cisco ISE deployment type. In this type of deployment, the
entire ISE infrastructure resides on a single appliance—
either physical or virtual. As discussed earlier in this
chapter, each persona has a specific role to serve in the
Cisco ISE ecosystem; a single-node ISE deployment is
responsible for performing all these personas on a single
device (see Figure 6-1).
Figure 6-1 Single-Node ISE Deployment with Persona
Assignment
In the standalone deployment illustrated in Figure 6-1, a
single ISE node is running the Administration, Monitoring,
and Policy Services personas, so the NAD sends all access
requests to the single ISE node. That single node is
responsible for all the administrative functions, logging,
profiling, pxGrid, certificate authority, hosting of all web
portals, and authentication. The other optional services,
such as pxGrid, device administration, and TC- NAC, may
also be run on the single node, but if they are, scalability
will be affected.
With a single-node deployment, there is no redundancy.
Therefore, if the appliance fails or loses network
connectivity for any reason, the ability to provide network
authentication and authorization may not exist. The
maximum number of supported endpoints in a single-node
deployment is 10,000 for the SNS-3615 (or equivalent
virtual appliance) or 50,000 for the SNS-3695 (or equivalent
virtual appliance).
As there is no redundancy in this solution and the
availability of network resources may be impacted in the
event of an outage, this deployment is suggested only for
testing in a lab environment.
Two-Node Deployment
A two-node Cisco ISE deployment incorporates redundancy,
which is highly recommended in a production network. In
this deployment type, the various ISE personas are
distributed across two appliances. As with a single-node
deployment, these appliances may be either physical or
virtual appliances. A mixture of physical and virtual
appliances may also be considered, depending on the
network topology and application. Each of the personas
must be assigned to one or more of the two available
appliances. When redundancy is available in this manner, it
is sometimes referred to as an ISE distributed deployment.
The Administration and Monitoring personas both have the
concept of primary and secondary nodes. However, the
Policy Services persona does not have primary and
secondary designations; a PSN is always “active” as soon as
the service is enabled on the appliance. It is up to the NAD
to determine which PSN the RADIUS requests are sent to.
Figure 6-2 illustrates how both nodes in a two-node
deployment run all services and are exact mirrors of one
another. In this type of deployment, if one node goes down,
the remaining node can still perform the authentications,
and the end users attempting to access the network should
not be affected.
Figure 6-2 Basic Two-Node ISE Deployment
Distributed Deployments
Table 6-5 summarizes the ISE scale limits for Versions 2.2
through 2.7.
7500:
3515
PAN+MnT
Characteri ISE 2.2 ISE 2.4 ISE 2.6 and
stic Maximums Maximums 2.7
Maximums
20,000: — 20,000:
3595 3595
PAN+MnT PAN+MnT
20,000: 3595
Characteri ISE 2.2 ISE 2.4 ISE 2.6 and
stic Maximums Maximums 2.7
Maximums
PSNs in a 40: 3495 PAN 50: 3595 PAN 50: 3595 PAN
fully
distributed
50: 3695 PAN
deployment
(separate
PAN, MnT,
and PSN
nodes)
PSNs in a 5 5 5
hybrid
deployment
(PAN and
MnT on a
single node
and
dedicated
PSNs)
Characteri ISE 2.2 ISE 2.4 ISE 2.6 and
stic Maximums Maximums 2.7
Maximums
Active 50 50 50
Directory
forests (join
points)
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What are the four ISE personas in ISE Version 2.7?
2. What is the maximum number of endpoints supported
in a single ISE cube, with all personas running on SNS-
3695 physical appliances?
3. What is commonly referred to as a hybrid deployment
of ISE?
4. Which persona is responsible for receiving RADIUS
Access-Requests, authenticating the entity, and
performing the policy decisions for authorization?
5. Which persona hosts the web portals used for guest
user authentication?
Chapter 7
Note
If you are using Internet Explorer 10.x, you need to
enable TLS 1.1 and TLS 1.2 and disable SSL 3.0 and TLS
1.0 under Internet Options > Advanced.
In this chapter, you will see how to log in to ISE, take a look
at the organization of the ISE GUI, and learn about the
various policies that are available in Cisco ISE.
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Logging in to ISE
The ISE Admin portal provides easy access to configuration,
reporting, and troubleshooting elements. As a security
policy management platform, it acts as a Swiss Army knife
for network access control, with many menus, configuration
options, and features. Due to its robust capabilities, the
interface can be daunting to navigate for someone new to
ISE. This chapter reviews how to navigate and find the most
important elements.
Initial Login
To log in to Cisco ISE, you need to open a supported web
browser. If you are logging in to a version of ISE that
predates ISE Version 2.4, you need to ensure that the
browser is running a supported version of Adobe Flash, as
described in the ISE Release Notes for that version. If your
web browser does not meet these requirements, your ability
to access or configure the various components of Cisco ISE
may be drastically affected.
Note
To find the minimum browser recommendations for ISE,
check the documentation for the ISE version at
https://www.cisco.com/c/en/us/support/security/identity-
services-engine/products-installation-and-configuration-
guides-list.html.
Note
The use of X.509 certificates with ISE is discussed further
in Chapter 8, “Initial Configuration of Cisco ISE.”
View alarms
Configure
general
settings for
user accounts
(attributes and
password
policy)
Run all
troubleshooting
flows
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Manage
(create, update,
view, and
delete) alarms
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Run all
troubleshooting
flows
PoliCreate Cannot perform any
cy
Ad and
Access Permissions identity management
Restrictions
ad
min manage
Level or system-level
min
Gro policies configuration tasks in
up for all Cisco ISE
Rol Cisco ISE
e services
No guarantee of access
across
to the subordinate links
the
network Read and write in the Access to the
that are permissions on Device Administration
all the work center
related to
authentic elements used
ation, in policies, such
authoriza as
tion, authorization
posture, profiles, NDGs,
profiler, and conditions
and client
provisioni Read and write
ng permissions on
identities,
endpoints, and
identity groups
(user identity
groups and
endpoint
identity groups)
Run all
troubleshooting
flows
Access to
Device
Administration
work center
Permission for
TACACS policy
conditions and
results
Network device
permissions for
TACACS proxy
and proxy
sequences
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Read
permissions on
administrator
account
settings and
admin group
settings
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
View
permissions on
admin access
and data
access
permissions,
along with the
RBAC policy
page
Run all
troubleshooting
flows
Customize,
save, print, and
export reports
Generate
custom report
queries, save,
print, or export
the results
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Save UI
settings for
future
reference
Download logs,
such as ise-psc-
log, from the
Operations >
Troubleshoot >
Download Logs
page
modify the
default system-
generated
RBAC policies
and
permissions. To
do this, you
must create
new RBAC
policies with
the necessary
permissions
based on your
needs and map
these policies
to any admin
group.
Access to
Device
Administration
Work Centers
Permission for
TACACS policy
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
conditions and
results
Network device
permissions for
TACACS proxy
and proxy
sequences and
permission to
enable TACACS
global protocol
settings
Read
permissions on
administrator
account
settings and
administrator
group settings
Read
permissions on
admin access
and data
access
permissions
along with the
RBAC policy
page
View the
authentication
details
Enable or
disable
endpoint
protection
services
Adaptive
Network
Control
Create, edit,
and delete
alarms;
generate and
view reports;
and use Cisco
ISE to
troubleshoot
problems in the
network
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Permission to
enable TACACS
global protocol
settings
Ad Access Permissions Restrictions
min Level
Gro
up
Rol
e
Access to the
external
identity stores
Access to
Operations >
TACACS Live
Logs page
Administration Portal
In addition to the ISE Home dashboard, the ISE Admin portal
provides access to a number of configuration and reporting
tools, as shown in Figure 7-11.
Help Menu
In the top-right corner of the Admin portal, the Help icon
provides a number of useful resources to help you manage
Cisco ISE, as illustrated in Figure 7-13:
Figure 7-13 ISE Help Menu
Settings Menu
The Settings menu at the top of Admin portal provides
information on high-level system settings and help, as
illustrated in Figure 7-15.
Context Visibility
The Context Visibility screen provides prebuilt contextual
dashboards with data on endpoints in ISE. From these
dashboards, you can create custom filters to customize
views further and even export the data. As illustrated in
Figure 7-16, this screen is divided into four main tabs:
Operations
The Operations screen has six main tabs: RADIUS, Threat-
Centric NAC Live Logs, TACACS, Troubleshoot, Adaptive
Network Control, and Reports. The following sections
describe these tabs.
RADIUS
Troubleshoot
The Troubleshoot tab under Operations provides a number
of tools a network administrator can use (see Figure 7-24).
These tools provide several useful functions, including a tool
to search for RADIUS authentications (RADIUS
Authentication Troubleshooting), a diagnostic tool that runs
show commands on any network device (Execute Network
Device Command), a configuration validation tool (Evaluate
Configuration Validator), a tool to find the cause of posture-
check failures (Posture Troubleshooting), an endpoint
debugging tool (Endpoint Debug), a packet capture utility
(TCP Dump), a tool to test policy flow to verify policy
configuration (Session Trace Tests), and various other
TrustSec tools.
Figure 7-24 Troubleshooting Tools
Reports
You use the Reports tab under Operations to generate
reports for ISE functions and sessions. Figure 7-29 shows the
following report categories:
Policy
You use the Policy tab in the ISE GUI to configure policy sets,
profiling, posturing, client provisioning, and policy elements.
Policy Sets
Profiling
ISE has the ability to determine (or at least make a very
educated guess about) what type of endpoint is attempting
to access the network. This process, called profiling, is
accomplished through ISE’s monitoring of protocols sent by
the endpoint onto the network (DHCP, HTTP, and, by proxy,
RADIUS, among a few others). The profiling done by ISE can
sometimes be general in nature (such as identifying just the
vendor or just the device type) or very specific (such as
identifying the endpoint’s vendor, device model, and
function on the network). You can use the Profiling tab to
create custom profiles and to view the existing profiles in
ISE (see Figure 7-32).
Posture
To configure a posture policy in ISE, you need to access the
Posture tab under Policy. Posturing is a mechanism by which
a software supplicant or an agent on an endpoint provides
ISE detailed information about the endpoint’s software and
hardware configuration. The information provided by the
endpoint may include information about the operating
system, antivirus/antispyware/antimalware software, and
current OS patch levels (see Figure 7-33). Depending on the
operating system, other important information can be
gathered from the endpoint as part of the posturing process.
Client Provisioning
In the Client Provisioning tab under Policy, you can configure
how each endpoint type is provisioned to join the network.
The client provisioning policy configures the endpoint
supplicant for BYOD and posturing. This is sometimes be
referred to as onboarding the endpoint. As an endpoint
attempts to onboard onto the network, the appropriate
security credentials (including X.509 certificates and
wireless profiles) will be downloaded onto a BYOD endpoint.
If the endpoint must be postured, the posture client must be
downloaded and installed on the client. After the endpoint is
onboarded, the user of the endpoint can join the network in
the future with minimal manual interaction.
In order to accomplish this client provisioning, ISE must
provide the appropriate information in a manner understood
by the endpoint. Via the client provisioning policy (see
Figure 7-34), based on the OS and other criteria provided by
the endpoint and the NAD, ISE presents the required
credentials (X.509 certificates and wireless profiles) to the
endpoint to store for future use. This might sometimes
require a supplicant built in to the OS or one that is
automatically downloaded from ISE (often a Java or ActiveX-
based supplicant).
Figure 7-34 Client Provisioning Policy
Policy Elements
Administration
The Administration tab in the ISE GUI includes a number of
setup-type functions. These functions are typically set up
one time and rarely modified thereafter. The Administration
section of the ISE GUI includes the tabs System, Identity
Management, Network Resources, Device Portal
Management, pxGrid Services, Feed Service, and Threat
Centric NAC.
System
The System tab under Administration allows an
administrator to configure the following elements, which
affect ISE’s behavior directly:
Deployment: You use the Deployment tab (see Figure
7-36) to configure all ISE nodes. Each node must be
defined and registered in the deployment configuration
on the PAN. As discussed in Chapter 6, each node is
assigned at least one persona. In the Deployment tab,
you can assign at least one persona, role (primary,
secondary, or standalone), and IP address or DNS-
resolvable hostname to each node.
Figure 7-36 ISE Deployment Tab
TrustSec
ISE application
programming
interfaces
Identity Management
Identity management is a key construct in ISE. Nearly every
step in the ISE authentication and authorization processes
requires at least one identity as the subject of the
authentication or authorization operations. The Identity
Management tab under Administration (see Figure 7-45)
allows an administrator to manage all ISE configurations
that pertain to identities. It includes the following tabs:
Network Resources
The Network Resources tab under Administration is where
all external supplementary resources are configured. These
resources include all the network access devices (NADs),
external RADIUS servers, NAC managers, and MDMs. You
can use the following tabs under Network Resources:
Network Devices: Whenever a new NAD—such as a
switch, router, firewall, or wireless LAN controller (WLC)
—is added to a network, it may be necessary to add the
device’s credentials to ISE in order to allow the NAD to
authenticate endpoints to ISE. For each NAD that is
added to the network devices database, additional
information can be provided about the NAD, including
the IP address(es), model name, software version,
device location, and device type. In addition, the
appropriate network services can be configured,
including RADIUS, SNMP, and TrustSec. Without the
requisite protocol being selected and appropriately
configured, the NAD in question will not be able to
access that service on ISE.
Unless it is added to the Network Devices tab (see
Figure 7-50), the only other way for a NAD to use ISE for
AAA is if a default device is configured. Default device is
disabled by default. If it is enabled and configured, ISE
accepts RADIUS requests from all NADs that share the
configured default device RADIUS shared secret.
Figure 7-50 Network Devices Tab
pxGrid Services
Cisco pxGrid is a function of ISE that can be used to share
context-sensitive information from ISE’s session direction
with other systems in the ISE partner ecosystem.
Furthermore, pxGrid integration can be used to trigger
adaptive network control actions to quarantine endpoints in
response to network or security events. To integrate ISE with
a third-party system via pxGrid, ISE and the other system
must form a certificate trust. On the pxGrid Services tab
(see Figure 7-61), you can view the subscribed third-party
pxGrid clients, issue certificates, view Live Log for a pxGrid
event, configure permissions for a pxGrid client, and more.
Feed Service
The Feed Service tab enables periodic updates to ISE’s
Profiler service (see Figure 7-62). The Profiler service makes
it possible for ISE to identify the specifics of endpoints that
are accessing the network. As discussed in Chapter 5,
“Introduction to Advanced Concepts,” ISE profiles endpoints
based on RADIUS attribute/value pairs (such as the MAC
address of the endpoint), DHCP traffic, HTTP traffic, and
other network communications. As endpoint vendors
develop new endpoints, ISE can download the updated
database of the criteria (for example, MAC address, DHCP
parameters) needed to identify the new endpoint.
Work Centers
Work centers logically group together all the pages related
to configuring, monitoring, and reporting for common ISE
functions. There are eight work centers to choose from (see
Figure 7-64):
Figure 7-64 Work Centers
Network Access
Guest Access
TrustSec
BYOD
Profiler
Posture
Device Administration
PassiveID
Types of Policies in ISE
ISE is a policy management platform for wired, wireless, and
remote access endpoints. As each of these endpoints
attempts to access the network, the endpoint, via the NAD,
is exposed to a number of different policies. Each of these
policies serves a purpose in terms of limiting or
appropriately managing the level of access given to the
endpoints. Many of these policies take in the programmatic
construct referred to as an IF-THEN statement.
Authentication
Authentication refers to the ability to identify an endpoint or
the user of an endpoint as it connects to the network. By
determining the identity of the endpoint or user, a network
administrator can make additional decisions about what
level of access should be given to the endpoint or user. We
discuss authentication policy in more detail in Chapter 9.
Authorization
Once ISE has determined the identity of a user or an
endpoint, ISE can use this identity to determine what the
endpoint should be able to access. The granting of—and
even the denial of—access is referred to as authorization.
An authorization policy allows a network administrator to
make a final determination based on any number of criteria,
such as information provided via authentication, by the
endpoint, or by the NAD from which the endpoint is
accessing the network. We discuss authorization policy in
more detail in Chapter 10.
Profiling
Profiling is the ability to determine the type of device that is
accessing the network. It is often accomplished based on
endpoint information provided via the RADIUS exchange
between ISE and the NAD or via other network protocols
that the endpoint leverages as it attempts to join the
network (for example, DHCP, HTTP). We discuss profiling in
more detail in Chapter 14, “Profiling.”
Posture
A posture assessment of an endpoint is an in-depth review
of the security policy, including the operating system status
and supplementary security software (such as antivirus
software, antimalware software, antispyware software, and
OS patches), present on the endpoint. If the endpoint’s
posture does not adhere to the company’s security policy,
the device can be labeled as noncompliant and remediated
as necessary. Posturing is covered in Chapter 18, “Posture
Assessment.”
Client Provisioning
Client provisioning is a process whereby all necessary
credentials and configurations are deployed to an endpoint
—allowing the endpoint to more easily (and maybe even
automatically) join the network in the future. Provisioning is
sometimes referred to as onboarding. The onboarding
process depends on the endpoint’s operating system, the
NAD where the endpoint is joining the network, the method
of access (wired or wireless), and a number of other criteria.
The client provisioning policy provides a decision tree
showing what credentials and configurations are deployed
to the endpoint in these scenarios. Client provisioning is
discussed in greater detail in Chapter 16, “Bring Your Own
Device,” and Chapter 18, “Posture Assessment.”
TrustSec
TrustSec is a security solution in which a Security Group Tag
(SGT) is assigned to an endpoint following authentication.
SGTs are often designed to subdivide and easily distinguish
different user scenarios—for instance, full access versus
partial access, employee versus guest, engineering versus
marketing. Every packet that has the same SGT is given the
same level of access on the network. The NAD inserts the
SGT into each packet sent by the endpoint, allowing each
TrustSec-enabled upstream device to know what group of
users or endpoints was responsible for sending the packet
and to enforce the appropriate security policy.
The TrustSec policy in ISE determines what SGT to assign to
an endpoint based on the user of the endpoint, the type of
endpoint, the method of access (wired versus wireless), and
other criteria that can be determined from the
authentication process. TrustSec is discussed in detail in
Chapter 17, “TrustSec and MACsec.”
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. Name some of the criteria that can be used for a global
endpoint search in ISE.
2. What is important about the Context Visibility
dashboards?
3. How does RADIUS Live Log assist in troubleshooting?
4. What are the three primary elements of a policy?
5. What are the different types of policies in ISE?
Chapter 8
Network Devices 6, 8
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
incorrectly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Note
The distinction between virtual appliances and virtual
machines is important because in a number of escalation
cases, the root of the problem has been misconfiguration
of the VMware virtual machines. Two misconfigurations
are most common:
There are no resource reservations set for the memory
and CPU.
The VM storage is much slower than the physical
drives of the SNS appliance, and delayed writes cause
database corruption.
Ensure that the virtual appliances are always configured
with the correct reservations and storage in place.
Self-Signed Certificates
Note
Before you can join ISE nodes in what is commonly
referred to an ISE cube, each ISE node must trust the
certificate(s) used by the other ISE nodes.
CA-Signed Certificates
aaa.woland.com
psn.woland.com
mydevices.woland.com
sponsor.woland.com
Note
Bear in mind that a certificate is not limited to a single
SAN. If you were to add additional SANs to a certificate,
that same certificate could be used across multiple ISE
nodes, as long as the certificate had a SAN field with that
ISE node’s DNS name.
Keep the PEM file open and open a web browser and
navigate to the certificate authority (for example, http://atw-
cp-ad.ise.local/certsrv, which is the CA that is built in to my
Active Directory in my lab). Figure 8-16 shows the page that
appears. (If you are not using a CA server, a different
process might be required.)
Figure 8-16 Requesting a Certificate
Paste the contents of the PEM file into the form, again
ensuring that there are no extra spaces. Choose the Web
Server certificate template from the dropdown, as shown in
Figure 8-18, and click Submit.
Figure 8-18 Submitting the Certificate Signing Request
Note
Do not download the certificate chain. Cisco recommends
importing all certificates separately instead of using
certificate chains (that is, PKCS files). This is due to the
difference in behavior of the numerous client supplicants
and how those supplicants authenticate the certificate
chains.
Now you can import the CA’s certificate into the ISE trusted
store by navigating to Administration > System >
Certificates > Trusted Certificates in the ISE GUI, as shown
in Figure 8-21.
Note
While an administrator can only assign one certificate for
EAP authentication on ISE, this does not mean that ISE
will only accept EAP authentications using only this
certificate. ISE will accept certificates presented to it for
EAP authentication if ISE trusts the certificate authorities
that issued the certificates. This is how ISE can accept
EAP authentications from certificates issued both by
trusted external CAs and self-signed certificates issued by
ISE’s own internal CA for BYOD devices.
Network Devices
Cisco ISE is a policy server. In industry standard terms, ISE
would be considered a policy administration point (the
admin node) and a policy decision point (the PSN). The
policy enforcement point is the network access device
(NAD). The NAD is the device that applies the access
control to the endpoint.
The NAD—specifically the NAD’s capabilities—is a critical
part of any secure network access strategy. The more
capable the network access devices (switches, wireless
controllers, VPN concentrators), the more flexibility and
power the ISE administrator has to accomplish the business
goals.
Note
It is possible and common to use a comma-separated
values (CSV) file to do bulk imports of NDGs and NADs.
However, these functions are beyond the scope of this
book.
Note
Unlike endpoint identity groups, user identity groups
cannot be nested. This means you cannot create a group
that is a member of another group.
Local Endpoint Groups
Note
An endpoint can exist in one and only one identity group.
However, identity groups can be nested. For example, you
can create an identity group named iPads that is a
member of the Corporate Asset group.
Local Users
Under Administration > Identity Management > Identities,
you can access local users, which are identity stores where
user accounts can be created for use with network logins, as
sponsor accounts for guest users, or to create test accounts
for service probes. While it is possible to use local accounts
for an entire deployment of ISE, it is not very common. The
majority of deployments use an external identity store such
as Active Directory as the “single source of truth” and
leverage locally configured users for administrative
purposes.
For more on identity stores, see Chapter 2.
Active Directory
Microsoft Active Directory is the single most common
external identity store used with ISE deployments. Cisco ISE
joins Active Directory (AD), creates a machine account, and
uses native AD communication to query the identity store
for user accounts and their attributes.
Kpasswd 464 No
Protocol Port (Remote- Authentic Notes
Local) ated
NTP 123 No
Note
It is critical to ensure that good time synchronization is in
place before joining an AD domain. Time synchronization
issues are the number-one reason ISE fails to join an AD
domain.
Note
For the sake of the examples in this book, we’ll retain the
default identity store name ad1 and reference this value
in future chapters as we define the ISE policy.
Although the Connection tab shown in Figure 8-31 displays
only a single ISE node, the screen displays the status of all
ISE nodes in the ISE cube related to the AD connection(s). In
other words, if the ISE deployment (or ISE cube) had 34
nodes in it, this tab displays all 34 nodes and the current
status of each node’s connection to the configured Active
Directory domain. This is necessary because every ISE node
joins the Active Directory domain independently of the other
nodes, although the entire configuration is handled from this
centralized GUI.
Choose the ISE node(s) and click the Join button on the
screen shown in Figure 8-31; a dialog box pops up for the
username and password of an account with the correct
rights and permissions to join the machine to AD (see Figure
8-32). Enter the correct username and password and click
OK.
Figure 8-33 shows the Connection tab after the ISE node has
been joined to the domain.
Figure 8-33 Active Directory > Connection Tab (After the
Domain Join)
Now, when you are building a policy that will use AD group
membership as a condition, you are presented with this list
of groups instead of having to sort through the list of all AD
groups. Figure 8-35 shows such a selection of groups.
Figure 8-35 Selected Active Directory Groups
The Connection tab provides two tools you can use to test
an AD connection: Test User and Diagnostic Tool (see Figure
8-38). ISE administrators as well as Cisco TAC commonly use
these tools in determining the root cause of an issue with
the Active Directory communication. Figure 8-39 shows the
output of the test results using the katmcnam user. Figure 8-
40 shows the options for the Active Directory Diagnostic
Tool.
Note
It’s important to note that Active Directory may be used
for authentication as well as authorization. However, it is
very common to use Active Directory for the authorization
operation only and to use another source for the
authentication operation.
Figure 8-44 shows the second part of the ISS, where you
configure the action to take if a selected identity store
cannot be accessed. The ISS can terminate the lookups and
trigger a process error, or it can act as if the user was not
found and continue to the next identity store in the
sequence.
Figure 8-44 All Identity Stores ISS, Part 2
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. When initially setting up ISE at the command line, what
key fields are required to finish installing ISE?
2. What are some of the attributes that a SAN field can
include?
3. What are the advantages and disadvantages of using a
wildcard certificate?
4. What is the primary use case for network device
groups?
5. If an attempt to join an Active Directory domain fails
initially, what are the three things to check first when
troubleshooting?
Chapter 9
Authentication Policies
Authentication Policy 3
More on MAB 1, 8
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Authentication Policy
Authentication policies are the first opportunity for Cisco ISE
to interact with the RADIUS Access-Request coming from a
network access device (NAD). The main goal of an
authentication policy is to process the authentication
request quickly so it can be dropped if invalid, denied
immediately if the credentials are incorrect, or forwarded to
be run through the authorization policies if successful. In
addition, authentication policies have a few other goals:
Allowed Protocols
After conditions are matched in a top-level rule, the rule
then dictates what authentication protocols are permitted
for that policy set. The Default Network Access list of
allowed protocols has almost every supported
authentication protocol selected. You can also create a more
restrictive allowed protocols list and use a different one in
each policy set if you wish to do so.
To examine the default allowed protocols, take the following
steps in the ISE GUI:
Step 1. Navigate to Policy > Policy Elements >
Results > Authentication > Allowed Protocols.
Step 2. Select Default Network Access.
Conditions
The conditions of the MAB rule shown in Figure 9-6 state
that if the authentication request is Wired_MAB or
Wireless_MAB, it will match this rule. Wired_MAB and
Wireless_MAB are predefined smart conditions that contain
one or more specific conditions and can be reused across
different policies and rules.
To see more details, you can click on a condition displayed
in the rule. When you do, the Conditions Studio opens (see
Figure 9-7). The Conditions Studio, which was introduced in
ISE Version 2.3, gives an ISE administrator a workspace to
configure and edit simple and complex policies and save
them for reuse in the library.
Figure 9-7 Conditions Studio
Identity Store
After matching the conditions in the rule, an authentication
request is then authenticated against the chosen identity
store or, in the case of MAB, compared to the internal
endpoints database (the list of MAC addresses stored locally
on ISE).
If the MAC address is known (that is, present in the provided
endpoints database), it is considered to be a successful
MAB. (Notice that we did not say that it is considered a
successful authentication.) MAC Authentication Bypass does
what its name says: It bypasses authentication and it is not
considered a secure authentication on its own.
The selected identity source may be an identity source
sequence (ISS), which tries a series of identity stores, in
order. This is discussed in more detail in Chapter 20, “ISE
Scale and High Availability.”
Options
Every authentication rule has a set of options that is stored
with the identity store selection. These options tell ISE what
to do if an authentication fails, if the user/device is
unknown, or if the process fails. Figure 9-10 shows the
different options available.
Figure 9-10 Identity Store Options
More on MAB
Something that is often not understood, especially when
looking to mix access device vendors, is MAC Authentication
Bypass (MAB). There is no standard for MAB. Different
vendors implement MAB in different ways. Ultimately, the
goal of MAB is to allow the supplicant in the switch to run an
authentication request for the endpoint because the
endpoint obviously must not have a supplicant.
Some vendors send a RADIUS message with Service-Type
set to Login, and some send a RADIUS message with
Service-Type set to Framed. Cisco uses the Service-Type
setting Call-Check for MAB. Why would Cisco use Call-Check
if no other vendor does? Why does Cisco do MAB differently
than everyone else? The quick answer is for security.
Many years ago, before Cisco released Cisco ISE or the Cisco
ACS 5.x server, there was a possible security vulnerability
with MAB. That security vulnerability is still possible with
other solutions and other network devices. The issue was/is
the lack of differentiation between a MAB request and a
Local Web Authentication request. Both requests come from
the network device with the same Service-Type setting and
the same format. There was no database separation of user
IDs from endpoint IDs (that is, MAC addresses). As shown in
Figure 9-23, a malicious user could enter a MAC address into
the username and password fields for Web Authentication or
maybe even into the endpoint supplicant and gain access to
the network.
Figure 9-23 Web Authentication with MAC Address
Instead of Username
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is authentication?
2. What is authorization?
3. What are the goals of an authentication policy?
4. What are policy sets?
5. How do Cisco NADs do MAB differently than other
vendors’ NADs?
Chapter 10
Authorization Policies
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Authorization Policies
After an endpoint has been successfully authenticated, the
authenticated process is passed to the authorization policy,
which determines the final access results.
Note
Notice that there is one more category under
Authorization: Downloadable ACLs. We talk more about
downloadable ACLs (dACLs) later in this chapter.
Note
We look at only some of these common tasks in this book
as some of them are beyond the scope of the
Implementing and Configuring Cisco Identity Services
Engine SISE 300-715 exam.
Note in Figure 10-3 that you can use the DACL Name
dropdown to select a dACL that was created and
stored in ISE. The Voice Domain Permission
checkbox is required for the switch to permit the
phone into the voice VLAN on the switch.
Step 6. Notice in the Attributes Details section that this
authorization result will send a RADIUS Access-
Accept message, a dACL that permits all traffic, and
the voice domain vendor-specific attribute (VSA) to
permit the phone to join the voice VLAN.
Note
If these are devices that will be on wireless instead of
wired, you would configure an ACL on the wireless
controller and specify the name of the Airespace ACL in
the Authorization Profile instead.
Now, you can create the authorization rule that will use the
authorization profile you just created. Follow these steps in
the ISE GUI:
Step 1. Navigate to Policy > Policy Sets.
Step 2. Expand the Wired Access policy set.
Step 3. Expand the authorization policy.
Step 4. Click on the cog next to the Employee
SmartDevices rule and choose Insert New Row
Below.
Step 5. Name the rule Employee Limited.
Step 6. Click the + sign to open the Conditions Studio.
Step 7. Select AD1 > External Groups Equals
“Employees” (or another AD group of your
choosing) as the condition.
Step 8. Select Employee Limited from the dropdown for
the authorization profile.
Step 9. Click Save.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What are the goals of an authorization policy?
2. What kind of conditions can be added to an
authorization policy?
3. What is the basic logic of an authorization policy?
4. Does authentication make a network segmented and
secure?
5. What is the goal in using hierarchical compound
conditions?
Part III: Implementing
Secure Network Access
Chapter 11
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Authentication Configuration on
Wired Switches
With Cisco switches, numerous configuration sections must
be completed. Some aspects must be configured from
global configuration mode, and others are configured at the
individual interfaces. An authentication subsystem must be
enabled across an entire switch (global configuration), and
there are interface configurations that must be entered for
authentication settings (for timers, enabling 802.1X
communication, and more).
IOS 12.2.x
Cisco switches provide a proactive method to check the
availability of the RADIUS server. If this option is configured,
the switch sends periodic test authentication messages to
the RADIUS server (ISE). The switch is simply looking for a
RADIUS response from the server. A success message is not
necessary; a failed authentication suffices because that
failed authentication response confirms that the server is
alive.
If you want to receive an Access-Accept response, the
username that is configured on the switch needs to already
exist in either ISE or another identity store. This is an
optional step if log filtering is not enabled. You might
consider this step if you want to reduce the number of failed
authentications in ISE logs. Because the RADIUS test
continuously runs, it may show a large number of logged
failed authentications. This account will be used in a later
step, where you define the RADIUS server. You may also
configure log filtering as well to reduce the amount of failed
authentications from the configured test authentication on
the switch if you do not wish to create an account in ISE or
another identity store for this purpose.
To configure the RADIUS server for a Cisco switch using IOS
Version 12.2, follow these steps:
Step 1. In global configuration mode, add a username and
password for the RADIUS keepalive by entering the
following command:
Note
If you are using a Cisco 3850, 3650, 9300, 9500, or 5760
Series switch, the network access device sends its
Calling-Station-Id in the format of xxxx.xxxx.xxxx by
default, instead of xx-xx-xx-xx-xx-xx. You can optionally
change this with the radius-server attribute 31 mac
format global configuration command.
Note
In later versions of IOS 15.x and IOS XE, the VSAs are
configured to send to the RADIUS server by default. In this
case, these commands may not appear in the normal
running configuration after step 3. Certain default
configurations are hidden in the normal show running-
config output. In order to verify that VSAs are being sent
to the RADIUS server, issue the show running-config all
| inc radius-server command.
Note
In IOS Version 15.x, this command is enabled by default
and may be seen in the output of show running-config
all | inc ip device tracking.
Note
The details of these ACLs and why they are created this
way are discussed in future chapters for configuring web
authentication and deployment phasing.
Note
With FlexAuth, you can toggle whether dot1x or MAB has
the higher priority. The best practice is to always prefer
the stronger authentication method, which is dot1x. The
dot1x method is also the default on all Catalyst Cisco
switches.
Note
With certain deployment methods, where MAB should
occur before 802.1X authentication (for example, in an
environment where the majority of devices are non-
authenticating or where EasyConnect is being used to
authenticate the user). For these environments, FlexAuth
allows for a network administrator to set a user-definable
authentication order. However, the best practice is to
maintain the order dot1x and then MAB. Keep in mind
that if the order were to be MAB followed by dot1x with
the priority being dot1x followed by MAB, any 802.1X
communication would stop the MAB and immediately
switch to an 802.1X transaction. The configured order on
a switch port simply tells the switch port which
authentication method to attempt first. However, the
priority tells the network access device which
authentication method to prefer over others if it takes
place on the switch port. This is an important difference
to understand.
Note
If a switch makes a local decision, such as assigning a
VLAN instead of denying access, the switch no longer
accepts CoA commands from the RADIUS server. Think
about it this way: ISE now thinks that the switch port is
down, but the switch has actually permitted the endpoint
to have access to the guest VLAN, so the state is now
“out of sync.”
Note
Using Port Security to limit the number of MAC
addresses allowed on a port is not compatible with
802.1X because 802.1X handles this function natively.
Note
This chapter assumes that you have established basic
connectivity with the NAD and are now to the point of
bootstrapping the WLC for use with ISE. Some
configuration in this section is globally applicable,
meaning it applies to the entire system, and other
configuration is per wireless LAN (per SSID).
Repeat these steps for each PSN that you need to add.
Notice that these ACL names are the same as the names of
the Cisco switches. This is not required, but this naming
convention ensures consistency where possible.
General Tab
You use the General tab to enable or disable a WLAN and
select the default interface. You can assign the correct VLAN
or VLAN group for the SSID, the name of the SSID, and the
SSID number.
Select the General tab and follow these steps:
Step 1. If you are ready to put the current SSID in an
operative state, ensure that the Enabled checkbox
is selected.
Step 2. From the Interface/Interface Group (G) dropdown,
choose the previously created guest interface.
Note
Starting in WLC Version 8, Cisco aimed to simplify the ISE
configuration on a WLAN. Starting in this version, there is
an Apply Cisco ISE Default Settings option that can be
enabled on the AAA Servers tab of the WLAN settings. If
this option is enabled, the following settings are applied:
Note
For WLC Versions 7.6 and earlier, the recommendation
was to disable interim updates. However, for Version 8.0
and later, interim updates should be enabled with an
interval of 0 seconds. This way, an accounting update is
sent only when the client IP address changes and does
not impact Device Sensor updates.
Advanced Tab
In order to allow ISE to override the assigned VLAN or
interface or even to assign an ACL, the Allow AAA Override
setting must be enabled.
Select the Advanced tab and follow these steps:
Step 1. Set Allow AAA Override to Enable.
Step 2. Set DHCP Addr. Assignment to Required. The
WLC has built-in capabilities for the profiling
endpoints and sending that profiling data to ISE. The
DHCP Addr. Assignment checkbox needs to be
enabled for the DHCP Device Sensor built in to the
WLC to function correctly.
Step 3. Change the NAC State to ISE NAC. This setting is
critical to allow for URL redirection, Centralized Web
Authentication, posture assessment, native
supplicant provisioning, and more. This is a critical
setting for the interaction of ISE with the WLC.
Note
Older versions of WLC code may display “RADIUS NAC”
instead.
General Tab
You use the General tab to enable or disable a WLAN and
select the default interface. You can assign the correct VLAN
or VLAN group for the SSID, the name of the SSID, and the
SSID number.
Select the General tab and follow these steps:
Step 1. If you are ready to put the current SSID into an
operative state, ensure that the Enable checkbox is
selected.
Step 2. From the Interface/Interface Group (G) dropdown,
choose the employee interface that you created
earlier.
Advanced Tab
In order to allow ISE to override the assigned VLAN or
interface or even to assign an ACL, the Allow AAA Override
setting must be enabled.
Select the Advanced tab and follow these steps:
Step 1. Set Allow AAA Override to Enable.
Step 2. Set DHCP Addr. Assignment to Required. The
WLC has built-in capabilities for the profiling
endpoints and sending that profiling data to ISE. The
DHCP Addr. Assignment checkbox needs to be
enabled for the DHCP Device Sensor built in to the
WLC to function correctly.
Step 3. Change the NAC State to ISE NAC. This setting is
critical to allow for URL redirection, Centralized Web
Authentication, posture assessment, native
supplicant provisioning, and more. This is a critical
setting for the interaction of ISE with the WLC.
Step 4. Scroll down and select DHCP Profiling and HTTP
Profiling. (We will revisit this in Chapter 14, which
covers endpoint profiling in detail.)
Step 5. Click Apply.
Step 6. Save the configuration.
port 1813
Quarantined: No
time 247795ms
Transaction: success 29, failure 0
time 0ms
time 16ms
average: 0
CAT9300#
radius
CAT9300#
Interface: GigabitEthernet1/0/2
IP Address: 10.1.10.50
User-Name: 00-50-56-87-00-04
Handle: 0xA9000012
Method State
Current Clients
From the Cisco Wireless LAN Controller GUI, navigate to
Monitor > Clients, as shown in Figure 11-31.
Debug Client
Cisco Wireless LAN Controller provides a few very useful
debug commands, including debug dot1x and debug
client <mac-address>. debug dot1x can be a bit
overwhelming on a live network, but the debug client
command shows only events related to a specific endpoint.
Example 11-4 shows an example of the debug client
command.
Live Sessions
To view Live Sessions, navigate to Operations > RADIUS >
Live Sessions. Live Sessions displays a correlated view of all
activity related to an authentication session. To see more
detail about a specific live session, click on the initiated
time of the session, as shown in Figure 11-35. If an endpoint
changes state, that change is listed in this view.
Looking Forward
While this chapter has covered the required configurations
for switches and wireless controllers to perform 802.1X and
MAB authentications successfully with ISE, these NADs are
responsible for much more than just basic authentication
and authorization. Local ACLs need to be deployed to define
what traffic should be redirected for all use cases, possibly
configuring SGT Exchange Protocol (SXP) and other specific
items. Those specific NAD configurations are covered in
Chapters 12, “Web Authentication,” 13, “Guest Services,”
16, “Bring Your Own Device,” and 17, “TrustSec and
MACsec.”
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What function do the global AAA configurations serve?
2. What do RADIUS server attributes 6, 8, and 25 provide
to ISE?
3. What problem did FlexAuth solve in ISE deployments?
4. What different host modes are available?
5. What is the essential command needed to turn on
authentication on a switch port?
Chapter 12
Web Authentication
Note
This chapter was written based on the assumption that
the switches and WLCs have been configured as
described in Chapter 11, “Implement Wired and Wireless
Authentication.” If you have not already configured your
network devices for authentication, none of the
configuration in this chapter will work, and you should
revisit Chapter 11.
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Note
It is important not to confuse the term WebAuth with the
term WebAuthN. WebAuthN refers to a new Internet
standard for Web Authentication and the use of Web
Authentication pages in combination with authentication
protocols such as FIDO2 with tokens like YubiKeys,
Windows Hello, and Apple’s Touch ID. These topics are
beyond the scope of the SISE 300-715 exam and,
therefore, this book.
Note
For more details on LWA, see Chapter 4.
Note
Cisco IOS does not allow for certificates or even self-
generated keys to be created and installed until a DNS
domain name is defined on the device.
Note
As stated in the introduction to this chapter, you are
expected to have already configured the WLC according
to the directions in Chapter 11. In Chapter 11, you should
have created an “open” WLAN with MAC filtering enabled
and the NAC state configured for ISE NAC. In addition, you
created an access list named ACL-WEBAUTH-REDIRECT.
Step 2. Click this access list and ensure that the entries
for your environment are there, as shown in Figure
12-7.
Figure 12-7 ACL-WEBAUTH-REDIRECT Contents
Note
Beginning with ISE Version 2.0, ISE contains “smart
default” policies. These are preconfigured policies that
help customers deploy things like CWA, BYOD, and
posture. Due to a communication error between the
software developers and Aaron Woland (the man who
drove the idea behind smart defaults), those smart
defaults include using an ACL named
ACL_WEBAUTH_REDIRECT. Notice the underscore instead
of the dash. This section does not use the prebuilt rules
but shows how to create new rules.
You can leverage these prebuilt rules, but how would that
help you learn and prepare for the SISE 300-715 exam?
Instead of leveraging those prebuilt rules, which could
shorten your configuration time dramatically, in the
following sections you will see how to build your own rules.
Create the Rule to Redirect Users to the CWA
Portal
The first rule to create is one that redirects unauthenticated
users to the CWA portal, where they are required to
authenticate interactively.
In the ISE GUI, follow these steps:
Step 1. Navigate to Work Centers > Network Access
> Policy Sets.
Step 2. Drill down into your default policy set (or the
policy set that is in use for your deployment at this
time).
Step 3. Insert a new rule above the
Basic_Authenticated_Access rule and name the new
rule WebAuth, as shown in Figure 12-15.
Note
It is impossible to stress enough times that you should
not leverage VLAN assignment with CWA. The authors of
this book have met with countless customers who have
deployed ISE and have helped many of them deal with
exactly that problem.
Interface: GigabitEthernet1/0/1
IP Address: 10.1.10.51
User-Name: 00-50-56-A1-1E-3A
Domain: DATA
ise243.securitydemo.net:8443/portal/
gateway?sessionId=C0A8FE0100000271FEF432A8&portal=50fbc805-6bde-
4e28-8a3e-17750f9385
38&action=cwa&token=b296cdf51b7985efc8adace571ce4c29
Session timeout: N/A
Method State
Example 12-2 shows the command and its output for the
endpoint after the user has successfully completed the Web
Authentication.
Interface: GigabitEthernet1/0/1
IP Address: 10.1.10.51
User-Name: [email protected]
SGT: 0004-00
Handle: 0xBF000272
Method State
Key Description P
Topic a
Elemen g
t e
Key Description P
Topic a
Elemen g
t e
Paragrap Segmentation 3
h 2
1
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the final state of a client connected to a Cisco
wireless LAN controller?
2. What capability in a Cisco NAD enables the client to be
sent to a Web Authentication portal?
3. What authentication method is displayed on a switch
for a user who has successfully authenticated via CWA?
4. Where is the URL-Redirect ACL created?
5. What is different about URL redirection when comparing
how a switch uses ACLs to how a WLC uses ACLs?
Chapter 13
Guest Services
Note
This chapter was written based on the assumption that
the switches and WLCs have been configured as
described in Chapter 11, “Implement Wired and Wireless
Authentication.” If you have not already configured your
network devices for authentication, none of the
configurations in this chapter will work, and you should
revisit Chapter 11.
Sponsors 6–8
SAML Authentication 10
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
The next identity type as we move from the top down in the
left-hand navigation pane is the network access users.
These users are not leveraged very often with ISE
deployments, except with service accounts or for device
administration. You might think that this is where you would
find guest users when those accounts get provisioned, but
that is not the case. There is an identity store for guest
users, but it is separate from this internal identity store.
The next identity type in the left-hand navigation pane is
identity source sequence (ISS) identities. By examining the
ISSs, you can determine whether there is an identity store
for those guest user accounts. Figure 13-3 shows a list of
preconfigured ISSs, and Figure 13-4 shows the details of the
ISS that you used in Chapter 12, “Web Authentication,”
when you configured Centralized Web Authentication.
Guest Types
There are different types of guest accounts for different
needs. From a security perspective, businesses typically
want guest accounts to expire so they no longer need to be
maintained and so there is no concern about usernames and
passwords being shared around.
The primary difference between guest types is in how long
the accounts are permitted to be active. Default guest types
help ISE customers by providing templates, based on the
most popular needs from Cisco’s customer research, but
every setting is configurable. Different guest types have
different settings for how many simultaneous logins may be
used, the number of endpoints each guest may register with
ISE, and the messaging to use with the guest-related
account creation and renewal.
The authors of this book have worked with countless
organizations around the world, and while each organization
is unique, organizations across the board have many similar
needs. Let’s look at an example of a common practice that
requires more than one guest type. Say that any employee
is authorized to invite a guest and provide Internet access
for a short amount of time, but a manager or director must
provide access for any time period longer than a few days or
a week.
Figure 13-8 shows the Portals & Components > Guest Types
page, which includes four built-in types of guest accounts.
Figure 13-8 Guest Types
The following sections dive into the default guest types that
ISE provides out of the box.
Contractor
The contractor type of guest account is designed to be
active for long periods of time—up to a year. This type of
account is for a non-employee who is acting like an
employee, such as an onsite software developer. Such a
person is not an employee and so wouldn’t get an account
in the HR system or the Active Directory identity store.
To edit the contractor guest type, navigate to Work Centers
> Guest Access > Portals & Components > Guest Types, as
shown in Figure 13-9.
Figure 13-9 Contractor Guest Type, Part 1
Daily
A daily guest account expires after only a few days. This
type of guest account can typically be created by any
employee of the company. You can examine this guest type
by navigating to Work Centers > Guest Access > Portals &
Components > Guest Types and selecting Daily (default).
Keep in mind that these guest types are the preconfigured
default types for the most common use cases, based on
customer research. The only differences in the account
types are the preconfigured default settings. If you wanted
to and had the proper permissions, you could set the daily
account type to last 365 days.
The key difference between the preconfigured contractor
guest type and the preconfigured daily guest type is the
maximum access time. Daily accounts default to a one-day
lifetime, with five days as the maximum setting. Again, you
can change this if you choose to.
Figure 13-12 highlights the Maximum Access Time and Login
Options sections for the daily guest type.
Weekly
The preconfigured weekly guest type expires within a
maximum of a few weeks. You can examine this guest type
by navigating to Work Centers > Guest Access > Portals &
Components > Guest Types and then choosing Weekly
(default).
The only difference between the preconfigured daily guest
type and the preconfigured weekly guest type is the
maximum access time. Daily accounts default to a 1-day
lifetime, with 5-days as the maximum setting, while weekly
accounts default to a 5-day lifetime (1 business week), with
14-days as the maximum setting for a sponsor to grant
access.
Figure 13-13 shows the Maximum Access Time section for
the weekly guest type.
Social
Social login guest types are special. These logins do not
require a sponsor to preconfigure or approve account
creation. These accounts are ultimately mere copies of a
social network identity, such as a Facebook identity.
You might want to enable use of social login to ensure that
guests are real persons and to have some trackability and
accountability for the actions the guests perform while
attached to the network. Another use case for social login is
for marketing and lead tracking—to be able to run reports
on the types of users who have been connecting to the
guest network and maybe even to track them as sales
leads.
Within ISE, the social guest type is a copy of the daily guest
type. It has a five-day maximum lifetime, with a default of
one day. The difference between a daily guest and a social
guest is the lack of assigned sponsor groups for social login;
a social login does not require sponsorship from an
employee.
Figure 13-14 shows the Sponsor Groups section for the
social guest type. Notice that it is empty.
If you want to use all three portal types, how can you
differentiate the access requests so you know which portal
to direct each user to if you don’t know the user’s identity
yet? One method that is commonly leveraged is to use a
different SSID for each of the different guest types that your
organization needs to deploy. Keep in mind, though, that not
every portal type is appropriate for every installation. As a
designer of an ISE deployment, you should determine the
needs of the organization in terms of Internet access for
non-employees and deploy the appropriate solution.
Another consideration—and a recommendation from the
authors of this book—is to use the guest endpoint identity
group(s) for authorization rules to help prevent guest users
from being redirected to login portals every time they roam
to a different WLC or come back in to the office again. To
understand this recommendation, let’s look at the common
Wi-Fi experience of being a guest in a hotel:
Day 1: Check in to the front desk.
The hotel employee checks your ID to ensure that you
are the individual who signed up for the room and issues
physical keys that permit you to enter your assigned
room.
Along with the keys, the employee also provides you
with instructions for accessing the Wi-Fi.
Note
While it is true that different hotel chains—and even
individual hotels—have different experiences, this
example use case is still widely prevalent. If you work in
or own a hotel with a better experience than described in
this section, our example is not meant to offend.
Portal Settings
In the Portals & Page Settings section, expand the Portal
Settings section, as shown in Figure 13-18. In this section
you can see where the portal is assigned a port and where
interfaces are selected.
Figure 13-18 Hotspot Portal Configuration > Portal
Settings, Part 1
GigabitEthernet 3
When you configure the NIC bonding feature, Cisco ISE pairs
fixed physical NICs to form bonded NICs. Table 13-2 shows
which NICs can be bonded together to form a bonded
interface. Figure 13-18 also shows the same information in a
prettier form.
Much the way the guest user interface greatly simplifies the
myriad possible interface combinations, the user interface
greatly simplifies the myriad certificate possibilities.
The ISE PSN hosts all web pages securely, which means a
certificate is required to provide the secure HTTPS
connection. Each PSN can have its own certificate. Actually,
each PSN can have many different certificates.
In order to simplify this greatly, the concept of a portal
group tag was added in ISE Version 1.3, along with a new
guest portal structure. Every guest portal must be assigned
to a portal certificate group tag, as shown in Figure 13-19.
The certificate portal group tags are not created within the
portal. They are created when you add a new certificate or
configure certificate usage, in the System Certificates
section of the ISE UI. Any certificate that has the usage type
portal assigned must be part of a portal group tag, as shown
in Figure 13-20.
Figure 13-20 Certificate Usage Settings
If you click the Settings tab at the top of the mobile preview
that is called out in Figure 13-29, you can view what is
available, as shown in Figure 13-31.
Figure 13-31 Acceptable Use Policy Settings
You could create a new policy set just for the Hotspot SSID if
you wanted. However, for simplicity, here you can create an
authorization rule above the CWA rules created in Chapter
12 so that traffic from the ISE-Hotspot SSID receives the
Hotspot CWA authorization profile. Follow these steps in the
ISE GUI:
Step 1. Navigate to Work Centers > Guest Access >
Policy Elements > Policy Sets.
Step 2. Select the policy set that you will be working with.
Step 3. Insert a new authorization rule above the
Employee_CWA rule and name it Hotspot CWA.
Step 4. Ensure that the conditions of the new rule include
Wireless_MAB.
Step 5. Add the condition Radius Called-station-id
CONTAINS ISE-Hotspot.
Step 6. In the Authorization Profile column, select the
Hotspot CWA profile.
Step 7. Duplicate the new rule above the Hotspot CWA
rule.
Step 8. Name the new rule Guest Endpoints - Hotspot.
Step 9. Include an additional condition for Identity
Group Name EQUALS Endpoint Identity
Groups:Guest Endpoints.
Step 10. Select Internet-Only for the authorization
profile.
Step 11. Save the policy set.
Figure 13-37 shows the new authorization rules in the policy
set.
Much as for the rules you created in Chapter 12, the order of
these rules is very important. Once a user clicks to accept
the AUP, the MAC address of the guest’s endpoint is added
to the Guest Endpoints identity group. The top rule permits
access to the Internet for members of that group coming
from the ISE-Hotspot wireless network. If a user is coming
from the ISE-Hotspot wireless network and the endpoint is
not already in the Guest Endpoints group, the user gets
redirected to the hotspot portal.
Figure 13-38 is a flowchart that explains this flow
graphically, and Figure 13-39 shows the live log, where the
number 1 shows the endpoint being sent through the
hotspot first, and the number 2 indicates the result of the
user typing in the CiscoRocks access code and accepting the
AUP.
Now that you have all the background you need, it’s time to
move on to configuration.
Portal Settings
Let’s look at the different settings in the Portal Settings
section. Follow these steps in the ISE UI:
Step 1. Navigate to Work Centers > Guest Access >
Portals & Components > Guest Portals.
Step 2. Select Edit Self-Registered Guest Portal.
Step 3. Expand Portal Settings.
The login page is one of the main pages for the self-
registered guest type. It contains an AUP, and you can also
add an access code to add one more level of control. You
have a configurable option to slow down or prevent brute-
force hacking so that after five failed login attempts, ISE
limits logins to have a two-minute waiting period between
attempts.
Allowing guests to create their own accounts is the main
purpose of a self-registered guest portal, so naturally that
setting is checked by default. Guests may also request a
password reset in case they lose their credentials.
Just because guests can create their own accounts does not
mean that your organization will want them to set their own
passwords. Those passwords are automatically generated
by ISE, based on the password policy you configure.
Allowing a guest to change the password to something more
memorable can provide for a better overall experience, but
that might not work with the security practices in your
organization.
Social login can be enabled on a self-registered guest portal
even though it is not a social login guest portal. This is an
option of convenience to offer the visitor a choice: Either
create your own account by providing your email address or
provide us with your social media identity. Either one is
acceptable, but you must pick one to gain access. You must
have a social login identity store configured to use the social
login option.
Security Assertion Markup Language (SAML) is another
option for this portal type, if you have the SAML identity
provider (IdP) configured already. This option allows this
login portal to participate in a single sign-on (SSO)
ecosystem.
Social and SAML identity sources are configured later in this
chapter.
In this portion of the settings, you assign the guest type for
users who register through this portal. The default type is
daily, and these accounts are valid for one day with a
maximum of five days. You can also specify an access code,
and this setting can be accessed in multiple areas.
There are multiple fields to include in the registration form,
and these fields are pulled from the guest type. If you have
custom fields for a guest, they are included in the list. As an
administrator, you can determine which of these fields are
required and which are optional.
Figure 13-45 shows the guest location setting for the
portal. You can use this setting to indicate which time zones
are available for a guest to select when creating a guest
account.
BYOD Settings
BYOD settings are for employees, not guests. As shown in
Figure 13-51, enabling these settings allows employees to
register their own devices and obtain Internet access
through the network. You will learn more about BYOD in
Chapter 16, “Bring Your Own Device.”
Figure 13-51 Self-Registered Guest Portal – BYOD
Settings
Figure 13-61 shows the portal again, but this time the user
is able to log in with the newly created credentials.
The good news is that there are no more portal settings for
the sponsored guest portal that you have not already
examined in this chapter, so we do not have to dive into any
more portal settings. Figure 13-66 illustrates the portal
settings for sponsored and self-registered guest portals.
Figure 13-66 Comparison of Sponsored and Self-
Registered Guest Portal Settings
Sponsors
A sponsor is an employee who introduces and, ultimately,
takes responsibility for a guest. The term responsibility in
this instance means the employee acts as the point person
during an incident response or an HR-related investigation
involving the guest user.
Sponsor Groups
It is possible to have different sponsor groups, with each
one designed to manage a different set of guest users.
Figure 13-67 shows the three default sponsor groups:
Sponsor Portals
Just as ISE offers portals for guests, it offers sponsor portals.
These portals are the series of web pages that a sponsor
can access to generate, approve, and manage guest
accounts. Unlike the guest portals, there is only one sponsor
portal created by default. With guest portals, the portal type
itself can dictate much of the allowed content and the flows
within the portal. With sponsor portals, the sponsor group
dictates all the settings.
You can take a look at the default sponsor portal by
navigating to Work Centers > Guest Access > Portals &
Components > Sponsor Portals > Sponsor Portal (default),
as shown in Figure 13-71.
Figure 13-71 Sponsor Portals
Portal Settings
It is not the ISE administrator or IT expert who normally logs
in to the sponsor portals. Rather, employees of the
organization are the end users.
The sponsor portal settings are very similar to the guest
portal settings, as you can see in Figure 13-73. A port must
be specified, and TCP port 8445 is the default port. Interface
selection and bonded interface choices are exactly the same
as for the guest portals. Because this portal will be accessed
by end users, the same guidance around using a publicly
signed certificate holds true.
Figure 13-73 Editing a Sponsor Portal
Notification Services
When you enable guests to create accounts, the guests
need to be able to learn what their credentials are. That is
where the SMTP and SMS gateway settings under the
Administration menu come in to play.
SMTP Servers
To send a guest credentials via email, you must configure an
SMTP server under Work Centers > Guest Access >
Administration > SMTP Server, as shown in Figure 13-76.
Figure 13-76 SMTP Server Settings
From the main page, you can select the guest type to
create, or you can click the menu icon in the upper-right
corner. Figure 13-83 shows the menu, and Figure 13-84
shows the screen for creating a new contractor guest
account.
SAML Authentication
Now that you understand guests and sponsors, we are going
to backtrack to the Ext Id Sources tab of the Guest Access
work center and configure a SAML ID provider.
Security Assertion Markup Language (SAML) is an XML-
based open standard for authentication and authorization
that can be leveraged for web-enabled SSO.
Some noteworthy definitions go along with SAML:
Note
Before you can add a SAML IdP, you must first trust that
IdP’s certificate. From the ISE UI, navigate to
Administration > System > Certificates > Trusted
Certificates > Import.
Step 10. Click Save and ensure you are saving the
configuration in your IdP as well.
Call to Action
Guest access is a very common reason to deploy ISE. It is
one of the premier tasks asked of an implementor of ISE.
The authors of this book have seen many terrific
deployments that are nearly perfect; however, they have
also seen a few deployments that did not provide good end-
user experiences because the implementors were clearly
not very well versed on guest access capabilities, flows, and
customizations.
As you are studying not only to pass the SISE 300-715 exam
but also to gain a complete understanding of how ISE works
in order to deploy it in production, play around! Don’t stop
with what is covered in this chapter only but continue to try
different things.
Exam Preparation Tasks
As mentioned in the section “How to Use This Book” in the
Introduction, you have a couple of choices for exam
preparation: the exercises here, Chapter 27, “Final
Preparation,” and the exam simulation questions in the
Pearson Test Prep software online.
Paragraph Certificates 34
0
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. Why would a company choose to use SAML
authentication for a guest portal?
2. What is the purpose of having different guest types?
3. Why does a hotspot portal not include a username or
password field?
4. How do visitors get redirected back to the hotspot
portal after their time has expired?
5. What is the difference between a self-registered guest
portal and a sponsored guest portal?
Chapter 14
Profiling
ISE Profiler 1, 3, 4, 8, 9
Profiling Policies 5, 6, 10
Verify Profiling 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
ISE Profiler
Cisco ISE Profiler is the component of the Cisco ISE
platform that is responsible for endpoint detection and
classification. It uses a probe or series of probes to collect
attributes about an endpoint and then compares the
collected attributes to predefined device signatures to
locate a match.
In the early days of identity-based networks and 802.1X,
humans spent countless hours identifying all the devices
that did not have supplicants—that is, devices that could
not authenticate to the network using 802.1X, such as
printers and fax machines. After identifying the network port
where a printer was plugged in, it was possible to configure
the port to either not use 802.1X or use MAC Authentication
Bypass (MAB). MAB is an extension to 802.1X that allows a
switch to send the device’s MAC address to the
authentication server. If that MAC address is in the
“approved list” of devices, the authentication server sends
back an “accept” result, thereby allowing specific MAC
addresses to bypass authentication.
Countless hours were spent collecting and maintaining this
list of MAC addresses. A manual onboarding procedure
would eventually have to be created so that when a new
printer (or another valid device) was added to the network,
its MAC address was added to the list. Obviously, some
enhancements to this manual process were required. There
had to be some way to build this list more dynamically to
avoid spending so much time on prep and maintenance. As
described in Chapter 5, this is where profiling technology
entered the picture. Profiling allows you to collect attributes
about devices from sources such as DHCP, NetFlow, HTTP
User-Agent strings, DNS, Active Directory, and more. Those
collected attributes are then compared to a set of
signatures; this is similar to the way an intrusion prevention
system (IPS) signature works. In ISE, these signatures are
commonly referred to as profiles.
For example consider an endpoint connecting to wireless.
While connected, the wireless controller is able to collect
and send the MAC address and HTTP User-Agent string to
ISE. ISE then determines that the MAC address’s OUI
belongs to Apple and the HTTP User-Agent string contains
the word ipad. Therefore, ISE then assigns that device to the
profile Apple-ipad.
Anomalous Behaviour
One of the first questions a security team may ask when
beginning to use profiling with any network access control
solutions is “Can we use this as an anti-spoofing solution?”
Remember that MAC Authentication Bypass is really a very
limited replacement for a strong authentication. It would be
fairly easy for a malicious user to unplug a printer from the
wall, configure a laptop to use the same MAC address as the
printer (spoofing), and gain access to the network. To help
mitigate this potential issue, ISE added two new features
starting in ISE Version 2.2: Anomalous Behaviour
Detection and Anomalous Behaviour Enforcement.
It is important to keep in mind that profiling (without the
anomalous behaviour features) is a technology that
compares collected attributes about an endpoint to a set of
signatures called profiling policies to make a best guess
about what a device is. Can profiling be used to prevent
spoofing? Maybe. However, it is often very difficult to
accomplish anti-spoofing with profiling alone. It would
require a lot of tuning, trial and error, and constant
adjustment, which makes it too operationally expensive and
untenable.
The purpose of Anomalous Behaviour Detection is to reduce
the operational expense in detecting potential MAC
spoofing. With Anomalous Behaviour Detection enabled, ISE
checks profiling data and looks for contradictions or certain
changes. In order to accomplish this, Anomalous Behaviour
Detection checks the following:
Note
There are two special exception authorization policies in
every policy set. The local exceptions authorization policy
is for authentications that are being evaluated on the
specific policy set. The global exceptions authorization
policy is evaluated globally. This means that if an
endpoint that is evaluated by any policy set on this ISE
deployment, it is also evaluated against any rules in the
global exception authorization policy, regardless of which
policy set the rules were created in.
NETFLOW
DHCP
DHCPSPAN
HTTP
RADIUS
Network Scan (NMAP)
DNS
SNMPQUERY
SNMPTRAP
Active Directory
pxGrid
The following sections examine these probes.
DHCP
The DHCP probe requires that DHCP requests be sent
directly to the ISE PSN(s). This is often done by using the ip
helper-address interface configuration command (see
Figure 14-8).
Figure 14-8 DHCP with ip helper-address Logical
Design
DHCPSPAN
Another way for ISE to glean DHCP requests and even DHCP
responses is through the use of a Switched Port Analyzer
(SPAN) session in true promiscuous mode. A SPAN session
copies all traffic between a source interface and the
destination interface on a switch, which would be one of the
ISE interfaces assigned to the DHCPSPAN probe. A SPAN
logical design is illustrated in Figure 14-9.
Probe Configuration
Minimal configuration is required on the ISE side to enable
DHCP probes. In the Profiling Configuration tab you saw
earlier in this chapter, in Figure 14-7, follow these steps:
Step 1. Click the checkbox next to DHCP and DHCPSPAN
to enable these probes.
Step 2. Select either a specific interface or all interfaces.
(You cannot select multiple interfaces individually.
Your choices are a single interface or all interfaces.)
Step 3. (Option) Customize the UDP port on which the
DHCP requests will be received. Unless there is a
requirement to change the port, it is recommended
to keep the default.
Note
If you are using only Device Sensor–capable
infrastructure, neither DHCP probe needs to be enabled.
RADIUS
RADIUS is the primary communication mechanism from a
network access device (NAD) to the authentication server
(ISE). RADIUS communication provides very useful data that
can help classify a device.
Originally, the RADIUS probe was focused on the MAC
address and IP address of a device. By having this data
conveyed in the RADIUS packet, ISE is able to build the all-
important MAC-to-IP address bindings. Because the endpoint
database uses MAC addresses as unique identifiers for all
endpoints, these bindings are absolutely critical. Without
them, Layer 3 probes such as HTTP and Nmap scanning
would not work correctly.
Some of the RADIUS attributes that are most useful in
profiling or creating access policies include the following:
Calling-Station-Id: This attribute provides the
endpoint’s MAC address.
Framed-IP-Address: This attribute provides the IP
address of the endpoint.
Called-Station-Id: While it is not very important for
profiling, this RADIUS attribute is very important with
endpoints that are connecting on a wireless SSID.
Typically, this attribute stores the bridge’s or access
point’s MAC address. Appended to that MAC address is
the SSID. If you wish to create a rule in an access
control policy that is specific to an SSID, you can use the
Called-Station-Id attribute to identify authentications on
that SSID.
NAS-Port-Id: This RADIUS attribute identifies the
physical port of the NAD that the endpoint is connecting
to.
NAS-Port-Type : This attribute indicates the type of port
that is being used to authenticate the endpoint.
Service-Type : This attribute indicates the type of
service requested or provided. This can tell you if the
authentication is MAB or 802.1X. For MAB, Cisco
switches send the Call-Check value for the Service-Type
attribute. For 802.1X, the Service-Type is set to Framed.
In addition, the RADIUS probe triggers the SNMPQUERY
probe to poll the NAD (as discussed later in this chapter, in
the section “SNMPQUERY and SNMPTRAP”).
Probe Configuration
As with all the other probes, only minimal configuration is
needed for the NMAP probe in the ISE GUI. From the Profiling
Configuration tab, just click the checkbox next to Network
Scan (NMAP) to enable this probe. You may enable this
probe as shown in Figure 14-12.
DNS
The DNS probe is used to collect the FQDN of an endpoint
using a reverse lookup for the static or dynamic DNS
registration of that endpoint. This probe is quite useful when
looking for a specific DNS name format among corporate
assets (Active Directory members).
A reverse DNS lookup is completed only when an endpoint is
detected by at least one of the following probes: DHCP,
RADIUS, HTTP, or SNMP.
To enable the DNS probe, simply click the checkbox next to
DNS in the Profiling Configuration tab, as shown in Figure
14-13. This probe uses the name server that is configured
on the ISE node.
Figure 14-13 DNS Probe
Note
It is recommended to remove SNMP settings from IOS
Device Sensor–enabled NADs to avoid double work and
wasted processing.
SNMPTRAP
The SNMPTRAP probe receives from the configured NAD(s)
information that supports MAC notification, linkup, linkdown,
and informs. The purpose of this probe is twofold: It is used
to trigger the SNMPQUERY probe, and it is used as a toggle
switch to allow the SNMPQUERY probe to reactively query a
NAD instead of waiting for the periodic polling interval.
Therefore, you must also enable the SNMPQUERY probe in
order for SNMPTRAP to be functional.
The SNMPTRAP probe receives information from a specific
NAD(s) when the MAC address table changes or when the
link state changes on a switch port. In order to make this
feature functional, you must configure the NAD to send
SNMP traps or inform.
Example 14-1 shows a sample SNMPTRAPS configuration on
a Cisco switch.
Example 14-1 Configuring SNMPTRAPS Probe
CAT9300(config)#interface g1/0/1
CAT9300(config-if)#exit
move
string>
SNMPQUERY
SNMPQUERY does the bulk of the profiling work by providing
the most information about the endpoint. There are actually
three different kinds of SNMPQUERY probes:
Note
For distributed deployments, NAD polling is distributed
among all PSNs enabled for SNMPQUERY probes.
NETFLOW
NetFlow is an incredibly useful and undervalued security
tool. It is similar to a phone bill as it provides a summary of
all calls sent and received (rather than a recording of
conversations in their entirety).
Cisco routers and switches support NetFlow, which sends a
record of each flow that is seen by the device. This record
includes the ports, source IP addresses, destination IP
addresses, and other very usable information.
However, just enabling NetFlow in your infrastructure and
forwarding all its information to ISE can quickly overwhelm
the PSN. If you are planning to use the NETFLOW probe, it is
highly recommended that you have a NetFlow collector,
such as Stealthwatch, to filter out any unnecessary data and
send only what is truly needed to ISE. The NETFLOW probe
is widely used for profiling in many ISE deployments. The
Implementing and Configuring Cisco Identity Services
Engine SISE 300-715 exam does not focus heavily on the
NETFLOW probe, so neither does this book. It is
recommended to perform extensive planning prior to using
this probe.
Configuring the NETFLOW probe is limited to enabling the
checkbox next to NETFLOW in the Profiling Configuration tab
and selecting either the Gigabit 0 interface or all interfaces.
Figure 14-15 shows the enabled NETFLOW probe.
HTTP Probe
When an application such as a web browser uses HTTP, the
application typically identifies itself with its application type,
operating system, software vendor, and software revision by
submitting an identification string to its operating peer. This
information is transmitted in an HTTP request-header field
called the User-Agent field.
ISE uses the information in HTTP packets for profiling; it
uses the User-Agent field to help match signatures to
determine what profile a device belongs in.
There are two primary mechanisms by which the HTTP
probe can collect the HTTP traffic:
Using a SPAN session in true promiscuous mode
or in conjunction with a filter to limit traffic: When
using the SPAN method, you need to determine the best
place to create the SPAN session and gather the data.
One recommended location is the Internet edge, where
a network organization would typically deploy a web
security appliance such as the Cisco IronPort WSA.
Figure 14-16 displays the HTTP SPAN design with ISE.
As you can see, there are multiple ways to use the HTTP
probe, and you should consider what works best for your
environment and then deploy using that approach. In many
environments, it is best to not use SPAN at all but to
leverage ISE’s own portals to capture the User-Agent
strings.
To configure the HTTP probe, click the checkbox next to
HTTP in the Profiling Configuration tab, as shown in Figure
14-17. Select either the Gigabit 0 interface or all interfaces.
pxGrid Probe
The Cisco Platform Exchange Grid (pxGrid) is a multivendor,
cross-platform network system that allows the sharing of
device and user context across a wide range of network and
security solutions, such as security monitoring and
detection systems, network policy platforms, asset and
configuration management, and identity and access
management platforms. pxGrid makes it possible to share
and receive context from other Cisco and third-party
systems. This probe uses that function for receiving
endpoint context from external sources and using it for
profiling.
The pxGrid probe is based on the pxGrid Version 2
specification, using the Endpoint Asset topic. The available
topic attributes are as follows:
assetId: Asset ID
assetName: Asset name
assetIpAddress: IP address
assetMacAddress: MAC address
assetVendor: Manufacturer
assetProductId: Product code
assetSerialNumber: Serial number
assetDeviceType: Device type
assetSwRevision: Software revision number
assetHwRevision: Hardware revision number
assetProtocol: Protocol
assetConnectedLinks: Array of network link objects
assetCustomAttributes: Array of custom names-value
pairs
pxGrid is covered more in detail in Chapter 22, “ISE Context
Sharing and Remediation.”
Minimal configuration is required on the ISE side to enable
the pxGrid probe in ISE. In the Profiling Configuration tab,
check the box next to pxGrid to enable this probe. There
are no additional settings to configure on this page.
Figure 14-19 shows the pxGrid probe enabled.
Infrastructure Configuration
As an overall best practice, it is recommended to do a
cost/benefit analysis of the use of processor-intensive
probes or probe designs. For example, it is often
recommended to use DHCP helper addresses instead of
configuring a SPAN session and examining a multitude of
traffic that may or may not be relevant.
For example, HTTP traffic is extremely useful for identifying
the operating system on a client endpoint. However, an
HTTP SPAN probe can consume a large amount of system
resources on the PSN. In addition, it may not be critical to
have full visibility into the User-Agent strings of all devices,
such as corporate-managed Windows devices.
Some deployments make use of VLAN ACL (VACL) captures
that can limit what traffic is sent to the SPAN session. Other
deployments use the authorization policy in ISE to send
unknown devices to an ISE portal, which allows the portal to
update ISE’s profiling data.
DHCP Helper
As shown in Figure 14-8, the ip helper-address commands
are configured on the default gateway for each of the
access-layer VLANs. To configure destination addresses for a
NAD to send a copy of DHCP requests to, you enter interface
configuration mode of the Layer 3 interface for the VLAN or
subnet and enter the ip helper-address [ip-address]
command. Then you can repeat this process until you have
added the DHCP server(s) and all applicable ISE PSNs to the
list of helper addresses on that interface. Generally, it’s best
practice to add no more than two PSN IP addresses as help
addresses on a Layer 3 interface.
Example 14-2 shows an example of the output from a Layer
3 interface that is configured to send DHCP requests to the
DHCP server in addition to two different ISE PSNs.
Building configuration…
interface Vlan41
! DHCP Server:
ip helper-address 10.1.100.100
ip helper-address 10.1.100.4
end
C6K-DIST#
SPAN Configuration
A monitor session is configured in the global configuration
mode of a switch or router. It can be configured as a local
(SPAN) or remote (RSPAN) session. Example 14-3 shows a
SPAN configuration in which an Internet-facing VLAN is the
source of the session and an interface on the PSN is the
destination.
Note
For more on SPAN configuration, see
http://www.cisco.com/en/US/products/hw/switches/ps708/
products_tech_note09186a008015c612.shtml.
Example 14-3 monitor session Command Input
[rx | tx]
[interface_name]
Session 1
Type : Local
Session
Source VLANs :
Both : 100
Encapsulation : Native
Ingress : Disabled
Learning : Disabled
DC-4948#
C9K-DIST(config-access-map)#action forward
C9K-DIST(config)#switchport capture
Device Sensor
IOS Device Sensor requires a multipart configuration. The
first part is to configure the Device Sensor filter lists, which
inform Device Sensor of which items to consider important
for each of the different protocols.
IOS Device Sensor support three protocols: DHCP, CDP, and
LLDP. You must create one list for each protocol, as
described in the following steps:
Step 1. Create a list for DHCP. The options you should
configure for the DHCP list include the hostname,
class identifier, parameter request list, and client
identifier, as demonstrated here:
Step 3. Create a list for LLDP that includes the port ID,
system name, and system description, as
demonstrated here:
CAT9300(config)#device-sensor accounting
Profiling Policies
Collecting data for profiling is only part of what needs to
happen. In addition, you need endpoint signatures and a
policy engine to compare the collected attributes to those
signatures, which then leads to the assignment of the
endpoint profile.
The profiling engine works a lot like an intrusion detection
system (IDS), where traffic is compared to a set of
signatures to identify suspicious activity. The profiling
engine has hundreds of built-in signatures called profiles
that are designed to match based on certain attributes.
Much like an IDS system, with profiling there is also an
update service in ISE to allow the engine to download new
signatures.
Note
Despite what you see in this example, you would rarely
build an authorization policy that is specific to the point of
the model number of the Cisco IP Phone. Instead, you
would just use the Cisco-IP-Phone parent policy in your
authorization policies.
Logical Profiles
When ISE Version 1.0 was first released, many customers
quickly asked to have a grouping of profiles that was not
hierarchical. For example, they wanted to be able to create
a profile group named IP-Phones that contained all the
individual profiles of IP phones, both from Cisco and other
vendors.
Global CoA
To enable CoA for profiling in the ISE cube and to configure
the CoA type used by profiling globally, navigate to
Administration > System > Settings > Profiler, as shown in
Figure 14-41.
Figure 14-41 Profiler Global Settings
The Port Bounce CoA shuts down the switch port and then
performs a no shutdown to reenable it. This causes the link
state to change, which simulates the unplugging and
plugging in of the network cable. The benefit to this type of
CoA is that many devices try to renew their DHCP-assigned
IP addresses when the link state changes. This can be
particularly useful for headless devices and IoT if there is a
requirement to place them in a separate VLAN. In addition,
there is a built-in failsafe to never send a port bounce when
there is more than one MAC address on a switch port. This
failsafe ensures that there is no negative impact on IP
telephony. When more than one MAC address exists on a
switch port, a Reauth CoA is sent instead.
The Reauth CoA instructs the NAD to initiate a new
authentication to the endpoint by sending another EAPoL
Start message to trigger the supplicant to send the
credentials again. In the case of MAB, the NAD resends a
RADIUS authentication with the endpoint MAC address as
the identity credential. Either way, there will be a new
authentication, but that authentication maintains the same
authentication session ID. By maintaining the session ID, ISE
is able to tie together the multiple states of the endpoint.
Per-Profile CoA
The individual profile policies have a setting that allows
administrators to control their own destiny with CoA. The
per-profile CoA addresses the need to send a Port Bounce
CoA for certain devices only while using the global Reauth
CoA for the remaining endpoints. A per-profile policy CoA
takes priority over a global CoA.
When a CoA type is configured for a profile, it is used when
an endpoint is classified as that profile type. Figure 14-43
shows the settings.
Verify Profiling
There are a few key places to check when verifying profiling
operation. Most of them are in the ISE GUI, and of course
you can a network device itself.
The Dashboard
By navigating to Context Visibility > Endpoints > Endpoint
Classification, you can glean a lot of information (see Figure
14-61).
Figure 14-61 Context Visibility Endpoint Classification
Endpoint Identities
The ultimate source of truth about endpoints is the
endpoints database, which you can view in Context Visibility.
For a graphical view of a list of endpoints, you can navigate
to Context Visibility > Endpoints > Authentication. You can
then see all the endpoints, with the profile of an endpoint
shown in the Endpoint Profile column (see Figure 14-64).
Figure 14-64 Context Visibility Authentications
Dashboard
--------------------------------------------------
Proto Type:Name Len Value
dhcp 43:vendor-encapsulated-optio 5 2B 03 DC 01 00
dhcp 55:parameter-request-list 14 37 0C 01 0F 03 06 2C 2E
2F 1F 21 F9 2B FC
dhcp 60:class-identifier 10 3C 08 4D 53 46 54 20 35
2E 30
dhcp 12:host-name 12 0C 0A 58 59 5A 2D 42 69
6F 4D 65 64
dhcp 61:client-identifier 9 3D 07 01 00 50 56 87 00
04
dhcp 77:user-class-id 13 4D 0B 73 79 6D 75 6E 75
73 2D 62 69 6F
Exam Preparation Topics
As mentioned in the section “How to Use This Book” in the
Introduction, you have a couple of choices for exam
preparation: the exercises here, Chapter 27, “Final
Preparation,” and the exam simulation questions in the
Pearson Test Prep software online.
Certificate-Based
Authentication
EAP-TLS 7, 8
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Not only does ISE trust certificates that have been signed by
this CA, it trusts those certificates for a specific use case
(client authentication). If a client presents a certificate, and
that certificate has not been signed by a CA that is trusted
for client authentication, the authentication fails. Access is
rejected, just as it is when someone enters the wrong
password or a bartender spots a fake ID.
Examine Both the Start and End Dates to
Determine If the Certificate Has Expired
Continuing to use the driver’s license or passport analogy,
there are usually two dates listed on this type of identifying
document: the date it was issued and the date it expires. If
you try to use an expired license or an expired passport, it
should be denied. For example, if you are trying to get
through security at an airport and present an expired
driver’s license, the TSA agent is not supposed to allow you
through the gate. Even if the picture on the license is still
clearly you, and it was obviously a valid identification card
once, the signing authority (the Department of Motor
Vehicles) is no longer warrantying that the document is
valid.
A digital certificate also has two dates listed: the date it was
issued and the date until which it is valid (that is, when it
expires). The authentication server performs a check similar
to the TSA agent’s check and should reject any certificate
that is not within its validity range. In other words, the
authentication server checks to see if the certificate is valid
for the date and time that the authentication request comes
in.
Network Time Protocol (NTP) is very important when
working with certificates. Problems often arise when time is
out of sync. For example, say that a certificate is presented
on January 10, 2020, at 11:11 a.m., but its valid-from value
starts on January 10 at 11:30 a.m. In this example, the
certificate was issued for a time 19 minutes in the future.
This occurred because of a time sync issue in which the
certificate authority thought it was 20 minutes later than
the authentication server thought it was, and the brand-new
certificate was not valid yet.
Figure 15-3 shows a certificate with the valid-from and valid-
to attributes highlighted.
Note
Cisco ISE also does a courtesy check to validate whether
the machine or account has been disabled in AD. If an
account was disabled in AD, access is denied.
Note that the process described here is a very different
process from an Active Directory authentication, which uses
Kerberos (so AD logs are recorded differently). There are
solutions on the market that examine AD log files and use
the information obtained to help tie together usernames and
IP addresses for single sign-on to web proxy servers and
identity-enabled firewalls and other services. Cisco Context
Directory Agent (CDA) is an example of this type of solution.
If the authentication used is certificate-based authentication
(such as EAP-TLS) but the user was authorized from an AD
lookup, the process is unlikely to be able to provide the right
types of logging for those identity-enabled firewalls or web
proxies.
EAP-TLS
More often than not, when talking about certificate
authentication with wired and wireless LANs, EAP-TLS is
used as the authentication protocol. Yes, it’s completely
possible to use EAP-GTC or maybe some other EAP type, but
EAP-TLS is the mainstream protocol. It’s used natively or as
the inner method with tunneled EAP types such as PEAP,
EAP-FAST, EAP-TTLS, and TEAP.
With Cisco ISE, you could enable the use of EAP-TLS from a
preconfigured supplicant, or you could use the BYOD
onboarding functionality with ISE to provision the native
supplicant for Windows, MAC, iOS, and Android devices in
addition to issuing that device a certificate for use with EAP-
TLS.
Note
For more on EAP methods, see Chapter 3, “Extensible
Authentication Protocol (EAP) over LAN: 802.1X.” For
more on device onboarding, see Chapter 16, “Bring Your
Own Device.”
Note
When you use certificate-based authentication for
Windows computers that are also joined to AD and you
wish to use Machine Access Restriction (MAR), a special
configuration is required. Because MAR is a property of
Active Directory, if the machine is using certificates (EAP-
TLS) for authentication, the certificate authorization
profile needs to enable the option named “Perform Binary
Certificate Comparison with Certificate retrieved from
LDAP or Active Directory” using Active Directory as the
source for comparison.
Note
When possible, avoid using certificate-chain files (which
have a .pkcs extension). Always prefer Base64-encoded
files instead of DER-encoded files to prevent the strange
behavior that occurs with some Android clients.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. A certificate file with a .cer extension may be encoded
in different ways. Which encoding method should you
use when possible?
2. A client is issued a certificate from a signing CA, which
is subordinate to a node CA, which is subordinate to the
root CA. Which public certificate or certificates must be
added to ISE’s trusted certificate store?
3. What is the URL for downloading the certificate of a
Windows CA?
4. What portion of a certificate key pair should never
leave the host?
5. What configuration object does ISE use to compare the
fields of a certificate and extract information for use in
authorization policy?
Chapter 16
BYOD Challenges 1
Onboarding Process 1, 2, 4, 6
Foundation Topics Section Question
s
MDM Onboarding
Managing Endpoints 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
BYOD Challenges
Because user identity is typically based on a single identity
credential, an IT department does not have the ability to
create and enforce a rigorous secure access policy. Although
a user might be authorized, the device, location, time, and
access medium can prompt company policy violations or
even regulatory compliance violations that cannot be
adequately detected or enforced.
This chapter focuses on the technical challenges of
providing a secure BYOD access model. Say that a user buys
a new tablet or device and wants to connect it to the
corporate Wi-Fi to be productive on that consumer device. IT
has the challenge of identifying the device as a non-
corporate device and providing limited access to it; this is
the process of onboarding, and it is one of the most
common challenges of BYOD.
Figure 16-2 illustrates what many companies used ISE to do
in the earlier days.
Onboarding Process
In this chapter we focus on two types of onboarding:
BYOD Onboarding
As introduced in Chapter 12, “Web Authentication,” ISE
provides a My Devices portal, which allows users to register
devices and manage the devices they have registered. It is
possible for a device to simply be registered by the user,
which may provide one level of authorization, such as only
Internet access. It is also possible for a device to go through
the full-blown onboarding and provisioning process, where
the supplicant configuration is installed into the device
along with the optional certificate for EAP-TLS connectivity.
Regardless of your choice to use device registration only or
to use the full onboarding process, the process can be
accomplished with a single SSID or dual SSID approach as a
wired option.
Figure 16-4 shows the dual SSID approach, and Figure 16-5
shows the single SSID approach. A quick comparison of the
approaches follows.
Figure 16-4 Dual SSID Flow
Figure 16-5 Single SSID Flow
Dual SSID
Dual SSID onboarding is characterized as follows:
The employee does not need to configure the supplicant
on the device.
The employee authenticates to a web form.
The employee connects to Open SSID before the
provisioning process and then must connect to the
corporate SSID after the process completes. This
reconnection to the second SSID may be automated or
manual.
Single SSID
Single SSID onboarding is characterized as follows:
The employee must configure the supplicant on the
device to connect to the corporate SSID.
The authentication used to connect to the corporate
SSID is used for single sign-on to the onboarding and
provisioning process.
A Change of Authorization (CoA) is used to provide full
access after the provisioning process, without requiring
the employee to reconnect to the network.
Figure 16-5 depicts the single SSID approach.
Step 10. The user clicks Register, and the Install Profile
window appears, as shown in Figure 16-24.
Figure 16-24 iOS: Install Profile Window
Step 13. When the profile is installed, the user clicks Done
and is returned to his web browser, where the
success message is waiting for him (see Figure 16-
30).
Figure 16-30 iOS: Success Message
Step 5. The user downloads the app from the Google Play
Store, as shown in Figure 16-36.
Figure 16-36 Android: Downloading the Cisco Network
Setup Assistant App
Step 6. The user runs the app and clicks Start, as shown
in Figure 16-37.
Figure 16-37 Android: Running the Network Setup
Assistant App
Note
The ISE Client Provisioning portal automatically uses the
OTA provisioning process that is native to iOS for Apple
iOS, so there is no need to specify that here.
Figure 16-49 shows the completed client
provisioning policy rule for iOS.
Note
The ISE Client Provisioning portal automatically redirects
Android devices to play.google.com to download the
supplicant-provisioning app. There is no ability to specify
a different app store at this screen.
Step 13. Disable the built-in MAC OS rule and insert a new
rule below it. Name the new rule CiscoPress-MAC-
OS.
Step 14. Set Operating System to Mac OSX.
Step 15. Configure the results to use MacSPWizard and
CiscoPress-TLS .
Note
As with Windows, with macOS you have to specify the
supplicant wizard—in this case MacSPWizard—to
configure the native supplicant.
AND
Configuring SCEP
Another option besides using the internal CA in ISE is to
configure ISE to use an external CA that uses SCEP to issue
certificates to endpoints. Multiple different external CA
types may be used. The single most common CA deployed
is the Microsoft Active Directory certificate authority. This
CA, which has support for SCEP, is referred to as Network
Device Enrollment Services (NDES). It requires Windows
2008 R2 Enterprise or newer, and that server must be part
of a domain.
While not all CAs have been tested, you may theoretically
use any CA of your choosing if it meets the following
requirements:
Supports SCEP
Supports an automated or automatic issuing of the
requested certificates
Does not require a shared secret to be configured
between the registration authority and the certificate
authority
When you add a new SCEP profile to ISE, the CA’s public key
is automatically imported into the certificate store, and the
Trust for Client Authentication or Secure Syslog Services
setting is enabled. This means that any endpoint for which
the CA provisions a certificate will be trusted. If you choose
to use CRL or OCSP, you need to edit this certificate and set
that configuration. See Chapter 15, “Certificate-Based
Authentication,” for more details about the certificate store,
trust, and revocation settings.
If the configuration on your CA is complete and accurate,
your deployment is now ready to do BYOD onboarding. (See
Appendix C, “Sample Switch Configurations,” for details on
configuring CA.) As you join the open network and
authenticate or join the closed network and are directed to
the onboarding process, you experience firsthand the client
experience outlined earlier in this chapter.
CN=device-UDID
SAN=MAC-Address
Step 9. The device CSR is sent to ISE, which either issues
the certificate with its own internal CA or
(optionally) uses SCEP to proxy the enrollment
request to the CA.
Step 10. Whether using SCEP or the internal CA, the issued
certificate is sent back to ISE, which sends it to the
endpoint through the OTA service.
CN=Username
SAN=MAC-Address
Step 12. The user CSR is sent to ISE, which uses its
internal CA to issue the certificate or uses SCEP to
proxy the certificate enrollment request to an
external certificate authority. If the request is
proxied to an external CA, the certificate authority
automatically issues the certificate and sends it
back to ISE.
Step 13. ISE sends the certificate to the device through the
OTA service. Included in that profile is the Wi-Fi
configuration, which details the SSID and indicates
to use EAP-TLS.
Step 14. ISE sends a ReAuth CoA to the NAD, which causes
a new authentication.
Step 15. The endpoint authenticates to the corporate SSID
using the certificate via EAP-TLS.
Android Flow
To detail the flow of onboarding with Android, this section
looks at the dual SSID approach. Android is certainly
capable of handling a single SSID approach as well, but you
just saw that experience with iOS. Remember that with the
dual SSID approach, the user must log in to a CWA portal.
That portal is hard-coded in ISE to launch the onboarding
process only if the user is not a guest user.
With the dual SSID approach, the end user should have to
complete only six actions, as shown in Figures 16-66
through 16-69. However, this section takes a look at
everything that occurs behind the scenes in a series of three
phases.
Figure 16-66 Phase 1: Device Registration
Figure 16-67 Phase 2: Download NSA
Figure 16-68 Phase 3: Device Provisioning
Figure 16-69 Phase 1: Device Registration
Step 18. The CSR is sent to ISE, which either uses its own
internal CA or uses SCEP to proxy the certificate
enrollment request to an external CA.
Step 19. The CA automatically issues the certificate.
Step 20. ISE sends the certificate and profile to the NSA
app. Included in that profile is the Wi-Fi
configuration, which details the SSID and indicates
to use EAP-TLS.
Step 21. The NSA app connects the endpoint to the
corporate SSID.
Step 22. The endpoint authenticates to the corporate SSID
by using the certificate via EAP-TLS.
Windows and macOS Flow
macOS and Windows both use a wizard called the Cisco
Native Supplicant Provisioning Wizard to accomplish
onboarding and provisioning. The wizard takes care of
triggering the CSR from the operating system and installing
the supplicant profile.
Whereas mobile operating systems go through a three-
phase process, the desktop operating systems go through a
two-phase process. This section uses a single SSID
onboarding example to demonstrate this flow. In a perfect
world, the end user needs to take only five actions.
(However, we all know that this is not a perfect world.)
The initial supplicant provisioning wizard was a Java-based
applet. Due to security vulnerabilities and attacks native to
Java, the security levels in the client-side Java have been
tightened, making the end-user experience increasingly
challenging, with different security warning prompts and
workarounds. In response, Cisco has created native
applications for both macOS and Windows operating
systems that don’t use the client-side Java.
Reports
Cisco ISE provides a number of prebuilt reports that exist
under Operations > Reports. They are divided into the
logical groupings Audit, Device Administration, Diagnostics,
Endpoints and Users, Guest, Threat Centric NAC, and
TrustSec. There is a report dedicated to supplicant
provisioning. To run this report, follow these steps in the ISE
GUI:
Step 1. Navigate to Operations > Reports > Reports
> Endpoints and Users > Supplicant
Provisioning.
Step 2. Choose Today as the time range.
Step 3. Click Run.
Identity Group
Another way to verify the onboarding is to examine an
endpoint in the endpoint identity groups database. To do so,
follow these steps in the ISE GUI:
Step 1. Navigate to Administration > Identity
Management > Groups > Endpoint Identity
Groups > RegisteredDevices.
Step 2. (Optional) Apply a quick filter to make the list
more manageable.
Step 3. Examine the MAC address and static group
assignment.
MDM Onboarding
Many organizations use mobile device management (MDM)
solutions to provide endpoint management for a plethora of
devices. MDM solutions help enforce specific security
requirements, such as endpoint encryption, PIN lock, jail-
break detection, and remote wipe capabilities. Many mobile
device managers can even provision supplicants and
certificates to devices as part of their management
package.
In the past, a user bringing a mobile device into an
organization, in order to gain access to the network, would
have to call the help desk for instructions on how to onboard
the device with the mobile device manager. There are some
significant downsides to this process, including the
following:
Users were required to manually connect to the MDM
solution to begin the onboarding process.
There was no enforcement to help steer the user toward
the correct solution.
A mobile device manager license was required for every
device the organization would provision and allow to
have network access, but this could be cost prohibitive.
However, Cisco recognized that MDM vendors had mobile
device management capabilities that could work with
Cisco’s onboarding network access policy and enforcement
mechanisms.
ISE integrates with many of the industry’s top MDM vendors’
products, including VMware AirWatch, Mobile Iron, Citrix
XenMobile, Meraki Systems Manager, Globo, IBM MaaS360,
and Microsoft Intune. These vendors have implemented an
application programming interface (API) written by Cisco to
enable scalable bidirectional communication between their
solution and ISE. By using the same API for all vendors
instead of having a custom integration for each vendor,
Cisco can ensure consistency and quality.
Integration Points
Cisco’s MDM API enables ISE to use MDM attributes in the
authorization policies. The authorization may use a macro-
level attribute stating that the device is in compliance with
the MDM policy, or micro-level attributes such as jail-break
status, PIN lock, or endpoint encryption. Table 16-2
describes the various MDM attributes that can be used as
part of the authorization policy in ISE.
Note
If the mobile device manager will be provisioning
certificates to endpoints with their own CA instead of
using the BYOD onboarding with ISE and your CA, you also
need to trust the certificate for client authentication.
AND
AND
AND
MDM:DeviceRegisterStatus EQUALS Unregistered
Next, you can add another rule below the MDM On-boarding
rule that permits access to devices that are registered and
meet the MDM compliance guidelines and therefore should
be provided with full access to the network. Follow these
steps to add the new rule:
Step 1. Navigate to Policy > Policy Sets.
Step 2. Open the policy set for the CiscoPress SSID and
expand the authorization policy.
Step 3. Click the cog icon for the MDM On-boarding rule
and choose Duplicate Below.
Step 4. Name the new rule MDM Permit.
Step 5. Delete the BYODRegistration condition.
Step 6. Set MDM:DeviceRegisterStatus to EQUALS
Registered.
Step 7. Add a new condition for MDM:ComlianceStatus
EQUALS Compliant. The final condition set should
look like this:
AND
AND
AND
AND
Managing Endpoints
Each user can use the My Devices portal to manage the
devices he or she has personally onboarded, or the
administrator can manage user devices from the Endpoints
screen. Table 16-3 outlines the options for a device.
Self-Management
End users can come to the My Devices portal to manage
any endpoints they have registered and also to register new
endpoints.
An employee can log in to the My Devices portal by
navigating to either the default URL
https://ISE_fqdn:8443/mydevices/ or the friendly URL
configured at Administration > Device Portal Management >
My Devices and clicking the My Devices Portal link.
Figure 16-80 shows the My Devices portal settings page
where the friendly URL is configured.
Figure 16-80 My Devices Portal Settings Page
Administrative Management
From an administrative perspective, BYOD registered
endpoints are administered just like any other endpoints, at
Work Centers > BYOD > Identities > Endpoints. From here,
an administrator can initiate actions against the registered
devices, as shown in Figure 16-83.
Figure 16-83 Endpoint Identities
No chaining
User and machine both failed
User and machine both succeeded
User failed and machine succeeded
User succeeded and machine failed
With this level of flexibility, an authorization result may
permit limited access to remediate a single failure, no
access if neither user nor machine succeeds, and full access
if both user and machine succeed (for example).
A real-world deployment used EAP chaining to identify
corporate-owned and -managed devices. The authorization
rule in that deployment was as follows:
THEN
Permit Full Access
What Is TrustSec? 1
Classification 3
Enforcement 9
MACsec 10
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
incorrectly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Note
In one real-life scenario, an organization had more than
50,000 switches in the access layer of its environment.
That is a tremendous number of VLANs to create and an
overwhelming number of addresses to maintain on the
firewall’s access control list. That same organization had
15 full-time employees managing the firewall rules and
needed to find a better mechanism to control access and
reduce operating expenses.
East–West Segmentation
In May 2017, the WannaCry ransomware attack targeted
computers around the globe. The virus affected more than
200,000 computers across 150 countries, with estimates of
the damages ranging from hundreds of millions to billions of
dollars. WannaCry targeted unpatched computers running
Microsoft Windows. After it was executed on a compromised
computer, it would exploit an SMB vulnerability to further
attempt to spread to other computers on the same network.
WannaCry is just one example of many types of malware
that take advantage of gaps in segmentation to further
propagate.
To prevent similar attacks from successfully propagating,
east–west traffic should be properly filtered based on the
host or user role, including hosts that are contained in the
same VLAN or subnet. VLAN segmentation is limited due to
the focus on filtering north–south communication, but the
hosts on the same VLAN may still talk to each other. ACLs or
dACLs could potentially limit the unwanted east–west traffic
on the same network segment, but that filtering would add
to the complexity of those ACLs or dACLs. For example, if
communication is allowed between hosts on the same
subnet but only on certain ports, there will be more ACEs
and complexity in that access list. Due to these limitations
of ACLs, Cisco determined that there needed to be a better
way to segment endpoints while simplifying the security
policy and found an answer in TrustSec.
What Is TrustSec?
Note
The endpoint itself is not aware of the tag. It is known in
the network infrastructure.
Step 5. Verify that the PAC has been provisioned from IS:
AID: 95A54E9778870BF50F8184D24E67C998PAC-Info:
AID: 95A54E9778870BF50F8184D24E67C998
I-ID: Sw03
PAC-Opaque:
000200B0000300010004001095A54E9778870BF50F8184D24E67
C99800060094000301007B5D25F3BFF9F4C5643E0D5872CF7081
000000135EA6FD1A00093A8019B4AB6BD8C878FD05E8A504FAFF
EB6805CF573E865E805A10A05A525BF3D260E7D2BADFACBDFC9E016
53E1D09BA2105D80173E63885AE237E12346D2FC518E5F85299
BB7F9E3CCA6248E5EEB4AD5FE15C3E1F84C429358D8B357297
A3B463EC4F50B31452E1C2A0131A7A2008D27268F4865792
Step 11. Click the Import PAC button to import the PAC.
Step 12. Click Apply.
Step 13. Navigate to Monitoring > Properties >
Identity By TrustSec > Environment Data and
verify that the environment data downloaded, as
shown in Figure 17-12.
Figure 17-12 Verifying That the Environment Data
Downloaded
C9300(config-if-cts-dot1x)# shutdown
C9300(config-if)# no shutdown
Step 10. (Optional) Set the SAP mode for MACsec. If you do
not plan on using MACsec, you can use either no-
encap or null. You should mirror the encapsulation
mode on the interface on the other switch:
Step 12. Bring the interface down and then back up:
Click here to view code image
C9300(config-if-cts-dot1x)# shutdown
C9300(config-if)# no shutdown
Step 13. Verify that the PAC and CTS environment data
was downloaded on the non-seed switch after
authenticating to the network:
Step 14. You have not configured the RADIUS server, CoA
server, or much else. After authentication to the
TrustSec domain, the AAA configuration should not
change in the switch as seen in the output of the
below show command. The RADIUS servers are not
defined in the running configuration. However, they
are listed in the environment data that was
downloaded:
Click here to view code image
C9300# show running-config aaa
!
aaa authentication dot1x default group radius
aaa authorization network cts-list group radius
aaa accounting system default start-stop group radius
aaa accounting dot1x default start-stop group radius
username admin privilege 15 secret 5 $1$.
tao$9RBJkWqe3PVqC0nbfDdFn/
username cts-user privilege 15 secret 5
$1$lLcC$JER9rQMhXnsLF4cvzEZ/V.
!
!
!
!
!
!
!
aaa new-model
aaa session-id common
Step 15. Verify the policy peer and the interface on the
non-seed switch:
From this output, you can see that the TrustSec peer
device is Sw01, and its device SGT is the
TrustSec_Devices tag with number 2.
Next, verify the interface that authenticated to the
TrustSec domain by entering the following
command:
[...truncated]
Note
If ISE is integrated with ACI, you can also check the box
Propagate to SGT to propagate the SGT to ACI. When you
do this, you automatically create an endpoint group (EPG)
in ACI that maps to this SGT. However, you still need to
create contracts within ACI to define how this EPG should
communicate with other EPGs.
Note
It is considered a best practice to also have a security
group for all the common network services that will exist
on a network. These are services that should always be
accessible by any device, such as DNS and DHCP. The
following steps walk through creation of such a group.
Classification
In order to use SGTs in your network infrastructure, the
network devices must be able to understand and process
SGTs. All Cisco Secure Access–supported switches and
wireless controllers support the assignment of SGTs. The
assignment of an SGT to an authentication session is called
classification. The process of communicating the assigned
SGT upstream into the network is called transport, and it
can either occur via native inline tagging or via a peering
protocol called SGT Exchange Protocol (SXP).
Figure 17-18 shows an example of one access switch that
has native tagging. The packets get tagged on the uplink
port and remain tagged as the packets move through the
infrastructure. This figure also shows a non-native-tagging-
capable switch that uses SXP to update the upstream switch
with the mapping of IP addresses to SGT tags. In both cases,
the upstream switch continues to tag the traffic throughout
the infrastructure.
Figure 17-18 Security Group Tagging
cisco-av-pair=cts:security-group-tag=tag-number
Note
To view what hardware supports TrustSec and which
features it supports, check the Cisco TrustSec Platform
Capability Matrix at
https://www.cisco.com/c/en/us/solutions/enterprise-
networks/trustsec/solution-overview-listing.html.
Mapping a Subnet to an SGT
The cts role-based sgt-map [ipv4-subnet | ipv6-subnet]
sgt tag-value command enables subnet-to-SGT binding:
SXP Design
Because SXP uses TCP as its transport, the peers may be
Layer 2 adjacent or multiple Layer 3 hops away, as long as
the TCP packets between the peers are routable and the
peers are reachable. A network device can peer with an
upstream switch for tag propagation or can even peer
directly with the enforcement device (the data center switch
or security group firewall). Figure 17-24 illustrates an
example of this SXP peering over a non-SGT supported core.
Sw01-9300 (config)#
speaker
Sw01-9300(config)#
<10.1.100.21,
Sw01-9300(config)#
<10.1.100.21,
Sw01-9300(config)#
password changed
SXP : Enabled
Highest Version Supported: 4
-----------------------------------------------------------------
-------------------
Duration
-----------------------------------------------------------------
-------------------
0:00:11:44
(dd:hr:mm:sec)::0:00:11:44 (dd:hr:mm:sec)
SXP : Enabled
-----------------------------------------------------------------
------------
-----------------------------------------------------------------
------------
(dd:hr:mm:sec)
(dd:hr:mm:sec)
Interface GigabitEthernet1/0/3:
Cache Info:
Expiration : N/A
Critical-Authentication: Disabled
Peer SGT: 0
Default SGACL:
Fail-Open: Enabled
Statistics:
authc success: 0
authc reject: 0
authc failure: 0
authc no response: 0
authc logoff: 0
sap success: 0
sap fail: 0
authz success: 2
authz fail: 0
L3 IPM: disabled.
Enforcement
Now that you have security groups being assigned
(classification), and they are being transmitted across the
network (transportation), it is time to focus on the third
staple of security group access: enforcement.
There are multiple ways to enforce traffic, based on the tag,
but, ultimately, they can be summarized into two major
types:
Enforcement on a switch (SGACL)
Enforcement on a firewall (SGFW)
SGACL
This is what you would see for the source IP address on the
port using a dACL:
1 group (source) × 30 (dst) × 4 permission = 120 ACEs
SGACLs are created in ISE. However, they are not part of the
security policy until they are applied to a cell in the TrustSec
policy matrix, illustrated in Figures 17-40 and 17-41, and
that TrustSec policy matrix or SGACL policy is applied to the
network devices.
SGACLs created in ISE are configured before they are
applied to the TrustSec policy matrix. The syntax of the
SGACLs configured in ISE is unlike that of IP ACLs. Since the
source and destination are defined by the cell position in the
TrustSec Policy Matrix, the SGACL is written without a source
or destination. Table 17-2 lists the syntax for SGACLs for
IOS, IOS XE, and NX-OS operating systems.
Note
SGACLs on switches do not function as stateful firewalls. If
you permit access in one direction, you need to ensure
that access is permitted in the opposite direction. In many
cases, filtering in one direction is enough, but if you want
to filter the exact posts in either direction, you can create
an SGACL based on the source ports.
Step 13. Set the following permissions the same way you
changed permissions in steps 11 and 12:
name = Permit_Mgmt-01
IP protocol version = IPV4
refcnt = 2
flag = 0x41000000
stale = FALSE
RBACL ACEs:
permit tcp dst eq 80
permit tcp dst eq 443
permit tcp dst eq 3389
permit tcp dst eq 22
name = Permit IP-00
IP protocol version = IPV4, IPV6
refcnt = 2
flag = 0xC1000000
stale = FALSE
RBACL ACEs:
permit ip
name = Permit_ICMP-03
IP protocol version = IPV4
refcnt = 4
flag = 0x41000000
stale = FALSE
RBACL ACEs:
permit icmp
MACsec
Long ago, when Wi-Fi was first being introduced into the
consumer and corporate space, security concerns arose
related to sensitive data being transmitted through the air
without any level of confidentiality. The temporary solution
was to use Wired Equivalency Protection (WEP). WEP was
not very secure (as history has proven), but it provided an
extra level of protection designed to bring wireless
connections to the same security level available in a wired
network.
Wireless networks quickly became even more secure than
wired networks. As described many times in this book so far,
802.1X authentication took off like a rocket in wireless
networks, and enhancements were made to the encryption
and keying mechanisms, such as Wi-Fi Protected Access
(WPA/WPA2) using AES encryption. Wireless networks had
full encryption mechanisms to provide the confidentiality
and integrity of data traversing the Layer 2 hop from the
endpoint into the network infrastructure, in addition to the
strong identity capabilities of 802.1X.
We needed “wireless equivalency” for wired networks to
provide equivalent confidentiality and integrity, but how
could we achieve it? Should we use IPsec on every endpoint
to every other endpoint, encrypting the entire
communication from end to end? If we did that, how would
we provide strong levels of quality of service (QoS) since we
would not be able to see the content of a packet? We would
be simply encrypting both good and bad traffic across the
network if we used end-to-end IPsec.
Downlink MACsec
Downlink MACsec is the term used to describe the
encrypted link between an endpoint and a switch. The
encryption between the endpoint and the switch is handled
by the MKA keying protocol. Downlink MACsec requires a
MACsec-capable switch (such as a Cisco Catalyst 9300) and
a MACsec-capable supplicant on the endpoint (such as Cisco
AnyConnect Network Access Manager). The encryption on
the endpoint can be handled in hardware (if the endpoint
possesses the correct hardware) or in software, using the
main CPU for the encryption and decryption.
A Cisco switch can force encryption, make it optional, or can
force non-encryption. This setting can be configured
manually per port (which is not very common) or
dynamically as an authorization result from ISE (which is
much more common). If ISE returns an encryption policy
with the authorization result, the policy issued by ISE
overrides anything set using the switch CLI.
Figure 17-61 shows the MACsec policy within an
authorization profile on ISE. Notice at the bottom of the
figure that the switch sends the attribute cisco-av-
pair=subscriber:linksec-policy, followed by the policy itself.
As you can see, there are three options in the MACsec Policy
dropdown:
interface X
macsec
mka default-policy
mab
dot1x pae authenticator
end
ISE Configuration
Downlink MACsec is configured as an attribute in the
authorization profile (as a result of an authorization). To add
this result to an authorization profile, follow these steps:
Step 1. Navigate to Policy > Policy Elements >
Results > Authorization > Authorization
Profiles.
Step 2. Edit an existing authorization profile.
Step 3. Under Common Tasks, check the box next to
MACsec Policy.
Step 4. Select must-secure, should-secure, or must-
not-secure from the dropdown.
Step 5. Click Save to save the change.
Uplink MACsec
Uplink MACsec is the term used to describe encryption of
the link between switches with IEEE 802.1AE. At the time
this book was written, the switch-to-switch encryption used
Cisco’s proprietary Security Association Protocol (SAP)
instead of MKA, which is used with downlink MACsec toward
the endpoint. AES-GCM-128 encryption is used with both
uplink and downlink MACsec.
Uplink MACsec can be achieved manually or dynamically.
Dynamic MACsec requires 802.1X between the switches, as
discussed earlier in this chapter. This section focuses on
manual mode.
!
interface TenGigabitEthernet1/1/1
cts manual
policy static sgt 2 trusted
CAT9300# conf t
CAT9300(config-if-cts-manual)# end
CAT9300#
interface TenGigabitEthernet1/1/1
description Cat6K Ten1/5
no switchport
ip address 10.1.48.2 255.255.255.252
load-interval 60
cts manual
0000000000000000000000000000000000000000000000000000000000000026
mode-list
gcm-encrypt
no macro auto processing
end
Interface TenGigabitEthernet1/1/1:
CTS is enabled, mode: MANUAL
Version: 2
Configured pairwise ciphers:
gcm-encrypt
Cache Info:
Cache applied to link : NONE
Statistics:
authc success: 0
authc reject: 0
authc failure: 0
authc no response: 0
authc logoff: 0
sap success: 2
sap fail: 0
authz success: 5
authz fail: 0
L3 IPM: disabled.
CAT9300#
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the purpose of SXP?
2. What is the goal of TrustSec?
3. What are the three main staples of TrustSec?
4. What are the different ways that an SGT may be
assigned?
5. What is required for a switch to perform SGT
enforcement?
Chapter 18
Posture Assessment
Authorization Rules 1
Mobile Posture 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
incorrectly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Posture Assessment with ISE
This book and the Implementing and Configuring Cisco
Identity Services Engine SISE 300-715 exam are focused on
ISE and, therefore, cover posture assessment for ISE. You
might run into organizations that use ISE for posture and
some that do not. It would be nice if Cisco had just one
answer for posture assessment, but that is just not the
reality today. It is possible to do posture assessment with
application access control using the Cisco Duo Security
solution, and it is also possible to perform endpoint posture
assessment with a Cisco ASA, using the AnyConnect
HostScan module, which ties in to the ASA’s Dynamic
Access Policy (DAP) engine.
However, the use of the HostScan method was mostly
replaced with use of the AnyConnect System Scan module
with ISE for the policy server; in addition, when using
Firepower Threat Defense (FTD) VPN headends, ISE is the
only option for posture assessment because HostScan and
DAP were never ported over.
Cisco made the right call: Posture should be centralized
from a policy server, such as ISE, and not distributed to local
policy engines within each firewall. This central
management ensures that an organization has a consistent
posture policy that applies to all network access control
methods: wired, wireless, and remote access VPNs (RA-
VPNs).
It turns out that EAP does not like this. Overloading the EAP
communication with this much data did not work out well. In
fact, the IETF eventually created the new protocols PT-EAP
and PT-TLS specifically for posture transport. As challenging
as it was to use EAP to carry the posture data, the original
concept of using a NAD to send the data to the policy server
was absolutely spot on.
The concept of NAC took off in the industry. Everyone
wanted to protect their networks from infected devices, and
the industry eventually standardized on the term network
access control. Many startup companies were performing
network access control using methods other than 802.1X.
The clear leader in the network access control space was a
company called Perfigo, which created a Clean Machines
inline appliance solution. Cisco acquired Perfigo in 2004 and
renamed the solution NAC Appliance. This gave Cisco a
solution with strong 802.1X identity control with limited
posture capabilities and a separate appliance-based solution
for customers looking for stronger posture control with less
secure identity control.
Where the NAC Appliance clearly led the industry was in the
simplicity of its posture controls. It used SNMP as the control
plane to the network, using VLAN switching tricks to steer
customer traffic through the inline appliances until the
device was permitted to have full network access, and then
the endpoint would be switched into the normal data VLAN
that did not send all traffic through the inline device.
Figures 18-2 and 18-3 illustrate the NAC Appliance flows,
where traffic starts out in the dirty network and is moved to
the employees’ network after posture assessment is
complete. The “dirty” network could be equated to an
isolated sandbox where endpoints are kept with limited
controlled access until they are determined to be compliant
and approved.
Figure 18-2 Assessing Posture with Non-802.1X-Based
Solutions
Configuring Posture
In this section, we move forward with configuring posture
assessment and explain it as we progress through the work
center.
Like the other work centers in the ISE user interface, the
Posture work center has an overview page that lists what
you need to accomplish to be successful. Navigate to Work
Centers > Posture, and you see the default overview page,
shown in Figure 18-9.
If you compare Figure 18-10 with Figure 18-11, you see that
Figure 18-11 shows a higher Cisco conditions version, a new
version for the Cisco AV/AS support charts for Windows and
macOS, and a newer supported OS version. Are you
beginning to see the importance of updating the posture
module?
Download AnyConnect
The AnyConnect Secure Mobility Client is a lightweight
modular client that is designed to be controlled by a
headend. The headend is responsible for pushing all
configuration settings to the client and even for updating
the software.
When AnyConnect first hit the market, it was only a VPN
client, and the only headend in existence for it was Cisco’s
ASA. When a user connected to the VPN, if the administrator
had published a new policy to the ASA, AnyConnect
automatically updated itself with the new policy. The same
was true for the AnyConnect software version. If the
administrator published a new version, that administrator
could also indicate for the client to be upgraded (inline)
when the user connected to the ASA.
AnyConnect has since been extended to have modules for
Cisco Umbrella, posture assessment with the ASA, posture
assessment with ISE, network visibility, a network
supplicant, and more.
As the number of modules increased, so did the number of
possible headends. With ISE performing posture analysis, it
can and does become one of those headends that sends
configurations, modules, and software updates to
AnyConnect, and it does this through the ISE Client
Provisioning portal.
Note
Beware of the battle of conflicting masters! With so many
headends (ASA, FTD, ISE, and Umbrella), it is quite
possible for the headends to overwrite one another’s
policies. It is recommended to keep your VPN headends
and ISE in sync at all times.
Download the files for Windows and macOS and save them
to be uploaded into ISE later.
Agent Behavior
Figure 18-19 shows the Agent Behavior section of the
AnyConnect posture profile. Instead of examining every
single option, we instead focus on the most important
settings:
IP Address Change
All throughout this book, you have been warned about the
complications that result from changing VLANs after an
endpoint has an DHCP address. The System Scan module
helps deal with those VLAN changes by triggering a DHCP
renewal. For 802.1X networks, the supplicant typically
handles the renewing of IP addresses, and therefore the
agent is not required. However, for non-802.1X networks
where VLAN changes will be used, this agent capability is
very important.
Figure 18-20 shows the IP Address Change section of the
AnyConnect posture profile. These are the most important
settings:
Figure 18-20 AnyConnect Posture Profile: IP Address
Change Section
Posture Protocol
The title of this section is a bit misleading as it implies that
this section is about the communication protocol itself, but it
is not. This section shows how to configure agent behavior
related to the agent discovery process and posture
reassessment. The URL redirection function usually ensures
that posture discovery works smoothly, but posture
reassessment occurs when an endpoint has already been
granted its full network access and the redirection is no
longer in place.
In this section, we look at settings for configuring features to
aid in discovery and communication with ISE PSNs. Figure
18-21 highlights the Posture Protocol section of the
AnyConnect posture profile. The following settings are the
most important ones to understand:
Custom Messages
It is important to provide clear messaging to end users. The
final two sections of the configuration allow you to
customize the messages that the end user will see when the
endpoint is in the noncompliant and grace period states.
Figure 18-22 highlights the two custom message sections of
the AnyConnect posture profile.
Figure 18-22 AnyConnect Posture Profile: Custom
Messages Sections
Note
If you have not downloaded the agent resources already,
the AnyConnect Compliance Module dropdown is empty
and unusable. This is one of many reasons for the
recommended order of operations in Figure 18-12.
Step 5. From the AnyConnect Module Selection section,
shown in Figure 18-24, select the modules that
should be deployed when clients are provisioned
through ISE’s CPP.
Note
Just as the ISE posture module (System Scan) has a
profile to configure all aspects of the module, so do all the
other modules. You can create the profiles offline and
upload them just as you would the AnyConnect packages.
The AnyConnect UI can also be customized and localized
for different languages. Those bundles can also be
created offline and uploaded to ISE.
Step 6. Select the posture profile you created and any
additional profiles for each module, if they have
been uploaded to ISE already, as shown in Figure
18-25.
The Login Page Settings section has an option you have not
seen in other configurations to this point: Enable Auto Login
(see Figure 18-29). You can select this setting to leverage
the ISE session directory to ensure that the user is logged in
and determine the user’s identity instead of forcing the user
to log in to the portal web page separately.
Figure 18-29 Client Provisioning: Login Page Settings
You can use the default temporal agent, or you can follow
these steps to prepare a new rule for Windows devices used
by employees and provision AnyConnect to them:
Step 1. Click the down arrow next to the Windows rule in
the CPP and choose Duplicate Above, as shown in
Figure 18-31.
Figure 18-31 Duplicating a CPP Rule
Note
In this case you do not see a compliance module
dropdown because it is configured as part of the
AnyConnect configuration.
Conditions
Conditions used to be called “checks” because that is the
function they perform. A condition checks an endpoint for
the existence of certain artifacts or performs a bulk
collection of those artifacts.
Figure 18-34 shows the types of conditions that exist.
Figure 18-34 Condition Types
Application
Application conditions have two purposes:
To collect application inventory and pass that inventory
to ISE for context visibility of the endpoints
To check for a specific application that is running or
installed for posture compliance
To see application conditions, navigate within the Posture
work center to Policy Elements > Conditions > Application.
Figure 18-37 shows that ISE has predefined checks
(conditions) that are part of the posture updates from
Cisco.com.
Firewall Condition
The next condition type in the list is the firewall condition.
As shown in Figure 18-44, there are preconfigured checks for
this condition to make your life a little easier.
Figure 18-44 Predefined Firewall Conditions
If you edit one of the preconfigured rules, you see that the
rules are configured to identify firewalls from any vendor
(see Figure 18-45). Setting Vendor to Any really makes
things easier for you when it comes to configuring checks.
(It can be painful to try doing the same thing with ASA and
DAP policies.)
Figure 18-45 Firewall Condition for Any Firewall
If you click Add, you can create a custom check for a host-
based firewall, as shown in Figure 18-46. Note that the list of
vendors in the Vendor dropdown can be a bit overwhelming,
as Figure 18-47 illustrates.
Figure 18-46 Adding a New Firewall Condition
Figure 18-47 An Overwhelming Number of Choices per
Vendor
Anti-Malware
Anti-malware is a single condition that replaces both the
anti-spyware and anti-virus conditions, starting with
compliance module 4.0. The condition checks for both
installation and the definition version of an anti-malware
product.
An endpoint detection and response (EDR) platform should
not rely very heavily on definitions, as it should be more
focused on behaviors or communicating to the cloud.
Cisco’s AMP for Endpoints is such an EDR client. Because
there is no need for definition files, the posture check only
needs to ensure that the client is installed and running the
right version.
Traditional endpoint protection platforms (EPPs), such as
anti-virus and anti-spyware, rely on signatures, much as an
intrusion prevention system (IPS) does. The product is only
as good as the signatures it has present to detect the
viruses, and that is why it is also important to ensure that
the definition files are as up to date as possible.
Figure 18-48 shows the preconfigured checks for the anti-
malware condition, including checks for installation and
definitions for all anti-malware products for Windows and
macOS.
Figure 18-48 Preconfigured Anti-Malware Checks
Adding a new condition can help you see the options. For
example, the settings shown in Figure 18-49 show some of
the options that are available for this type of check.
Figure 18-49 Adding a New Anti-Malware Condition
Anti-Spyware
The anti-spyware condition is valid only when you use
compliance module 3.x or earlier. The anti-malware
condition replaces it in compliance modules 4.0 and later.
Some preconfigured Any anti-spyware checks come as part
of the posture updates, just as with the with anti-malware
and firewall conditions, but they only work with compliance
module 3.x and earlier.
Anti-Virus
The anti-virus condition is valid only when you use
compliance module 3.x or earlier. The anti-malware
condition replaces it in compliance modules 4.0 and later.
Some preconfigured Any anti-virus checks come as part of
the posture updates, just as with the anti-malware and
firewall conditions, but they only work with compliance
module 3.x and earlier.
Dictionary Simple
At this point in the chapter, we are breaking from the order
in which the conditions are presented in the user interface
because the order in the UI does not make logical sense.
Compound conditions require other conditions to be created
first, so in this section, we review the simple conditions first.
By default, there are no dictionary simple conditions, but
you can add them.
To see a simple condition, you can add one by clicking Add.
Then you can provide a name and, optionally, a description.
Then you choose a condition. In the example shown in
Figure 18-50, a condition is being created for Network
Access:AuthenticationIdentityStore, which contains the
value Demo. Figure 18-51 shows an example of another
simple condition being added—in this case, the condition of
Endpoints:OperatingSystem, which matches the value
ndows.
Figure 18-50 First Dictionary Simple Condition
Disk Encryption
There are many different vendors for disk encryption for
both Windows and macOS, and an endpoint might have
different drives, each with a different state encryption
condition.
To add a disk encryption condition, click Add. Name the
condition, select Mac OSX as the operating system, and set
Compliance Module to 4.x or Later. Then click the Vendor
Name dropdown to see what vendors the posture module
can look for (see Figure 18-54).
Figure 18-54 Adding a Disk Encryption Condition
File
File checks are among the most popular posture conditions
leveraged by ISE customers. The file condition is often used
to locate a watermark file, which is a custom file located
somewhere very obscure on system endpoints to help
identify the endpoints that are truly managed by the
company.
In addition, there are a lot of preconfigured file conditions. In
fact, the screen shown in Figure 18-56 indicates that there
are 370 of them.
Service
The service condition verifies that a Windows service or
macOS daemon is running or ensures that a service or
daemon is not running. Figure 18-71 shows the three
preconfigured service conditions, including the long-dead
Cisco Security Agent (CSA) service. Figure 18-72 shows a
new custom service condition.
USB
The USB condition is the final condition we need to examine,
and there is nothing to configure or add for this one. It is
simply a preconfigured check to determine what mass
storage is connected to the endpoint for use in the posture
policy. Figure 18-76 shows the USB_Check condition.
Remediations
It could be considered kind of humorous, but when
discussing posture assessment and access control, many
professionals only seem to focus on the access prevention
capabilities. In other words, if an endpoint does not meet
the minimum requirements, they deny access. You know
what another term for this behavior is? Denial of service! If
an employee is denied access to the network or some other
resource that the person requires to accomplish day-to-day
activities that keep the business running, that is a denial of
service. At the very least, it will increase calls to your help
desk, which makes the implementation more of a problem
than a solution. Many NAC projects have been considered
failures and ripped out of the network because the wrong
person was denied access.
A much better experience is to automatically fix whatever is
wrong or help the end user fix it. This is remediation.
ISE provides a number of remediation choices, each with a
different use case or purpose (see Figure 18-77).
Figure 18-77 ISE Remediations
Application Remediations
The application of remediation is specifically for the
application condition. It allows AnyConnect to uninstall the
offending application or to simply kill the process to shut
down the application.
Click on Application Remediations and click Add.
In the example shown in Figure 18-78, the remediation is set
to Automatic, which means AnyConnect will run this action
in the context of its system process. (Remember that
AnyConnect does not run in the user context.) The
remediation is set to uninstall the offending application, and
the offending application is configured to be VMware Player
Version 9.x.
Figure 18-78 Application Remediation Example
File Remediations
A file remediation allows an end user to download a required
file in order to bring the endpoint up to compliant status.
This file could be a watermark file or any other required file.
Figure 18-80 shows an example file remediation where the
file is named watermark.xml.
Figure 18-80 File Remediation Example
Firewall Remediations
A firewall remediation is designed to enable a host-based
firewall when it is not enabled. Cisco provides two default
remediations for firewalls: one for Windows and one for
macOS. Figure 18-81 shows the default firewall remediation
for macOS.
Figure 18-81 Default Firewall Remediation
Launch Program
Launching a specific application is a very common
remediation type leveraged by large organizations all over
the world. When an organization has a mature endpoint
management team, it may have a number of custom tools
and processes for updating systems, as well as logon scripts
and other scripts to run these custom processes.
There are security implications related to allowing
applications to launch scripts—and there is no remediation
option for launching scripts because of those implications.
However, you can convert a script into an executable, and
that executable can be run with the launch program
remediation. There is one catch to the use of this
remediation: The executable must be signed by a trusted
authority.
Figure 18-82 shows an example of a launch program
remediation.
Figure 18-82 Launch Program Remediation Example
Link
A link remediation is used to display a clickable URL that
directs the end user to a web page of your choosing. Figure
18-83 shows an example of a link remediation.
Figure 18-83 Link Remediation Example
Windows Update
The Windows Update remediation uses the built-in Windows
service to download and install software patches and
hotfixes directly from Microsoft. This remediation action also
permits the changing of the Windows Update setting to
overwrite the user’s configured settings. Figure 18-86 shows
an example of a Windows Update remediation.
Figure 18-86 Windows Update Remediation Example
USB Remediations
A USB posture condition collects information about any
attached USB devices, and a USB remediation is used to
block the use of all USB mass storage devices. There is no
granularity of control as of ISE Version 2.7 and AnyConnect
Version 4.8; this remediation offers only a policy to block all
USB storage usage, but it has met the needs of many
customers.
Figure 18-87 shows the preconfigured USB remediation.
Figure 18-87 Preconfigured USB Remediation
Requirements
You have now seen posture conditions and remediations.
Both of those policy elements are combined into posture
requirements, which are used in a posture policy.
Note
If this section gets confusing, don’t worry. You are not
alone! Refer to Figure 18-33 any time you start to feel
lost.
Note
As you build a requirement, it is possible to combine more
than one condition together, but if you do, for each
combination you see only one remediation option. The
recommended approach is to use compound conditions
when you plan to use more than one condition in a
requirement. This way, you are still maintaining the ratio
of one condition per remediation in the requirements
table unless the conditions share the exact same
remediation, such as using a patch management system
to rectify the situation.
Notice that in the default posture policy, all the rules are
disabled by default. These preexisting policies are there to
leverage the preexisting conditions, remediations, and
requirements that ISE downloads with posture updates from
Cisco.com. Yes, it is a lot to look at, and many people see
this screen and just turn and run. However, it really does
make life easier to have all these prebuilt options, as you
can simply enable a few of them and get a tremendous
amount of value without having to configure anything.
This section shows how to enable the default hardware
attributes and application visibility policies for Windows and
macOS, using both AnyConnect and temporal agents. In
addition, you will see how to create two new policy rules for
the custom file and Registry requirements created earlier.
All the posture policies will apply to members of the
Employees AD group only. Figure 18-91 shows this posture
policy.
Posture Lease
Originally ISE performed a posture assessment every time
an endpoint connected to the network. Some customers did
not like that end-user experience and asked Cisco to speed
up the login process. To meet that customer requirement,
ISE added the posture lease concept, which allows an
administrator to configure ISE to perform posture
assessment in specified intervals for endpoints using the
AnyConnect agent for posture assessment.
When the posture lease is active, ISE uses the last known
posture state and does not reach out to the endpoint to
check for compliance.
When the posture lease expires, the endpoint stays in the
same compliance state until the endpoint reauthenticates,
at which point the posture is reassessed. If the endpoint is
compliant, the lease starts over.
Cache Last Known Posture Compliant Status
The Cache Last Known Posture Compliance setting has
nothing to do with the posture assessment or authorization
of an endpoint. This setting is used for context visibility. The
endpoint record in the Context Visibility dashboard shows
the last known compliance state of the endpoint until the
timer for this setting expires.
Reassessment Configurations
Posture reassessments are a critical component for the
posture workflow. You saw how to configure the AnyConnect
agent for posture reassessment in the “Posture Protocol”
section, earlier in this chapter. The agent periodically checks
in with the PSNs defined based on the timer in that
configuration.
When a request reaches the PSN, the PSN determines
whether a posture reassessment is needed, based on the
ISE configuration for that endpoint’s role. If the client passes
the reassessment, the PSN maintains the endpoint’s
posture-compliant state, and the posture lease is reset. If
the endpoint fails the reassessment, the posture status
changes to noncompliant, and any posture lease that
existed is removed.
Note
Periodic posture reassessment can be done only for
clients that are already successfully postured for
compliance. Posture reassessment cannot occur if clients
are not compliant on the network.
Authorization Rules
The authorization rules for posture assessment are much
like the ones you create for guest access and BYOD. There
must be a rule that redirects endpoints that do not have a
posture-compliant state to the active PSN, and there must
be another rule for permitting the endpoint on to the
network if it is posture compliant.
The redirection is to the client provisioning portal; this is
incredibly important to this process. If posture is not
applicable to an endpoint, the endpoint is redirected to this
portal and marked as not applicable. If posture is applicable
but the agent is not yet on the endpoint, the CPP launches
the network provisioning wizard on the endpoint to install
the agent. Finally, if the client has the agent, the redirection
sends the posture probes to the active PSN so the posture
assessment can commence.
Note
Both of the first two rules have the same result, which
is to use a preconfigured authorization profile that
redirects the endpoint to the Client Provisioning
portal.
Interface: GigabitEthernet0/23
MAC Address: 0050.56a1.3e7f
IP Address: 10.1.41.102
User-Name: associate1
ise244.securitydemo.net:8443/portal/
gateway?sessionId=0A01283C000000056ABF55B4&portal=44fd6796-4ebf-
40d3-a24d-
afbbedd3fb10&action=cpp&token=b7fb1e5cfdc2d62894b860c0619c1474
Handle: 0x6C000005
Method State
mab Not run
The end user clicks this link, and the Network Setup
Assistant (NSA) is launched. (This is the same NSA that you
used for native supplicant provisioning in Chapter 16.) The
NSA downloads the AnyConnect software that you uploaded
to ISE along with the AnyConnect configurations you
published there, and then AnyConnect installs the posture
module, as shown in Figures 18-100 through 18-102.
Next, the contractor clicks the link to download and run the
temporal agent, as shown in Figure 18-115.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the difference between an anti-malware
condition and an anti-virus condition?
2. What is the difference between a dictionary compound
condition and a compound condition?
3. What is a patch management condition?
4. What is a remediation?
5. What is the difference between stealth mode and the
temporal agent?
Part V: Safely Deploying in
the Enterprise
Chapter 19
Deploying Safely
Monitor Mode 1
Foundation Topics Section Questio
ns
Low-Impact Mode 2
Closed Mode 10
Wireless Networks 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
After the root group named Stage has been created, you can
follow these steps to create an NDG for monitor mode:
Step 1. Click Add.
Step 2. Name the network device group Monitor Mode.
Step 3. Select Stage from the Parent Group dropdown, as
shown in Figure 19-6.
Figure 19-6 Adding the Monitor Mode NDG
Figure 19-12 shows the policy set selection rule for monitor
mode.
Low-Impact Mode
As described previously in this chapter, low-impact mode is
one of the end-state choices for a deployment. Closed mode
is the other final stage. There is no specific best practice for
which mode is better to deploy; it depends on the
organization and its needs.
A number of large organizations use a variety of
technologies to reimage desktop systems that make use of
the Preboot Execution Environment (PXE) to boot into a
pseudo-OS and then connect to an imaging server that
reimages the company computer. Those PXE environments
may be time sensitive and may not have the ability to
authenticate to the network infrastructure, but they must be
able to seamlessly boot, connect to the reimaging server,
and update the desktop to the latest corporate image—
without any additional user interaction. Low-impact mode
was the only way to make this work feasibly in some
environments.
Another example is a retail organization that uses thin
clients in its retail stores. These thin clients must be able to
boot using PXE, gain limited access to the network, and
download their operating systems from the local store
server—and they need to have that access before the DHCP
timers expire. Once the OS is loaded into memory and takes
over the system, its supplicant sends an EAPoL start
message to the network and authenticates with 802.1X.
Low-impact mode allows the thin client to boot
automatically and have the appropriate levels of access to
the store server to download the OS.
Low-impact mode adds security on top of the framework
that was built in monitor mode. It continues to use the
authentication open capabilities of the switch port,
allowing traffic to enter the switch prior to an authorization
result. This permits the DHCP clients to be assigned IP
addresses before their DHCP timers run out.
With low-impact mode, you add security right from the start
by putting a port-based ACL (pACL) on the switch interface.
This is a traffic-filtering ACL that gets applied to the port as
part of the switch configuration and is then overridden by
the dACL sent down from ISE.
Figure 19-13 shows the operational flow intended for low-
impact mode. Because this mode is one of the two possible
end states (closed mode being the second), very specific
access may be provided per user, device, or other condition
that you wish to use in the ISE authorization policies.
Remember that the goal of low-impact mode is to provide
very limited network access to devices without
authentication and then provide very specific access to
those that have been authorized; this is the least-privilege
security principle.
Figure 19-13 Low-Impact Mode Operational Flow
Step 3. Name the new policy set Low Impact Mode and
provide a description.
Step 4. Select DEVICE > Stage > Starts With > Low
Impact Mode, as shown in Figure 19-15.
Step 5. Click Save.
Figure 19-15 shows the policy set selection rule for low-
impact mode.
Closed Mode
Closed mode is similar to the default behavior of 802.1X. As
you can see in Figure 19-3, the port does not allow any
traffic before the authentication (except for EAP, CDP, and
LLDP), and then the port is assigned to specific
authorization results after the authentication.
Note
Closed mode was once called high-security mode but was
renamed due to the perception that it was more secure
than low-impact mode. In truth, the two modes are
equally secure. The security level of either end state
depends on the configuration of the devices and the
policies on ISE, not on the mode of operation. In other
words, an administrator can make closed mode very
insecure or very secure, depending on the
implementation.
Figure 19-18 shows the policy set selection rule for closed
mode.
Wireless Networks
Wireless networks behave differently than wired networks.
With the creation of a WLAN, an administrator must define
the security for that LAN. When using 802.1X, you set the
security to use WPA2 for key management. This setting
cannot be mixed with an open authentication, and there are
no fallback options.
For guest authentication, the guest needs to connect to a
different SSID. This is fundamentally a much different model
from a wired network, which needs to handle all different
user, device, and authentication types on a single switch
port configuration.
Even though wireless behaves differently, the authorization
results in ISE may be configured to send the responses to
wired devices and wireless devices, providing a unified
access strategy. This permits wireless networks to be
managed as part of your low-impact mode or closed mode
deployments.
Some ISE installations use a separate policy set for wireless
authentications and authorizations, and others will assign
wireless NADs to the low-impact mode or closed mode NDG.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What command enables an enhancement to the 802.1X
standard and allows traffic to flow before an
authentication result is received?
2. What is the only response from the RADIUS server that
is ignored by a switch port in monitor mode?
3. What should be used to differentiate switches in
monitor mode from those in low-impact mode?
4. What network type cannot leverage monitor mode?
5. What deployment strategy should be employed to
ensure a successful and safe deployment without
causing outages?
Chapter 20
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
IS Description Node
E Name
Pe
rs
on
a
IS Description Node
E Name
Pe
rs
on
a
Note
In order to join another ISE node to the deployment, both
nodes must have mutual trust. In other words, all nodes
must trust each other’s certificates. The easiest way to
accomplish this is to use signed certificates on all nodes
prior to joining them to a single cube. See Chapter 8,
“Initial Configuration of Cisco ISE,” for a detailed
walkthrough of replacing the self-signed certificates with
a signed certificate.
Note
As with all other operations with ISE, DNS is a critical
component.
Step 8. Repeat steps 2 through 7 for all the ISE nodes that
should be joined to the same cube.
Note
You can monitor the status of the ISE node that has been
joined by using the show application status ise
command from the command-line interface through
either the console or an SSH session to the ISE node (see
Example 20-1). When the application server state
changes from initializing to running, you know that ISE is
fully up and running.
ID
-----------------------------------------------------------------
---
PROCESSES
atw-ise242/admin#
Note
ISE Version 2.6 added the new UI option Dedicated MnT.
This option improves MnT node performance by disabling
all other personas and services enabled on that node—
even though you could do that yourself manually if you
choose to. With ISE scale and performance numbers, the
maximum scale requires dedicated nodes for each
persona.
Note
This is a good time to double-check that all the desired
probes and services are enabled on the PSNs.
Understanding the High Availability
Options Available
There are many different items to note when it comes to
high availability (HA) in an ISE deployment. There are
concerns about communication between the PANs and the
other ISE nodes for database replication and
synchronization, as well as about communication between
the PSNs and MnT nodes for logging.
The ISE nodes themselves are not the only issue. There is
also the issue of authentication sessions from the NAD
reaching the PSNs in the event of a WAN outage. In addition,
a NAD might recognize that a PSN may no longer be active
and might send authentication requests to the active PSN
instead.
Note
The best practice for logging is to also send logging data
to a security information management (SIM) tool for long-
term data archival and reporting.
Note
As of ISE Version 2.7, there is no ability to automatically
sync the original primary PAN back into the ISE cube. That
is still a manual process.
SPID: ISE-VM-K9
VPID: V01
Serial: AKGHJ7I48DQ
atw-ise241/admin#
SPID: ISE-VM-K9
VPID: V01
Serial: A59HJHJBK9N
atw-ise242/admin#
Node Groups
PSNs do not necessarily need to have a high availability
configuration. Every ISE node maintains a full copy of the
database, and the NADs have their own detection of a
“dead” RADIUS server, which triggers the NAD to send AAA
communication to the next RADIUS server in the list.
Note
While Craig Hyps was a principal technical marketing
engineer at Cisco, he wrote what is considered to be the
definitive guide on load balancing with ISE. The guide was
written using F5 load balancers, but the principles are the
same, no matter which load balancer you choose to
implement. Instead of replicating that entire large and
detailed guide in this chapter, the following sections focus
on the basic principles that must be followed when using
ISE with load balancers. If you want to read the complete
document, simply search the Internet for “How To: Cisco
and F5 Deployment Guide-ISE Load Balancing Using BIG-
IP.”
General Guidelines
ISE deployments are not exactly like typical RADIUS server
deployments. With traditional RADIUS deployments, the
traffic only flows from the NAD to a RADIUS server, and a
CoA message might be sent from the RADIUS server to the
NAD.
ISE is sort of like a next-generation RADIUS server that
offers a more powerful and complex model. ISE requires the
endpoint to also be able to reach the PSN for purposes of
posture communication and Centralized Web Authentication.
Therefore, if you want to deploy with load balancers, you
must ensure the following:
Each PSN must be reachable by the PAN/MnT node
directly, without having to go through Network Address
Translation (NAT). This sometimes is referred to as
routed mode or pass-through mode.
Each PSN must also be reachable directly from the
endpoint.
Failure Scenarios
If a single PSN fails, the load balancer takes that PSN out of
service and spreads the load over the remaining PSNs.
When the failed PSN is returned to service, the load
balancer adds it back to the rotation. By using node groups
along with a load balancer, another member of the node
group issues a CoA reauthorization for any sessions that
were being established. This CoA causes the session to
begin again. At that point, the load balancer directs the new
authentication to a PSN that is still alive and still in rotation.
NADs have some built-in capabilities to detect when the
configured RADIUS server is dead and to automatically fail
over to the next RADIUS server configured. When using a
load balancer, the RADIUS server IP address is actually the
VIP address. So, if the entire VIP address is unreachable (for
example, if the load balancer has died), the NAD should
quickly fail over to the next RADIUS server in the list. That
defined RADIUS server could be another VIP address in a
second data center or another backup RADIUS server; the
options are quite flexible.
interface gig 0
!Actual IP of Node
ip address 1.1.1.1 255.255.255.0
interface gig 1
1000msec
threshold 1000
timeout 1000
frequency 5
track 1 ip sla 1
acct-port 1813
acct-port 1813
outstanding batch-size 5
Patching ISE
ISE patches are released roughly once per month. These
patches contain bug fixes as well as security fixes when
necessary. (Think about the Heartbleed and Poodle
vulnerabilities that were discovered with SSL.) To ensure
that bug fixes are applied, security vulnerabilities are
plugged, and a solution will work as seamlessly as possible,
it is important to have a planned patching strategy.
You can download patches from Cisco.com by going to
Downloads > Products > Security > Access Control
and Policy > Identity Services Engine > Identity
Services Engine Software, as shown in Figure 20-23.
Note
This book was written using ISE Version 2.7, which at the
time this book was written did not have any patches yet.
Therefore, Figures 20-23 and 20-24 show ISE Version 2.6,
and the example in Figures 20-25 through 20-27 use ISE
Version 2.1.
Figure 20-24 Anatomy of ISE Patch Nomenclature
Note
Even though ISE may be deployed with high availability
options, it is always recommended to save patching for
an approved change window.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the name of the technique in which a single IP
address is owned by multiple network endpoints?
2. What common load-balancing technique should be
avoided when using load balancers with Cisco ISE PSNs?
3. What are the two backup types in ISE?
4. Which node’s UDI information should be used when
generating an ISE license to ensure that failover occurs
smoothly?
5. What is the prerequisite for joining an ISE node to an
ISE cube?
Chapter 21
Troubleshooting Tools
Logging 3–6
Diagnostic Tools 1, 2
Troubleshooting Methodology 7
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Logging
The number-one way to troubleshoot any product or solution
is to examine the logs. There are numerous ways to
examine logs with ISE, including using Live Log, Live
Sessions, and individual log files that may be downloaded
from the GUI, viewed from the CLI, or combined in a support
bundle. The following sections cover these options in detail.
Live Log
ISE has a fantastic tool that is officially called the Live
Authentications Log and commonly referred to as Live Log.
Live Log can display 23 columns, and you can hide, display,
and reorder the columns as you like. Customizing Live Log
to your specific preference will really aid in your ability to
use it quickly and efficiently.
Figure 21-1 shows Live Log. The numerals in this figure
correspond to the numerals in the following list:
Advanced Filtering
The quick filter is displayed by default, but you can use an
advanced filter by clicking Filter > Advanced Filter, as shown
in Figure 21-9. The advanced filter allows you to create
complex matching rules, as shown in Figure 21-10.
Live Sessions
Live Sessions differs from Live Log in that it shows activity
related to the entire session, whereas Live Log is focused on
the raw entries related to a passed or failed authentication.
For example, recall from Chapter 16, “Bring Your Own
Device,” that a device may authenticate numerous times
within a single session. This is true of nearly every advanced
flow with ISE, including BYOD flows, guest flows, posture,
and TC-NAC flows.
Logging Targets
When a node joins an ISE cube, the policy is set for the
nodes to send all logs to the defined LogCollector, which
would be the primary monitoring persona.
To examine the configured LogCollector, navigate to
Administration > System > Logging > Remote Logging
Targets. As shown in Figure 21-20, this screen lists each
syslog collector and its IP address, whether it is a TCP or
UDP syslog, and the port number for the log collector. TCP
syslog is used in certain environments to provide
guaranteed log delivery.
Logging Categories
There are many different types of logs in ISE. You can see
and configure the logging categories and the logging targets
assigned to each of the categories by navigating to
Administration > System > Logging > Logging Categories
(see Figure 21-23).
Figure 21-23 Logging Categories
Debug Logs
With enterprise-class solutions, there is often a provision to
provide very detailed levels of logging for troubleshooting
and debugging. ISE provides the ability to set each
component to log at different levels, including the debug
level.
Note
It is recommended that you not change any of the
settings described in this section unless Cisco TAC directs
you to do so. Setting components to debug level has an
impact on system performance.
To change the logging level of a component, navigate to
Administration > System > Logging > Debug Log
Configuration. Click on the name of the ISE node that needs
to have the log settings modified, and a list of components
and the current log-level settings is displayed, as shown in
Figure 21-25.
2019-05-20 13:53:37,008
VERBOSE,139899300931456,LwSmCheckSaneShutdownMarker()
called. Checking sane shutdown marker
/opt/pbis/var/.lwsmd_marker,LwSmCheckSaneShutd
ownMarker(),lwsm/server/main.c:1548
2019-05-20 13:53:37,008
VERBOSE,139899300931456,LwSmCheckSaneShutdownMarker() -
Marker file /opt/pbis/var/.lwsmd_marker doesn't exist. Process
was shutdown
correctly. Creating
now...,LwSmCheckSaneShutdownMarker(),lwsm/server/main.c:1558
Support Bundles
The ultimate tool for Cisco TAC is the support bundle. You
can think of a support bundle as being equivalent to the
show tech-support command on a Cisco IOS device. A
support bundle can contain all the logs across the entire ISE
system, including all its functions, the configuration, and
anything else a support engineer needs to troubleshoot the
ISE installation and maybe even to re-create the
environment in a lab, if necessary.
A support bundle is saved as a simple tar.gpg (GPG
encrypted) file. The support bundle is automatically named
with the date and timestamp, using the following format:
ise-support-bundle_ise-support-bundle-mm-dd-yyyy-hh-
mm.tar.gpg.
pk-200607-0214.tar.
gpg
completed
Diagnostic Tools
In addition to all its terrific logging capabilities, ISE has a
number of built-in diagnostic tools that are found under
Operations > Troubleshoot > Diagnostic Tools. The following
sections provide a brief overview of the most commonly
used tools.
Click Submit, and ISE logs you in remotely and executes the
command, as shown in Figure 21-36. The GUI displays the
resulting output, as shown in Figure 21-37.
Figure 21-36 Credentials Obtained
Figure 21-37 Command Output Displayed
key [redacted]
Posture Troubleshooting
ISE includes the Posture Troubleshooting tool to help you
identify why a user failed a posture check and was denied
access to the network.
To run the Posture Troubleshooting tool, follow these steps:
Step 1. Navigate to Operations > Troubleshoot >
Diagnostic Tools > General Tools > Posture
Troubleshooting.
Step 2. Enter any of the search fields and click Search,
as shown in Figure 21-44.
Figure 21-44 Posture Troubleshooting
Endpoint Debug
An ISE deployment can be quite large and distributed in
nature. Even with a single ISE node, many different
components within ISE might be in use for any network
session—for example, Guest for all web portal traffic as well
as guest account creation and sponsorship, posture for
checking the compliance of an endpoint, profiling to help
identify the type of an endpoint, and RADIUS runtimes for
the processing of incoming access requests.
As you are troubleshooting, there may come a time when
you have to set the logging level of a particular component
to debug and examine the debug logs within ISE. There are
so many logs and so many logging categories in ISE that it
is often quite burdensome to search through all those
separate logs to find the entries that pertain to the
endpoint, user, or session in question. This is where the
Endpoint Debug tool comes into play. It was designed by
Aaron Woland and a leader within Cisco’s TAC named Jesse
Dubois. The purpose of this tool is to allow you to easily and
effectively troubleshoot an endpoint’s activity with ISE in its
entirety.
The Endpoint Debug tool provides a single debug file for all
components for a specific endpoint across its entire session
—across the entire deployment! So, if an endpoint is getting
profiled in the east coast data center and the west coast
data center at the same time, all that information shows up
in the single, consolidated debug file. This tool prevents you
from having to enable debugging on the components for all
endpoints, and it focuses the debugging on a specific
endpoint and its related session activity instead. This is
incredibly elegant, and it helps advanced administrators and
TAC engineers greatly reduce time to resolution when
experiencing an issue.
There are two ways to launch the Endpoint Debug tool. The
first (and more cumbersome) method is to follow these
steps:
Step 1. Navigate to Operations > Troubleshoot >
Diagnostic Tools > General > EndPoint Debug
and select MAC Address or IP.
Step 2. Enter the endpoint’s address.
Step 3. Click Start.
Step 4. Click Stop when it’s time to examine the file.
Step 5. Click the link for the resulting file (which is named
after the endpoint’s MAC address) to download the
resulting file.
When you launch the Endpoint Debug tool from Live Log,
the tool automatically launches in a new window,
prepopulated with the address for the endpoint.
Figure 21-49 shows debugging in progress, and Figure 21-50
shows the final result of the Endpoint Debug tool.
Figure 21-49 Endpoint Debug Tool Processing
When you run the Endpoint Debug tool, the tool creates a
single file for the endpoint on each ISE node where that
endpoint was active. All files are listed in the single GUI, as
you can see in Figure 21-49. To view one of the files, click on
the filename, as shown in Figure 21-50, and you are
prompted to download just the single file or combine all the
files from all the nodes into a single file for download and
easier consumption.
If a certificate was used in the authentication, that captured
certificate is listed with the same filename and a .cert
extension. The certificate is downloaded in PEM format so
you can more easily examine it.
TCP Dump
One of the most valuable troubleshooting options available
to an ISE administrator is the ability to perform packet
analysis on a RADIUS packet. Packet analysis provides
visibility into the raw RADIUS attributes of an authentication,
which can help you determine why a specific authentication
rule was chosen or not chosen.
Cisco ISE provides the ability to perform a packet capture
from any interface of any node in the entire ISE cube,
download the resulting PCAP file, and perform that action
from the central administrative console. You can then view
the downloaded file by using your favorite packet analysis
tool, such as Wireshark.
The TCP Dump tool is located under Operations >
Troubleshoot > Diagnostic Tools > General Tools > TCP
Dump, as shown in Figure 21-51.
Figure 21-51 TCP Dump
With the TCP Dump tool, you can select any node of the ISE
deployment and any interface of that node. You can also
select the resulting packet capture format to be either the
raw PCAP format or a human readable format.
To illustrate the value of the TCP Dump tool, this section
walks through an example of using this tool to capture
packets coming in to ISE and then using Wireshark to review
the packet capture to examine the incoming RADIUS packet
and look for the Called-Station-Id attribute. Follow these
steps:
Step 1. Navigate to Operations > Troubleshoot >
Diagnostics Tool > General Tools > TCP Dump
(refer to Figure 21-51).
Step 2. Ensure that the correct ISE node (a PSN) and the
proper interface (GigabitEthernet 0 for most
installations) are selected.
Step 3. Click Start. The packet capture begins, and the
approximate file size updates, as shown in Figure
21-52.
In the results shown in Figure 21-54, you can see that the
Called-Station-Id contains the MAC address of the wireless
access point with the SSID string (ZTX-ISE) appended to it.
This is a configurable setting in the wireless LAN controller,
as shown in Figure 21-55.
Figure 21-55 WLC Auth Called Station ID Type Setting
The first screen of the Session Trace tool is the Test Setup
tab, shown Figure 21-58. Even though the tool is
prepopulated, you can add other attributes by using the
dropdowns under Custom Attributes.
You can modify any of the attributes from within the Test
Setup tab. For example, you could try a different username
or try changing the endpoint profile. This allows you to play
around with what-if scenarios to see what authentication
and authorization rules would be used, in which policy sets,
and with what end results.
You can click Submit to save a test. Next, click on the Run
Test tab of the tool, where you can select which ISE node to
run the test against. The results are displayed right on the
same page, as shown in Figure 21-59.
Figure 21-59 Session Trace Test Case Run Test Tab
Troubleshooting Methodology
As you read this section, keep in mind the tip from the
beginning of the chapter: Stay calm, take your time, and
think about how the solution works. Taking your time may
sound counterproductive, but when you rush to fix a
problem, you often end up taking much longer to reach a
resolution. By staying calm, taking your time, and thinking
through the flows, you may actually be able to come to a
solution very quickly.
Figure 21-60 shows an example of authentication and
authorization flows.
Figure 21-60 Basic Authentication and Authorization
Flows
Log De-duplication
Prior to ISE Version 1.2, every authentication request
created a 12 KB log record that needed to be stored.
Therefore, when bad endpoint behavior causes millions of
failed authentications a day, a lot of log data is being
stored.
Beginning in ISE Version 1.2, ISE started to suppress
anomalous clients by default; it stored only a single record
and then logged each time that record was received. This
saved a tremendous amount of processing effort and log
storage, and it made better scalability possible.
Note
A successful authentication clears all flags.
Endpoint Diagnostics
There are multiple aspects to troubleshooting from an
endpoint. Naturally, there is the supplicant that is
authenticating via 802.1X, but there are also other aspects
that require visibility from time to time. DNS resolution is a
critical aspect and may need to be validated from the client;
in addition, you may need to perform activities such as
BYOD onboarding with the Network Setup Assistant apps or
the posture agent (NAC Agent).
Interface: GigabitEthernet1/0/2
IP Address: 10.1.10.50
User-Name: 00-50-56-87-00-04
Domain: DATA
ise02.ise.local:8443/guestportal/gateway?
sessionId=C0A8FE0100009884CAE356DA&action=cwa
SGT: 0008-0
Handle: 0x0C0008C4
Method State
mab Authc Success
You can select the client that you are interested in verifying
by clicking its MAC address. This brings up the client details
screen (see Figure 21-73). In the Security Information
section in Figure 21-73, you can see that RADIUS NAC State
is set to CENTRAL_WEB_AUTH, the ACL-WEBAUTH-REDIRECT
redirection ACL is applied, and the session is being
redirected to a client provisioning portal on the ISE node.
Figure 21-73 Clients > Detail
Debug Commands
A number of debug commands can be used on Cisco
switches and WLCs to see authentication details. These
commands are incredibly useful when you need to
troubleshoot network devices.
The go-to debug command for a Cisco WLC is debug
client mac-address. When you enter this command, all
activity on the WLC related to the client is shown in the
command output, and no other client traffic on the
controller is affected.
Cisco switches do not offer a client debugging command,
but you can constrain the debug command to a specific
interface by using the syntax debug interface interface-
name. You can use this command before entering one of the
other debug commands to ensure that only the specified
interface is affected by the debugging process.
The following debug commands are also useful for Cisco
switches:
debug authentication [ all | errors | events |
feature | sync]: Use this command to see all activity
related to the authentication manager that handles
802.1X, MAB, WebAuth, and the related session activity.
debug dot1x [ all | errors | events | packets |
redundancy | registry | state-machine]: Use this
command to see all activity related to the 802.1X
software in the switch.
debug epm [ all | api | error | events | redirect]: Use
this debug command when troubleshooting URL
redirection and application of DACLs.
Note
For more on serviceability in ISE and troubleshooting, take
a look at Aaron Woland’s blog post “Troubleshooting
Cisco’s ISE without TAC,” at
https://www.networkworld.com/article/3053669/troublesh
ooting-ciscos-ise-without-tac.html.
Paragraph De-duplication 80
5
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What does it mean when the Identity column in Live
Log shows the string USERNAME?
2. What steps should you take if an expected
authentication is not showing up in Live Log?
3. What does the Posture Troubleshooting tool do?
4. What is the function of the Endpoint Debug tool?
5. What is the function of the Diagnostic and Reporting
Tool?
Part VI: Extending Secure
Access Control
Chapter 22
pxGrid 4–10
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
MDM Integration
In Chapter 16, “Bring Your Own Device,” you read about
BYOD and the integration between ISE and mobile device
management (MDM). That integration is twofold: ISE
provides the redirection to the MDM service for onboarding,
but the mobile device manager is also able to provide
Context-In to ISE. In other words, the mobile device
manager tells ISE about the mobile endpoints, compliance
with the MDM endpoint policies, the status of encryption or
PIN lock, and more.
This integration uses a specific bidirectional application
programming interface (API) between ISE and the mobile
device manager (cloud service or appliance). This API is
unique and created just for MDM integration.
You can create multiple ANC policies, and each policy can
contain one or more actions. Each ANC policy can be
associated with a different authorization result. For example,
you might end up with ANC policies such as the following:
Investigate
Phasers on Stun
Eradicate
Nuke from Orbit
In addition to providing a much more flexible approach to
classification (or, as Cisco’s legendary Paul Forbes would
say, “flexible name spaces”), ANC also integrates tightly
with pxGrid. It allows pxGrid subscribers to trigger the ANC
action in the pxGrid connection instead of in the point API,
as it was done previously.
To recap, Endpoint Protection Services was renamed
Adaptive Network Control. Then Adaptive Network Control
got new functionality in ISE Version 1.4. Cisco then came up
with a new naming convention to refer to the entire
integrated security system where any Cisco security product
takes action through another Cisco security product: Rapid
Threat Containment. So, for example, you can use Rapid
Threat Containment with Cisco Stealthwatch and Rapid
Threat Containment with Cisco Firepower Management
Center and Identity Services Engine.
While ISE is often the center of a security ecosystem, the
Rapid Threat Containment portfolio includes more than just
integrations with ISE. There are solutions like Rapid Threat
Containment with Firepower Management Center and Cisco
Stealthwatch, Firepower and Cisco Tetration, and many
more. Actions taken using Cisco Threat Response are also
part of the Rapid Threat Containment umbrella. Crystal
clear, right?
pxGrid
pxGrid in Action
pxGrid uses secure communication between participants.
Therefore, certificates are very important to the success and
ease of a deployment. Every pxGrid participant must trust
the controller, and the controller must trust each of the
participants.
The FMC needs to speak to the pxGrid controller to learn of
the topics that exist and who has published those topics,
and it also needs to speak directly to the MnT node to
perform bulk downloads of the published session data. If the
FMC were to trust the pxGrid controller’s certificate but not
the Monitoring and Troubleshooting (MnT) node’s certificate,
the communication would ultimately fail. Figure 22-6
illustrates this concept. As you can see in this figure, you
end up needing a full mesh of trust between pxGrid
participants. Each participant must trust the controller as
well as the other participants.
Context-In
pxGrid involves more than context being shared from ISE
(referred to as Context-Out); it is also used for sharing
information between external systems. As of Version 2.4, ISE
is also able to receive information through pxGrid to help
with its own profiling policies. This is referred to as
Context-In.
In Chapter 14, “Profiling,” you learned about profiling and
the different probes that ISE can use. One of those probes,
which was introduced in ISE Version 2.4, is the pxGrid probe,
which is used to learn profiling data about endpoints
through pxGrid Context-In.
The profiling probe was first used with the Cisco Industrial
Network Director (IND), which communicates with industrial
switches and IoT security devices and collects detailed
information about the connected IoT devices. However,
additional third-party ecosystem partners have been added
since that time. IND Version 1.3 adds a pxGrid publisher
interface to communicate to ISE IoT attributes that are
leveraged in profiling (see Figure 22-8).
Figure 22-8 Industrial Network Director Using ISE pxGrid
Probe
Important Note
Beginning in ISE Version 2.2, all pxGrid communications
occur within the secure pxGrid channel. In other words, all
communication occurs by leveraging the pxGrid
certificate of the ISE node. This differs from prior versions,
in which all bulk downloads from the MnT node occurred
using the Admin certificate rather than the pxGrid
certificate. This caused a lot of confusion and thus needed
to change. If you are implementing pxGrid on any ISE
version prior to ISE 2.2, you must ensure that the
participant trusts the CA that issued the Admin certificate,
as well as the CA that issued the pxGrid certificate.
Notice in Figure 22-12 how the topics are listed under the
pxGrid participant as well as the roles that each node plays
with the topic (pub and sub).
By default, only ISE nodes are registered automatically. All
other pxGrid participants either require manual approval or
require you to enable auto-registration.
For the most part, this is all you really need to do on each
participant. Some participants make things easier than
others. The following sections show how to configure some
of the main pxGrid participants: Cisco Firepower
Management Center, Cisco Stealthwatch, and Cisco Web
Security Appliance.
Note
Much like the FMC, the Firepower Device Management
(FDM) solution is also capable of integrating with ISE
using pxGrid, but this section is focused on the FMC
integration.
Firepower Management Center leverages pxGrid to learn the
context of who and what is on the network and determine
the mapping of those devices to IP addresses. However, it
leverages the LDAP-based realms to learn about what users
and groups exist in Active Directory for the creation of
access policy.
The following section shows how to configure the pxGrid
integration, and the next one discusses realm configuration.
In Figure 22-15, you can see that the .zip file contains the
signed certificate, the encrypted private key, and all the
signing certificates in the PKI hierarchy for the issued
certificate. In addition, the signing certificates in the PKI
hierarchy for the Admin certificate are also included for
good measure. Beginning with ISE Version 2.2, these
certificates should not be required but are included in the
.zip file anyway.
Now you have all the required certificates and the private
key for the FMC.
To configure pxGrid in the FMC, follow these steps in the
FMC GUI:
Step 1. Navigate to System > Integration > Identity
Sources (see Figure 22-16).
Note
The separate MnT certificate is there just in case you are
not using a single CA for all pxGrid clients. However, you
now know that you should always use the same CA for all
participants.
Step 9. Add the signed certificate and private key for the
FMC by clicking the + button for the FMC server
certificate. The PEM-encoded certificate that was
signed by ISE’s endpoint CA and the encrypted
private key are now added to FMC. Give the internal
certificate a name such as pxGrid-FMC, as shown
in Figure 22-18.
Step 13. To subscribe to the SXP topic, check the box next
to SXP Topic.
Step 14. Click Save in the upper-right corner of the screen.
Figure 22-19 shows the completed form.
Step 15. Click Test to verify that the connection is
successful. The test is likely to fail the first time you
try unless ISE is configured to automatically approve
new participants.
Step 16. In the ISE UI, navigate to Administration >
pxGrid Services > Clients. If ISE is not configured
to auto-approve participants, you need to accept
the FMC’s agent and test again.
Step 17. Select the ia-fmc- client for the FMC, as shown in
Figure 22-20, and click Approve.
Note
In the pxGrid Settings screen, you have an option to allow
password-based account creation. This is an alternative to
the certificate-based accounts that you are seeing in this
chapter. With password-based account creation, a
password is leveraged instead and then tokens are
assigned for authorization. At press time, there were not
any pxGrid client applications leveraging this account
method. Also, in the Settings screen you can click the Test
button to verify that pxGrid is working as expected in ISE.
This is very useful for checking that ISE trusts its own
certificates.
Configuring Realms for Identity in Access Rules
The FMC may download all the users and IP address
bindings, but none of the data that is downloaded is used in
the policy until there is a realm configured to determine
which groups and users to use in the firewall policies.
Realms leverage LDAP or LDAPS to communicate to query
the data from Active Directory.
To configure realms in the FMC, follow these steps:
Step 1. Navigate to System > Integration > Realms.
Step 2. Click New Realm.
Step 3. In the Add New Realm dialog that appears (see
Figure 22-22), provide a name for the new realm.
Figure 22-22 Completed Add New Realm Form
Hint
If you aren’t getting the result you want, you can try
backing up in the DN an extra level, such as
dc=securitydemo,dc-net, so you can examine all
organizational units (OUs).
Note
Selective inclusion of AD groups is important for
performance, as AD may have thousands of groups, most
of which are not relevant for identity policies in the
firewalls. In addition, the FMC would not perform very well
if all groups were candidates for identity rules.
The realm is now fully configured for rule creation along with
pxGrid integration for learning what IP addresses belong to
which users and devices. Now you are ready to add identity
information to the access policy rules in the FMC.
For those who enjoy using the CLI, there is also a great way
to see the user identities from the expert mode command
line in the FMC: adi_cli session (see Example 22-1).
realm info
securitydemo.net, sh
ADI is connected
996c-525400b48521
996c-525400b48521
996c-525400b48521
996c-525400b48521
tag: 5
996c-525400b48521
996c-525400b48521
Step 17. In the Primary ISE pxGrid Node section, enter the
FQDN for the primary pxGrid controller.
Step 18. Click Choose File and select the ISE root CA
certificate.
Step 19. Click Upload File.
Figure 22-48 shows the completed Primary ISE
pxGrid Node section.
(https://ise.securitydemo.net:8910)...
Note
All steps in this book are for Cisco Stealthwatch Version
7.0. To see the integration with Version 6.x, check out the
Cisco Press book Cisco ISE for BYOD and Secure Unified
Access.
Step 19. In order for the SMC to be able to use this new
identity certificate, it needs to be added to the
SMC’s trusted CA store, so click on the General tab
in the SMC’s settings and scroll down to the Trust
Store section (see Figure 22-63).
Figure 22-63 Importing the Signed CSR Chain File into
the Trust Store
After a little bit of time, the status light for the pxGrid
connection (highlighted in Figure 22-66) changes from
yellow to green to indicate that the connection to pxGrid is
up and running.
Figure 22-72 shows the ISE RADIUS Live Log, where you can
see ANC triggering a CoA.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the goal of pxGrid?
2. What is the goal of Rapid Threat Containment?
3. What did Endpoint Protection Service (EPS) provide?
4. What is the value of Adaptive Network Control?
5. What is the difference between Context-In and Context-
Out?
Chapter 23
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
TC-NAC Flows
An ISE authorization policy can be configured to trigger a
vulnerability scan when an endpoint joins the network. This
is what everyone thinks they want when they consider
implementing network access control. They think it is a way
to ensure that every endpoint attaching to the company
network is posture compliant and vulnerability free before it
is permitted access. Figure 23-2 shows an example of such a
flow using vulnerability scanners.
Enable TC-NAC
Before you can configure TC-NAC, it must first be enabled on
a Policy Services node (PSN). Keep in mind that TC-NAC can
be enabled on exactly one PSN, and you receive an error
message if you try to enable it on a second PSN in a
deployment. You enable TC-NAC in the Administration >
Deployment screen in the ISE GUI (see Figure 23-4).
Figure 23-4 Enabling TC-NAC on a PSN
When you enable the TC-NAC service on a PSN, a few things
happen. Example 23-1 shows the output of the show
application status ise command on the PSN before you
enable the TC-NAC service. You can see in this output that
the TC-NAC service is disabled.
ID
-----------------------------------------------------------------
---
PROCESSES
ID
-----------------------------------------------------------------
---
PROCESSES
ID
-----------------------------------------------------------------
---
Note
Both STIX and TAXII are open standards created and
maintained by the Organization for the Advancement of
Structured Information Standards (OASIS).
Note
If you are ever in the mood for a good laugh, watch the
video-on-demand of Aaron Woland presenting on this
topic at Cisco Live by going to www.ciscolive.com and
clicking on the On-Demand Library. Search for “Woland
Advanced Security Integration” and choose the session
from Cisco Live! Orlando 2018 that is shown in Figure 23-
44.
Figure 23-44 BRKSEC-3557 Cisco Live! Orlando 2018
Normalized Events
The threat intelligence from AMP is organized into indicators
and incidents:
An indicator of compromise (IoC) shows that there is
an artifact or series of artifacts discovered on an
endpoint indicating a breach with high confidence.
An AMP incident is an event such as a detected threat
or a vulnerable application.
Indicators
An IoC could be viewed as a type of signature. There is even
an open source framework called OpenIOC for IoCs. This
framework leverages an XML-based format for exchanging
threat intelligence in a machine-readable way.
IoCs can be used like signatures to compare an endpoint
against a signature and look for matches. AMP uses IoCs in
this way and can trigger alarms that classify an endpoint as
being in a compromised state. This classification is
conveyed to ISE and added to the endpoint record within
the Context Visibility store.
AMP assigns indicators to the likely impact levels low,
medium, and high. This normalization helps ISE group the
indicators and allows an administrator to take appropriate
actions.
Incidents
An incident can be described as one of the many AMP
events that can occur in the AMP console. Example 23-4
shows just a sampling of the events that exist in the AMP
console.
Note
You wouldn’t want to expose each and every possible
event to ISE, as that would be too much data.
Note
It must be a Socks proxy; a standard HTTP proxy does not
work for the AMP connector.
Note
As of ISE Version 2.7, only the AMP public cloud is
supported. A customer who has deployed the on-premises
version, known as AMP Private Cloud, cannot,
unfortunately, integrate it with ISE.
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What protocols are used between ISE and CTA?
2. What is the difference between an incident and an
indicator in TC-NAC?
3. Can TC-NAC be applied before providing full access to
an endpoint or after?
4. What is required for an entry to be added to the TC-NAC
Live Log?
5. What is the difference between a vulnerability and an
exploit?
Part VII: Device
Administration AAA
Chapter 24
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
Foundation Topics
Note
The purposes of network access AAA and device
administration AAA are so different, in fact, that Aaron
Woland once published a blog post on Network World
about why both types shouldn’t be in ISE. He contended
that ISE should stick to network access AAA and leave
Cisco’s Access Control Server (ACS) for device
administration AAA. You can read that opinion piece at
http://www.networkworld.com/article/2838882/radius-
versus-tacacs.html.
Note
Review Chapter 1 for more on what device administration
AAA is and for a detailed look at TACACS+.
Device Administration in ISE
When it comes to ISE, device administration is synonymous
with TACACS+. Everything to do with TACACS+ exists within
the Device Administration work center.
In fact, to enable TACACS+, you need a single license,
named Device Admin, as shown in Figure 24-3. Unlike the
Base, Plus, and Apex licenses, the Device Admin license is
based on the number of connections. It is a single license
that is counted per PSN with TACACS+ enabled. This differs
a bit from ISE’s predecessor, Cisco Access Control Server
(ACS), which had a base license and a large deployment
license.
Note
Aaron Woland has publicly stated his belief that device
administration AAA has no business being in a network
access AAA product. There is too much disparity in the
uses of the two AAA types, their traffic patterns, and the
load level they put on the AAA and monitoring servers.
However, Aaron lost that fight. Device administration AAA
is squarely embedded in ISE, and ACS has been retired
permanently.
Large Deployments
For a large deployment, it is best to have separate ISE cubes
for network access and device administration. This way, you
are assured that one will never negatively impact the other.
After all, you would not want to accidently prevent your CEO
from getting on the wireless network just because a script is
actively making a lot of changes across your network
infrastructure. You also would not want the audit logs for
network device changes to be kept for less time because
the MnT disk space is shared between network access and
device administration.
The MnT node plays a key role in network access functions
beyond just logging and reporting. As of ISE Version 2.2, the
MnT node is still the holder of critical functions such as the
centralized session directory, the pxGrid topic publishing for
session data, and merging of passive ID and active
authentication data into the session directory.
If the MnT node must also process tremendous amounts of
logging for all the command authorization accounting,
logging entries for every single command entered on every
single network device in the entire organization…well, you
can see why this becomes a point of concern.
Figure 24-5 illustrates two different ISE cubes. Cube 1 is
dedicated to TACACS+, and Cube 2 is dedicated to RADIUS.
Therefore, the PAN and MnT nodes are also dedicated—not
just the PSNs. While this figure does show virtual IP (VIP)
addresses for the PSNs, a load balancer is not required. The
setup is only illustrated this way to show a common
practice.
Figure 24-5 Large Deployments: Separate ISE Cubes for
TACACS+ and RADIUS
Medium Deployments
With medium-size deployments, you might want to have a
single ISE cube, but it is best to have separate PSNs for
network access and device administration. This way, you
are assured that one will never affect the other, and you will
not have to maintain separate cubes.
A set of PSNs would primarily be responsible for all the
RADIUS traffic, while another set of PSNs would have
primary responsibility for the TACACS+ traffic. For
redundancy, you might choose to send the RADIUS traffic to
the TACACS+ PSNs, but only in the case of a disaster. The
PSNs are still primarily dedicated to either RADIUS or
TACACS+.
Figure 24-6 illustrates a single ISE cube with dedicated PSNs
per function. While the illustration does show VIP addresses
for the PSNs, a load balancer is not required. The setup is
only illustrated this way to show a common practice.
Small Deployments
A small deployment could certainly be just a single ISE
cube. It might even be a standalone ISE node that is
performing all functions. In such instances, there are no
dedicated nodes at all; all PSNs handle equal amounts of
TACACS+ and RADIUS traffic.
Figure 24-7 illustrates a single ISE cube with dedicated PSNs
per function. While the illustration does show VIP addresses
for the PSNs, a load balancer is not required. The setup is
only illustrated this way to show a common practice.
Network Devices
We could discuss ISE cubes and TACACS+ versus RADIUS
PSNs all day long. However, none of it will matter if a
network access device (NAD) is not set up correctly. A NAD
object in ISE must be configured with the TACACS+ shared
secret and the connection type.
The same network device group (NDG) guidelines for
network access apply for device administration. The more
applicable the NDG design is for your organization, the more
it aids in your policy creation. Device type, location, and line
of business are all very useful types of NAD groupings.
Figure 24-11 shows the TACACS+ portion of the NAD
definition in the ISE UI.
Connection Settings
Figure 24-12 shows that the default tab is the Connection
Settings tab. The shared secret retirement period, which can
range from 1 to 99 days, is configured on this tab. In
addition to the retirement period, the connection and
session timers are configured on this tab, as are the strings
used for username and password prompts and whether
single-connect mode should be enabled at all.
Identities
The next three tabs in the Device Administration work
center are related to user identities. These identities are not
unique to the Device Administration work center at all. In
fact, they are the same as the identities you find in the
other work centers. The Identities tab houses the internal
users created within ISE’s internal user database. Figure 24-
16 shows the Identities tab with a local user.
Note
In Figure 24-16, you can see that when you select the
Identities tab, the page that appears is labeled Network
Access Users, but this is simply a legacy name, as these
user accounts can be leveraged for device administration
as well.
Network Resources
The Network Resources tab of the Device Administration
work center is a shortcut to the same network resources
available all throughout the UI and in other work centers. A
very noticeable difference is the inclusion of TACACS
External Servers and TACACS Server Sequence sections, as
shown in Figure 24-19.
Policy Elements
The Policy Elements tab of the Device Administration work
center is a shortcut to the conditions and results. The
following sections focus on the results. The two main results
that are used with device administration are TACACS
command sets and TACACS profiles.
TACACS Profiles
Policy Sets
Policy sets work the same way with device administration as
they do with network access. They are combinations of
authentication and authorization rules.
You can and should create policy sets that work with your
organization’s needs, perhaps based on location, job role, or
line of business.
For the purposes of this chapter and the chapters that
follow, here we walk through the configuration of two policy
sets, one per device type that we will work with in these
chapters: Cisco Catalyst switches (IOS) and the Cisco
Wireless LAN Controller (WLC).
To create the Catalyst policy set, follow these steps:
Step 1. Navigate to Work Centers > Device
Administration > Device Admin Policy Sets.
Step 2. Click on the + sign to create a new policy set, as
highlighted in Figure 24-25.
Figure 24-25 Device Admin Policy Sets
Note
These policy sets use the NDGs created in earlier
chapters.
Reports
The reports related to device administration are packaged
up quite neatly within the Device Administration work
center, to avoid your having to leave the work center. By
navigating to Work Centers > Device Administration >
Reports > Device Administration Reports, you can see the
default reports, as shown in Figure 24-29.
Figure 24-29 Reports
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What is the name of the authorization result for a
device administration rule?
2. What port does TACACS+ communicate on by default?
3. What are TACACS command sets used for?
4. When an administrator needs to refresh the shared
secret between many network devices and ISE, what
should the administrator do?
5. What network resource is used to forward requests to
an external TACACS+ server in order?
Chapter 25
Configuring Device
Administration AAA with
Cisco IOS
Foundation Topics
TACACS Profile
Opti Description
on
Opti Description
on
If you click on the Raw View tab, shown in Figure 25-2, you
can see the raw AV pairs that will be sent to the network
access device.
Figure 25-2 TACACS Profile Raw View
Permit debug
Permit undebug
Permit traceroute
Permit ping
Grant Command Argument
Permit show
Permit config*
Permit interface
Permit shutdown
Permit no shutdown
Step 4. Click the checkmark at the end of each entry to
keep that line.
Step 5. Click Save.
Note
If you have other IOS device types than switches, you
may add the network device group with an OR operator.
Note
This is a built-in allowed protocol list that allows TACACS+
with PAP/ASCII, CHAP, and MS-CHAPv1. You may
alternatively create a custom allowed protocol list under
Work Centers > Device Administration > Policy
Elements > Results > Allowed Protocols.
non-exportable...
ISEc0ld
ISE-TACACS local
ISE-TACACS enable
CAT9300(config-line)# exec-timeout 0 0
eq 22
Step 10. To test the SSH access, open a new Putty window
and log in with a variety of different accounts to
verify that the security administrators, network
administrators, and help desk analysts are able to
connect via SSH.
Step 11. In ISE, navigate to Operations > TACACS >
Live Logs to view the authentications. Figure 25-18
shows the TACACS+ authentications.
Figure 25-18 TACACS+ Live Log with Authentications
ISE-TACACS if-authenticated
CAT9300#
Note
The output of the debug aaa authentication command
includes both RADIUS and TACACS+ authentications, so it
may be rather chatty on a busy production switch using
ISE for network access control.
Note
The output of the debug aaa authorization command
includes both RADIUS and TACACS+ authentications, so it
may be rather chatty on a busy production switch using
ISE for network access control.
key=D138FCA5
user='bboyles'
*Jun 10 07:55:43.238: tty1 AAA/AUTHOR/CMD (2095255949):
send AV service=shell
send AV cmd=show
send AV cmd-arg=running-config
send AV cmd-arg=<cr>
Method=ISE-TACACS (tacacs+)
user=bboyles
AV service=shell
AV cmd=show
CAT9300#
AV cmd-arg=running-config
*Jun 10 07:55:43.238: AAA/AUTHOR/TAC+: (2095255949): send
AV cmd-arg=<cr>
CAT9300#
CAT9300#
CAT9300#
key=333EB499
user='bboyles'
send AV service=shell
send AV cmd=configure
send AV cmd-arg=terminal
send AV cmd-arg=<cr>
Method=ISE-TACACS (tacacs+)
user=bboyles
AV service=shell
CAT9300#
AV cmd=configure
AV cmd-arg=terminal
AV cmd-arg=<cr>
event 2
event 1
while reading
event 1
event 1
27 bytes response
event 1
event 1
18 bytes response
request id 4069
Skipping
event 2
event 1
while reading
event 1
event 1
29 bytes response
request id 4069
event 2
while reading
event 1
event 1
17 bytes response
10.1.100.21/49 timeout=5
AUTHOR/START processed
connection to 10.1.100.21/49
request id 4069
running-config <cr>
for 4069(bboyles)
event 2
while reading
event 1
event 1
*Jun 10 08:36:10.344: TPLUS(00000FE5)/0/READ: read entire
17 bytes response
10.1.100.21/49 timeout=5
AUTHOR/START processed
connection to 10.1.100.21/49
seq 1, encryption 1, SC 0
action:LOGIN ascii
msg_len:9, data_len:0
seq 3, encryption 1, SC 0
seq 4, encryption 1, SC 0
msg_len:0, data_len:0
seq 1, encryption 1, SC 0
method:tacacs+
rem_addr_len:11 arg_cnt:2
seq 2, encryption 1, SC 0
seq 1, encryption 1, SC 0
*Jun 10 09:17:13.977: T+: session_id 2881630759
priv_lvl:1
len:4 rem_addr_len:11
seq 2, encryption 1, SC 0
*Jun 10 09:17:13.980: T+: session_id 2881630759
data_len:0
Q&A
The answers to these questions appear in Appendix A. For
more practice with exam format questions, use the Pearson
Test Prep software online.
1. What ISE TACACS+ policy element is used to assign the
shell privilege level?
2. What types of TACACS+ allowed protocols can be
defined?
3. When is Deny Always used in a command set?
4. What are the three main parts of configuring TACACS+
on IOS?
5. What is the advantage of using command sets instead
of defining custom privilege levels?
Chapter 26
Caution
The goal of self-assessment is to gauge your mastery of
the topics in this chapter. If you do not know the answer
to a question or are only partially sure of the answer, you
should mark that question as wrong for purposes of the
self-assessment. Giving yourself credit for an answer you
correctly guess skews your self-assessment results and
might provide you with a false sense of security.
At the very least, ensure that these Cisco WLCs have their
own group for a device type. With that group, you can
ensure that a device administration policy set is built just for
these devices and their unique way of doing device
administration.
Next, you should ensure that Cisco WLC has a network
device object in ISE with the TACACS+ shared secret
configured.
Navigate to Work Centers > Device Administration >
Network Resources > Network Devices and click on the WLC
or click Add to create a new object.
Ensure that the network device groups are assigned
properly and that the TACACS+ shared secret is configured
correctly. Figure 26-3 shows the NAD settings.
It should be very easy to test the logins from WLC: Just try
to log in from a browser. Up to this point, you have been
authenticating to WLC by using a LOCAL user account
(admin). However, you configured the authentication order
to use TACACS and then LOCAL, and the admin user account
won’t exist in Active Directory or ISE.
Open a browser window, bring up the WLC UI, and follow
these steps:
Step 1. Log in as admin. Figure 26-15 shows an attempted
login using the same admin account used to
configure WLC up to this point.
Figure 26-15 Logging In as admin
Step 12. At the WLC CLI, type debug aaa tacacs enable.
Step 13. Log out of the GUI.
Step 14. Log in to the GUI as a user from the SecOps
group. The login as SecOps1 succeeds. Figure 26-22
shows the success and the assigned SecAdmin WLC
profile in Live Log. In addition, the CLI shows a
tremendous amount of debug activity happening.
One of the messages here read “User has the
following mgmtRole 48.” This number matches the
value shown in ISE’s GUI for the SecAdmin WLC
TACACS profile.
Figure 26-22 SecOps1 Login Shown in Live Log
Final Preparation
Hands-on Activities
As mentioned, you should not expect to pass the SISE 300-
715 exam by just reading this book. The SISE 300-715 exam
requires hands-on experience with many of the Cisco
technologies, tools, and techniques discussed in this book,
including Cisco switches, Cisco Threat Response, Cisco ISE,
Cisco pxGrid, Cisco AnyConnect Secure Mobility Client, and
the different APIs supported by those products. Building
your own lab, breaking it, and fixing it is the most effective
way to learn the skills necessary to pass the exam.
Summary
The tools and suggestions listed in this chapter have been
designed with one goal in mind: to help you develop the
skills required to pass the Implementing and Configuring
Cisco Identity Services Engine (SISE 300-715) exam to
achieve the CCNP Security or the Cisco Certified Specialist
certifications.
This book has been developed from the beginning both to
present you with a collection of facts and to help you learn
how to apply those facts. Regardless of your experience
level before reading this book, it is our hope that the broad
range of preparation tools and the structure of the book will
help you pass the exam with ease.
Part IX: Appendixes
Glossary of Key Terms
A
Active Directory (AD) An external identity store from
Microsoft that can be used with ISE authentication and
authorization policies.
Adaptive Network Control (ANC) The successor to EPS,
which added different custom labels that can be used in
authorization policies.
AMP incident An AMP event that has occurred, such as a
detected threat or vulnerable application.
Anomalous Behavior Detection An optional feature in ISE
for mitigating some of the attempts at MAC address
spoofing.
AnyConnect DART (Diagnostics and Reporting Tool) A
module of Cisco’s AnyConnect client that is used to collect
detailed logs related to all aspects of AnyConnect, including
the NAM supplicant.
AnyConnect NAM (Network Access Manager) Cisco’s
enterprise-class supplicant, which is an evolution of a
Meeting House acquisition that became the Cisco Security
Services Client (CSSC) and is now a module in AnyConnect.
authentication server A device that validates EAP
credentials from a supplicant and makes authentication and
authorization decisions.
authenticator A device that is communicating with a
supplicant using the EAP over LAN protocol. It is the device
responsible for sending the EAP authentication request to
the authentication server via RADIUS. Network access
devices are authenticators.
C
CDP Second Port Disconnect A Cisco-proprietary method
by which an IP Phone uses Cisco Discovery Protocol (CDP) to
communicate when the endpoint connected behind the
phone disconnects from the network. This method works for
MAB, dot1x, and WebAuth.
Centralized Web Authentication (CWA) Web
Authentication in which pages are hosted in a central
location, such as on ISE. With CWA, the authenticator is only
aware of a MAB authentication, and the authentication
server (ISE) houses the web portal and maintains the
synchronization between the user’s credentials and the MAB
authentication session.
certificate An X.509 certificate, which is an electronic
document that has been signed for authenticity.
certificate authentication profile (CAP) A configuration
that is used to extract the principle identity from a field in
the certificate. When using the EAP-TLS protocol for user
authentication with certificates, you need to configure CAP
to define what certificate field to use as the username
attribute for the ISE authentication process.
certificate authority (CA) The top-level entity in a PKI
deployment that is responsible for issuing digital
certificates. The CA could be a local enterprise resource in
the company’s infrastructure or could be a third-party CA
provider.
certificate revocation list (CRL) A signed list of revoked
certificates’ serial numbers. The CA publishes the CRL via a
website that can be retrieved by a device or an application
that needs to validate whether a digital certificate has been
revoked by the certificate authority administrator.
certificate signing request (CSR) A request sent from an
applicant to a certificate authority in order to apply for a
digital identity certificate.
Change of Authorization (CoA) A message that a RADIUS
server (or a policy server) sends when it sends any change
of the authorization status of a user or an endpoint. This can
be accomplished via a port bounce, a reauthentication, or
even the push of an entirely new policy.
Cisco AnyConnect ISE agent A persistent posture agent
that can be installed on Windows or macOS clients to
monitor and enforce posture compliance. It can be installed
with the user interface visible to the user or in stealth mode,
where it runs without any client interaction.
command-line interface (CLI) A text-based method used
to access ISE or another device. When using a CLI, most
interaction with the device occurs using only the keyboard.
command set Part of the configurable authorization results
in ISE that allows you to define a specific list of commands
that can be executed.
Common Access Card (CAC) An embedded integrated
circuit that can be used for two-factor authentication. Also
called a smart card. A CAC stores a set of X.509-encrypted
digital certificates used for authentication processes. An
employee’s identification badge might be a CAC.
Common Vulnerabilities and Exposures (CVE) A system
to track, monitor, and describe publicly known security
vulnerabilities.
Common Vulnerability Scoring System (CVSS) An open
standard for assessing the severity of security
vulnerabilities. CVSS assigns severity scores of 0 to 10 to
vulnerabilities to enable incident responders to prioritize
their responses.
compound condition A policy object that contains multiple
attributes along with an operator such as AND or OR.
context The end result of all attributes associated to an
endpoint or user, including (but not limited to) the user
identity, endpoint profile, posture compliance, location,
time, and any other attribute related to an authentication
request.
context brokering ISE brokering in which pxGrid
participants share data exchanged between other members
of the security system.
Context-In A feature that enables ISE to receive contextual
information through pxGrid to help ISE with its own profiling
policies.
Context-Out A feature that enables the sharing of
contextual information about an endpoint or user to external
pxGrid participants.
cyber threat intelligence (CTI) Information about threats
related to the computer and networking world. Basically, CTI
is data about existing threats.
D
device administration AAA The form of authentication,
authorization, and accounting (AAA) used for controlling
login and configuration command and control enforcement
for network devices. It is most often used with TACACS+.
DNS ACL An ACL that is based on snooping performed by a
wireless AP that updates the controller on which destination
IP addresses to permit access to.
dual SSID onboarding BYOD onboarding in which a user
joins an open SSID first, and the credentials from the CWA
are used to authenticate and authorize the end user for
onboarding. After the device is onboarded, the closed SSID
is used with the provisioned supplicant.
E
EAP over LAN (EAPoL) IEEE 802.1X, a standard for port-
based network access control for local-area and
metropolitan-area networks.
EAPoL-Proxy-Logoff A standards-based method an IP
Phone uses to send an EAP logoff message on behalf of the
802.1X authenticated endpoint that is connected to the
phone. This method does not work for non-802.1X-
authenticated endpoints.
Easy Connect An authentication method with which
Microsoft Active Directory logins are used to passively map
user information onto existing network sessions that were
initiated with MAB.
Endpoint Protection Services (EPS) A Cisco tool that
provided an API that allowed other applications to initiate a
quarantine action against an endpoint based on IP address
or MAC address.
environment data Information that a TrustSec device
receives from ISE about the environment, including server
lists, device SGTs, defined SGTs, and expiration timeout.
exploit A weaponized software package that takes
advantage of a vulnerability to accomplish a task that was
not meant to be permitted. So, a vulnerability means there
is theoretically a way to exploit something (that is, a
vulnerability exists), and an exploit means that there is a
definite path to doing so.
Extensible Authentication Protocol (EAP) An
authentication framework that defines the transport and use
of identity credentials.
external identity store An identity store that is configured
to use an external database server for authentication and/or
authorization policies. Examples include Active Directory,
LDAP, RADIUS token servers, RSA SecureID, and certificate
authentication profiles.
F–G
FlexAuth (Flexible Authentication) A capability of a
Cisco switch interface that allows a network administrator to
set an authentication order and priority on a switch port,
thereby allowing the port to attempt 802.1X, MAB, and
WebAuth, in this order. All these functions are provided
while maintaining the same configuration on all access
ports, so this is a simpler operational model for customers
than traditional 802.1X deployments.
global CoA A form of CoA that is sent automatically when a
device transitions from unknown to any known profile.
graphical user interface (GUI) A graphic-based method
used to access ISE or another device. Using a GUI usually
requires a mouse to point and click on the various
configuration or administrative components of the device.
The keyboard is used to populate text-based fields within
the GUI.
guest A user or device that needs network access who is
not an employee or a corporate-owned device.
Guest Flow A special state leveraged in an ISE
authorization policy that indicates that a user’s credentials
were entered through a Centralized Web Authentication
portal.
guest locations A mechanism that simplifies time zone
selection for a guest account.
I
identity source An individual identity store.
Identity Source Sequence (ISS) A list of multiple identity
sources combined in a top-to-bottom sequence list for ISE
authentication or authorization processes.
identity store An internal and/or external database that
can be used to authenticate a user’s or an endpoint’s
credentials.
indicator of compromise (IoC) An indicator that an
artifact or a series of artifacts has been discovered on an
endpoint that indicates, with high confidence, that a breach
occurred.
integration A process in which ISE shares data outbound,
receives information inbound, and brokers data exchange
between other members of the ecosystem.
internal endpoint database An ISE database that is used
to store information about all the endpoint devices that
have connected to the ISE infrastructure. This database
stores the endpoints’ attributes, including MAC address, IP
address, and various other attributes learned using the ISE
profiling probes.
internal user database An ISE database that is used for
the creation of internal username and password accounts
(which are typically referred to as internal user accounts).
This database can also be used for ISE authentication and
authorization policies. An internal user database may be
used, for example, for ISE guest services.
ISE CA (certificate authority) ISE’s built-in certificate
authority, which may be used to issue certificates to BYOD
endpoints.
ISE cube Another name used to refer to an ISE deployment.
ISE profiling An advance subscription license feature of ISE
that is used to identify endpoints based on network data
obtained from a number of enabled probes. With profiling,
you can build an authorization policy that combines a user’s
identity with the classification result and invoke specific
authorization results.
K–L
key pair The combination of a public key and a private key
that is used for asymmetric encryption.
Lightweight Directory Access Protocol (LDAP) A TCP/IP
client-model protocol that is used to connect and retrieve
information from an X.500 directory service database using
TCP port 389. A secure version of LDAP is also supported,
using Secure Sockets Layer (TLS/SSL) with TCP port 636.
LDAP, which is defined in RFC 2251, can be used as an
external identity store.
Local Web Authentication (LWA) A form of
authentication in which WebAuth pages are hosted on a
local device, such as a switch, a wireless controller, or even
a firewall. With LWA, the authenticator receives the
credentials from the web portal and sends those credentials
to the authentication server through a RADIUS Access-
Request. The portal may be hosted on the authenticator
itself or on an external server.
logical profiles Groupings of individual profiles.
M
MAC Authentication Bypass (MAB) A method by which a
NAD sends a RADIUS authentication on behalf of an
endpoint, using the endpoint’s MAC address as the identity
credential.
MACsec IEEE 802.1AE, a standard for authenticating and
encrypting packets between two MACsec-capable devices.
mobile device manager A security software system that
allows an administrator to configure and secure a mobile
device, regardless of where the device is located. Mobile
device managers can provide application provisioning,
security posturing, and remote wipe capabilities.
Monitoring and Troubleshooting (MnT) node An ISE
node that provides monitoring and troubleshooting functions
for a Cisco ISE deployment.
Multi-Auth A mode that is an extension to MDA and
permits a virtually unlimited number of MAC addresses per
interface, with a separate authentication session for each
MAC address.
Multi-Hosts A mode that is an extension to MDA and
permits a virtually unlimited number of MAC addresses per
interface. All endpoints attached to the interface utilize the
authorization results of the first MAC address to
authenticate successfully. No other hosts are able to use
802.1X authentication.
Multiple-Domain Authentication (MDA) An
enhancement to the default mode of 802.1X that allows for
two MAC addresses, one in the voice domain and the other
in the Data domain.
N
Native-EAP Specific methods of Extensible Authentication
Protocol, including EAP-MD5, EAP-MSCHAPv2,and EAP-TLS.
network access AAA The form of authentication,
authorization, and accounting (AAA) used for controlling
login and access to networks, controlling who and what is
allowed to communicate on a network.
network access control (NAC) The industry-standard
term for the posture assessment as part of access control.
network access device (NAD) An access-layer device
that acts as the 802.1X authenticator and policy
enforcement point for a secure access solution. A switch,
firewall, or other device that provides access control
enforcement.
Network Device Admission Control (NDAC) An option
that provides the ability to authenticate network access
devices that are joining a TrustSec domain. The purpose is
to create a chain of trust within a TrustSec domain and allow
only trusted network devices.
network device group (NDG) A hierarchical group that
can be used to logically group network devices based on
various criteria, such as geographic location, device type, or
the relative place in the network (access layer, data center,
and so on).
Network Time Protocol (NTP) A time synchronization
networking protocol which ensures that network-based
computer systems have the correct date and time for the
operating system. NTP is critical when it comes to issuing
and using digital certificates in a PKI customer deployment.
NTP uses User Datagram Protocol (UDP) port 123.
node A physical or virtual ISE appliance that runs one or
more personas.
node groups Groupings of PSNs, where the PSNs maintain
a heartbeat with each other. If a PSN goes down while a
session is being authenticated, one of the other PSNs in the
node group sends a CoA to the NAD so the endpoint can
restart the session establishment with a new PSN. Local
replication of profiling data also occurs within the node
group.
non-seed device A device that acts as a supplicant in a
TrustSec domain. Such a device does not initially require
direct IP connectivity to ISE and enrolls and authenticates to
the seed device.
O
one-time password (OTP) An example of a two-factor
authentication process in which the user’s account
password is generated for each individual authentication
access process. OTPs come in various forms, including
software-based and hardware-based token generators. The
account user inputs a secret PIN number, and a unique one-
time password is generated for the user’s authentication
login process.
Online Certificate Status Protocol (OCSP) A protocol
that allows a device or an application to send real-time
requests, typically using HTTP. The OSCP process is a client
request/server response process. OCSP is documented in
IETF RFC 6960.
P
personas The different functions in Cisco ISE that are
required for proper operation of the platform.
Policy Administration node (PAN) The administrative
persona for Cisco ISE. All policies on ISE are configured and
then pushed to all other ISE nodes/personas from this node.
policy matrix A common view in ISE that lists the source
and destination tags. This is where filtering using SGACLs
may be configured and deployed to network devices to
ensure a consistent policy across the TrustSec domain.
Policy Services node (PSN) The workhorse node of an ISE
deployment that is responsible for actively servicing RADIUS
authentication and authorization requests.
port security A feature included in the Catalyst Integrated
Security Features (CISF) of Cisco Catalyst switches that
limits the number of MAC addresses permitted on a single
switch interface. Port security and 802.1X are mutually
exclusive, meaning they cannot both be configured on the
same switch interface without causing unexpected negative
behavior.
portal A website that is set up to allow the user to
accomplish tasks.
posture A process by which an application (such as Cisco
AnyConnect ISE agent) running on an endpoint or a
temporary executable file (such as a Cisco temporal agent)
is run on the client and provides critical information about
the software or operating system that is actively running on
the device.
posture conditions Definitions of the items that a posture
module examines on an endpoint. A condition may be
looking for the existence of an item (such as a file), the
absence of that item, or details about an item (such as the
file date and hash). Failing a mandatory condition results in
noncompliance of the endpoint. Also known as a check.
posture remediation When an endpoint fails a posture
condition, actions taken to correct the failure so the
endpoint can be moved from a noncompliant state to a
compliant state.
posture requirements Policy elements where conditions
are bound to the remediations. The requirement elements
go into the posture policy.
principle username X.509 attribute The identity used
for the user credential that has been extracted from a field
in a certificate.
private key The half of the key pair that should never be
shared with any other entity. Data encrypted with the
private key can only be decrypted by using the public key.
privilege level The level of access a user has in an IOS
shell session.
profiling The process by which an authentication server
makes educated observations about what a device is, based
on various attributes of the endpoint.
Protected Access Credential (PAC) A unique shared
credential between a server (ISE) and a client (network
access device). The PAC allows the server and the client to
authenticate via a secure tunnel and enables the client to
download control data such as the SGACL policy and
environment data.
public key The half of the key pair that is shared with other
entities for purposes of authentication and/or encryption.
Data encrypted with the public key can only be decrypted
by using the private key.
Public Key Infrastructure (PKI) A set of hardware,
software, and security policies that enables the enrollment,
storage, distribution, and management processes for digital
certificates. PKI is based on the X.509 standard.
publisher The source of the data that subscribers are
subscribed to. Any other pxGrid participant may be a
publisher.
pxGrid A scalable pub/sub communication bus that is used
for the sharing of large amounts of security data at scale.
R
Rapid Threat Containment A trigger from a pxGrid
participant that can give an endpoint a label in ISE and
change the level of access the endpoint has, based on a
corresponding authorization policy.
registration authority (RA) A second-level entity in a PKI
deployment that can process and verify certificate-based
requests. The RA helps offload the processing of certificate
processing from the CA. This also enables the PKI
deployment to be more scalable for large corporate PKI
environments.
Remote Authentication Dial-In User Service (RADIUS)
An application-layer network protocol used for
authentication, authorization, and accounting. RADIUS is a
client/server protocol that uses User Datagram Protocol
(UDP) port 1645/1646 (IETF Draft) or UDP port 1812/1813
(IETF Revised Standard).
S
SAML assertion A packet of security info that contains the
identity and attributes of a user and the user’s authorization
for a service that is passed from the IdP to the SP.
SAML identity provider (IdP) A policy engine that
determines authorization and issues SAML assertions. The
IdP is the identity provider against which ISE authenticates.
SAML service provider (SP) An application or service that
is being accessed and that requires AuthN/AuthZ before it
can be accessed. The ISE web portal is the SAML SP in this
case.
security group access control list (SGACL) An access
list that allows the control of access and permissions based
on the SGTs assigned.
Security Group Exchange Protocol (SXP) A peering
protocol that allows network devices to communicate their
databases of IP address-to-SGT mappings to one another.
This provides support for retagging a frame after it reenters
a TrustSec domain.
security group firewall (SGFW) A firewall or router that
can filter traffic based on source and destination SGTs.
Security Group Tag (SGT) A 16-bit value that ISE assigns
to a user’s or an endpoint’s session upon login. Sometimes
referred to as a Scalable Group Tag.
seed device The authenticator to network devices for the
TrustSec domain. This device is configured manually and
has connectivity to ISE initially.
Simple Certificate Enrollment Protocol (SCEP) A
protocol used to broker the provisioning of a certificate to an
endpoint.
simple condition A policy object that is defined with a
single attribute.
Single-Host The default mode of an 802.1X-enabled port,
which allows only a single MAC address per switch interface.
single SSID onboarding BYOD onboarding in which a
username and password are used to authenticate and
authorize the end user. After a user is onboarded, the same
SSID is used but with a certificate.
sponsor An employee who introduces and supports a
guest.
Structured Threat Information Expression (STIX) A
language format used to share cyber threat intelligence
(CTI) (that is, threat data). STIX is a format, not a transport
protocol. It requires a protocol, such as TAXII or pxGrid, to
carry it between consumers and producers of the STIX data.
subscriber A pxGrid participant that subscribes to a topic
of interest and is notified when that data is retrieved or
updated.
supplicant The software on an endpoint that understands
how to communicate with EAP over LAN (802.1X).
T
temporal agent A temporary executable file that is run on
a client to check compliance status. The Cisco temporal
agent is run at the time of connection to the network and is
removed after the login session is terminated.
topic A list of information that is available for pxGrid
subscribers, which might include session data or a list of
vulnerable endpoints.
trusted authority An entity whose signature is considered
valid.
Trusted Automated Exchange of Intelligence
Information (TAXII) A protocol used to exchange CTI over
secure communication (HTTPS). TAXII is designed
specifically to carry STIX CTI. TAXII follows a pub/sub model,
much like pxGrid.
TrustSec A Cisco solution that simplifies the provisioning
and management of secure access to network services and
applications. By classifying traffic based on the contextual
identity of the endpoint versus its IP address, Cisco TrustSec
enables more flexible access controls for dynamic
networking environments and data centers. MACsec is also
grouped into TrustSec as an option to encrypt at Layer 2,
hop by hop.
TrustSec domain A chain of trust in which the Security
Group Tags and security group ACLs are all downloaded
from the same trusted source, well-known authentication
methods are used, and SGTs are propagated throughout.
tunneled EAP An EAP method that involves building a
secure tunnel between the supplicant and the
authentication server. Native EAP communication occurs
within the secure tunnel.
two-factor authentication A more secure method of
providing authentication credentials that requires two
separate pieces of information for the user authentication to
be successful. Typically this is something you know and
something you have to prove your identity. An example of
two-factor authentication is using an ATM machine to
withdraw money from your checking account and needing
your physical bank ATM card plus your secret PIN code to
prove your identity.
U–V–W
user identity group A group that has associated internal
user accounts that sets the type of internal account being
created.
vendor-specific attributes (VSAs) Attributes that
developers and various network access device vendors use
to extend RADIUS to perform other functions and carry
information within RADIUS.
vulnerability A weakness in computer software or
hardware. Also known as a security hole. The term vuln is a
shortened form of vulnerability.
Web Authentication (WebAuth) A process in which an
end user submits credentials to the authentication server
through an interactive web page. WebAuth is used when
stronger authentication (such as 802.1X) is unavailable.
Appendix A
Chapter 3
1. b. Explanation: EAP communication occurs between
the supplicant and the authentication server. The
authenticator acts as a middleman and encapsulates
the unmodified EAP frames within the RADIUS
communication to the authentication server.
2. b. Explanation: For purposes of the SISE 300-715
exam, only Cisco AnyConnect NAM 3.1 and newer are
capable of running EAP chaining. However, in
December 2019, Microsoft released EAP chaining
support as part of its initial TEAP offering, in
conjunction with Cisco’s ISE Version 2.7. However, the
SISE 300-715 exam predates this release.
3. c. Explanation: The outer identity provides a
mechanism to authenticate the identity of the
endpoint during the tunnel establishment phase.
4. a. Explanation: IEEE 802.1X must use RADIUS or
DIAMETER (but DIAMETER is beyond the scope of the
SISE 300-715 exam).
5. d. Explanation: Supplicants have the option of not
authenticating the server certificate. In addition, EAP-
FAST offers the ability to use PAC files instead of
certificates for tunnel establishment. DNS would not
be a requirement for EAP since EAP communication
occurs at Layer 2. While the supplicant could be using
a certificate that was issued by the authentication
server, a client certificate is not required and could be
issued by any certificate authority.
6. d. Explanation: A Protected Access Credential (PAC)
is a type of secure cookie that can be used instead of
or in addition to a certificate.
7. a. Explanation: MS-CHAPv2 cannot be used with ISE
when the identity store is LDAP.
8. b. Explanation: The tunnel mechanism is unrelated
to the ability to do machine authentication. The
requirement is simply that EAP-MS-CHAPv2 or EAP-
TLS must be the authentication method.
9. c. Explanation: The three main components of
802.X are the authentication server, the supplicant,
and the authenticator.
10. b and c. Explanation: Extensible Authentication
Protocol (EAP) is an authentication framework that
transports credentials. Traditional, or native, EAP
types include EAP-MS-CHAPv2, EAP-TLS, and EAP-GTC.
A tunneled EAP type is able to use native EAP types
as its inner method. Examples of tunneled EAP types
are PEAP, EAP-FAST, EAP-TTLS, and TEAP. There is no
such thing as machine EAP, and EAP chains bind
multiple EAP types together.
Chapter 4
1. b. Explanation: The available option for non-
authenticating endpoints is MAC Authentication
Bypass (MAB). For headless endpoints, Web
Authentication and EasyConnect would not be
appropriate because there would be no user
interaction or authentication.
2. b. Explanation: With non-authenticating endpoints,
the authenticator (a switch, for example) may be
configured to send the MAC address of the endpoint
to the authentication server in a RADIUS Access-
Request message. This process is known as MAC
Authentication Bypass (MAB).
3. d. Explanation: With MAB, it is not recommended to
use VLAN assignment, but MAB authorizations do not
limit the authorization results.
4. b. Explanation: The benefit of using EasyConnect is
that no PKI or 802.1X supplicant is required. The
Active Directory login is passively mapped to a MAB
network session. This provides an ISE administrator
with a way to easily roll out basic network access with
user authentication.
5. a and c. Explanation: While EasyConnect can be
auto-configured using a domain administrator
account, it does not require one; it also does not
require an agent to be installed on the domain
controller. The domain account that ISE uses to
access Active Directory does require permission to
access WMI remotely and access to read the security
event log of the domain controller.
6. a. Explanation: The four main non-802.1X
authentication use cases are WebAuth (CWA and
LWA), MAB, EasyConnect, and remote-access VPNs.
7. b. Explanation: When gathering additional data
from probes, ISE can further identify an endpoint by
using profiling.
8. c and e. Explanation: Centralized Web
Authentication uses a web portal that is hosted on ISE
to receive the user’s credentials. The authenticator
sends a MAB request to ISE, and ISE responds with a
RADIUS Access-Accept and a URL redirection, and
often a dACL limits the access to the network. After
the credentials are received through the web portal,
ISE sends a Change of Authorization (CoA) to the
authenticator, causing reauthentication. The
reauthentication maintains the same session ID, and
ISE is able to tie the user’s credentials to the MAB
request and send the final authorization results for
the end user. With EasyConnect, ISE passively maps
an Active Directory login to a MAB network session.
9. b. Explanation: There are many different
“headless” endpoints in an organization, such as IP
phones, IP cameras, printers, badge readers, IV
pumps, and medical imaging systems. Some of these
endpoints do not have supplicants. For those that do,
the enablement and configuration of supplicants on
the disparate endpoints could be very complicated or
operationally difficult for the company. Many such
devices do not have a central management platform
that is capable of configuring each supplicant across
large numbers of devices deployed at scale.
Therefore, MAB is chosen to provide network access
to such headless devices.
10. a. Explanation: In ISE Version 2.1, DCHP and DNS
services were introduced for third-party NADs that did
not support CoA with URL redirection. Instead, an
authentication VLAN would be utilized, and ISE would
deliver a DHCP address to the endpoint. Subsequent
DNS requests would redirect the endpoint’s browser
to ISE’s centralized portal for authentication.
Chapter 5
1. b. Explanation: A RADIUS CoA allows an
authentication server to trigger a reauthorization.
This provides an opportunity for the server to update
a user’s level of network access as the server learns
additional information about an endpoint, such as
endpoint posture information.
2. c. Explanation: In a situation where a CoA is
warranted, an authentication server can perform a
number of actions, including no COA (that is, do
nothing), port bounce (that is, whether to shut the
relevant access port), or reauthenticate (that is, force
the endpoint to reauthenticate in cases where
multiple endpoints are present on a single access
medium). Supported CoA actions may vary depending
on the authentication server.
3. c. Explanation: Devices that don’t have an 802.1X
supplicant available use MAC Authentication Bypass.
Without the supplicant, a device does not recognize
EAP messages and, therefore, EAP authentication
techniques are not available. In the absence of EAP, a
device uses its MAC address as its unique identifier to
authenticate to the network.
4. d. Explanation: The first three octets of a MAC
address are the organizationally unique identifier
(OUI), which indicates the vendor that manufactured
the device. This information can be useful, at times,
in determining the function of the device (for
instance, an IP phone or printer).
5. a. Explanation: Oftentimes, “dumb” network
devices lack 802.1X supplicants. From this list, a
printer would be the most common device to lack
802.1X support. Other examples include IP phones, IP
cameras, and badge readers.
6. c. Explanation: Prior to the introduction of MAB,
there was not a mechanism to authenticate a device
based strictly on the device’s MAC address. The
switch port would therefore be configured without
port security or any level of end-user or device
authentication. This would allow any device—either
the intended device or an unintended rogue device
that was plugged in to that switchport—to have
unfettered access to the network.
7. d. Explanation: Through posture checking, an
endpoint can be checked for file conditions
(existence, date, and version), registry conditions
(whether a registry entry is present), and service
condition (whether a service is running). Posture
checking also can confirm the presence, absence, and
status of antivirus and antispyware programs running
on the endpoint.
8. d. Explanation: When using posture assessment as
a condition for authorization policy, the value of the
PostureStatus condition can be Compliant,
NonCompliant, or Unknown. Different levels of
network access or remediation can be authorized
based on the status of this variable.
9. b. Explanation: To remediate a noncompliant
endpoint, a redirect ACL must be defined on the
switch, and the redirect destination must be set to
the remediation portal.
10. d. Explanation: A mobile device manager is a third-
party appliance or service that provides advanced
posture assessment for mobile endpoints. A mobile
device manager can determine the type of mobile
device, the level of the operating system on the
endpoint, the presence or absence of a PIN lock, and
whether encryption is being used, and it can provide
remote security services such as device lock and
secure wipe. Depending on the mobile device
management (MDM) vendor chosen, additional
services may be available.
Chapter 6
1. c. Explanation: Cisco Identity Services Engine (ISE)
is a network security and policy platform. Using Cisco
ISE, a network administrator can maintain and serve
security policy to all network devices from a central
location.
2. a, d, e, and g. Explanation: Cisco ISE has four
personas: Administration, Monitoring, Policy Services,
and pxGrid.
3. a. Explanation: Cisco ISE’s Administration persona
is the instance of Cisco ISE where policy configuration
actually happens. This persona distributes the policy
to all other nodes.
4. d. Explanation: The Cisco ISE Monitoring persona
provides a platform for logging and reporting data
from the Cisco ISE deployment. As a user or device
authenticates and authorizes to the network, the
ability to monitor and log those AAA events is the
responsibility of the Monitoring persona.
5. c. Explanation: The Cisco ISE Policy Services
persona provides policy decision making. As a user or
an endpoint attempts to authenticate to the network,
the PSN is responsible for making the AAA decisions
based on the policy as downloaded from the Cisco ISE
Policy Administration node (PAN).
6. a. Explanation: The NAD sends a RADIUS access-
request to ISE policy services nodes and the RADIUS
response will contain attribute/value pairs (AV pairs)
that contain the security policies such as
downloadable ACLs, VLAN assignments, and security
group tags (SGTs) to perform the enforcement.
7. b and c. Explanation: If you choose to deploy ISE as
a virtual appliance, it is paramount that you allocate
the appropriate virtual resources to best emulate the
equivalent SNS-36xx physical appliance. Also, you
should reserve 100% of these resources to ensure
that other virtualized network functions do not starve
ISE of the resources.
8. d. Explanation: In a single-node Cisco ISE
deployment, all ISE personas reside on a single
appliance. In this type of deployment, there are no
options for redundancy. For instance, if the Policy
Services persona fails, or if the physical appliance
fails, RADIUS authentications and authorizations fail
until the issue can be resolved.
9. f. Explanation: In a hybrid Cisco ISE deployment,
the Administration and Monitoring personas are
combined on two of the appliances; each of them
acts as primary on one appliance and secondary on
the other appliance. On the remaining two
appliances, only the Policy Services persona is
configured.
10. f. Explanation: In a fully distributed ISE
deployment, the ISE Administration and Monitoring
personas each reside on a separate appliance (or a
separate pair of appliances if redundancy is required).
The Administration and Monitoring appliances will
each be an SNS-3695 appliance (or equivalent virtual
appliance). With these Administration and Monitoring
functions distributed, up to 50 PSNs can be deployed,
with a maximum of 2,000,000 endpoints.
Chapter 7
1. d. Explanation: The best way to ensure a secure
connection is by encrypting the communications
between ISE and the device that is being used for the
administrative portal. If HTTP were used, any device
in the network flow between the administrative
device and ISE could eavesdrop or play “man-in-the
middle” on the communications, either compromising
the administrative credentials or surreptitiously
injecting a different security policy. To prevent this
from happening, ISE leverages HTTPS, which encrypts
all traffic between the administrative device and ISE,
to ensure that the traffic sent from the administrative
device arrives securely, without compromise. SSH
and SCP are not protocols that are typically used for
GUI-based portals.
2. b. Explanation: Before the initial secure connection
with ISE can occur, ISE generates a self-signed
certificate. This certificate is not signed by a trusted
certificate authority (CA) (either a local CA or a third-
party public CA), so you might see a security warning
in the web browser that is being used for
administrative access. If you are confident that a
man-in-the-middle or other nefarious device is not
presenting this certificate, you can permanently
accept the certificate in the web browser to suppress
these security warnings in the future. Ideally, it is
best to install a certificate from a trusted CA (a CA
that already exists in the browser store, either a local
CA or a third-party public CA) in ISE. Doing so also
prevents these security warnings from popping up in
the future.
3. a. Explanation: The Operations tab of Cisco ISE
allows an administrator to monitor, report, and
troubleshoot active authentication and authorization
sessions.
4. c. Explanation: The Policy tab of the Cisco ISE GUI
allows an administrator to configure authentication,
authorization, profiling, posture, client provisioning,
and security group access.
5. b and d. Explanation: The Administration
component of Cisco ISE can be used to configure all
setup-type functions of ISE. These functions are often
set up one time and rarely modified thereafter.
Certificates and network devices are two items that
are configured under the Administration component
and are rarely modified after their initial
configuration.
6. b, c, and e. Explanation: When adding a new NAD
to Cisco ISE, you must provide a device name and a
device IP address. If you intend to use Cisco ISE as a
RADIUS server for authentication and authorization
(which is the usual purpose of Cisco ISE in a network
deployment), you also need to add a shared secret
key for RADIUS. The RADIUS server IP address is
configured on the NAD pointing to Cisco ISE. Mobile
device managers and SGA AAA servers are unrelated
to the network device configuration.
7. c and e. Explanation: When an endpoint attempts
to access the network, it automatically sends a
number of different packets onto the network; this is
normal communication for a networked device. The
information contained within these packets can often
be leveraged by ISE to determine the type of device
that is sending the information. The MAC address of
the endpoint, learned either via EAP or via MAC
Authentication Bypass (MAB) on the NAD, is
forwarded to ISE via RADIUS. The endpoint’s DHCP
requests to get an IP address can also be sent to ISE,
allowing ISE to extract key identifying information
from this DHCP process. Finally, HTTP(S)
communications between the endpoint and ISE
portals can be used to further identify the type of
device that is accessing the network. Using RADIUS,
DHCP, and HTTP (and other protocols), ISE can make
a pretty good determination as to the type of device
that is accessing the network. ISE currently does not
support the use of SSH or FTP for profiling an
endpoint.
8. a. Explanation: During the client provisioning
process, the necessary credentials and configurations
are deployed to the endpoint, allowing the endpoint
to automatically join the network in the future with
little or no interaction from the user.
9. c. Explanation: pxGrid is an API that integrates ISE
with third-party ISE ecosystem partners.
10. c. Explanation: Quarantine in ANC means nothing
without a corresponding ISE security policy. That
security policy can provide access that is as
restrictive or liberal as an ISE administrator wants it
to be. It can grant full access to the network or
completely remove access for the quarantined
endpoint.
Chapter 8
1. c. Explanation: The permissions needed to join ISE
to AD are Search Active Directory (to see if the ISE
machine account already exists) and Add Workstation
to Domain (if it does not already exist). An optional
permission is Set Attributes on the New Machine
Account (OS type and version).
2. b. Explanation: The show application status ise
command list all the ISE processes and the status of
each one.
3. c. Explanation: In both HTTPS and TLS connections,
certificates are used to authenticate the server to the
client and act as the basis for the encrypted transport
between the client and the server.
4. b and c. Explanation: Currently, ISE is supported
only on virtual machines and physical appliances.
5. b. Explanation: The show application status ise
command lists all the ISE processes and the status of
each of them.
6. a. Explanation: Use an NDG as the condition by
which to build different policy sets for the staged
deployment of ISE.
7. b. Explanation: The Admin certificate usage is only
for the ISE Admin portal that the administrator logs in
to.
8. a, c, and d. Explanation: There are three default
top-level network device groups, but you can create
additional customized NDGs.
9. c. Explanation: A certificate authentication profile
serves as the identity source for certificate
authentications and defines the field of a certificate
whose data will be extracted and used as the
principal identity for the authorization process.
10. a, d, and e. Explanation: The AD account to join ISE
to the domain does not require Domain Admin
permissions. It simply needs to be able to search
Active Directory to see if the ISE machine account
already exists, add a workstation to the domain if it
doesn’t already exist, and set OS and version
attributes on the new machine account it creates.
Chapter 9
1. b. Explanation: The RADIUS packet must have
Service-Type, which dictates the method of
authentication, set to Call-Check. The Calling-Station-
Id field must be populated with the MAC address of
the endpoint.
2. b. Explanation: As this book went to press, only
EAP-FAST and TEAP (RFC 7170) had EAP chaining
capabilities.
3. c. Explanation: An authentication policy is meant to
drop traffic that isn’t allowed. If traffic is using an
authentication protocol that is configured, the policy
routes authentication requests to the correct identity
store to validate the identity and passes successful
authentications over to the authorization policy.
4. b. Explanation: Only the Process Host Lookup
checkbox must be selected in the allowed protocols
list for Cisco MAB to work.
5. a, b, and d. Explanation: Reusable conditions are
saved in the library for reuse.
6. d. Explanation: Create one rule for each EAP-Type
under the policy set’s authentication policy that
points to the appropriate identity store for each rule.
7. d. Explanation: The Called-Station-ID attribute is
used to match the source SSID.
8. d. Explanation: The Calling-Station-ID attribute
contains the MAC address of the endpoint.
9. c. Explanation: The continue option is used to send
an authentication to the authorization policy, even if
the authentication was not successful.
10. a. Explanation: The Conditions Studio allows you to
create and edit conditions. It is not where the result
of an authentication rule is set or modified.
Chapter 10
1. d. Explanation: An authorization profile is a
required authorization result that is made up of
multiple RADIUS attributes. These RADIUS results
affect the ultimate security policy deployed to the
NAD on behalf of the endpoint.
2. b. Explanation: It contains the RADIUS response
Access-Accept or Access-Reject along with the
additional authorization attributes to be sent to the
network device for enforcement.
3. d. Explanation: dACL name, web redirection, Local
WebAuth, and auto smart port are common tasks that
are sent to a NAD for secure policy enforcement of
the endpoint.
4. a. Explanation: An authorization policy contains
authorization rules, and each rule has at least one
authorization profile.
5. a. Explanation: Condition attributes can be saved
into a library for future use and improved readability.
6. b. Explanation: It contains the voice domain
permission (cisco-av-pair = device-traffic-class =
voice), which authorizes the endpoint to access the
voice VLAN assigned to the interface.
7. c. Explanation: A simple condition contains only
one attribute. A compound condition contains
multiple attributes along with an operator such as
AND or OR.
8. a. Explanation: A hierarchical compound condition
can contain a mixture of simple and complex
conditions to meet the demands of a security
requirement.
9. d. Explanation: The end goal of a Cisco Secure
Access deployment is to provide very specific
permissions to any authorization to provide defense-
in-depth while meeting the goals of the organization’s
security policy. A printer, for example, should not
have unfettered access to the network but should
have only what is needed (such as reaching the print
servers).
10. c. Explanation: Cisco dACLs are created entirely on
the RADIUS server, and a full ACL is sent down to the
network device within RADIUS AV pairs. Non-Cisco
network devices must create ACLs on individual local
network devices. This allows a Cisco administrator to
create and maintain the access lists in a central place
and have any changes applied nearly instantly.
Chapter 11
1. c. Explanation: 802.1X requires global-level
configuration for AAA servers, such as enabling
802.1X on the system, configuring Change of
Authorization, and enabling VSAs. In addition, each
interface that will be performing authentication
requires interface-level commands.
2. b and d. Explanation: When interacting with an
advanced RADIUS server, such as Cisco ISE, Cisco
WLCs require that the same ISE PSN be configured as
the authentication and accounting server for the
WLAN. In addition, RADIUS NAC must be enabled on
the Advanced tab for the WLAN configuration.
3. b. Explanation: Cisco switches can be configured to
send syslog messages to the MnT node, where the
data is correlated as part of the authentication
reports.
4. a. Explanation: The switch sends periodic test
authentication messages to the RADIUS server (Cisco
ISE), looking for a RADIUS response from the server
(either an Access-Accept or Access-Reject). The
username and password in the automated test must
exist in the configuration.
5. b. Explanation: Device tracking must be enabled in
order to capture the IP address of an endpoint.
6. c. Explanation: FlexAuth allows a network
administrator to set an authentication order and
priority on a switch port, thereby allowing the port to
attempt 802.1X, MAC Authentication Bypass, and
WebAuth, in this order. All these functions are
provided while maintaining the same configuration on
all access ports, thereby providing a much simpler
operational model for customers than traditional
802.1X deployments.
7. d. Explanation: Multi-Hosts mode is not commonly
used, but it is a valid option. Much like Multi-Auth
mode, Multi-Hosts mode is an extension to MDA.
There is one authentication on the voice domain, and
there is one authentication on the data domain. All
other hosts on the data domain are allowed onto the
network using the first successful authentication. It’s
an “authenticate one, allow the rest” model.
8. a. Explanation: The authentication port-control
auto command enables authentication on a port and
allows the authorization result to be sent from the
RADIUS server.
9. c. Explanation: The show aaa servers command
gives you a quick and simple way to see the current
status of the ISE server from the switch’s perspective.
10. d. Explanation: The show authentication
session interface command shows that
authentications are being attempted, shows which
ones are successful, shows what authorization results
have been assigned, and much more. Some of the
information that is quickly provided by this
command’s output include the endpoint’s MAC
address, the authentication method used, any
assigned redirect URL, access control lists, and other
RADIUS AV pairs provided via the authentication and
authorization process.
Chapter 12
1. d. Explanation: The Cisco switch needs the HTTPS
server to be enabled in order to redirect HTTPS traffic.
Before that service can be enabled, the switch needs
a certificate. A hostname and domain name must be
configured to provide the switch a fully qualified
domain name.
2. b. Explanation: A traffic-filtering ACL may be
downloaded from ISE to a switch as a dACL, but the
redirection ACL must preexist on the switch and is
called using a RADIUS AV pair. The AirespaceOS-
based Cisco WLCs support only locally configured
ACLs, which are also applied through the use of a
RADIUS AV pair.
3. c. Explanation: ISE NAC is a critical setting for a
WLAN that enables URL redirection and the pre-RUN
states. Without this setting, CWA is not possible. On
some WLC versions, the ISE NAC may still be
displayed as a RADIUS NAC in the UI.
4. b. Explanation: CWA is controlled by the
authorization policy. Even an unknown MAC address
needs to “continue” out of the authentication policy,
so the appropriate response may be sent to the NAD,
including the URL redirection to the portal.
5. b and d. Explanation: The first rule should match if
no more specific authorization rule is used, and it
should redirect the user to the CWA portal. The
second rule type should exist above the redirection
rule, and it should allow access to the user after the
user successfully authenticates to the CWA portal.
6. d. Explanation: Web Authentication is used mainly
when a device is not capable of performing a stronger
user authentication, such as when a device does not
have an 802.1X supplicant. If a device does not have
a supplicant, you should not change VLANs on it.
Without a supplicant, the device does not normally
have the ability to recognize the change and request
a new IP address. However, you can still use VLAN
changes. There are tricks of the trade, such as
implementing very short DHCP lease times to help
enable that VLAN change on devices that do not have
supplicants. TrustSec tags (SGTs) are always a great
idea for microsegmentation, and they are not
mutually exclusive with any segmentation
techniques.
7. c. Explanation: With CWA, the NAD sends a MAB to
ISE, and ISE responds with an Access-Accept that
redirects traffic to a web portal hosted on the active
ISE node. The user enters credentials into that web
portal, and ISE sends a CoA-ReAuth down to the NAD.
At that point, a new MAB authentication with the
same SessionID is sent to ISE, and it binds the Web
Authentication and the MAB together and then sends
the final authorization result back to the NAD in
response to the MAB authentication. The
configuration of the NAD is different for wired and
wireless, although the ISE configuration can be the
same, and the overall process is also the same.
Different policy sets for wired and wireless could be
leveraged, but this is not a requirement.
8. d. Explanation: The show authentication
session interface [interface-name] command is like
the Swiss Army knife of show commands for
authentications. Its output shows the MAC address, IP
address, the dACL (listed as an ACS ACL), the URL-
Redirect ACL, and the URL the end user is being
redirected to.
9. b. Explanation: Cisco ISE has a phenomenally
useful built-in tool that is commonly called Live Log.
Live Log provides a near-real-time view of every
incoming authentication, Change of Authorization
(CoA), and more. You can also leverage Operations >
RADIUS > Live Sessions or reach Live Log through
Work Centers > Network Access > Overview >
RADIUS Livelog.
10. a. Explanation: The CoA is a key function.
Specifically, it is a CoA-Reauth and causes a switch to
reauthenticate the endpoint without starting a new
session. The switch sends another MAB request to
ISE, which is able to tie the guest authentication from
the centralized portal to the MAB request from the
switch and assign the appropriate permission.
Chapter 13
1. d. Explanation: When a guest logs in, endpoints are
added to groups to make it easy to assign guest
access to an endpoint when it joins a network and not
negatively impact the guest’s user experience.
2. b. Explanation: A guest is a user or device that is
not a corporate employee or corporate-owned
endpoint. This user type could be a visitor, contractor,
consultant, or customer. Guest accounts are created
to allow these users to authenticate and gain Internet
access.
3. a, c, and d. Explanation: There are three default
guest portals with ISE: hotspot, self-registered and
sponsored guest portals. SAML and social login are
options for portal authentication.
4. a, c, e, and f. Explanation: While ISE allows you to
create your own guest types, four default guest types
are preconfigured: daily, weekly, contractor, and
social. Each guest type has unique attributes, such as
the lifetime for which the guest account may exist,
hours the guest may be active on the network, and
the number of devices the guest may use.
5. b. Explanation: A guest who connects to the
network with an unknown device is redirected to the
guest portal. Which portal a guest is redirected to is
based on the configuration of ISE. Often, a special
wireless SSID is used as the source condition. After
the guest is registered, the device is added to the
endpoint identity group so the guest is not redirected
in subsequent connections.
6. d. Explanation: Members of GROUP_ACCOUNTS can
edit, delete, reinstate, and approve all guests created
by sponsors who are members of the same group.
They cannot, however, work with guest accounts
created by other groups.
7. b. Explanation: Sponsor groups exist to assign
common permissions to multiple sponsors. When a
sponsor is a member of more than one group, the
permissions are additive, and the sponsor receives a
combination of the least-restrictive permission from
all the groups.
8. c. Explanation: While a sponsor could connect
directly to the PSN with the correct port for the
sponsor portal listener, this is not a very user-friendly
process for the end users who are sponsoring guests.
The sponsor portal has a field to configure an FQDN
that acts as a “friendly name” to make it easy for the
end user, and the PSN uses that friendly name to
identify that the traffic is destined to the sponsor
portal. In addition, when a guest registers, an
approval notification can be sent to the sponsor, and
the sponsor can respond to approve the request.
9. a. Explanation: The guest portal and the sponsor
portal are fully customizable, and there are built-in
templates to make customization easy. Advanced
customizations can be performed offline and
imported.
10. c. Explanation: SAML authentication replaces the
identity source sequence (ISS) for a guest or sponsor
portal, as ISS’s and SAML authentications are
mutually exclusive. SAML is available for guest and
sponsor portals to leverage the organization’s single
sign-on solution for a better end-user experience.
Chapter 14
1. a. Explanation: Profiling probes are enabled under
the PSNs in a deployment.
2. a. b, and d. Explanation: There is no such thing as
an EndPointProfile attribute. While an OS scan is used
as a condition to determine an endpoint’s profile, it
cannot be used directly in an authorization policy. An
authorization policy may use identity groups (which
contain lists of MAC addresses), the EndPoint Policy
attribute (which is the actual endpoint profile), and
logical profiles (groups of profiles).
3. a and d. Explanation: The SNMPQUERY probe
periodically queries all the NADs configured with
SNMP strings, but it is also a reactive probe. The
SNMPQUERY probe reactively queries a NAD when the
RADIUS probe receives an accounting START message
or when an SNMP trap is received.
4. b and c. Explanation: A WLC can send DHCP
information to ISE either using Device Sensor, which
sends the information via the RADIUS accounting
packets, or by bridging DHCP to the LAN, which then
has an IP helper address send that information to ISE.
A WLC cannot send DHCP information to ISE by using
the DHCP proxy.
5. a. Explanation: Cisco no longer includes profile
updates within ISE version updates or patches. All
new profiles are included and downloaded as part of
Cisco Profiler Feed Service.
6. c. Explanation: Profiling relies on the certainty
value. Each profile has a minimum certainty value,
and matching the conditions increases the certainty
value. The higher the certainty value of any profile,
the more likely it is to be assigned.
7. a. Explanation: There are several places in the ISE
GUI where this can be found but probably the easiest
place is under Context Visibility > Endpoints >
Endpoint Classification.
8. b and d. Explanation: HTTP User-Agent strings can
be gleaned through SPAN monitoring, VACLS, and
directly from the ISE web portals. Wired switches do
not currently have an HTTP Device Sensor probe, but
wireless controllers do.
9. b and c. Explanation: With IOS Device Sensor, ISE
gets the same information it would get from DHCP
without having to place an IP helper address on the
Layer 3 interface and the SNMPQUERY probe.
10. c. Explanation: Profiles are classified as Cisco
Provided, Administratively Modified, or Administrator
Created. Only Cisco Provided profiles are overwritten.
Chapter 15
1. b. Explanation: The signing CA’s public key must be
imported into ISE’s certificate store, and it must be
stored under Administration > System > Certificates
> Trusted Certificates, for the Trust for Client
Authentication use case.
2. d. Explanation: It’s very important to understand
that the Valid-From field is just as important as the
Valid-To field. A certificate is rejected if it is issued for
a date and time after the current date and time. NTP
is therefore critical for PKI.
3. b and d. Explanation: ISE supports both CRL and
Online Certificate Status Protocol (OCSP). OCSP is the
preferred method for scalability and security reasons.
There is no such thing as Secure Authentication
Mechanism Language; SAML stands for Security
Assertion Markup Language. OAuth is not used for
certificate status verification.
4. c. Explanation: ISE only leverages the CRL
distribution point configured within the trusted
certificate store for that signing CA and ignores the
field that is in the client’s certificate.
5. a. Explanation: ISE sends some “throw-away data”
to the client that is encrypted with the combination of
ISE’s private key and the client’s public key (the
certificate sent for authentication). Then the endpoint
decrypts the data with the combination of its private
key and the server’s public key, proving the client has
the full key pair and not just a copy of a public key.
6. c. Explanation: A certificate issued by Active
Directory Certificate Services is still just an X.509
certificate. It goes through all the same
authentication validation as any other certificate,
regardless of the fact that the CA was integrated into
AD. The CAP extracts the user’s identity from the
fields in the certificate for the authorization with AD.
7. b. Explanation: While both EAP-TLS and EAP-GTC
are native EAP types capable of performing
certificate-based authentication, EAP-TLS is more
common. EAP-TTLS and EAP-FAST are tunneled EAP
types, both of which are capable of having EAP-TLS as
an inner method.
8. d. Explanation: Allowed protocols, CAP for an
identity store, and trusting the signing CA for client
authentication are all that is required. Certificate
revocation checking and the authorization rule are
both optional.
9. c. Explanation: Many certificate authorities have
websites that permit administrators to download their
public certificates and even the full certificate chains.
This chapter provides an example of downloading the
key from a Microsoft CA. Navigating to this web page
and downloading the certificate is how an ISE
administrator might obtain the public certificate of
the signing CA to trust for client authentications.
However, it is not recommended to use PKCS chain
files unless there is no other option. Always use
Base64-encoded files instead of DER-encoded files.
10. b. Explanation: While I’m flattered that you might
want to call me to fix your problems, C is definitely
not the correct answer. The first question that you
would be asked is “What does it say for Failure
Reason in the Authentication Details Report?” and to
do this, you click the details icon. There is no report
named Failed Authentications, and even if there were,
it would not exist under Report. Please do not email
Aaron directly to ask him why things are not working.
Chapter 16
1. b. Explanation: One of the business issues with a
bring your own device (BYOD) model is walking end
users through the process of configuring their
network supplicants to meet corporate policies. The
onboarding process helps end users perform those
actions themselves, without requiring interaction
from the IT department.
2. c. Explanation: In order to maintain a seamless
experience for the end user, a CoA-Reauth message
is used to keep the endpoint connected to the
network and simply cause the supplicant to send
credentials again. At this point, the supplicant uses
the new certificate-based credentials to authenticate.
The end user is completely unaware of the actions. A
CoA-DM (disconnect message) would drop the
endpoint from the network and would provide a poor
user experience. Waiting for a reauth interval or a
disconnect/reconnect to the network would not be an
optimal user experience either.
3. a. Explanation: The software is hard-coded to
prevent guest users from entering the flows. There is
no configuration possible to allow guest users to
enter the provisioning process through the dual SSID
onboarding flows.
4. d. Explanation: In order to onboard, Android needs
to download the Cisco Network Setup Assistant. The
reason for this is due to Android not allowing
unknown apps to be downloaded and executed by
default. Instead, the provisioning app must be
downloaded through the app store.
5. b. Explanation: ISE authenticates any endpoint that
has been configured to authenticate to the network,
regardless of the onboarding status. The policy can
be configured to send an Access-Reject message or to
leave the user in the redirected state to receive a
message explaining the need to configure the device
independently or call their IT department for
assistance.
6. b. Explanation: Apple iOS does not use an app to
perform the provisioning. Instead, it leverages the
native over-the-air (OTA) provisioning that is built in
to the OS to handle the certificate signing requests
and downloading of a network profile.
7. b. Explanation: While an ISE administrator might be
able to remove devices from ISE in the Endpoints
dashboard, end users log in to their My Devices
portal, where they can add or remove devices at
leisure.
8. a. Explanation: The live authentication log does not
show any information about the registration or the
NSA app. It does show all the authentications and the
Changes of Authorization.
9. d. Explanation: ISE enables the use of a native .exe
for Windows and a .dmg for macOS.
10. b. Explanation: The client provisioning policy
determines which NAC agent and NSA wizard to use
and which NSP to send to an endpoint. The policy is
capable of using the operating system as one of
many conditions to determine which result to provide
for an endpoint.
Chapter 17
1. c. Explanation: A Security Group Tag (SGT) is a 16-
bit value that ISE assigns to a user or to an endpoint’s
session upon login. The SGT can represent the
context of the user and device and may be carried in
the Layer 2 frame or communicated through SXP. The
tag is assigned at ingress and enforced upon egress.
2. b. Explanation: Security Group Tags (SGTs) are
considered an authorization result in the ISE
administrative GUI. They are defined within the
TrustSec Work Centers section of the GUI, under
Components.
3. a, b, and d. Explanation: In order to use a Security
Group Tag, the tag needs to be assigned in a process
known as classification. Tags can be assigned
dynamically and downloaded as a result of an ISE
authorization, be assigned manually at the port level,
and mapped to IP addresses and downloaded to SGT-
capable devices.
4. a. Explanation: SXP Version 2 introduced the IPv6
binding and the ability for SXP to automatically
negotiate the SXP version with its peer.
5. d. Explanation: Cisco has developed a peering
protocol (similar to BGP) to allow devices to
communicate their databases of mappings of IP
addresses to SGTs to one another. This peering
protocol is called SGT Exchange Protocol (SXP).
6. a and c. Explanation: Every SXP peer session has a
speaker and a listener. A speaker sends the mappings
of IP addresses to SGTs. The listener receives those
updates and records them. A peer can be configured
to be both a speaker and a listener for the same peer
if both support it. It may have numerous peers as
well.
7. a. Explanation: Native tagging of SGTs includes the
16-bit tag as a portion of the Cisco MetaData (CMD)
field of the Layer 2 Ethernet frame. It may also be
included as part of an IPsec link.
8. b. Explanation: An SGT can be encrypted within a
MACsec-encrypted link between network
infrastructure devices or even an IPsec connection.
The endpoint is never aware of the tag that has been
assigned, so enabling downlink MACsec between the
endpoint and the switch does not help.
9. a and c. Explanation: SGTs can be enforced with
security group ACLs, which are egress ACLs that use
Source and Destination tags as the conditions on
which to invoke the egress ACL. In addition, the ASA,
ASR, Firepower Threat Defense, and ISR can act as
security group firewalls using the Source and/or
Destination tags as ACL conditions.
10. d. Explanation: Uplink MACsec defines the
encrypted connection between network infrastructure
components, and downlink MACsec defines the
encrypted connection between the access-layer
device and the endpoint. While uplink MACsec and
downlink MACsec use different keying mechanisms
today, both still use the same encryption algorithm,
AES-GCM-128.
Chapter 18
1. d. Explanation: The three possible posture
outcomes following the initial connection with the
network are compliant, noncompliant, and unknown.
Compliant implies that the endpoint fully adheres to
the company’s security policy, as configured in ISE.
Noncompliant implies that there is at least one
deviation from the company security policy. Unknown
implies that there is not an agent present on the
device and, therefore, the endpoint is unable to
report its posture to ISE.
2. d. Explanation: The file condition for posture can
check for the existence and check the date and
version of a file on the client. This can be very useful
in determining if a particular endpoint is vulnerable to
a new virus or if a specific software package is
present on the endpoint.
3. c. Explanation: The Stealth Mode Agent is a special
configuration of AnyConnect that hides the
AnyConnect user interface and runs AnyConnect as a
service for posture assessment. If system scan
posture is the only AnyConnect service that is
running, then the AnyConnect icon will not even be
displayed in the system tray, and allows posture to
appear to be operating in an “agentless” fashion.
4. a. Explanation: Remediation is the process by which
an endpoint that is not compliant with security policy
becomes compliant. This may include downloading
the latest virus definitions, installing a service pack,
or launching an application.
5. d. Explanation: A posture lease allows an
administrator to configure ISE to perform posture
assessment in specified intervals for endpoints using
the AnyConnect agent for posture assessment
instead of performing an assessment at every login.
When posture is compliant, a token is issued to the
posture module, and the lease begins. When the
posture lease is active, ISE uses the last known
posture state and does not reach out to the endpoint
to check for compliance.
6. b. Explanation: The ISE admin must configure ISE to
download posture updates which contain the latest
definition files for what endpoint protection software
suites exist, what their latest versions are, the latest
data on hotfixes, and a tremendous number of
preconfigured objects from Cisco. Many TAC cases are
opened due to endpoints failing posture checks, and
the remedy of those cases is simply to update the ISE
and AnyConnect compliance modules.
7. c. Explanation: Mobile platforms are inherently
more locked down than desktop operating systems
and require a device manager to gain the level of
visibility into the endpoint that AnyConnect is able to
achieve with desktop operating systems. ISE has links
to one or more mobile device managers for BYOD
onboarding and also to provide the posture
assessment of the endpoint. AnyConnect is not used
for posture assessment on mobile platforms.
8. a. Explanation: This condition type is for bulk
attribute collection. This check is preconfigured by
Cisco to collect details about the endpoint’s hardware
to aid in the endpoint context visibility aspects of ISE,
which can be viewed in the Context Visibility >
Endpoints > Hardware dashboard. This condition
cannot be used for access control decisions or
posture compliance.
9. c. Explanation: The posture elements contain
conditions, remediations, and requirements.
Conditions and remediations are linked together into
requirements. Requirements are used in the posture
policy.
10. a. Explanation: AnyConnect is a lightweight client
and requires a headend to provide the configurations
and modules to the endpoint. ISE is one of the
possible headends, and Cisco ASA and Umbrella are
two additional headend possibilities. Any of these
headends can update the AnyConnect client and
install modules and provide the configuration. Only
ISE and the ASA are capable of installing AnyConnect
on the endpoint.
Chapter 19
1. c. Explanation: Monitor mode is a process, not just
a command on a switch. The process involves
enabling authentication (with authentication open),
seeing exactly which devices fail and which ones
succeed, and correcting the failed authentications
before they cause any problems.
2. a. Explanation: Low-impact mode uses
authentication open but adds security on top of the
framework was built in monitor mode. It uses a PACL
on the switch port to permit critical traffic of certain
endpoints, such as thin clients, to function prior to an
attempted authentication. After the authentication,
the authorization should provide specific access,
unlike monitor mode, which is the same before and
after authentication.
3. d. Explanation: By using a phased deployment
approach, you are can start off in monitor mode and
gradually transition into the end state of either low-
impact mode or closed mode. By doing so, you can
avoid the denial of service that can so often happen
with 802.1X deployments.
4. b. Explanation: authentication open ignores
RADIUS Access-Reject responses but honors and
enforces all other authorization results.
5. a. Explanation: authentication open allows traffic
to flow with or without authentication. When an
authorization result is sent back from the
authentication server, the switch ignores RADIUS
Access-Reject responses but honors and enforces all
other authorization results.
6. b. Explanation: Policy sets are groupings of
authentication and authorization policies. The use of
policy sets makes for a nice clean way to differentiate
separate rules for each stage of the deployment.
7. d. Explanation: Wireless LANs cannot have a
mixture of authentication and non-authentication. A
WLAN must either use Wi-Fi Protected Access (which
facilitates the 802.1X authentication) or open; it
cannot be both.
8. a. Explanation: The NDG assignment of the NAD is
used to determine which policy set ISE uses for
incoming authentication. It involves moving the NAD
from the monitor mode NDG to either the low-impact
or closed mode NDGs.
9. a. Explanation: Wired clients do not get to pick
their network; there is no SSID as there is for
wireless. Therefore, all the different types of possible
authentication mechanisms must work within a single
port configuration. Otherwise, an administrator would
have to change the port configuration for each type
of device that needs to access the network, which
would be extremely operationally expensive.
10. a. Explanation: Just like the default behavior of the
original IEEE 802.1X, closed mode does not allow any
traffic into the switch port until after a result has been
received for the attempted authentication or a
timeout occurs.
Chapter 20
1. c. Explanation: After a standalone node has been
promoted to primary on the Deployment screen, you
click Register and enter the FQDN and the credentials
for any other node that you want to join the new
primary and form an ISE cube.
2. a and c. Explanation: Two backup types exist: a
configuration (Policy Administration node) backup and
an operational (MnT node) backup. These backups are
separate and must be scheduled separately. An HTTP
repository is a read-only repository and cannot be
used for uploading backup files.
3. d. Explanation: The show udi CLI command and
the GUI provide the three required items: SPID, VPID,
and serial number.
4. b. Explanation: There is no automatic failover, but
there is a manual promotion from the secondary’s
GUI.
5. d. Explanation: There is no automatic failover, but
the ISE nodes are configured to send logging to both
the primary and secondary MnT nodes automatically.
If one fails, the other still receives the logs.
6. c. Explanation: Node groups are made up of PSNs,
and the PSNs maintain a heartbeat with each other. In
the event that a PSN goes down while a session is
being authenticated, one of the other PSNs in the
node group sends a CoA to the NAD so the endpoint
can restart the session establishment with a new PSN.
7. b. Explanation: Cisco ISE is commonly deployed
with load balancers. There are caveats to pay
attention to, such as not using Source NAT (SNAT).
The NAD does not need to know how many PSNs are
in use. It is simply configured for a single RADIUS
server per VIP address. The exception to the rule is
with the CoA configuration. It is often the case that
each PSN must be entered separately as a dynamic
author client (CoA client).
8. b. Explanation: Patches are downloaded from
Cisco.com and applied to the PAN under
Administration > System > Maintenance > Patch
Management. The PAN pushes a patch to the other
nodes in the deployment.
9. d. Explanation: The status of a backup can be
viewed from the GUI or the CLI, but the status of a
restore can only be viewed from the CLI.
10. d. Explanation: It is not configurable; rather, all
nodes are patched, in alphabetical order. The PAN is
patched first and pushes the patch to all other nodes.
Chapter 21
1. d. Explanation: The Evaluate Configuration
Validator tool compares a switch configuration to a
template configuration built into ISE and points out
any differences between these configurations.
2. c. Explanation: The RADIUS Authentication
Troubleshooting tool examines different aspects of a
session and provides details that may not have been
available in the detailed authentication report, as well
as suggestions for items to check next.
3. a, b, and e. Explanation: A support bundle can
include the full configuration database, debug logs,
local logs, core files, MnT reporting logs, system logs,
and the policy configuration. These options are
selectable in the GUI, and all of them are included
automatically from the CLI.
4. b. Explanation: Live Sessions correlates activity
related to the entire session, not just the raw entries
related to a passed or failed authentication.
5. a. Explanation: Live Log displays events related to
the raw syslog messages sent from the PSN to the
MnT node, focused on passed or failed
authentications.
6. d. Explanation: Logging targets are configured
centrally, and the settings are pushed down to each
PSN. Each PSN is configured to send syslog messages
to all configured logging targets concurrently.
7. b. Explanation: An administrator uses the Suppress
Anomalous Clients setting under Administration >
System > Protocols > RADIUS to enable log de-
duplication.
8. b. Explanation: Cisco AnyConnect DART is the
module used to collect all log files from the endpoint
along with other important information. DART
combines all this information into a single condensed
file for analysis by Cisco TAC.
9. c. Explanation: While a firewall can sometimes be a
good place to determine why communication is not
successful, the three main locations to troubleshoot
network access are ISE, the endpoint, and the NAD.
10. b. Explanation: debug epm is the go-to debugging
command for URL redirection, applied dACLs,
assigned SGTs, and other activity related to advanced
capabilities of authentication sessions.
Chapter 22
1. a. Explanation: pxGrid can integrate with third-
party systems to allow for context sharing, Context-
In, context brokering, and rapid threat containment.
However, it cannot ingest threat feeds.
2. a, b, and d. Explanation: EPS, which is considered
pxGrid 1.0, provided three static actions/labels:
Quarantine, Unquarantine, and Shutdown.
3. d. Explanation: EPS always had the ability to
change an endpoint’s SGT or level of access with a
corresponding authorization policy. However, EPS had
only the actions Quarantine and Unquarantine. This
lack of diverse labels gave ISE administrators limited
options if they wanted to have multiple policies to
choose from. ANC allows ISE administrators to create
multiple labels to use with ANC and authorization
policies.
4. a. Explanation: Thanks to the Context-In feature,
ISE can receive contextual information through
pxGrid to help ISE with its own profiling policies.
5. a. Explanation: Starting in ISE Version 2.4, the
maximum number of pxGrid nodes increased from 2
to 4.
6. a, c, and d. Explanation: In order to add a
participant to pxGrid, that user must trust the ISE
certificate authority, have installed a pxGrid
certificate that was either issued by ISE or the CA that
issued ISE’s pxGrid certificate, and have the IP
address or FQDN of the pxGrid controller (ISE)
configured.
7. a. Explanation: pxGrid Version 1 was designed by
extending the Extensible Messaging and Presence
Protocol (XMPP), which is also the communication
protocol used by Jabber.
8. b. Explanation: Beginning in ISE Version 2.3, ISE
added a modernized WebSocket-based interface to
pxGrid to make integration easier. The DevNet
partners were no longer required to integrate a Java
or C library into their applications. Instead, they could
use common representational state transfer (REST)
connections.
9. c. Explanation: In WSA Version 11.7 and later, the
Web Security Appliance can retrieve Active Directory
groups and local ISE groups by using the ISE External
Restful Service (ERS). This feature provides the ability
to configure the WSA’s policies using AD groups.
10. c. Explanation: ANC was added to create multiple
ANC policies that can be assigned to an endpoint.
Chapter 23
1. d. Explanation: Threat Centric Network Access
Control (TC-NAC) enables you to create authorization
policies based on indicators of compromise and
vulnerability attributes received from the threat and
vulnerability products that ISE can be integrated with.
Assigning policies that quarantine an endpoint is part
of Cisco Rapid Threat Containment, not TC-NAC.
2. c. Explanation: AMP does not send CVSS scores;
vulnerability assessment tools do. AMP sends threat
intelligence as indicators and incidents, and they are
not exposed to the authorization policy at all as of ISE
Version 2.7.
3. b. Explanation: A vulnerability is a weakness in
computer software or hardware that is also referred
to as a security hole. An exploit is a weaponized
software package that takes advantage of that
security hole. A virus is a type of exploit.
4. b. Explanation: The AMP adapter does not require a
proxy, but it does require the ability to reach the AMP
cloud on the Internet. If a web proxy is required for
Internet access, the AMP adapter requires it to be a
Socks proxy, not an HTTP/HTTPS proxy. Cisco’s WSA
does offer Socks proxy capabilities, but any Socks
proxy can work—not just the WSA proxy.
5. a. Explanation: Policies are flexible enough to
provide nearly any flow an organization wants.
Waiting for the vulnerability scanner to respond could
create a very slow login process for end users, which
would be very undesirable. The AMP agent does not
communicate to AnyConnect for posture assessment.
ISE communicates to the AMP cloud for threat
intelligence.
6. c. Explanation: When a vulnerability assessment
occurs and the results are sent back to ISE, it is
possible that a CoA needs to occur. When a CoA
occurs, it is recorded in the Coa-Events report, and if
a change of access based on the TC-NAC event
occurs, it is displayed in the TC-NAC Live Log.
7. a. Explanation: CTA uses the standard threat
intelligence data structure known as STIX to
communicate cyber threat intelligence. TAXII is used
to transport the STIX data in a secure manner.
8. d. Explanation: The Threat-Events report indicates
the endpoint’s base CVSS score from the vulnerability
scanner. The Vulnerability Assessment report does
not show scores.
9. c. Explanation: An administrator follows a link to
the AMP public cloud and authorizes the ISE adapter
software to subscribe to events from the selected
endpoint groups. The authorization uses OAuth for
software-to-software authorization. ISE does not
support on-premises AMP private cloud installations.
10. a. Explanation: From the CTA dashboard, you
create a STIX/TAXII API account and then copy the
details into the ISE UI for future use. There is no on-
premises version of CTA.
Chapter 24
1. b. Explanation: Device administration is very
interactive in nature, and the ability to authorize each
command is a critical capability because it means you
will not be forced to authorize one time only. There
are no devAdmin attribute/value pairs; that is made
up. While Cisco did extend TACACS to TACACS+, that
is not an acceptable answer here.
2. d. Explanation: One device administration license
enables the Device Administration work center in the
ISE GUI. The first license enables the work center, but
to be compliant with Cisco’s licensing, one license per
PSN that enables TACACS+ is required.
3. c. Explanation: Each work center in the ISE user
interface provides a common place to perform all
activities related to that work center. The network
resources are the routers, switches, and other devices
that interact with ISE, and they are the same devices
for the Network Access and Device Administration
work centers.
4. a. Explanation: When a deployment is expected to
be very large, it is recommended to maintain
separate ISE cubes (deployments) for network access
and device administration. TACACS is never required
to be enabled on the PAN. It is not possible to have
dedicated MnTs per function within a single ISE cube.
5. d. Explanation: The deployment page in the Device
Administration work center is special. Unlike the
standard deployment page, the work center allows
you to enable or disable TACACS+ on one or all of the
PSNs together as well as set the TCP port that
TACACS+ will use. The default port is 49. There is no
CLI to configure the TACACS+ port.
6. b. Explanation: Work Centers > Device
Administration > Settings > Password Change Control
is where you can globally enable or disable the ability
to change passwords through the TACACS+ session
and configure the strings to be used in the prompts.
7. a. Explanation: TACACS command sets are
designed to permit or deny commands and their
associated arguments. There is no such thing as
device administration command sets. TrustSec tags
have nothing to do with device administration.
8. d. Explanation: It is not possible to configure a
policy to deny device administration access to any
user who has not first passed the network access
authentication. While a few customers have
requested this feature, the network access sessions
and the device administration sessions are
completely separate.
9. a. Explanation: The Device Administration work
center and its policies only relate to TACACS+, but
RADIUS can be used for device administration AAA;
however, those policies have to be configured in the
network access policy sets.
10. c. Explanation: Using a condition such as device
type to differentiate the incoming TACACS+
authentication and authorizations is a common
practice.
Chapter 25
1. b. Explanation: A privilege level defines the level of
access a user has in the IOS shell session. Cisco IOS
provides 16 levels of access privilege. By default, the
higher the level, the more commands and access one
has available to them.
2. a. Explanation: With Cisco IOS devices,
administrative access to the network device console,
Telnet sessions, and Secure Shell (SSH) sessions can
be controlled to authenticate, authorize shell privilege
level, and perform granular per-command
authorization and accounting.
3. c. Explanation: Privilege level 1, known as user
exec mode, is the default level for a user after login.
The shell prompt is the device hostname followed by
the > symbol (for example, Switch>).
4. d. Explanation: Privilege levels 0, 1, and 15 are
defined by default in Cisco IOS. Privilege levels 2
through 14 are available for customization.
5. c. Explanation: When creating AAA method lists,
you can define the primary AAA method as well as
fallback methods. For example, you might configure a
AAA authentication method list to first attempt to use
the TACACS+ server group and, if it is unreachable,
use the local account store on the IOS device.
6. a. Explanation: When configuring a TACACS+
profile, IOS devices use the shell common task type.
7. b. Explanation: The aaa authentication enable
command defines what methods to use to
authenticate from user exec mode to privileged exec
mode.
8. c. Explanation: TACACS+ uses TCP port 49 as the
transport protocol to connect from the TACACS+
client to the TACACS+ server. The easiest way to
troubleshot that TCP connection is to debug the IP
TCP transactions on the switch.
9. c. Explanation: The aaa authentication login
method list can be applied to the vty lines to evaluate
all incoming SSH sessions.
10. c. Explanation: The debug tacacs command
debugs just the TACACS+ packet traces.
Chapter 26
1. c. Explanation: WLC provides role-based access
control (RBAC) on a per-menu basis. A WLC
administrator sees all configuration items in that
menu, but authorization is performed before changes
are applied. So if a user named admin1 does not have
access to the CONTROLLER menu, admin1 can see
the menu and all its items and make changes on the
web page, but when admin1 clicks Apply, an
authorization failure message appears.
2. a. Explanation: WLC applies TACACS access control
to the SSH session and to the HTTP sessions
simultaneously. Cisco WLC does not use access
classes, but IOS does.
3. c. Explanation: An AAA server can respond with a
single role or multiple roles (which are additive). The
exceptions to this rule are the three special roles that
cannot be used with any other roles: LOBBY,
MONITOR, and ALL.
4. d. Explanation: TACACS profiles are used with WLC,
and there is a specific WLC type of TACACS profile.
Command sets are not used by WLC; its RBAC
capabilities are related to entire menus in the WLC UI.
5. b. Explanation: The Task Attribute view is a
graphical front end for creating the raw TACACS
values. You can create a result in either view and
seamlessly switch between the views without losing
your work.
6. c. Explanation: IOS and WLC rules can be in the
same policy set, although it is strongly recommended
to separate them with the use of NDGs in the top-
level condition. RADIUS is not used with device
administration policy sets; only TACACS is. RADIUS
may only be used with network access policy sets.
However, you can use a network access policy set to
perform RADIUS-based device administration AAA.
7. d. Explanation: Due to a default “security setting”
for ISE, any failed authentications show USERNAME in
Live Log until you enable the Disclose Invalid
Usernames setting under Administration > Settings >
Security Settings.
8. a. Explanation: MONITOR provides a read-only style
of access to the WLC. All pages are visible to the
user, but no changes are authorized.
9. b. Explanation: The ISE PSN(s) must be listed in the
authentication, authorization, and accounting lists
under Security > AAA > TACACS+ configuration of
the UI. When you add a TACAC+ authentication
server, the entry in the authorization server list is
added automatically.
10. d. Explanation: The LOBBY role permits access to
the lobby ambassador functions, which remain from
when WLC performed its own guest lifecycle
management. Lobby ambassador on the WLC has
since been superseded by the guest capabilities in
ISE.
Chapter 2
1. Something you know, something you have, and
something you are
2. SAML identity provider (IdP) and social login
3. Identity source sequence
4. Active Directory
5. Identity
Chapter 3
1. EAP-FASTv2 and TEAP
2. A supplicant
3. AnyConnect Diagnostics and Reporting Tool (DART)
4. Windows, when it is a member of an Active Directory
domain
5. AnyConnect Network Authentication Module (NAM)
Chapter 4
1. Many organizations have a large percentage of
endpoints that are IoT devices or otherwise headless
devices, guest endpoints, and VPN users.
2. EasyConnect is easy to deploy quickly, does not
require you to configure supplicants, and is an
alternative to the headaches of 802.1X.
3. Authentication is based on MAC address, which is
easily spoofed. This is why a defense-in-depth
approach should be utilized.
4. CWA is fully compatible with CoA, which offers more
flexibility for authentication and authorization. It also
allows for customized portals.
5. PAP or MS-CHAPv2
Chapter 5
1. A standards-based mechanism to change the AAA
attributes of a session after it has been authenticated
2. Profiling
3. It gathers a series of attributes about an endpoint to
help match it to a profiling policy and identify the
endpoint type.
4. It allows ISE administrators to ensure a minimum
security posture of an endpoint based on the software
or operating system running on it.
5. Support for most mobile devices and phones, remote
wipe, and device backup are a few.
Chapter 6
1. Admin, Monitoring, Policy Services, and pxGrid
2. 2,000,000 endpoints
3. Administration and Monitoring personas running on a
primary and secondary node, with up to five
dedicated policy services nodes
4. Policy Services
5. Policy Services
Chapter 7
1. Some of the criteria that can be used for a global
endpoint search in ISE include username, user type,
MAC address, IP address, authorization profile,
endpoint profile, failure reason, identity group,
identity store, network device name, network device
type, operating system, posture status, location, and
security group.
2. The Context Visibility dashboards are a series of
prebuilt contextual dashboards with data on the
endpoints. ISE administrators can quickly filter
endpoints to customize their view and export the
data.
3. The RADIUS Live Log dashboard provides real-time
information about RADIUS authentication and gives
an ISE administrator the ability to drill into a single
authentication for more details when troubleshooting.
4. Dictionaries, conditions, and results
5. Authentication, authorization, profiling, posture,
client provisioning, and TrustSec
Chapter 8
1. IP address, net mask, default gateway, DNS domain,
name server, NTP server, time zone, and configuring
the initial admin username and password
2. DNS name, IP address, uniform resource name, and
directory name
3. A single certificate can be shared across multiple
hosts in an organization, as long as they have the
same domain name. The disadvantage is that it can’t
be used for EAP authentication, so it’s limited to other
certificate usages in ISE.
4. Network device groups can be used as a condition
when creating network access control policies.
Depending on the network device group that a NAD is
in, a policy can be built to authenticate and authorize
endpoints differently, depending on which NADs they
connect to.
5. Check the permissions on the account that you’re
attempting to join with, make sure that the time
settings on the domain controller and the ISE node
are within 5 minutes of each other, and ensure that
the required ports are open between ISE and the
domain controller
Chapter 9
1. Authentication is the validation of a credential or an
identity.
2. Authorization is the validation of what access should
be granted after an identity has been validated.
3. Accept only allowed protocols, select the correct
identity store, validate the identity, and then pass the
request to the authorization policy.
4. A logical container for an authentication policy and
an authorization policy that allows an ISE
administrator to segment and organize policies into
policy blocks
5. It has Service-Type set to Call-Check for MAB.
Chapter 10
1. To examine conditions in authorization rules in order
to ultimately send an authorization result to a
network access device (NAD)
2. Policies can be built using a myriad of attributes,
such as location, time, whether a device was
registered, whether a mobile device has been jail
broken, or nearly any other attribute imaginable.
Even the authentication can be used as an attribute:
Was authentication successful? Which authentication
protocol was used? What is the content of specific
fields of the certificate that was used?
3. If certain conditions are met, assign the following
permissions.
4. No, authentication alone does not guarantee
segmentation. In order to provide a true defense-in-
depth approach, the access granted must be least-
privilege access.
5. Hierarchical compound conditions can contain a
mixture of simple and complex conditions to meet the
demands of a security requirement. Such a condition
can also minimize the number of authorization rules
needed in the policy.
Chapter 11
1. They define the method lists for RADIUS
authentication, authorization, and accounting. The
RADIUS requests are sent and accepted from the
servers defined in these lists.
2. The authentication method that was chosen, the IP
address of the endpoint, the service-type, and the
class
3. It enabled the NAD to fall back to another
authentication method if the first one failed or timed
out. Instead of having to configure the switch port for
just MAB or just 802.1X, ISE admins could instead
have both configured on a port.
4. Single-Host, MDA, Multi-Auth, and Multi-Hosts
5. authentication port-control auto
Chapter 12
1. RUN state
2. URL redirection
3. MAB or, more specifically, the mab Authc Success
method
4. On the NAD (switch or WLC)
5. The switch uses separate ACLs to control access
through the switch and to control what is redirected
to the web portal. The WLC uses a single ACL to
perform both functions.
Chapter 13
1. The guest portal is used for Centralized Web
Authentication (CWA) and can make it easier for an
employee who is going through the CWA process.
2. Different guest types can have different timelines for
account life, different active hours, and different
permissions.
3. Hotspot portals are designed for use when guest
authentication is not necessary, such as at a coffee
shop. The user just clicks to accept an AUP, and the
MAC address is recorded to prevent the user from
having to revisit the AUP the next time.
4. There is a setting for endpoint purge, which is how
frequently endpoints should be removed from the
endpoint group.
5. The portals are exactly the same except for the
settings that are preconfigured. The portals can be
configured to work exactly the same way if you
change the settings.
Chapter 14
1. ISE Profiler is the part of ISE that is responsible for
endpoint detection and classification. It uses probes
to collect attributes about the connected endpoints.
2. Anomalous Behaviour Detection provides the ability
to discover some MAC spoofing through the
connection type, DHCP Class-Identifier, and changes
to the endpoint policy.
3. NETFLOW, DHCP, DHCPSPAN, HTTP, RADIUS, NMAP,
DNS, SNMPQUERY, SNMPTRAP, Active Directory, and
pxGrid
4. The three different types of CoA action are Reauth,
no CoA, and Port Bounce.
5. This allows an ISE administrator to change a setting
for a specific profile that needs a different CoA type in
order to function. For example, certain non-802.1x
devices might need a Port Bounce in order to trigger
DHCP.
Chapter 15
1. Use Base64 encoding, also called PEM encoding, and
avoid DER encoding when possible.
2. Add the public certificate from each of the possible
issuing CAs and each CA in the issuing chain. In this
scenario, the root, node, and signing CAs must all be
imported and trusted.
3. http://[fqdn-of-CA]/certsrv
4. The private key should never be exported. The public
certificate is meant to be shared.
5. A certificate authentication profile (CAP)
Chapter 16
1. Employees want to use their own devices on an
organization’s network because those devices help
them be productive, thanks to the native applications
running on those devices, which provide the user
experience they are used to and love. In order to
grant this experience, companies need to be able to
identify a user, a device, the device’s compliance,
and more.
2. MDM policies ensure that devices have a minimum
level of security enabled, such as encryption, remote
wipe capabilities, and screen lock (PIN lock).
3. Con: Some manual supplicant configuration is
required by the end user. Pro: A single SSID is used
for onboarding and connection.
4. Pro: There is no manual configuration of the NAD
supplicant required of the end user. Con: A user has
to connect to a different SSID, either automatically or
manually.
5. Certificates can be issued by ISE’s internal certificate
authority and managed locally, or ISE can act as a
registration authority to an external certificate
authority using SCEP. Alternatively, MDM providers
can deliver their own certificates to endpoints
through the MDM onboarding process.
Chapter 17
1. To communicate IP address-to-SGT mappings from
one device to another so that routers, switches, and
firewalls can learn identity information from access
devices
2. To assign a tag to a user’s or device’s traffic at the
point of ingress and enforce the access elsewhere in
the network. This provides flexible enforcement of
east–west and north–south traffic.
3. Classification is the process of assigning a tag to a
user or device. Transport means propagating the tag
throughout the network, either inline or through SXP.
Enforcement is taking action on a SGACL policy or
SGFW to either allow or deny the traffic, based on the
source and destination tags.
4. Dynamic assignment via ISE authorization policy
using normal authentication methods (802.1X, MAB,
WebAuth) and static assignment, using the Layer 2
port, Layer 3 port, VLAN, or IP address, hostname, or
subnet.
5. The switch must know the source SGT, destination
SGT, SGACL policy, and environment data.
Chapter 18
1. Anti-malware conditions replaced both anti-virus and
anti-spyware conditions in compliance module 4.x
and later. Anti-virus and anti-spyware conditions are
only valid in compliance module 3.x and below.
2. Dictionary compound conditions are made up of
simple conditions that you created as an ISE
administrator. Compound conditions are
preconfigured conditions from Cisco.
3. Patch management systems are widely used and
deployed in businesses to keep endpoints up to date,
patched, and posture compliant. The patch
management condition integrates with those tools
and uses them for remediation; it also ensures that
the patch management agents are running and up to
date.
4. When an endpoint fails a posture check (a condition),
the configured remediation action is used to correct
that failure and allow the endpoint to become
compliant. The requirement binds the condition to the
remediation action.
5. The temporal agent is not installed on the endpoint;
it runs in the user’s context. It gets launched from the
web browser and runs in memory with the web
browser. It is not capable of automatic remediation at
all. The stealth mode agent is actually the
AnyConnect System Scan module with a configuration
option that hides the GUI. If no other modules are
enabled, the icon doesn’t even display in the system
tray (Windows) or menu bar (macOS). All user
notification can be suppressed. The stealth mode
agent runs as a service, not in the user space, and it
can therefore perform auto-remediation.
Chapter 19
1. authentication open
2. Access-Reject
3. Network device groups (NDGs)
4. Wi-Fi/wireless networks
5. A phased approach
Chapter 20
1. Anycast
2. Source NAT (SNAT)
3. Configuration and operational
4. Primary PAN and secondary PAN
5. The primary PAN must trust the administrative
certificate on the additional nodes, and those nodes
must trust the administrative certificate on the
primary PAN.
Chapter 21
1. When the string USERNAME shows up in the Identity
column, it means a user has failed authentication.
The column displays USERNAME when the default
security setting to not disclose invalid usernames is
set.
2. Disable the log de-duplication to ensure that all
entries appear in Live Log.
3. The Posture Troubleshooting tool examines the
detailed posture report and displays reasons that an
endpoint might have failed a posture condition.
4. The Endpoint Debug tool sets all logs to debug for
the endpoint and its session only and combines the
entries into a single file for download.
5. DART collects any and all related settings and logs
from an endpoint with AnyConnect to be sent to TAC.
Chapter 22
1. The ultimate goal of pxGrid is to integrate various
Cisco security products and third-party ecosystem
partners to form a security architecture to share
information and remediate threats.
2. The goal of Rapid Threat Containment is to utilize
information or triggers from other Cisco security
products or ecosystem partners to respond to threats
more quickly and to dynamically change an
endpoint’s access.
3. EPS provided ISE a way to assign a policy (label) on
an endpoint that could be used in authorization
policies. The labels available were static in nature:
Quarantine and Unquarantine. This left little room for
additional authorization policies.
4. ANC picked up where EPS left off but also provides
the ability to create multiple custom policies/labels,
which can be used in multiple authorization policies.
This added flexibility and options to Rapid Threat
Containment, where an ISE administrator no longer
has to assign a single policy (quarantine) and have a
single authorization policy tied to it.
5. Context-In is a feature of pxGrid that enables
endpoint attributes and data to be shared from an
ecosystem partner and used for profiling purposes in
ISE. Context-Out enables ISE to share contextual
information with pxGrid participants to enrich their
database.
Chapter 23
1. STIX for the threat intelligence, and TAXII is used for
transport.
2. An indictor shows that an endpoint matched an IoC,
and an incident is an AMP event.
3. Both. A vulnerability scan can be triggered with any
authorization profile and allows flexibility.
4. An entry appears in TC-NAC Live Log only if a CoA
was directly related to a TC-NAC adapter.
5. A vulnerability is a weakness in computer hardware
or software. An exploit is software created to take
advantage of a vulnerability.
Chapter 24
1. TACACS profile
2. TCP port 49
3. TACACS command sets are used for dictating what
commands and arguments are permitted or denied as
part of the authorization result.
4. Retire the secret. It will remain valid for a period of
time, and the new and old secrets will both be usable
for some time.
5. TACACS server sequence
Chapter 25
1. TACACS+ profile
2. PAP/ASCII, CHAP, and MS-CHAPv1
3. Deny Always should be used in a command set when
there is a command that should be denied and should
have higher precedence over a match than any
Permit in that command set.
4. Configuration of TACACS+ authentication and
fallback, configuration of TACACS+ command
authorization, and configuration of TACACS+
command accounting
5. Custom privilege levels need to be configured on
each and every network device that will be used for
device administration. While commands can be
defined for the custom privilege level, this
customization adds administrative burden in terms of
managing the configuration of the privilege level
when it needs to be modified.
Chapter 26
1. Raw view
2. ALL
3. LOBBY
4. Disclose invalid usernames
5. TACACS Live Log
Appendix B
Note
The downloaded document has a version number. When
you compare the version of the print Appendix B (Version
1.0) with the latest online version of this appendix, you
should do the following:
Same version: Ignore the PDF that you downloaded
from the companion website.
Website has a later version: Ignore this Appendix B
in your book and read only the latest version that you
downloaded from the companion website.
Technical Content
The current Version 1.0 of this appendix does not contain
additional technical coverage.
3560-X#sho run
Building configuration...
version 12.2
hostname 3560-X
aaa new-model
ip routing
ip domain-name ise.local
ip name-server 10.1.100.100
ip device tracking
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4076357888
revocation-check none
rsakeypair TP-self-signed-4076357888
certificate self-signed 01
quit
!
dot1x system-auth-control
interface Loopback0
spanning-tree portfast
!
interface Vlan1
no ip address
interface Vlan40
ip http server
ip http secure-server
remark DHCP
remark Ping
end
version 15.0
no service pad
hostname C3750X
boot-start-marker
boot-end-marker
aaa new-model
ip routing
ip dhcp snooping
ip domain-name ise.local
ip device tracking
!
device-sensor filter-list cdp list my_cdp_list tlv name device-
name
epm logging
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-254914560
revocation-check none
rsakeypair TP-self-signed-254914560
certificate self-signed 01
dot1x system-auth-control
ip access-group ACL-ALLOW in
spanning-tree portfast
interface Vlan1
no ip address
shutdown
interface Vlan10
interface Vlan20
interface Vlan30
interface Vlan99
ip http server
ip http secure-server
remark redirect HTTP traffic only permit tcp any any eq www
remark Ping
remark redirect HTTP traffic only permit tcp any any eq www
remark all other traffic will be implicitly denied from the
redirection
logging origin-id ip
end
version 16.9
no service pad
service compress-config
service call-home
no platform punt-keepalive disable-kernel-core !
auth-type any
ip routing
!
!
ip name-server 10.1.100.40
tracking enable
!
!
device-sensor accounting
epm logging
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1546261629
revocation-check none
rsakeypair TP-self-signed-1546261629
certificate self-signed 01
dot1x system-auth-control
redundancy
mode sso
<span epub:type="pagebreak"
id="page_1049"/>monitoring hw-switch switch 1 logging
onboard message !
vlan 100
name DATA
lldp run
ip access-group ACL-ALLOW in
spanning-tree portfast
interface Vlan100
ip helper-address 10.1.100.21
ip default-gateway 10.1.100.254
ip forward-protocol nd
ip http server
ip http secure-server
ip ssh authentication-retries 2
ip ssh version 2
remark redirect HTTP traffic only permit tcp any any eq www
remark Ping
radius-server deadtime 30
key ISEc0ld
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 5 15
end
version 15.1
!
hostname 4503
aaa new-model
ip domain-name ise.local
<span epub:type="pagebreak" id="page_1054"/>!
ip device tracking
!
crypto pki trustpoint CISCO_IDEVID_SUDI revocation-check
none
rsakeypair CISCO_IDEVID_SUDI
revocation-check none
certificate ca 6A6967B3000000000003
certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
dot1x system-auth-control
vlan 40
name jump
vlan 41
name data
vlan 99
name voice
ip access-group ACL-ALLOW in
<span epub:type="pagebreak"
id="page_1056"/>authentication priority dot1x mab
authentication port-control auto authentication violation
restrict mab
spanning-tree portfast
ip dhcp snooping information option allow-untrusted !
interface Vlan1
no ip address
interface Vlan40
ip http server
ip http secure-server
remark redirect HTTP traffic only permit tcp any any eq www
remark DHCP
permit udp any eq bootpc any eq bootps <span
epub:type="pagebreak" id="page_1057"/>remark DNS
remark Ping
logging 10.1.103.4
end
hostname 6503
aaa new-model
!
aaa server radius dynamic-author client 10.1.103.231
server-key Cisco123
ip routing
ip domain-name ise.local
ip name-server 10.1.100.100
ip device tracking
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4076357888
revocation-check none
<span epub:type="pagebreak"
id="page_1059"/>rsakeypair TP-self-signed-4076357888
!
crypto pki certificate chain TP-self-signed-4076357888
certificate self-signed 01
quit
dot1x system-auth-control
interface Loopback0
ip access-group ACL-ALLOW in
spanning-tree portfast
interface Vlan1
no ip address
interface Vlan40
ip http server
ip http secure-server
remark redirect HTTP traffic only permit tcp any any eq www
remark DHCP
remark Ping
logging origin-id ip
end
Index
Symbols
* (asterisk), 494, 922
2FA (two-factor authentication), 26, 1000
802.1Q, 284
802.1X, 7. See also EAP (Extensible Authentication
Protocol)
authentication. See authentication
Cisco AnyConnect NAM supplicant, 59–73
AnyConnect NAM profiles, 71–72
Authentication Policy view, 60, 62
Client Policy view, 60, 61–62
EAP chaining, 73
Network Groups view, 60, 71
Networks view, 60, 62–70
overview of, 59–60
definition of, 993
FlexAuth (Flexible Authentication)
configuration, 269–272
definition of, 994
FAST (Flexible Authentication via Secure Tunneling),
45, 48–49, 215
global 802.1X commands, 266–267
history of, 38
identity stores. See identity stores
NADs (network access devices). See NADs (network
access devices)
overview of, 41–42, 719–720
phased deployment
advantages of, 717–718
closed mode, 728–730
default port behavior, 719
low-impact mode, 725–727
monitor mode, 722–725, 730–731
preparation for, 720–721
transitioning to end state, 730–731
wireless networks, 731
SGT (security group tag) assignment with, 577
supplicants. See supplicants
A
AAA (authentication, authorization, and accounting).
See accounting; authentication; authorization
aaa commands
aaa accounting commands 1 default start-stop group ISE-
TACACS, 951
aaa accounting commands 15 default start-stop group
ISE-TACACS, 951
aaa accounting dot1x default start-stop group ise-group,
562
aaa accounting dot1x default start-stop group radius, 262,
567
aaa accounting exec default start-stop group ISE-TACACS,
951
aaa accounting system default start-stop group ise-group,
562
aaa accounting system default start-stop group radius,
567
aaa authentication dot1x default group ise-group, 562
aaa authentication dot1x default group radius, 262, 567
aaa authentication enable default group ISE-TACACS
enable, 947
aaa authentication login, 947
aaa authorization commands, 949
aaa authorization config-commands, 949
aaa authorization console, 948
aaa authorization exec, 948
aaa authorization network cts-list group ise-group, 562
aaa authorization network cts-list group radius, 567
aaa group server radius ise-group, 561
aaa group server tacacs+ ISE-TACACS, 947
aaa new-model, 261, 561, 567, 947
aaa server radius dynamic-author, 265, 563
AAA Identity Management Security, 6
AAA Servers tab
corporate WLAN, 293–294
guest WLAN, 289–290
ABSOLUTE_PATH file path option, 669
ACCEPT message, 9
acceptable use policy (AUP) page settings
hotspot guest portals, 354–356
sponsored guest portals, 386
Acceptable Use Policy in Stealth Mode setting
(Posture General Settings), 691
access control entries (ACEs), 553
Access Control List option (TACACS profile), 933
access control lists. See ACLs (access control lists)
Access Control Server (ACS), 8, 630, 909, 910
access levels, Admin group roles, 127–132
access policy
for FMC (Firepower Management Center), 840–844
for WSA (Web Security Appliance), 855–856
Access-Accept message, 13
Access-Challenge message, 13
access-layer devices. See NADs (network access
devices)
Access-Reject message, 13
Access-Request message, 13, 88
Account Expiration Notification settings, 346
accounting
configuration
RADIUS accounting servers, 278–279
RADIUS fallback, 279–280
device administration AAA with Cisco IOS, 951
messages
RADIUS, 13
TACACS+, 11
Accounting-Request message, 14
Accounting-Response message, 14
accounts
CTA STIX/TAXII API, 892–893
guest
contractors, 344–346
daily, 344–346
overview of, 341, 343
provisioning from sponsor portals, 389–394
social, 348
weekly, 347
sponsor groups, 381–382
ACEs (access control entries), 553
ACL-MDM-REDIRECT, 539–540
ACLs (access control lists)
ACEs (access control entries), 553
ACL-MDM-REDIRECT, 539–540
ACL-WEBAUTH-REDIRECT, 280–282, 314–315, 330, 492,
693
configuration for BYOD onboarding, 492–495
DNS ACLs, 494
NSP ACL, 493, 495
dACLs (downloadable access control lists), 236, 237, 553
configuration for pre-WebAuth authorization, 319–320
creating, 246–249
DNS (Domain Name System), 494, 993
ingress, 553–554
local, 268–269
named, 244
pACLs (port-based ACLs), 725
SGACLs (security group ACLs), 597–604
definition of, 998
Deny_All SGACL, 601–602
east-west deployment of, 598–599
egress policy, 597–598, 600–601
north-south deployment of, 598–599
Permit_HTTP_HTTPS SGACL, 601–602
Permit_ICMP SGACL, 602–603
Permit_Mgmt SGACL, 601
Permit_SRC_HTTP_HTTPS SGACL, 603–604
Permit_WEB_RDP SGACL contents, 598
syntax, 599–600
URL-redirect
configuration for Cisco switch, 314–315
configuration for WLC, 316
wireless authentication, 280–284
Google URLs for ACL Bypass, 282–283
Posture Agent Redirection ACL, 283–284
Web Authentication Redirection ACL, 280–282
ACL-WEBAUTH-REDIRECT access list, 280–282, 314–
315, 330, 492, 693
ACS (Access Control Server), 8, 630, 909, 910
Active Directory. See AD (Active Directory)
active users, viewing in FMC (Firepower Management
Center), 844–845
ActiveX, 85–86, 153, 322, 356
AD (Active Directory), 23, 24–25, 196–202
Active Directory probe, 422
CA (certificate authority), 469
definition of, 991
domains, 24
forests, 24
joining, 197–202
MDM support for, 101
objects, 24
prerequisites for, 196
Adaptive Network Control (ANC), 148–149, 156, 822–
823, 864–866
Adaptive Security Appliances. See ASA (Adaptive
Security Appliance)
Adaptive Security Device Manager. See ASDM
(Adaptive Security Device Manager)
Add Dashlet(s) command, 134
Add Directory dialog, 838
Add New Dashboard option, 134
Add New Realm dialog, 838
Add New Rule command, 282, 283
Add-Remove URL command, 283
address ipv4 command, 264
Address Resolution Protocol (ARP), 646
addresses, MAC (Media Access Control). See MAC
(Media Access Control) addresses
AD-Host-Exists attribute (Active Directory), 422
adi_cli session command, 844–845
AD-Join-Point attribute (Active Directory), 422
Admin Access tab (System), 160–161
Administration persona, 109, 737
Administration portal, 137–142
Admin group roles, 127–132
global search for endpoints, 139–140
Help menu, 138, 140–141
initial login, 125–126
ISE Setup Wizards, 141
Settings menu, 142
tabs, 137–139
Administration profile, 940–941
Administration screen, 142, 155–170
Device Portal Management tab, 166–169
Blacklist portal, 166
Certificate Provisioning portal, 166–167
Client Provisioning portal, 166–167, 650–651
Custom Portal Files portal, 168
Mobile Device Management portal, 168
My Devices portal, 168
Settings, 169
Feed Service tab, 169
Identity Management tab, 161–163
External Identity Sources tab, 162
Groups tab, 162
Identities tab, 161
Identity Source Sequences tab, 163
Settings tab, 163
Network Resources tab, 163–166
External MDM tab, 165
External RADIUS Servers tab, 165
Location Services tab, 166
NAC Managers tab, 165
Network Device Groups tab, 164–165
Network Device Profiles tab, 165
Network Devices tab, 163–164
RADIUS Server Sequences tab, 165
PassiveID Setup option, 138
pxGrid Services tab, 169
Search icon, 138
System Activities option, 139
System tab, 155–161
Admin Access tab, 160–161
Backup & Restore tab, 160
Certificates tab, 158
Deployment tab, 155
Licensing tab, 155–158
Logging tab, 159
Maintenance tab, 159
Settings tab, 161
Upgrade tab, 160
Threat Centric NAC tab, 170
Visibility Setup option, 138
Wireless Setup (BETA) option, 139
Administration tab (Guest Access work center), 340–
341
AD-Operating-System attribute (Active Directory),
422
AD-OS-Version attribute (Active Directory), 422
AD-Service-Pack attribute (Active Directory), 422
Advance Filter, 771
Advanced Malware Protection. See AMP (Advanced
Malware Protection) for Endpoints
Advanced Settings tab, Windows native supplicant,
57
Advanced tab
corporate WLAN, 294–295
guest WLAN, 289–290
agents, temporal, 999
Aggregation Services Router. See ASR (Aggregation
Services Router)
Airwatch, 708
Alarms dashlet, 134
ALL role, 972
ALL_ACCOUNTS sponsor group, 381
All_User_ID_Stores, 472–474
alternative ID stores based on EAP type, 224–227
EapAuthentication equals EAP-TLS, 225
EapTunnel equals EAP-FAST, 226–227
EapTunnel equals PEAP, 226
AMP (Advanced Malware Protection) for Endpoints,
897–904
adapter configuration, 900–904
capabilities of, 897–898
incidents, 899–900, 991
indicators, 899
AMP Enabler profile, 642
ANC (Adaptive Network Control), 148–149, 156, 822–
823, 864–866, 991
AND operator, 252–256
Android devices. See also BYOD (bring your own
device) onboarding; MDM (mobile device
management)
BYOD (bring your own device) onboarding, 526–530
device provisioning, 529–530
device registration, 526–528
NSP app download, 528–529
fingerprint technology, 27
mobile posture, 707–712
authorization conditions, 709–710
authorization rules, 710–712
supported device managers, 707–709
Anomalous Behaviour Detection, 406–408, 991
anti-malware, 100, 661–663, 681–682
anti-spyware, 100, 663, 681–682
anti-virus, 100, 663, 681–682, 753–756
Anycast high availability
IP SLAs (service-level agreements), 754–756
network architecture, 753–754
route redistribution, 755–756
AnyConnect Diagnostics and Reporting Tool. See
DART (AnyConnect Diagnostics and Reporting Tool)
AnyConnect ISE agent, 992
AnyConnect ISE Posture Module, 99–100
AnyConnect NAM (Network Access Manager)
supplicant, 59–73, 809
AnyConnect NAM profiles, 71–72
Authentication Policy view, 60, 62
Client Policy view, 60, 61–62
EAP chaining, 73
Network Groups view, 60, 71
Networks view, 60, 62–70
Certificates tab, 67
Connection Type tab, 66
Credentials tab, 68–70
Machine Auth tab, 66
PAC Files tab, 67–68
Security Level tab, 64–66
User Auth tab, 68–70
overview of, 59–60
profiles, 71–72
AnyConnect posture assessment endpoint scenarios
AnyConnect already installed, endpoint not compliant,
700–702
AnyConnect not installed on endpoint yet, 696–700
stealth mode, 645, 703
temporal agent and posture compliant, 705
AnyConnect Secure Mobility Client, 640–649
AnyConnect configuration, 648–649
AnyConnect posture profile configuration, 644–648
client provisioning resource configuration, 640–642
downloading, 640
headend deployment packages, uploading to ISE, 642–
644
AnyConnect System Scan. See posture assessment
Apex license packages, 156
APIs (application programming interfaces)
license packages, 156
MDM (mobile device management), 821
Apple iOS. See also MDM (mobile device
management)
BYOD (bring your own device), 523–526. See also BYOD
(bring your own device) onboarding
device enrollment, 523–524
device provisioning, 526–527
device registration, 523–524
faceprint technology, 27
iPad, 482
iPCU (iPhone Configuration Utility), 812
mobile posture, 707–712
authorization conditions, 709–710
authorization rules, 710–712
supported device managers, 707–709
Push Notification, 101
Touch ID, 310
application conditions, 100, 655–660
application provisioning, 101
application remediations, 680
Application tab (Context Visibility screen), 143
architecture (ISE). See ISE (Identity Services Engine)
architecture
ARP (Address Resolution Protocol), 646
ASA (Adaptive Security Appliance)
ASDM (Adaptive Security Device Manager), 592–593
configuration for TrustSec, 564–565
DAP (Dynamic Access Policy), 629
SGFW (security group firewall) on, 612
SXP (SGT Exchange Protocol) configuration on, 591–592
ASDM (Adaptive Security Device Manager), 592–593
Ask a Question option (Help menu), 141
ASR (Aggregation Services Router), 613
assertions, SAML (Security Assertion Markup
Language), 35, 395, 998
assetConnectedLinks attribute (pxGrid), 423
assetCustomAttributes attribute (pxGrid), 423
assetDeviceType attribute (pxGrid), 423
assetHwRevision attribute (pxGrid), 423
assetId attribute (pxGrid), 423
assetIpAddress attribute (pxGrid), 423
assetMacAddress attribute (pxGrid), 423
assetName attribute (pxGrid), 423
assetProductId attribute (pxGrid), 423
assetProtocol attribute (pxGrid), 423
assetSerialNumber attribute (pxGrid), 423
assetSwRevision attribute (pxGrid), 423
assetVendor attribute (pxGrid), 423
assignment
SGTs (security group tags)
dynamically, 577
manually, 577–578
VLAN (virtual LAN), 551–553
asterisk (*), 494, 922
attribute/value (AV) pairs, 13, 15, 107
Audit reports, 150
AUP (acceptable use policy) page settings
hotspot guest portals, 354–356
sponsored guest portals, 386
authentication, 13–14. See also certificate-based
authentication; CWA (Centralized Web
Authentication); posture assessment
2FA (two-factor authentication), 26, 1000
authentication open versus 802.1X, 719–720
authentication servers, 41, 991
authenticators, 41, 991
authorization compared to, 209–210, 235
communications in, 42
definition of, 206
device administration AAA with Cisco IOS
device administration AAA with Cisco IOS, 946–948
TACACS+ command accounting, 951
TACACS+ command authorization, 948–950
devices without a supplicant, 79–80
EasyConnect, 89–90, 993
FlexAuth (Flexible Authentication)
configuration, 269–272
definition of, 994
FAST (Flexible Authentication via Secure Tunneling),
45, 48–49, 215
flows for, 804–805
importance of, 5
MAB (MAC Authentication Bypass)
authentication with, 80–82, 227–228
configuration, 265, 270–274, 318
definition of, 717, 995
MAB rule flowchart, 217
overview of, 96–99
profiling, 96–99
role-specific authorization rules, 241
wireless, 489
messages
RADIUS, 13–14
TACACS+, 9
MFA (multifactor authentication), 26–29
Multi-Auth (Multiauthentication), 995
policies and policy sets, 151
allowed protocols, 210, 213–216
for alternative ID stores based on EAP type, 224–227
authorization compared to, 209–210, 235
for certificate-based authentication, 472–474
conditions, 217–219
default, 216–217
definition of, 171
for device administration AAA with Cisco IOS, 944
goals of, 206–207, 210–211
identity stores, 210–211, 219–220
identity validation, 211
for MAB (MAC Authentication Bypass), 227–228
options, 220
for remote access VPN, 223–224
restoring, 229
for wireless SSID, 220–223
remote access connections, 88–89
SAML (Security Assertion Markup Language), 394–400
assertions, 395, 998
guest portal logins, 368, 394–400
IdPs (identity providers), 35, 394–400, 998
SPs (service providers), 394, 998
support for, 23
sponsored guest portals, 342, 380–381
AUP (acceptable use policy) page settings, 386
configuration flowchart, 380–381
default sponsor portal, 384
login settings, 386
other settings, 387
portal settings, 385–386
provisioning guest accounts from, 389–394
timers, 275
Web Authentication. See WebAuth (Web Authentication)
Windows native supplicant
machine authentication, 58–59
user authentication, 58
wired, 261–276
Cisco ISE verification, 302–303
endpoint supplicant verification, 295–296
global configuration AAA commands, 261–262
global configuration RADIUS commands, 262–269
interface configuration settings, 269–276
NAC (network access device) verification, 296–302
wireless
AAA servers, 276–280
airespace ACLs (access control lists), 280–284
Cisco ISE verification, 302–303
dynamic interfaces for client VLANs, 284–286
endpoint supplicant verification, 295–296
NAC (network access device) verification, 296–302
wireless LANs, 286–295
authentication event fail action command, 271
authentication event server alive action reinitialize
command, 272
authentication event server dead action authorize
vlan command, 272
authentication event server dead action authorize
voice command, 272
authentication event server dead action reinitialize
vlan command, 272
authentication host-mode multi-auth command, 273
authentication linksec policy command, 617
authentication open command, 275, 718, 719–720,
722, 725
authentication order dot1x mab command, 271
Authentication Policy view, Cisco AnyConnect NAM
supplicant, 60, 62
authentication port-control auto command, 276
authentication priority dot1x mab command, 271
authentication servers, 41, 991
authentication success settings, hotspot guest
portals, 357–358
Authentication tab, Windows native supplicant, 53,
56–57
authentication timers, 275
authentication violation restrict command, 273
authentication VLAN, 87–88
Authentications dashlet, 134
authenticators, 41, 991
authorization. See also ACLs (access control lists)
authentication compared to, 209–210, 235
for certificate-based authentication, 474–475
Cisco CTA (Cognitive Threat Analytics), 896–897
CoA (Change of Authorization)
CWA (Centralized Web Authentication) and, 85–86,
311
definition of, 16, 95–96, 992
enabling, 265, 277
ISE Profiler and, 442–444
messages, 110, 748
definition of, 209, 232
for device administration AAA with Cisco IOS, 948–950
flows for, 804–805
messages
RADIUS, 13
TACACS+, 10–11
mobile posture
authorization conditions, 709–710
authorization rules, 710–712
policies and policy sets, 151
authentication compared to, 209–210, 235
Blackhole_Wireless_Access, 240–241
for certificate-based authentication, 474–475
Cisco_IP_Phones, 237–241
compound conditions, 239, 251–256, 992
condition blocks, 252–256
configuration of, 241–249
default, 236–241
definition of, 171
for device administration AAA with Cisco IOS, 945–946
goals of, 235–241
for guest portals, 348–351
for MDM (mobile device management), 536–537
organization of, 216, 236
profile assignment in, 450–453
role-specific authorization rules, 241
rule processing for, 236–241
saving conditions for reuse in, 249–251
simple conditions, 239, 251, 999
profiles, 450–453
assignment of, 450–452, 453
for BYOD (bring your own device) onboarding, 516
configuration, 320–322
Downlink MACsec, 616
Employee Full Access, 241–243
Employee_Limited, 246–249
for hotspot guest portals, 362–364
Internet_Only, 243–246
MDM Onboard, 539–540
for posture assessment, 693
for self-registered guest portals, 373–380
for TC-NAC (Threat Centric Network Access Control),
884–886
rules, 236–241, 693–694
AND/OR operators in, 252–256
for BYOD (bring your own device) onboarding, 517,
518
for device administration AAA with Cisco WLC
(Wireless LAN Controller), 977–979
Employee and CorpMachine, 242–243
employee full access, 241–243
employee limited access, 246–249
Internet-only access, 243–246
IT Users Access, 252–256
for MDM onboarding, 539–542
PERMIT_ALL_IPV4_TRAFFIC, 241–243
role-specific, 241
for self-registered guest portals, 373–380
for TC-NAC (Threat Centric Network Access Control),
884–886
Wireless Black List Default, 239
security context, 232, 235
TrustSec, 559
Authorization Policy column, Live Log, 767
Authorization Profiles column, Live Log, 768
Authy, 29
Auto Command option (TACACS profile), 933
auto PAN switchover, 745–746
automate-tester username command, 264
automatic failover, 746
auto-source command, 267
AV (attribute/value) pairs, 13, 15, 107
B
Backup & Restore tab (System), 160
backup and restore, 101, 160, 759–761
backup interface GigabitEthernet 3 command, 352
backup-logs command, 783–784
Base license packages, 156
Base64-encoded files, 477
BlackBerry, 508–509, 708
Blackhole_Wireless_Access authorization profile, 240–
241
Blacklist portal, 166
blocks, condition, 252–256
bootstrapping ISE (Identity Services Engine), 177–180
bring your own device. See BYOD (bring your own
device) onboarding
browsers
requirements for, 125
Softerra LDAP, 26
support for, 122–123
BYOD (bring your own device) onboarding. See also
MDM (mobile device management)
Android onboarding flow, 526–530
device provisioning, 529–530
device registration, 526–528
NSP app download, 528–529
challenges of, 485–487
definition of, 487
dual SSID versus single SSID, 487–488, 993, 999
end-user experience
Blackberry example, 508–509
dual SSID with Android example, 503–508
single SSID with Apple iOS example, 496–503
history of, 482
iOS onboarding flow, 523–526
device enrollment, 523–524
device provisioning, 526–527
device registration, 523–524
ISE configuration for, 495–496
authorization profiles, 516
authorization rules for EAP-TLS authentications, 518
authorization rules for onboarding, 517
client provisioning policy configuration, 512–514
default unavailable client provisioning policy action,
515
ISE as certificate authority, 519–520, 521–523, 994
native supplicant profile, 510–512
SCEP (Simple Certificate Enrollment Protocol), 520–
521, 999
WebAuth configuration, 514–515
overview of, 487
self-registered guest portal settings, 372
verification of BYOD flows, 534–535
endpoint identity groups database, 535
RADIUS Live Logs, 534
reports, 534–535
Windows and Mac onboarding flow, 531–533
device provisioning, 532–533
device registration, 531
WLC (Wireless LAN Controller) configuration, 489–495
ACLs (access control lists), 492–495
WLAN configuration, 490–491
BYOD Endpoints dashlet, 134
C
C (Country) field, 184
C3PL (Common Classification Policy Language), 789
CA_SERVICE_Certificate_Template, 520
Cache Last Known Posture Compliance setting, 691
CACs (Common Access Cards), 992
Call Home List setting (AnyConnect posture profile),
647
Call-Check for Service-Type, 228
Called-Station-Id attribute (RADIUS), 414
Calling-Station-Id attribute (RADIUS), 414
Calling-Station-Id field (RADIUS), 97
CAPs (certificate authentication profiles), 23, 202,
469, 471–472, 991
cards, smart, 29
career limiting events (CLEs), 717
CAs (certificate authorities). See also certificate-
based authentication
AD (Active Directory), 469
CA-signed certificates, 182–191
characteristics of, 30–33
CSR (certificate signing requests), 182–191
binding certificates, 189–191
certificate subject fields, 183–184
downloading and importing certificates, 188–191
exporting certificates, 191
PEM files, 186–187
submitting, 186–187
wildcard certificates, 184
definition of, 992
ISE as, 519–520, 521–523, 994
signatures, 31–32
trusted, 31–32, 475–479
certificate status verification, 478–479
public certificates, 476–477
role in authentication process, 463–465
Catalyst 3000 Series, 12.2(55)SE switch
configuration, 1034–1038
Catalyst 3000 Series, 15.0(2)SE switchconfiguration,
1038–1044
Catalyst 4500 Series, IOS-XE 3.3.0 / 15.1(1)SG
switchconfiguration, 1053–1057
Catalyst 6500 Series, 12.2(33)SXJ
switchconfiguration, 1058–1061
Catalyst 9000 Series, 16.9.5 switchconfiguration,
1044–1052
categories, logging, 778–779
CCP (client provisioning policy), 515
CDA (Context Directory Agent), 469
CDP (Cisco Discovery Protocol), 98, 273, 418, 991
centralized portal, LWA (Local Web Authentication)
with, 84–85
Centralized Web Authentication. See CWA
(Centralized Web Authentication)
certificate authentication profiles. See CAPs
(certificate authentication profiles)
certificate authorities. See CAs (certificate
authorities)
Certificate Authority Certificates menu (ISE
Certificate Authority), 520
Certificate Provisioning portal, 166–167
certificate revocation lists (CRLs), 33, 466, 992
certificate signing requests. See CSRs (certificate
signing requests)
Certificate Templates menu (ISE Certificate
Authority), 520
certificate-based authentication, 158. See also PKI
(public key infrastructure)
CAPs (certificate authentication profiles), 23, 202, 469,
471–472, 991
CAs. See CAs (certificate authorities)
concept of, 30–31
CRLs (certificate revocation lists), 466, 992
CSRs (certificate signing requests), 182–191, 521–523
binding certificates, 189–191
definition of, 992
downloading and importing certificates from, 188–191
exporting certificates, 191
ISE (Identity Services Engine), 521–523
PEM files, 186–187
submitting, 186–187
wildcard certificates, 184
CWA (Centralized Web Authentication) configuration, 313
definition of, 463
EAP-TLS (EAP Transport Layer Security), 470
expired certificates, 32–33, 465
guest services, 340–341
ISE configuration for, 181–191, 470–479
authentication policies, 472–474
authorization policies, 474–475
CAPs (certificate authentication profiles), 471–472
certificate status verification, 478–479
overview of, 470
principal username X.509 attribute, 470
protocols verification, 470–471
public certificates, importing, 476–477
trusted CAs (certificate authorities), 475–479
popularity of, 460
public certificates, 476–477
purpose of, 181
pxGrid certificates. See pxGrid (Platform Exchange Grid)
RAs (registration authorities), 998
revoked certificates, 33
checking for, 466–467
CRLS (certificate revocation lists), 33
CRLs (certificate revocation lists), 33, 466
OCSP (Online Certificate Status Protocol), 33, 466, 996
validity period, 467
self-signed certificates, 181–182
trusted certificates, 537–538
Certificates tab
Cisco AnyConnect NAM supplicant, 67
System, 158
chaining, EAP, 73, 216
Challenge Handshake Authentication Protocol. See
CHAP (Challenge Handshake Authentication
Protocol)
Change of Authorization. See CoA (Change of
Authorization)
CHAP (Challenge Handshake Authentication
Protocol), 7, 46, 214, 215
chip cards, 29
Chrome, support for, 122
Cisco Access Control Server (ACS), 909, 910
Cisco Access Registrar, 8
Cisco AnyConnect Diagnostics and Reporting Tool.
See DART (AnyConnect Diagnostics and Reporting
Tool)
Cisco AnyConnect ISE agent, 992
Cisco AnyConnect ISE Posture Module. See
AnyConnect ISE Posture Module
Cisco AnyConnect Network Access Manager. See
AnyConnect NAM (Network Access Manager)
supplicant
Cisco Cognitive Threat Analytics. See CTA (Cognitive
Threat Analytics)
Cisco Context Directory Agent (CDA), 469
Cisco Discovery Protocol (CDP), 98, 418
Cisco Duo Security, 27–29
Cisco Firepower Management Center. See FMC
(Firepower Management Center) configuration
Cisco Identity Services Engine architecture. See ISE
(Identity Services Engine) architecture
Cisco Industrial Network Director (IND), 827
Cisco IOS. See IOS (Internetwork Operating System)
Cisco ISE for BYOD and Secure Unified Access
(Woland and Heary), 859
Cisco ISE (Identity Services Engine) architecture. See
ISE (Identity Services Engine) architecture
Cisco Meraki Systems Manager (Meraki SM), 708
Cisco Meta Data (CMD) field, 593, 616
Cisco NAC (Network Admission Control), 626, 630
Cisco Network Setup Assistant app, 492, 507
Cisco Platform Exchange Grid. See pxGrid (Platform
Exchange Grid)
Cisco Secure Access Control Server (ACS), 8
Cisco Secure Network Server (SNS), 177
Cisco Security Agent (CSA) service, 676
Cisco Software-Defined Access (SD-Access), 613–614
Cisco Stealthwatch. See Stealthwatch
Cisco Supplicant Provisioning Wizard, 513
Cisco Temporal Agent, 99–100
Cisco Umbrella, 640
Cisco Wireless LAN Controller. See WLC (Wireless LAN
Controller)
Cisco_IP_Phones authorization profile, 237–241
cisco-av-pair command, 576
CiscoPress SSID policy set, 518
CiscoPress-TLS, 513–514
Citrix XenMobile, 708
Class (RADIUS attribute 25) VSA, 266
Class-Identifier attribute (DHCP), 411
Clean Machines, 631
CLEs (career limiting events), 717
CLI (command-line interface), 992. See also specific
commands
CLI Setup Wizard, 178–179
Client Messaging servers, 101
Client Policy view, Cisco AnyConnect NAM supplicant,
60, 61–62
client provisioning policy. See CPP (client
provisioning policy)
Client Provisioning portal, 166–167, 650–651
Client Provisioning tab (Policy page), 153
Client Stopped Responding counter, 768
Client Supplicant Not Capable of MACsec policy, 617
client VLANs, dynamic interfaces for, 284–286
employee dynamic interface, 284–285
guest dynamic interface, 285–286
Client-FQDN attribute (DHCP), 411
client/server communication, 7–8
closed mode, 728–730
CMD (Cisco Meta Data) field, 593, 616
CN (common name), 183, 833
CoA (Change of Authorization)
CWA (Centralized Web Authentication) and, 85–86, 311
definition of, 16, 992
enabling, 265, 277
ISE Profiler and, 442–444
global CoA, 442–443, 994
per-profile CoA, 443–444
messages, 110, 748
CoA Type setting, hotspot guest portals, 354
Coa-Events report, 888–889
Cognitive Intelligence. See CTA (Cognitive Threat
Analytics)
Cognitive Threat Analytics. See CTA (Cognitive Threat
Analytics)
command sets
definition of, 992
device administration AAA with Cisco IOS, 934–936
TACACS+, 934–936, 941–943
command-line interface (CLI), 992. See also specific
commands
COMMANDS role, 971
comma-separated values (CSV) files, 194
Common Access Cards (CACs), 992
Common Classification Policy Language (C3PL), 789
common name (CN), 183, 833
Common Port option, Nmap, 416
Common Task Type option, TACACS profile, 933
Common Vulnerabilities and Exposures (CVE), 873,
992
Common Vulnerability Scoring System (CVSS), 873,
992
compliance. See posture assessment
compliance modules, updating, 637–638
compound conditions, 239, 251–256, 664–665, 677–
678, 992
Compromised Endpoints Over Time dashlet, 137
conditions
authentication policy, 217–219
authorization policy
blocks, 252–256
compound, 239, 251–256, 664–665, 677–678, 992
definition of, 235
EmployeeFullEAPChain, 249–250
mobile posture, 709–710
saving for reuse, 249–251
simple, 239, 251, 999
posture policy, 654–679
anti-malware, 661–663
anti-spyware, 663
anti-virus, 663
application, 655–660
compound, 677–678
dictionary compound, 664–665
dictionary simple, 663–664
disk encryption, 665–666
file, 667–673
firewall, 660–661
hardware attributes, 655
patch management, 673–675
Registry, 675
USB, 679
Wired_802.1X, 242, 254
Wired_MAB, 242
Conditions Studio, 217–219
Conditions tab (Policy Elements), 154
conf t command, 621
configure command, 922
configure terminal command, 963
Connection Settings (Device Administration), 918
Connection Type tab (Cisco AnyConnect NAM
supplicant), 66
Console application, 812
context
brokering, 992
definition of, 992
sharing
EPS (Endpoint Protection Services), 821–822
MDM integration, 820–821
need for, 818
pxGrid. See pxGrid (Platform Exchange Grid)
Rapid Threat Containment, 821–823, 993, 998
Context Directory Agent (CDA), 469
Context Visibility screen, 137, 142, 143
Context-In, 827, 992
Context-Out, 827, 993
CONTINUE message, 9, 11
Continue option
authentication policy, 220
posture reassessment, 692
Continuous Monitoring Interval setting (Posture
General Settings), 691
contractors, 344–346
CONTROLLER role, 971
Core Files support bundles, 783
Corporate Wipe option, 543
corporate WLAN configuration, 291–295
AAA Servers tab, 293–294
Advanced tab, 294–295
General tab, 292
Layer 2 Security tab, 292–293
Layer 3 Security tab, 293
correlation policy, 845–847
correlation rules, 845–847
Country (C) field, 184
CPP (client provisioning policy), 172, 637–638
AnyConnect Secure Mobility Client, 640–649
AnyConnect configuration, building, 648–649
AnyConnect posture profile, 644–648
client provisioning resource configuration, 640–642
headend deployment packages, uploading to ISE,
642–644
BYOD (bring your own device) onboarding
client provisioning policies, 512–514
default unavailable client provisioning policy action,
515
Client Provisioning portal, 153, 166–167, 650–651
default client provisioning policy, 652
order of operations, 637–638
rules, creating, 652–653
CRC32 file type, 672
credentials, 20
Credentials tab (Cisco AnyConnect NAM supplicant),
68
CRLs (certificate revocation lists), 33, 466, 992
Cropped Portal Page Customization screen, 358
crypto key generate rsa general-keys mod 2048
command, 313
crypto key generate rsa modulus 2048 command, 946
CSA (Cisco Security Agent) service, 676
CSRs (certificate signing requests), 182–191, 521–523
binding certificates, 189–191
definition of, 992
downloading and importing certificates from, 188–191
exporting certificates, 191
ISE (Identity Services Engine), 521–523
PEM files, 186–187
submitting, 186–187
wildcard certificates, 184
CSV (comma-separated values) files, 194
CTA (Cognitive Threat Analytics), 890–897
authorization with, 896–897
CTA STIX/TAXII API account creation, 892–893
dashboard, 890–892
integration for TC-NAC, 894–896
CTD (Cyber Threat Defense), 857
CTI (cyber threat intelligence), 890, 993
cts authorization list cts-list command, 562
cts credentials id Sw01 password Cisco123 command,
561
cts manual command, 595, 621
cts manualN7K-DIST command, 578
cts role-based enforcement command, 562, 595, 596
cts role-based sgt-map command, 580
cts role-based sgt-map vlan-list command, 580
cts sxp connection peer command, 588, 589
cts sxp default password command, 588
cts sxp default source-ip command, 588
cts sxp enable command, 588–589
cubes, ISE
definition of, 109, 737, 995
joining, 182
licensing in, 747–748
Current, Chip, 337
Custom Attribute option (TACACS profile), 933
Custom Portal Files portal, 168
Custom Ports option (Nmap), 416
custom profiling attributes, 445–448
Customization admin role, 127
CVE (Common Vulnerabilities and Exposures), 873,
992
CVSS (Common Vulnerability Scoring System), 873,
992
CWA (Centralized Web Authentication), 730–731. See
also sponsored guest portals
authentication process, 85–87
authorization policies, 322–324
custom authorization rules, 323–324
Guest Flow attribute, 323–324, 994
preconfigured authorization rules, 322
Cisco switch configuration, 313–315
certificates, 313
HTTP/HTTPS server, 314
URL-redirect ACL, 314–315
CoA (Change of Authorization) and, 311
definition of, 991
dual SSID onboarding and, 496
ISE (Identity Services Engine) configuration, 317–322
authorization profiles, 320–322
dACLs (downloadable access control lists), 319–320
Guest_Portal_Sequence ISS (identity source
sequence), 319
MAB (MAC Authentication Bypass), 96–99, 318
services supported by, 311
with third-party network device support, 87–88
URL-redirected MAC authentication bypass, 311–313
verification from client, 324–326
verification on NAD (network access device), 327–331
client details, viewing on WLC, 329–331
show commands on wired switch, 328–329
WLC (Wireless LAN Controller) configuration, 98, 315–316,
329–331
ISE NAC feature, 315–316
MAC Filtering option, 315
URL-redirect ACL, 316
Cyber Threat Defense (CTD), 857
cyber threat intelligence (CTI), 890, 993
D
dACLs (downloadable access control lists), 13, 236,
237, 246–249, 319–320, 548, 553
daily guest accounts, 344–346
DAP (Dynamic Access Policy), 629
DART (AnyConnect Diagnostics and Reporting Tool),
59, 809–811, 991
dashboard, 132–137
Dashboard Settings menu, 134
Endpoints tab, 134–135
Guests tab, 135–136
Summary tab, 134
Threat tab, 137
verifying profiling with, 454
Vulnerability tab, 136
Dashboard Settings menu, 134
dashlets
Alarms, 134
Authentications, 134
BYOD Endpoints, 134
Compromised Endpoints Over Time, 137
Endpoint Categories, 135, 454
Endpoint Categories dashlet, 135
Endpoints, 134, 135
Failure Reason, 136
Guest Status, 136
Guest Type, 136
Location, 136
Metrics, 134
Network Devices, 134, 135
Status, 134
System Summary, 134
Threat Watchlist, 137
Top Threats, 137
Top Vulnerability, 136
Total Compromised Endpoints, 137
Total Vulnerable Endpoints, 136
Vulnerability Watchlist, 136
Vulnerable Endpoints Over Time, 136
databases, 994
endpoint identity groups, 535
endpoints, 455–456
internal endpoint, 22, 994
internal user, 994
Datagram Transport Layer Security (DTLS), 190
DaysSinceLastCheckIn attribute, 537
debug aaa authentication command, 955
debug aaa authorization command, 955–958
debug aaa tacacs enable command, 985
debug authentication command, 815
debug client command, 302, 815
debug commands, 815
debug dot1x command, 302, 815
debug epm command, 815
debug interface command, 815
debug ip tcp transactions command, 966
debug logs, 779–784
configuration, 779–780
downloading from GUI, 780
support bundles, 782–784
categories of, 782–783
creating from CLI, 783–784
creating from GUI, 783
definition of, 782
viewing from CLI, 781–782
Debug Logs support bundles, 783
debug tacacs command, 958–961
debug tacacs packet command, 963–965
decryption policy, 857
Dedicated MNT, 742
de-duplication of logs, 805–807
default authorization policies, 236–241
default client provisioning policy, 652
default policy sets, 211
Default Posture Status setting (Posture General
Settings), 691
Default Privilege option (TACACS profile), 933
default sponsor portals, 384
defense-in-depth, 241
Delete option (endpoint management), 543
deny statement, 280, 316
Deny_All SGACL, 601–602
DenyAllCommands command, 941
deployment
AnyConnect headends
AnyConnect configuration, building, 648–649
package upload to ISE, 642–644
posture profile configuration, 644–648
device administration AAA, 911–913
large deployments, 912
medium deployments, 913
small deployments, 913
high availability, 743
Anycast high availability, 753–756
backup and restore, 759–761
failure scenarios, 753
general guidelines for, 752–753
licensing in multi-mode ISE cube, 747–748
load balancing, 751–752, 756–757
MnT (Monitoring and Troubleshooting) nodes, 109–
110, 743–744
node groups, 748–750
PAN (Policy Administration node), 109, 743–744
patches, 757–759
ISE (Identity Services Engine)
distributed, 116–119
hybrid, 116–117
overview of, 113
physical versus virtual, 111–113
scale limits for, 118–119
single-node, 113
two-node, 114–116
ISE nodes in distributed environment, 737–742
ISE cubes, 737
ISE persona types, 737
node personas, 742
PPAN (Policy Administration Node), 738–739
primary devices, 738–739
registration of ISE nodes, 739–742
phased approach to
advantages of, 717–718
authentication open versus 802.1X, 719–720
closed mode, 728–730
low-impact mode, 725–727
monitor mode, 722–725, 730–731
preparation for, 720–721
transitioning to end state, 730–731
wireless networks, 731
Deployment tab (Administration), 155
design
for device administration, 911–913
large deployments, 912
medium deployments, 913
small deployments, 913
SXP (SGT Exchange Protocol), 582–583
Desktop Preview (portal page customization), 358
destination tree view (TrustSec policy matrix), 553
Details icon, Live Log, 768
device administration AAA, 478–479
concept of, 6
configuring with Cisco IOS, 930
device administration service, enabling, 937
network device preparation, 937–939
overview of, 932
policy preparation, 939–946
privilege levels, 932–933, 997
TACACS profiles, 932–934
TACACS+ authentication and fallback, 946–948
TACACS+ command accounting, 951
TACACS+ command authorization, 948–950
TACACS+ command sets, 934–936, 992
testing and troubleshooting in ISE, 952–954
troubleshooting at IOS command line, 954–966
configuring with Cisco WLC (Wireless LAN Controller)
ISE configuration on WLC TACACS+ servers, 979–980
network device preparation, 972
policy results preparation, 974–977
policy sets, 977–979
testing and troubleshooting, 981–986
top-level menus, 971–972
definition of, 2, 993
design and deployment, 911–913
large deployments, 912
medium deployments, 913
small deployments, 913
device administration service, enabling, 937
device backup, 101
device enrollment, 523–524
device tracking in IOS Xe 16.x and later, 267
devices without a supplicant, 79–80
graphical illustration of, 6, 909
interactive nature of, 909–910
license packages, 157
MDM (mobile device management), 108, 820–821. See
also BYOD (bring your own device) onboarding
definition of, 995
overview of, 101–102
posture assessment with, 108
supported features, 101–102
vendors, 101–102
NAD (network access device) configuration, 917
connection settings, 918
identities, 920
network resources, 921–922
overview of, 916–917
password change control, 918
policy elements, 922–924
policy sets, 925–927
reports, 927
session key assignment, 918
UI navigation for, 919–920
network device troubleshooting, 812–815
client details, viewing on WLC, 813–814
debug commands, 815
show authentication interface command, 812–813
policies, 922–924, 939–946
policy sets, 943–946
roles, 939
TACACS command sets, 922–923, 941–943
TACACS profiles, 923–924, 939–941
purpose of, 909–910
RADIUS. See RADIUS (Remote Access Dial-In User Service)
reports, 150
resources for, 6
security context, 232, 235
smart devices
employee limited access, 246–249
Internet-only access for, 243–246
TACACS+. See TACACS+ (Terminal Access Controller
Access Control System)
Device Administration Policy Set, 943–944
Device Portal Management tab (Administration
screen), 166–169
Blacklist portal, 166
Certificate Provisioning portal, 166–167
Client Provisioning portal, 166–167, 650–651
Custom Portal Files portal, 168
Mobile Device Management portal, 168
My Devices portal, 168
Settings, 169
device provisioning
Android onboarding flow, 529–530
iOS onboarding flow, 526–527
Windows and Mac onboarding flow, 532–533
device registration
Android onboarding flow, 526–528
iOS onboarding flow, 523–524
Windows and Mac onboarding flow, 531
Device Sensor, 98, 267, 426–427, 457–458
DeviceComplianceStatus attribute, 536
DeviceCompliantStatus attribute, 712
DeviceRegisterStatus attribute, 536
device-sensor accounting command, 427
device-sensor filter-list cdp list command, 427
device-sensor filter-list dhcp list command, 426
device-sensor filter-list lldp list command, 427
device-sensor filter-spec cdp include list command,
427
device-sensor filter-spec dhcp include list command,
427
device-sensor filter-spec lldp include list command,
427
device-sensor notify all-changes command, 427
device-tracking attach-policy command, 267
device-tracking policy command, 267
device-tracking tracking auto-source command, 267
DHCP (Dynamic Host Configuration Protocol)
DHCP helper, 424–427
DHCP probe, 411–414
DHCPSPAN probe, 411–414
profiling, 97, 98
diagnostic tools
Endpoint Debug, 796–798
endpoint diagnostics, 809–812
Cisco AnyConnect Diagnostics and Reporting Tool
(DART), 59, 809–811
supplicant provisioning logs, 812
Evaluate Configuration Validator, 788–793
Execute Network Device Command, 787–789
network device troubleshooting, 812–815
client details, viewing on WLC, 813–814
debug commands, 815
show authentication interface command, 812–813
Posture Troubleshooting, 794–795
RADIUS Authentication Troubleshooting tool, 785–786
Session Trace, 801–804
TCP Dump, 798–801
troubleshooting methodology, 804–808
authentication and authorization flows, 804–805
log de-duplication, 805–807
USERNAME user, 807
Diagnostics and Reporting Tool. See DART
(AnyConnect Diagnostics and Reporting Tool)
Diagnostics reports, 150
diagrams, monitor mode flow, 7, 723–724
dial-up networking, 88
Dictionaries tab (Policy Elements), 154
dictionary compound conditions, 664–665
dictionary simple conditions, 100, 663–664
digital certificates. See certificate-based
authentication
disable command, 932
Disable UAC Prompt setting (AnyConnect posture
profile), 646
Discovery host setting (AnyConnect posture profile),
647
disk encryption conditions, posture policy, 665–666
DiskEncryptionStatus attribute, 536
Display Language setting, hotspot guest portals, 354
distributed ISE deployment, node configuration in,
116–119, 737–742
ISE cubes, 737
ISE persona types, 737
node personas, 742
PPAN (Policy Administration Node), 738–739
primary devices, 738–739
registration of ISE nodes, 739–742
Distribution Points, CRL, 467
DNS (Domain Name System), 196
ACLs (access control lists)
for BYOD onboarding, 494
definition of, 993
DNS probe, 417
snooping, 494
Domain Name System (DNS), 196, 417
Domain-Name attribute (DHCP), 411
domains
AD (Active Directory), 24
joining, 197–202
prerequisites for joining, 196
TrustSec, 557, 1000
Dot1x. See 802.1X
dot1x pae authenticator command, 275
dot1x system-auth-control command, 266, 563
dot1x timeout tx-period 10 command, 275
Downlink MACsec, 616–619
authorization profile, 616
ISE (Identity Services Engine) configuration, 619
policies, 616–618
switch configuration modes, 618–619
downloadable access control lists (dACLs), 13, 236,
237, 246–249, 319–320, 553
downloadable ACLs (dACLs), 548
downloading
AnyConnect Secure Mobility Client, 640
debug logs, 780
Drop option, authentication policy, 220
DTLS (Datagram Transport Layer Security), 190
dual SSID onboarding, 487–488, 993
definition of, 993
ISE (Identity Services Engine) configuration, 495–496,
510–523
authorization profiles, 516
authorization rules for EAP-TLS authentications, 518
authorization rules for onboarding, 517
client provisioning policy configuration, 512–514
default unavailable client provisioning policy action,
515
dual SSID with Android example, 503–508
ISE as certificate authority, 519–520, 521–523, 994
native supplicant profile, 510–512
SCEP (Simple Certificate Enrollment Protocol), 520–
521, 999
WebAuth configuration, 514–515
verification of BYOD flows, 534–535
endpoint identity groups database, 535
RADIUS Live Logs, 534
reports, 534–535
WLC (Wireless LAN Controller) configuration, 489–495
ACLs (access control lists), 492–495
WLAN configuration, 490–491
Dubois, Jesse, 772
“dumb” devices, 96
Duo Security, 27–29
Dynamic Access Policy (DAP), 629
Dynamic Host Configuration Protocol. See DHCP
(Dynamic Host Configuration Protocol)
dynamically assigning SGTs (security group tags),
577
E
EAP (Extensible Authentication Protocol), 7, 42–49,
73, 214, 545–546
alternative ID stores based on, 224–227
comparison of, 47–49
definition of, 993
EAP-FAST, 45, 48–49, 215
EAP-GTC, 43, 45, 215
EAP-MD5, 43, 46, 214
EAP-MS-CHAPv2, 43, 45, 46, 215
EAPoL (EAP over LAN). See 802.1X
EAPoL-Proxy-Logoff, 273, 993
EAPoL-Start (EAP over LAN Start), 270
EAP-TLS, 43, 45, 214, 215
EAP-TTLS, 45–46, 48–49
identity store comparison, 49
native types, 43–44, 996
PEAP, 44–45, 48–49, 53–54, 55–56, 108, 215
TEAP, 46–47, 48–49, 73
tunneled, 44–49, 1000
EAP MSCHAPv2 Properties dialog, 54
EAP_Authentication_Certificate_Template, 520
EAPChainingResult, 546
EAP-Identity-Request messages, 270
east-west segmentation, 554–555
east-west SGACL deployment, 598–599
EasyConnect, 89–90, 993
Edge, support for, 122
editors, Conditions Studio, 218
EDR (endpoint detection and response), 661, 897–898
eduroam initiative, 46
egress enforcement, of SGTs (security group tags),
555–556
EKU (extended key usage), 211
Elevated system admin role, 131
Employee and CorpMachine authorization rule, 242–
243
employee dynamic interface, 284–285
employee full access rule, 241–243
employee limited access, 246–249
Employee profile, 977
Employee_Limited dACL, 246–249
EmployeeFullEAPChain condition, 249–250
Enable agent IP refresh setting (AnyConnect posture
profile), 646
enable command, 932
Enable notifications in stealth mode setting
(AnyConnect posture profile), 645
Enable Rescan Button setting (AnyConnect posture
profile), 645
enable secret ISEc0ld command, 947
Enable signature check setting (AnyConnect posture
profile), 645
encryption, posture policy conditions for, 665–666
end state, transitioning to, 730–731
Endpoint Assignment tab (Adaptive Network Control),
149
endpoint attribute filtering, 444–445
Endpoint Categories dashlet, 135, 454
Endpoint Debug tool, 796–798
Endpoint ID column (Live Log), 767
endpoint identity groups, 22, 354, 450–452
endpoint identity groups database, 535
Endpoint list, 454
Endpoint Profile column (Live Log), 767
Endpoint Profile Policies, 431–441
endpoint protection platform (EPP), 661, 897–898
Endpoint Protection Services (EPS), 821–822, 993
EndPointPolicy, 453
endpoints
diagnostics, 809–812
Cisco AnyConnect Diagnostics and Reporting Tool
(DART), 809–811
supplicant provisioning logs, 812
EDR (endpoint detection and response), 661, 897–898
endpoint attribute filtering, 444–445
endpoint diagnostics, 809–812
Cisco AnyConnect Diagnostics and Reporting Tool
(DART), 59, 809–811
supplicant provisioning logs, 812
endpoint identity groups, 22, 354, 450–452
endpoint identity groups database, 535
EndPointPolicy, 453
endpoints database, 455–456
EPP (endpoint protection platform), 661, 897–898
EPS (Endpoint Protection Services), 993
global search for, 139–140
guest access, 338
health of. See posture assessment
internal endpoint database, 22, 994
local endpoint groups, 195
MDM (mobile device management), 542–543
onboarding, 153
posture assessment, 695–705
AnyConnect already installed, endpoint not compliant,
700–702
AnyConnect not installed on endpoint yet, 696–700
redirected state, 695–696
stealth mode, 645, 703
temporal agent and posture compliant, 705
profile policies for, 431–441
purge policies for, 345
supplicant verification, 295–296
Endpoints and Users reports, 150
Endpoints dashlet, 134, 135
Endpoints tab
Context Visibility screen, 143
Home page, 134–135
Endpoints widget, 454
enforcement, traffic
SGACLs (security group ACLs), 597–604, 998
Deny_All SGACL, 601–602
east-west deployment of, 598–599
egress policy, 597–598, 600–601
north-south deployment of, 598–599
Permit_HTTP_HTTPS SGACL, 601–602
Permit_ICMP SGACL, 602–603
Permit_Mgmt SGACL, 601
Permit_SRC_HTTP_HTTPS SGACL, 603–604
Permit_WEB_RDP SGACL contents, 598
syntax, 599–600
SGFWs (security group firewalls), 611–613
on ASA (Adaptive Security Appliances), 612
on ASR (Aggregation Services Router), 613
definition of, 999
on Firepower, 612–613
on ISR (Integrated Services Router), 613
TrustSec policy matrix, 604–609
configuration of, 605–609
views of, 604–605
environment data, 558, 993
epm logging command, 299
EPP (endpoint protection platform), 661, 897–898
EPS (Endpoint Protection Services), 821–822, 993
EPSStatus condition, 821–822
eradication, 896
ERROR message, 9, 11
ERS (External RESTful Services), 131, 850–851
Evaluate Configuration Validator, 788–793
Evaluation license, 155, 157
exam preparation, 988–989
exam updates, 1032–1033
final study and review, 988–989
hands-on activities, 988–989
Execute Network Device Command tool, 787–789
Executive SGT (Security Group Tag), 555
ExernalBlue, 868
exit command, 932
expanding policy sets, 211
expired certificates, 32–33, 465
exploits, definition of, 872, 993
Export command (Dashboard settings), 134
Ext Id Sources tab (Guest Access work center), 340
extended key usage (EKU), 211
Extensible Authentication Protocol. See EAP
(Extensible Authentication Protocol)
Extensible Communication Platform (XCP) server, 825
Extensible Messaging and Presence Protocol (XMPP),
825
External CA Settings, 520
external data source condition, 100
External Identity Sources tab (Identity Management),
162
external identity stores, 23–33, 993. See also
certificate-based authentication
AD (Active Directory), 24–25
configuration, 196
definition of, 23, 993
LDAP (Lightweight Directory Access Protocol), 25–26
MFA (multifactor authentication), 26–29
OTP (one-time password) services, 29
smart cards, 29
External MDM tab (Network Resources), 165
External RADIUS Servers tab (Network Resources),
165
External RESTful Services (ERS), 131, 850–853
F
faceprint technology, 27
Fail Live Log status, 767
FAIL message, 10
Failure Reason dashlet, 136
fallback, TACACS+, 946–948
FAST (Flexible Authentication via Secure Tunneling)
EAP chaining, 216
EAP-FAS, 215
EAP-FAST, 45, 48–49
FDM (Firepower Device Management), 832
Feed Service tab (Administration screen), 169
FIDO2, 310
files
CRC32, 672
file conditions, 100, 667–673
FileDate, 669–671
FileExistence, 671–678
FileVersion, 672
ise-2.7.0.356.SPA.x86_64.iso, 112
ISE-2.7.0.356-virtual-SNS3615-SNS3655–300.ova, 112
ISE-2.7.0.356-virtual-SNS3655-SNS3695–1200.ova, 112
ISE-2.7.0.356-virtual-SNS3695–2400.ova, 112
paths for, 669–670
policy for, 612
remediations for, 682
SHA-256, 672
FileVersion file type, 672
filtering
endpoint attributes, 444–445
Live Log, 771
Finance SGT (Security Group Tag), 555
fingerprint technology, 27
Firefox, support for, 122
Firepower
FDM (Firepower Device Management), 832
FTD (Firepower Threat Defense), 629
SGFW (security group firewall) on, 612–613
firewalls, 611
conditions for, 100, 660–661
posture policy conditions, 660–661
remediations, 682
SGFWs (security group firewalls), 611–613
on ASA (Adaptive Security Appliances), 612
on ASR (Aggregation Services Router), 613
definition of, 999
on Firepower, 612–613
on ISR (Integrated Services Router), 613
FlexAuth (Flexible Authentication)
configuration, 269–272
definition of, 994
FAST (Flexible Authentication via Secure Tunneling)
EAP chaining, 216
EAP-FAS, 215
EAP-FAST, 45, 48–49
FMC (Firepower Management Center) configuration,
831–850
access rules, 840–844
active users, viewing, 844–845
FDM (Firepower Device Management), 832
pxGrid integration, 832–837
Rapid Threat Containment, 845–850
realms, 837–840
FOLLOW message, 11
Forbes, Paul, 633
forests, AD (Active Directory), 24
form factors
ISE (Identity Services Engine), 177
SNS (Secure Network Server) appliances, 111–112
FQDN (fully qualified domain name), 416, 833
Framed-IP-Address attribute (RADIUS), 265, 414
FTD (Firepower Threat Defense), 629
Full Configuration Database support bundles, 782
Full Wipe option (endpoint management), 543
fully qualified domain name (FQDN), 416, 833
Funk Software, 45
G
gateway providers, SMS (Short Message Service),
388–389
GCL (pxGrid common library), 825
General tab
corporate WLAN, 292
guest WLAN, 287–288
Generic Token Card (GTC), 43, 45, 215
global CoA (Change of Authorization), 442–443, 994
global configuration AAA commands, 261–262
global configuration RADIUS commands, 262–269
device tracking in IOS Xe 16.x and later, 267
global 802.1X commands, 266–267
IOS 12.2.x, 262–263, 264–266
IOS 15.x, 263–266
IOS XE, 263–266
local ACL (access control list) creation, 268–269
Global Page Customizations (portal page
customization), 361
global profiler settings, 444–445
global search for endpoints, 139–140
Global Search tool, verifying profiling with, 454–455
Good Technology, 708
Google Chrome, 122
Google Client Messaging servers, 101
Google Play Store, 282, 492–493, 506
Google URLs for ACL Bypass, 282–283
graphical user interface. See GUI (graphical user
interface)
GROUP_ACCOUNTS sponsor group, 381
groups
Admin group roles, 127–132
endpoint, 22
endpoint identity, 22, 354, 450–452, 535
local endpoint, 195
local user identity, 194
NDGs (network device groups), 720–721, 996
node, 748–750, 996
user identity, 22, 339–340, 840–844, 1000
Groups tab (Identity Management), 162
GRTC (Generic Token Card), 43, 45
GTC (Generic Token Card), 43, 215
Guest Access work center
Administration tab, 340–341
Ext Id Sources tab, 340
Identities tab
endpoints, 338
ISS (identity source sequence), 339
user identity groups, 339–340
overview page, 337–338
Portals & Components tab, 341
guest portals, 341–342
guests, 341, 343–348
overview of, 341
sponsor portals, 341
guest dynamic interface, 285–286
Guest Exceeds Limit setting, contractor accounts,
345
Guest Flow attribute, 323–324, 994
guest location setting, 369–371, 994
Guest management license packages, 156
guest portals, 341–342
authorization policies for, 348–351
definition of, 341–342
hotspot, 351–358
AUP (acceptable use policy) page settings, 354–356
authentication success settings, 357
authorization rule configuration, 362–365
configuration flowchart for, 351
definition of, 342
interface bonding, 352–353
portal page customization, 358–362
portal settings, 352–354
post-access banner page settings, 355–356
support information page settings, 357–358
VLAN DHCP release page settings, 355–356
self-registered
authorization rule configuration, 373–380
BYOD settings, 372
configuration flowchart, 365–366
definition of, 342
guest change password settings, 371–372
guest device compliance settings, 373
guest device registration settings, 371–372
guest location setting, 369–371, 994
login page settings, 367–368
portal settings, 366–367
registration form settings, 368–371
self-registration success, 371
sponsored, 380–381
AUP (acceptable use policy) page settings, 386
configuration flowchart, 380–381
default sponsor portal, 384
definition of, 342
login settings, 386
other settings, 387
portal settings, 385–386
provisioning guest accounts from, 389–394
Guest reports, 150
guest services, 337–341
administration, 340–341
authorization policies for, 348–351
guests, 343–348
contractors, 344–346
daily, 346–347
definition of, 341
overview of, 343
provisioning from sponsor portals, 389–394
social, 348
sponsor, 341
weekly, 347
hotspot guest portals, 351–365
AUP (acceptable use policy) page settings, 354–356
authentication success settings, 357
authorization rule configuration, 362–365
configuration flowchart for, 351
definition of, 341–342
interface bonding, 352–353
portal page customization, 358–362
portal settings, 352–354
post-access banner page settings, 355–356
support information page settings, 357–358
VLAN DHCP release page settings, 355–356
identities, 338–340
importance of, 334
notification services, 388–389
SMS gateway providers, 388–389
SMTP servers, 388
overview of, 337–341
SAML (Security Assertion Markup Language)
authentication, 394–400
self-registered guest portals
authorization rule configuration, 373–380
BYOD settings, 372
configuration flowchart, 365–366
definition of, 342
guest change password settings, 371–372
guest device compliance settings, 373
guest device registration settings, 371–372
guest location setting, 369–371, 994
login page settings, 367–368
portal settings, 366–367
registration form settings, 368–371
self-registration success, 371
sponsored guest portals, 380–381
AUP (acceptable use policy) page settings, 386
configuration flowchart, 380–381
default sponsor portal, 384
definition of, 342
login settings, 386
other settings, 387
portal settings, 385–386
provisioning guest accounts from, 389–394
sponsors
definition of, 381, 999
sponsor groups, 381–382
Guest Status dashlet, 136
Guest Type dashlet, 136
guest WLAN configuration, 287–290
AAA Servers tab, 289–290
Advanced tab, 290
General tab, 287–288
Layer 2 Security tab, 288
Layer 3 Security tab, 289
Guest_Portal_Sequence ISS, 319, 339
guests, 343–348
contractors, 344–346
daily, 344–346
definition of, 341, 994
overview of, 343
provisioning from sponsor portals, 389–394
social, 348
weekly, 347
Guests tab (Home page), 135–136
GUI (graphical user interface)
Admin group roles, 127–132
Administration portal, 137–142
global search for endpoints, 139–140
Help menu, 138, 140–141
ISE Setup Wizards, 141
Settings menu, 142
tabs, 137–139
Administration screen, 142, 155–170
Device Portal Management tab, 166–169
Feed Service tab, 169
Identity Management tab, 161–163
Network Resources tab, 163–166
PassiveID Setup option, 138
pxGrid Services tab, 169
Search icon, 138
System Activities option, 139
System tab, 155–161
Threat Centric NAC tab, 170
Visibility Setup option, 138
Wireless Setup (BETA) option, 139
browser requirements for, 125
Context Visibility screen, 137, 142, 143
definition of, 994
downloading, 780
Home dashboards, 132–137
initial login, 125–126
Operations screen, 142, 143–150
ANC (Adaptive Network Control) component, 147–148,
991
RADIUS tab, 144–146
Reports tab, 150
TACACS Live Log tab, 147
Threat-Centric NAC Live Logs tab, 146
Troubleshoot tab, 147–148
Policy page, 138, 142, 150–154
Client Provisioning tab, 153
Policy Elements tab, 154
Policy Sets tab, 150–151
Posture tab, 152
Profiling tab, 152
support bundles, 783
supported browsers, 122–123
Work Centers screen, 142, 170–171
H
HA (high availability)
configuration, 269–272
RADIUS fallback, 279–280
hardware attributes condition, 100, 655
headends, AnyConnect
configuration of, 640–642
deployment packages
AnyConnect configuration, building, 648–649
posture profile configuration, 644–648
uploading to ISE, 642–644
number of, 640
Hello (Windows), 27
help command, 932
Help menu, Administration portal, 138, 140–141
Helpdesk admin role, 127
HelpDesk command set, 941–942
helpdesk group, 945
HelpDesk profile, 939, 940, 976
high availability (HA), 743
Anycast, 753–756
IP SLAs (service-level agreements), 754–756
network architecture, 753–754
route redistribution, 755–756
backup and restore, 759–761
configuration, 269–272
failure scenarios, 753
general guidelines for, 752–753
licensing in multi-mode ISE cube, 747–748
load balancing
IOS (Internetwork Operating System), 756–757
PSNs (Public Services Networks), 751–752
MnT (Monitoring and Troubleshooting) nodes, 109–110,
743–744
logging categories, 744
logging flows, 743
logging targets, 743–744
node groups, 748–750
PAN (Policy Administration node), 109, 743–744
patches, 757–759
RADIUS fallback, 279–280
high-security mode. See closed mode
Home dashboards, 132–137
Dashboard Settings menu, 134
Endpoints tab, 134–135
Guests tab, 135–136
Summary tab, 134
Threat tab, 137
Vulnerability tab, 136
hop-by-hop encryption, 548
host mode, switch port, 272–274
Host-Name attribute (DHCP), 411
hostname command, 946
HostScan, 629
hotspot guest portals, 342, 351–358
AUP (acceptable use policy) page settings, 354–356
authentication success settings, 357
authorization rule configuration, 362–365
configuration flowchart for, 351
interface bonding, 352–353
portal page customization, 358–362
portal settings, 352–354
post-access banner page settings, 355–356
support information page settings, 357–358
VLAN DHCP release page settings, 355–356
“HowTo: Cisco and F5 Deployment Guide-ISE Load
Balancing Using BIG-IP” (Hyps), 752
HR SGT (Security Group Tag), 555
hrDeviceDescr option (Nmap), 416
HTTP (Hypertext Transfer Protocol)
HTTP probe, 420–421
HTTP/HTTPS servers, enabling, 314
HTTPS (HTTP Secure), 126, 180
POST method, 84–85
hybrid ISE deployment, 116–117
Hyper-V, 113
Hyps, Craig, 633, 752
I
IBM MaaS360, 708
IBM Tivoli Identity Manager (TIM), 25
identification profiles, WSA (Web Security Appliance),
855–857
Identities tab
Device Administration, 920
Guest Access work center
endpoints, 338
ISS (identity source sequence), 339
user identity groups, 339–340
Identity Management, 161
Identity admin role, 127
Identity column, Live Log, 767
Identity Management tab (Administration screen),
161–163
External Identity Sources tab, 162
Groups tab, 162
Identities tab, 161
Identity Source Sequences tab, 163
Settings tab, 163
identity providers. See IdPs (identity providers)
Identity Services Engine. See ISE (Identity Services
Engine) architecture
Identity Source Sequences tab (Identity
Management), 163
identity sources, 34, 35
identity stores, 21–33, 993
authentication policy for, 219–220
CAPs (certificate authentication profiles), 202
definition of, 20–21
EAP (Extensible Authentication Protocol). See EAP
(Extensible Authentication Protocol)
external
Active Directory. See AD (Active Directory)
certificates. See certificate-based authentication
configuration, 196
definition of, 23, 993
LDAP (Lightweight Directory Access Protocol), 25–26
MFA (multifactor authentication), 26–29
OTP (one-time password) services, 29
smart cards, 29
identity sources, 21, 994
identity validation, 211
internal, 21–22
endpoint groups, 22
user identity groups, 22, 1000
ISS (identity source sequence), 34, 202–204, 218, 319,
339, 472, 994
local endpoint groups, 195
local user identity groups, 194
local users, 195–196
selection of, 210–211
Idle Timeout option (TACACS profile), 933
IdPs (identity providers), 35, 394–400, 998
IEEE 802.1X. See 802.1X
IETF (Internet Engineering Task Force), 12
NEA (Network Endpoint Assessment), 626
RADIUS. See RADIUS (Remote Access Dial-In User Service)
IF.THEN policy rules, 154
in authentication policies, 216
in authorization policies, 236
IMEI attribute, 537
importing public certificates, 476–477
incidents, 899–900
Include Service Version Information option (Nmap),
416
IND (Industrial Network Director), 827
indicators of compromise (IoCs), 899, 994
Industrial Network Director (IND), 827
Informational Live Log status, 767
infrastructure configuration
DHCP helper, 424–427
IOS Device Sensor, 426–427
SPAN (Switched Port Analyzer), 424–425
VACLs (VLAN Access Control Lists), 425–426
VMware vSwitches, 427
ingress access controls
ACLs (access control lists), 553–554
east-west segmentation, 554–555
VLAN assignment, 551–553
int eth1/3N7K-DIST command, 578
int GigabitEthernet 2 command, 352
Integrated Services Router. See ISR (Integrated
Services Router)
integration
definition of, 820, 994
MDM (mobile device management), 820–821
administrative management, 545
configuration, 537–538
endpoint management, 542–543
integration points, 536–537
onboarding rules, 539–542
self-management, 543–544
Rapid Threat Containment, 821–823
ANC (Adaptive Network Control), 822–823
definition of, 998
EPS (Endpoint Protection Services), 821–822, 993
interface bonding, hotspot guest portals, 352–353
interface configuration, 269–276
application of initial ACL to port, 275–276
authentication settings, 274–275
authentication timers, 275
configuration of interfaces as switch ports, 269
FlexAuth (Flexible Authentication), 269–272
HA (high availability), 269–272
host mode of switch port, 272–274
interface g1/0/1 command, 267
interface range command, 269
intermediate CAs (certificate authorities), 521–523
internal blocking, 896
Internal CA Settings menu (ISE Certificate Authority),
520
internal endpoint database, 22, 994
internal identity stores, 21–22
endpoint groups, 22
user identity groups, 22, 1000
internal user database, 994
Internet Engineering Task Force. See IETF (Internet
Engineering Task Force)
Internet Explorer, 122
Internet-only access for smart devices, 243–246
intrusion prevention systems (IPSs), 661, 818
IoCs (indicators of compromise), 899, 994
iOS. See Apple iOS
IOS (Internetwork Operating System)
device administration AAA with, 930
device administration service, enabling, 937
network device preparation, 937–939
overview of, 932
policy preparation, 939–946
privilege levels, 932–933, 997
TACACS profiles, 932–934
TACACS+ authentication and fallback, 946–948
TACACS+ command accounting, 951
TACACS+ command authorization, 948–950
TACACS+ command sets, 934–936, 992
testing and troubleshooting in ISE, 952–954
troubleshooting at IOS command line, 954–966
Device Sensor feature, 426–427
global configuration RADIUS commands
device tracking in IOS Xe 16.x and later, 267
IOS 12.2.x, 262–263, 264–266
IOS 15.x, 263–266
IOS XE, 263–266
local ACL (access control list) creation, 268–269
IOS XE switches
configuration for TrustSec, 560–563
global configuration RADIUS commands, 263–266
manual SGT (security group tag) propagation on, 595–
597
IOS-based NADs, 495
load balancing, 756–757
SXP (SGT Exchange Protocol) configuration on, 588–590
IOS_ Network _CS, 943
IOS_Admin_Privilege profile, 940–941
IOS_HelpDesk_CS, 941–942
IOS_HelpDesk_Privilege profile, 940
IOS_Security_CS, 942–943
IoT SGT (Security Group Tag), 555
ip access-group ACL-ALLOW command, 276
ip access-list ext ACL-AGENT-REDIRECT command,
269
ip access-list ext ACL-DEFAULT command, 268
ip access-list ext ACL-WEBAUTH-REDIRECT command,
268, 315
ip access-list extended ACL-ALLOW command, 268
ip access-list extended command, 425, 948
IP Address column, Live Log, 768
ip device tracking command, 266, 298
ip device tracking probe auto-source command, 267
ip domain-name command, 313, 946
ip helper-address command, 412–413, 424
ip http active-session-modules none command, 314
ip http secure-server command, 314
ip http server command, 314
ip radius source-interface command, 266
IP SLAs (service-level agreements), 754–756
ip ssh version 2 command, 947
iPad, 482. See also Apple iOS
iPCU (iPhone Configuration Utility), 812
iPhone, 482. See also Apple iOS
iPhone Configuration Utility (iPCU), 812
IPSs (intrusion prevention systems), 612, 661, 818
ISE (Identity Services Engine) architecture, 6. See
also profiling
Anomalous Behaviour Detection, 406–408, 991
configuration for BYOD onboarding, 495–496, 510–523
authorization profiles, 516
authorization rules for EAP-TLS authentications, 518
authorization rules for onboarding, 517
Blackberry example, 508–509
client provisioning policy configuration, 512–514
default unavailable client provisioning policy action,
515
dual SSID with Android example, 503–508
ISE as certificate authority, 519–520, 521–523, 994
native supplicant profile, 510–512
SCEP (Simple Certificate Enrollment Protocol), 520–
521, 999
single SSID with Apple iOS example, 496–503
WebAuth configuration, 514–515
configuration for CWA (Centralized Web Authentication),
317–322, 327
authorization profiles, 320–322
dACLs (downloadable access control lists), 319–320
Guest_Portal_Sequence ISS (identity source
sequence), 319
MAB (MAC Authentication Bypass), 96–99, 318
configuration for MACsec, 619
configuration for pxGrid, 828–831
cubes, 182
definition of, 109, 737, 995
licensing in, 747–748
deployment
distributed, 116–119, 737–742
hybrid, 116–117
overview of, 113
physical versus virtual, 111–113
scale limits for, 118–119
single-node, 113
two-node, 114–116
device administration AAA with Cisco IOS
device administration service, enabling, 937
network device preparation, 937–939
policy preparation, 939–946
TACACS+ authentication and fallback, 946–948
TACACS+ command accounting, 951
TACACS+ command authorization, 948–950
Endpoint Profile Policies, 431–441
form factors, 177
GUI (graphical user interface). See GUI (graphical user
interface)
high availability, 743
Anycast high availability, 753–756
backup and restore, 759–761
failure scenarios, 753
general guidelines for, 752–753
licensing in multi-mode ISE cube, 747–748
load balancing, 751–752, 756–757
MnT (Monitoring and Troubleshooting) node, 109–110,
743–744
node groups, 748–750
PAN (Policy Administration node), 109, 743–744
patches, 757–759
initial configuration, 174
AD (Active Directory), 196–202
bootstrapping, 177–180
CAPs (certificate authentication profiles), 202
certificates, 181–191
external identity stores, 196, 993
form factors, 177
installation guides, 177
ISS (identity source sequence), 202–204, 994
local endpoint groups, 195
local user identity groups, 194
local users, 195–196
NADs (network access devices), 192
NDGs (network device groups), 192–194
SSL (Secure Sockets Layers), 181
TLS (Transport Layer Security), 181–182
ISE NAC feature, 315–316
ISE nodes in distributed environment, 737–742
ISE cubes, 737
ISE persona types, 737
node personas, 742
PPAN (Policy Administration Node), 738–739
primary devices, 738–739
registration of ISE nodes, 739–742
licensing
in multi-mode ISE cube, 747–748
packages, 155–158
Live Log, 327
NADs (network access devices), 113
network probes, 409–423
Active Directory, 422
configuration, 409–411
DHCP and DHCPSPAN, 411–414
DNS, 417
HTTP, 420–421
NETFLOW, 419–420
Nmap (network scan), 415–417
publishing endpoint probe data on, 450
pxGrid, 423
RADIUS, 414–415
SNMPQUERY and SNMPTRAP, 417–419
nodes
configuration in distributed environment, 737–742
definition of, 109
MnT (Monitoring and Troubleshooting), 109–110, 743–
744
node groups, 748–750
PAN (Policy Administration node), 109, 745–748
PSN (Policy Services node), 110
single-node ISE deployment, 113
two-node ISE deployment, 114–116
overview of, 106–108
personas
Administration, 109, 737
definition of, 108–109
Monitoring, 109–110, 737
Policy Services, 110, 737
pxGrid, 111, 737
types of, 737
posture assessment. See posture assessment
Profiler Feed Service, 404–406, 429–430
CoA (Change of Authorization) with, 442–444
configuration, 429
verification of, 429–430
SXP (SGT Exchange Protocol) configuration on, 584–586
troubleshooting. See troubleshooting tools
verification of, 302–303
Live Sessions, 303
RADIUS Live Log, 302–303
version scalability, 118–119
virtual appliances, 177
WLC device administration AAA
ISE configuration on WLC TACACS+ servers, 979–980
network device preparation, 972
policy results preparation, 974–977
policy sets, 977–979
ISE Community Page option (Help menu), 141
ISE Documentation option (Help menu), 141
ISE on Cisco.com option (Help menu), 141
ISE Partner Ecosystem option (Help menu), 141
ISE Passive Identity Connector (ISE-PIC), 157, 858
ISE Portal Builder option (Help menu), 141
ISE Profiler. See profiling
ISE Setup Wizards, 141
ISE Software Downloads option (Help menu), 141
ISE YouTube Channel option (Help menu), 141
ise-2.7.0.356.SPA.x86_64.iso file, 112
ISE-2.7.0.356-virtual-SNS3615-SNS3655–300.ova file,
112
ISE-2.7.0.356-virtual-SNS3655-SNS3695–1200.ova
file, 112
ISE-2.7.0.356-virtual-SNS3695–2400.ova file, 112
ISE-PIC (ISE Passive Identity Connector), 157, 858
ISR (Integrated Services Router), 613
ISS (identity source sequence), 34, 202–204, 218,
319, 339, 472, 994
Issued Certificates menu (ISE Certificate Authority),
520
IT Users Access authorization rule, 252–256
J
Jabber, 825
JailBrokenStatus attribute, 536
Jamf Pro, 673, 708
Java applets, 85–86, 153, 322, 356
JGroups, 748
Jobs, Steve, 482
joining AD (Active Directory) domains, 197–202
Juniper, 45
K
Karelis, E. Peter, 753
Kerberos, 196, 469
key command, 264
keys. See also PKI (public key infrastructure)
EKU (extended key usage), 211
key pairs, 468–469, 995
MKA (MAC Security Key Agreement), 616
private, 468–469
public, 468–469, 998
Kpasswd, 196
L
L (Locality) field, 183
Lancope Stealthwatch. See Stealthwatch
LANs (local area networks)
EAP over LAN. See 802.1X
VLANs (virtual LANs), 726
assignment of, 551–553, 726
authentication VLAN, 87–88
dynamic interfaces for, 284–286
mapping to SGTs (security group tags), 580
segmentation with, 322
VACLs (VLAN Access Control Lists), 424, 425–426
Launch Page Level Help option (Help menu), 140
launch program remediations, 683
Layer 2 Security tab
corporate WLAN, 292–293
guest WLAN, 288
Layer 3 Security tab
corporate WLAN, 293
guest WLAN, 289
Layout Template command (Dashboard settings), 134
LDAP (Lightweight Directory Access Protocol), 23, 25–
26, 196, 995
lease, posture, 691
left-zero-padded keyword, 621
library, Conditions Studio, 218
library conditions, 708
licensing, 155–158, 747–748
Lightweight Directory Access Protocol. See LDAP
(Lightweight Directory Access Protocol)
Lightweight Directory Access Protocol (LDAP), 23, 25–
26, 196, 995
Line-of-Business-1 SGT (Security Group Tag), 555
Line-of-Business-2 SGT (Security Group Tag), 555
Link encryption (MACsec), 156
Link Layer Discovery Protocol (LLDP), 98, 418
link remediations, 684
Linux KVM, 113
lists
ACLs (access control lists). See ACLs (access control lists)
CRLs (certificate revocation lists), 33, 466
Live Log, 766–771
Actions menu, 770
advanced filtering, 771
authentication details report, 771–774
Authorization Policy column, 767
Authorization Profiles column, 768
blank lines in, 774–775
Cisco ISE verification with, 302–303
Client Stopped Responding counter, 768
CWA (Centralized Web Authentication) verification from,
327
Details icon, 768
device administration AAA with Cisco IOS, 952–954
Endpoint ID column, 767
Endpoint Profile column, 767
Identity column, 767
IP Address column, 768
MDM Server column, 768
Misconfigured Network Devices counter, 768
Misconfigured Supplicants counter, 768
Network Device column, 768
Quick Filters counter, 769
RADIUS (Remote Access Dial-In User Service), 144–146
RADIUS Drops counter, 768
Record Selector, 770
Refresh counter, 770
Repeat counter, 767, 769
Server column, 768
status types, 767
TACACS+, 147, 982–983
Threat-Centric NAC, 146
Time Selector, 770
verification of BYOD flows with, 534
Live Sessions, 776
Cisco ISE verification with, 303
RADIUS (Remote Access Dial-In User Service), 145–146
LLDP (Link Layer Discovery Protocol), 98, 418
load balancing
IOS (Internetwork Operating System), 756–757
PSNs (Public Services Networks), 751–752
LOBBY role, 972
local ACLs (access control lists), 268–269
local endpoint groups, 195
Local Logs support bundles, 783
local user identity groups, 194
local users, 195–196
Local Web Authentication. See LWA (Local Web
Authentication)
Locality (L) field, 183
Location dashlet, 136
Location Services tab (Network Resources), 166
Log %temp%\spwProfileLog.txt command, 812
logging categories, 778–779
logging host command, 299
logging in to ISE (Identity Services Engine), 125–132
Admin group roles, 127–132
Administration portal, 137–142
global search for endpoints, 139–140
Help menu, 138, 140–141
ISE Setup Wizards, 141
Settings menu, 142
tabs, 137–139
daily guest accounts, 347
Home dashboards, 132–137
initial login, 125–126
self-registered guest portals, 367–368
social, 35
sponsored guest portals, 386
logging monitor informational command, 299
logging origin-id ip command, 299
logging source-interface command, 299
logging synchronous command, 947
Logging tab (System), 159
logging targets, 743–744, 777–778
logical profiles, 441–442, 995
login authentication command, 947
Login Page Settings (Client Provisioning portal), 651–
652
Logoff option, posture reassessment, 692
logout command, 932
logs, 159, 766–785
debug, 779–784
configuration, 779–780
downloading from GUI, 780
support bundles, 782–784
viewing from CLI, 781–782
de-duplication of, 805–807
Live Log. See Live Log
Live Sessions, 776
logging categories, 744, 778–779
logging flows for, 743
logging targets for, 743–744, 777–778
Lost option (endpoint management), 543
low-impact mode, 725–727
LWA (Local Web Authentication), 310–311
with centralized portal, 84–85
definition of, 995
when to use, 84
M
MaaS360, 708
MAB (MAC Authentication Bypass)
authentication with, 80–82, 227–228
configuration, 265, 270–274, 318
definition of, 717, 995
MAB rule flowchart, 217
overview of, 96–99
profiling, 96–99
DHCP (Dynamic Host Configuration Protocol), 97
RADIUS (Remote Access Dial-In User Service), 97
role-specific authorization rules, 241
wireless, 489
MAC (Media Access Control) addresses
identity management with, 20
MAB (MAC Authentication Bypass), 80–82, 995
authentication with, 227–228
configuration, 265, 318
definition of, 717
MAB rule flowchart, 217
overview of, 96–99
profiling, 96–99
role-specific authorization rules, 241
wireless, 489
Mac filtering on WLCs, 315
MACsec, 995
MAM (MAC Address Management) model, 451
MKA (MAC Security Key Agreement), 616
URL-redirected MAC authentication bypass, 311–313
MAC Filtering option, WLC (Wireless LAN Controller),
315
Mac OSX
Console application, 812
onboarding flow, 531–533
device provisioning, 532–533
device registration, 531
Machine Access Restriction (MAR), 472
Machine Authentication, 66, 545–546
macro-segmentation, 613
MACsec, 995
definition of, 548
Downlink MACsec, 616–619
authorization profile for, 616
ISE (Identity Services Engine) configuration, 619
policies, 616–618
switch configuration modes, 618–619
history of, 614–616
Multi-Hosts mode, 273, 298, 618, 995
Uplink MACsec, 619–623
Maintenance tab (System), 159
Make Primary button, 738
malware
anti-malware posture policy conditions, 661–663
anti-malware remediations, 681–682
MAM (MAC Address Management) model, 451
Manage Dashboards command (Dashboard settings),
134
MANAGEMENT role, 971
manual SGT (security group tag) propagation, 595–
597
manually assigning SGTs (security group tags), 577–
578
Manufacturer attribute, 536
mapping
subnets to SGTs (security group tags), 580
VLANs to SGTs (security group tags), 580
MAR (Machine Access Restriction), 472
matrix view (TrustSec policy matrix), 553
Maximum Access Time setting
contractor accounts, 344
daily guest accounts, 347
weekly guest accounts, 347
Maximum Privilege option (TACACS profile), 933
Maximum Simultaneous Logins setting, 345
MD5 algorithm, 43, 46, 214
MDA (Multidomain Authentication), 273, 298, 618,
995
MDM (mobile device management), 820–821. See also
BYOD (bring your own device) onboarding
definition of, 995
dictionary, 708–709
onboarding
administrative management, 545
advantages of, 535–536
attributes in authorization policies, 536–537
definition of, 487
endpoint management, 542–543
integration configuration, 537–538
onboarding rule configuration, 539–542
self-management, 543–544
overview of, 101–102
posture assessment with, 108
supported features, 101–102
vendors, 101–102
MDM Server column (Live Log), 768
MDM_Compliant authorization rule, 709, 711
MDM_Detailed_Posture condition, 710
MDM_NotCompliant authorization rule, 711
MDM_NotCompliant condition, 709–710
MDM_NotReachable authorization rule, 710
MDMFailureReason attribute, 537
MDMServerName attribute, 537
MDMServerReachable attribute, 537, 712
Media Access Control. See MAC (Media Access
Control) addresses
MEID attribute, 537
Meraki Systems Manager (Meraki SM), 708
meshed SXP (SGT Exchange Protocol), 582–583
messages
CoA (Change of Authorization), 110, 311
RADIUS, 13–14
accounting messages, 13
authentication messages, 13
authorization messages, 13
syslog, 299–300
TACACS+
accounting messages, 11
authentication messages, 9
authorization messages, 10–11
communication flows, 12
Metrics dashlet, 134
MFA (multifactor authentication), 26–29
micro-segmentation, 614
Microsoft Active Director. See AD (Active Directory)
Microsoft CHAP. See MS-CHAP (Microsoft CHAP)
Microsoft Edge, 122
Microsoft Hyper-V, 113
Microsoft Internet Explorer, 122
Microsoft Intune, 673, 708
Microsoft Remote Procedure Call (MSRPC), 196
Miller, Darrin, 633
Misconfigured Network Devices counter, 768
Misconfigured Supplicants counter, 768
MKA (MAC Security Key Agreement), 616
MnT (Monitoring and Troubleshooting) admin role,
127
MnT (Monitoring and Troubleshooting) nodes, 109–
110, 743–744, 912
Dedicated MNT, 742
definition of, 995
logging categories, 744
logging flows, 743
logging targets, 743–744
sending syslog messages to, 299
mobile device management. See MDM (mobile device
management)
Mobile Device Management portal, 168
Mobile Iron UEM, 708
mobile posture, 707–712
authorization conditions, 709–710
authorization rules, 710–712
supported device managers, 707–709
Mobile Preview pane (portal page customization),
358
Mobility license packages, 156
Mobility Upgrade license packages, 157
Model attribute, 537
modes
closed, 728–730
low-impact, 725–727
monitor, 722–725
flow diagram, 723–724
operational flow, 722–723
policy set creation, 724–725
transitioning to end state, 730–731
modify device capabilities, 101
modules, compliance, 637–638
monitor mode, 722–725
flow diagram, 723–724
operational flow, 722–723
policy set creation, 724–725
transitioning to end state, 730–731
MONITOR role, 972
monitor session command, 425
Monitoring and Reporting Logs support bundles, 783
Monitoring and Troubleshooting nodes. See MnT
(Monitoring and Troubleshooting) nodes
Monitoring persona, 109–110, 737
Mozilla Firefox, 122
MS-CHAP (Microsoft CHAP), 43, 45, 46
MSE integration, 156
MSRPC (Microsoft Remote Procedure Call), 196
Multi-Auth (Multiauthentication), 273, 298, 618, 995
Multidomain Authentication (MDA), 273, 298, 618,
995
multifactor authentication (MFA), 26–29
multi-hop, 582
Multi-Hosts mode (MACsec), 273, 298, 618, 995
multi-node deployment. See cubes, ISE
Multiple Hosts (Multi-Hosts), 273, 298
must-not-secure policy (MACsec), 616, 618
must-secure policy (MACsec), 616, 618
My Devices portal, 168, 543–544
MyDevices_Portal_Sequence, 544
N
NAC (network access control) projects, 258. See also
AAA (authentication, authorization, and accounting)
NAC (Network Admission Control), 626, 630
NAC Appliance, 631–633
“NAC Framework” solution, 630
NAC Managers tab (Network Resources), 165
NADs (network access devices), 7, 107. See also
authorization
configuration, 917
ACLs (access control lists), 492–495
for BYOD onboarding, 489–495
connection settings, 918
identities, 920
network resources, 921–922
overview of, 916–917
password change control, 918
policy elements, 922–924
policy sets, 925–927
reports, 927
Session Key Assignment, 918
UI navigation for, 919–920
WLAN configuration, 490–491
CWA (Centralized Web Authentication) verification, 327–
331
client details, viewing on WLC, 329–331
show commands on wired switch, 328–329
definition of, 113, 996
enforcement types for, 50
ISE initial configuration, 192
role of, 49–50
TrustSec-enabled
defining TrustSec settings for, 559
PACs (Protected Access Credentials), 558–559
verification of, 296–302
with Cisco switches, 296–299
with Cisco WLC (Wireless LAN Controller), 300–302
with syslog messages, 299–300
NAM (Network Access Manager), 991
named ACLs, 244
NAP (Network Access Protection), 626
NAS-Port-Id attribute (RADIUS), 415
NAS-Port-Type attribute (RADIUS), 415
National Security Agency, 868
native EAP (Extensible Authentication Protocol), 43–
44, 996
native SGT (security group tag) propagation, 593–597
native supplicant profile, 510–512, 642
native tagging, 593–597
configuration on IOS XE switches, 595–597
Layer 2 frame format with, 593–594
pervasive tagging, 594
NDAC (Network Device Admission Control), 566, 996
NDES (Network Device Enrollment Services), 520
NDGs (network device groups), 192–194, 720–721,
996
NDS (Novell Directory Services), 25
NEA (Network Endpoint Assessment), 626
net-admin group, 945
NetAdmin profile, 974–975
NETFLOW probe, 419–420
NetIQ eDirectory. See AD (Active Directory)
netsh ras set tracing * enable command, 296
network access AAA, 3, 7, 996
network access control (NAC) projects, 258. See also
AAA (authentication, authorization, and accounting)
network access devices. See NADs (network access
devices)
Network Access Manager (NAM), 809, 991
Network Access Protection (NAP), 626
network access users, 21
Network Administrator command set, 943
Network Administrator role, 939
Network Admission Control. See NAC (Network
Admission Control)
Network device admin role, 128
Network Device Admission Control (NDAC), 566, 996
Network Device column (Live Log), 768
Network Device Enrollment Services (NDES), 520
network device groups (NDGs), 720–721, 996
Network Device Groups tab (Network Resources),
164–165
Network Device Profiles tab (Network Resources),
165
network device troubleshooting, 812–815. See also
device administration AAA
client details, viewing on WLC, 813–814
debug commands, 815
show authentication interface command, 812–813
Network Devices dashlet, 134, 135
Network Devices tab, 143, 163–164
Network Devices widget, 454
Network Endpoint Assessment (NEA), 626
Network Groups view, Cisco AnyConnect NAM
supplicant, 60, 71
Network Infrastructure SGT (Security Group Tag), 555
network interface cards (NICs), 97
network probes. See probes
Network Resources tab (Administration screen), 163–
166
External MDM tab, 165
External RADIUS Servers tab, 165
Location Services tab, 166
NAC Managers tab, 165
Network Device Groups tab, 164–165
Network Device Profiles tab, 165
Network Devices tab, 163–164
RADIUS Server Sequences tab, 165
Network Resources tab (Device Administration), 921–
922
network scan (Nmap), 415–417
Network Services Platform. See NSP (Network
Services Platform)
Network Services SGT (Security Group Tag), 555
Network Setup Assistant app, 282, 507
Network Time Protocol (NTP), 32, 196, 465, 996
Networks view, Cisco AnyConnect NAM supplicant,
60, 62–70
Certificates tab, 67
Connection Type tab, 66
Credentials tab, 68–70
Machine Auth tab, 66
PAC Files tab, 67–68
Security Level tab, 64–66
User Auth tab, 68–69
NGFWs (next-generation firewalls), 818
NICs (network interface cards), 97
Nmap (network scan), 415–417
No Escape option (TACACS profile), 933
nodes
configuration in distributed environment, 737–742
ISE cubes, 737
ISE persona types, 737
node personas, 742
PPAN (Policy Administration Node), 738–739
primary devices, 738–739
registration of ISE nodes, 739–742
definition of, 109, 996
MnT (Monitoring and Troubleshooting), 109–110, 743–744
Dedicated MNT, 742
definition of, 995
logging categories, 744
logging flows, 743
logging targets, 743–744
sending syslog messages to, 299
node groups, 748–750, 996
PAN (Policy Administration node), 109, 745–748
auto PAN switchover, 745–746
automatic failover for, 746
definition of, 997
promoting to primary, 745
PSN (Policy Services node), 110, 633, 874–876
single-node ISE deployment, 113
two-node ISE deployment, 114–116
non-802.1X authentication
devices without a supplicant, 79–80
EasyConnect, 89–90, 993
MAB (MAC Authentication Bypass). See MAB (MAC
Authentication Bypass)
need for, 76
remote access connections, 88–89
Web Authentication. See WebAuth (Web Authentication)
non-seed devices, 567–571, 996
non-tunneled EAP (Extensible Authentication
Protocol), 43–44
north-south SGACL deployment, 598–599
Not MACsec capable, 617–618
notification services, 388–389
SMS gateway providers, 388–389
SMTP servers, 388
Novell Directory Services (NDS), 25
NSP (Network Services Platform)
NSP ACL (access control list), 493, 495
NSP app download, 528–529
NTP (Network Time Protocol), 32, 196, 465, 996
O
O (Organization) field, 183
objects, AD (Active Directory), 24
OCSP (Online Certificate Status Protocol), 33, 466,
519, 996
onboarding. See BYOD (bring your own device)
onboarding; MDM (mobile device management)
one-time password (OTP), 29, 88, 996
Online Certificate Status Protocol (OCSP), 33, 466,
519, 996
open virtual appliances (OVAs), 112
Operate on non-802.1X wireless networks setting
(AnyConnect posture profile), 645
Operations screen, 142, 143–150
ANC (Adaptive Network Control) component, 147–148,
991
RADIUS tab, 144–146
Reports tab, 150
TACACS Live Log tab, 147
Threat-Centric NAC Live Logs tab, 146
Troubleshoot tab, 147–148
operators
AND, 252–256
OR, 252–256
option name host-name command, 426
OR operator, 252–256
Oracle Identity Manager, 25
Organization (O) field, 183
organizational units (OUs), 25, 183
organizationally unique identifiers (OUIs), 97
OS option (Nmap), 416
OSCP (Online Certificate Status Protocol), 519
OSVersion attribute, 537
OTA (over-the-air) provisioning, 492
OTP (one-time password), 29, 88, 996
OUIs (organizationally unique identifiers), 97
OUs (organizational units), 25, 183
OVAs (open virtual appliances), 112
over-the-air (OTA) provisioning, 492
Overview menu (ISE Certificate Authority), 520
OWN_ACCOUNTS sponsor group, 382
P
PAC Files tab (Cisco AnyConnect NAM supplicant), 67–
68
packages
AnyConnect headend deployment
AnyConnect configuration, building, 648–649
posture profile configuration, 644–648
uploading to ISE, 642–644
licensing, 155–158
pACLs (port-based ACLs), 725
PACs (Protected Access Credentials), 45, 546, 558–
559, 997
PAN (Policy Administration node), 109, 519, 738–739,
745–748
auto PAN switchover, 745–746
automatic failover for, 746
definition of, 997
promoting to primary, 745
PAP (Password Authentication Protocol), 7, 46, 214
Parameter-Request-List attribute (DHCP), 411
Pass Live Log status, 767
PASS_ADD message, 10–11
PASS_REPL message, 11
passive identity service, 110
PassiveID Setup option (Admin portal), 138
pass-through mode, 752
Password Authentication Protocol (PAP), 46, 214
Password Change Control (Device Administration),
918
passwords
guest change password settings, 371–372
OTP (one-time password), 29, 88, 996
patch management, 685, 757–759
conditions for, 100, 673–675
remediations, 685
PCI (Payment Card Industry), 551
PEAP (Protected EAP), 44–45, 48–49, 53–54, 55–56,
108, 215
Pearson Test Prep software, 989
peering, 582
PEM (Privacy Enhanced Electronic Mail) format, 186–
187, 833
Perfigo, 631
permit statement, 280, 314, 316
PERMIT_ALL_IPV4_TRAFFIC authorization rule, 241–
243
Permit_HTTP_HTTPS SGACL, 601–602, 607
Permit_ICMP SGACL, 602–603
Permit_Mgmt SGACL, 601, 607
Permit_SRC_HTTP_HTTPS SGACL, 603–604
Permit_WEB_RDP SGACL, 598
per-profile CoA (Change of Authorization), 443–444
personas
Administration, 109, 737
definition of, 108–109, 997
ISE nodes and, 742
Monitoring, 109–110, 737
Policy Services, 110, 737
pxGrid, 111, 737
types of, 737
pervasive tagging, 594
phased deployment, 717–718
authentication open versus 802.1X, 719–720
closed mode, 728–730
low-impact mode, 725–727
monitor mode, 722–725
flow diagram, 723–724
operational flow, 722–723
policy set creation, 724–725
transitioning to end state, 730–731
preparation for, 720–721
transitioning to end state, 730–731
wireless networks, 731
PhoneNumber attribute, 537
physical ISE appliances, 111–113
form factors for, 111–112
scalability of, 112–113
PIN Lock option (endpoint management), 543
ping, 646
PinLockStatus attribute, 536
PKI (public key infrastructure), 519. See also
certificate-based authentication
definition of, 463, 998
encryption with, 468–469
key pairs, 468–469, 995
prevalence of, 460
public versus private keys in, 468–469
RAs (registration authorities), 998
signatures, 31–32
smart cards, 29
Platform Exchange Grid. See pxGrid (Platform
Exchange Grid)
Plus license packages, 156
Point-to-Point Protocol. See PPP (Point-to-Point
Protocol)
Point-to-Point Protocol (PPP), 12
policies and policy sets. See also posture
assessment; profiles
ANC (Adaptive Network Control), 148–149, 156, 822–823,
864–866
AUP (acceptable use policy)
hotspot guest portals, 354–356
sponsored guest portals, 386
authentication, 151
allowed protocols, 210, 213–216
for alternative ID stores based on EAP type, 224–227
authorization compared to, 209–210, 235
for certificate-based authentication, 472–474
conditions, 217–219
default, 216–217
definition of, 171
device administration, 944
for device administration AAA with Cisco IOS, 944
goals of, 206–207, 210–211
identity stores, 210–211, 219–220
identity validation, 211
for MAB (MAC Authentication Bypass), 227–228
options, 220
for remote access VPN, 223–224
restoring, 229
for wireless SSID, 220–223
authorization, 151
authentication compared to, 209–210, 235
Blackhole_Wireless_Access, 240–241
for certificate-based authentication, 474–475
Cisco_IP_Phones, 237–241
compound conditions, 239, 251–256, 992
condition blocks, 252–256
configuration of, 241–249
for CWA (Centralized Web Authentication), 322–324
default, 236–241
definition of, 171
device administration, 945–946
for device administration AAA with Cisco IOS, 945–946
goals of, 235–241
for guest portals, 348–351
for MDM (mobile device management), 536–537
organization of, 216, 236
profile assignment in, 450–453
role-specific authorization rules, 241
rule processing for, 236–241
saving conditions for reuse in, 249–251
simple conditions, 239, 251, 999
BYOD (bring your own device) onboarding
client provisioning policy, 512–514
default unavailable client provisioning policy, 515
Cisco AnyConnect NAM supplicant
Authentication Policy view, 60, 62
Client Policy view, 60, 61–62
Cisco WLC (Wireless LAN Controller), 974–979
CiscoPress SSID, 518
closed mode, 730
correlation, 845–847
CPP (client provisioning policy), 637–638
AnyConnect Secure Mobility Client, 640–649
Client Provisioning portal, 153, 166–167, 650–651
default client provisioning policy, 652
definition of, 172
for ISE for BYOD onboarding, 512–514, 515
order of operations, 637–638
rules, creating, 652–653
default, 211
device administration, 922–924, 925–927, 939–946
policy sets, 943–946
roles, 939
TACACS command sets, 922–923, 941–943
TACACS profiles, 923–924, 939–941
Endpoint Profile Policies, 431–441
endpoint purge, 345
expanding, 211
for hotspot guest portals, 362–364
low-impact mode, 727
MACsec, 616–618
monitor mode, 724–725
for self-registered guest portals, 373–380
SGTs (security group tags), 577, 612
“smart default”, 318
top-level rules of, 212
TrustSec
egress policy, 597–598
policy matrix, 600–601, 604–609
WSA (Web Security Appliance), 855–857
access policy, 855–856
decryption policy, 857
Policy admin role, 128
Policy Administration node. See PAN (Policy
Administration node) policy configuration support
bundles, 783
Policy List tab, 149
Policy page, 138, 142, 150–154
Client Provisioning tab, 153
Policy Elements tab, 154, 922–924
Policy Sets tab, 150–151
Posture tab, 152
Profiling tab, 152
Policy Service nodes (PSNs), 110, 210, 519, 633
Policy Services persona, 110, 737
Policy Sets tab, 150–151, 925–927
policy static sgt command, 578, 595, 596
portals
Administration, 137–142
global search for endpoints, 139–140
Help menu, 138, 140–141
ISE Setup Wizards, 141
Settings menu, 142
tabs, 137–139
authorization policies for, 348–351
definition of, 997
guest types, 341–342
contractors, 344–346
daily, 344–346
overview of, 343
social, 348
weekly, 347
hotspot, 341–342, 351–358
AUP (acceptable use policy) page settings, 354–356
authentication success settings, 357
authorization rule configuration, 362–365
configuration flowchart for, 351
definition of, 342
portal page customization, 358–362
portal settings, 352–354
post-access banner page settings, 355–356
support information page settings, 357–358
VLAN DHCP release page settings, 355–356
overview of, 341
self-registered, 366–367
authorization rule configuration, 373–380
BYOD settings, 372
configuration flowchart, 365–366
definition of, 342
guest change password settings, 371–372
guest device compliance settings, 373
guest device registration settings, 371–372
guest location setting, 369–371, 994
login page settings, 367–368
portal settings, 366–367
registration form settings, 368–371
self-registration success, 371
sponsored, 380–381, 385–386
AUP (acceptable use policy) page settings, 386
configuration flowchart, 380–381
default sponsor portal, 384
definition of, 342
login settings, 386
other settings, 387
portal settings, 385–386
provisioning guest accounts from, 389–394
Portals & Components tab (Guest Access work
center). See portals port-control command, 276
ports
802.1X default port behavior, 719
application of initial ACL to, 275–276
assigning SGTs (security group tags) to, 577–578
configuring interfaces as, 269
host mode, 272–274
pACLs (port-based ACLs), 725
ports, 273
security, 273, 997
switch
configuring interfaces as, 269
host mode, 272–274
TCP
port 49, 8
port 389, 25
port 636, 25
port 64999, 580
UDP, 32
POST method, 84–85
post-access banner page settings, 355–356
Posture Agent Redirection ACL, 283–284
posture assessment. See also posture policy
authorization rules, 693–694
centralization of, 629
compliance module updates, 637–638
conditions for, 99–100, 997
CPP (client provisioning policy) configuration, 637–638
AnyConnect Secure Mobility Client, 640–649
Client Provisioning portal, 650–651
default client provisioning policy, 652
order of operations, 637–638
rules, creating, 652–653
definition of, 172, 626, 997
endpoint experience, 695–705
AnyConnect already installed, endpoint not compliant,
700–702
AnyConnect not installed on endpoint yet, 696–700
redirected state, 695–696
stealth mode, 645, 703
temporal agent and posture compliant, 705
history of, 629–633
ISE posture flows, 107–110, 633–636
license packages, 156
mobile posture, 707–712
authorization conditions, 709–710
authorization rules, 710–712
supported device managers, 707–709
overview of, 99–101
Posture General Settings, 690–691
posture lease concept, 691
posture requirements, 997
Posture Troubleshooting tool, 794–795
Posture work center
Cache Last Known Posture Compliance setting, 691
Posture General Settings, 690–691
posture lease, 691
posture reassessment, 691–692
profiling versus, 402
remediation, 997
posture policy, 653–688
conditions, 654–679
anti-malware, 661–663
anti-spyware, 663
anti-virus, 663
application, 655–660
compound, 677–678
dictionary compound, 664–665
dictionary simple, 663–664
disk encryption, 665–666
file, 667–673
firewall, 660–661
hardware attributes, 655
patch management, 673–675
Registry, 675
USB, 679
configuration, 688–689
relationships between elements of, 653
remediations, 679–686
anti-malware, 681–682
anti-spyware, 681–682
anti-virus, 681–682
application, 680
definition of, 679–680
file, 682
firewall, 682
launch program, 683
link, 684
patch management, 685
USB, 686
WSUS (Windows Server Update Services), 685
requirements, 687–688
posture profiles, 644–648
Posture tab (Policy page), 152
PoV (proof of value) service, 138
PPAN (Policy Administration Node), 738–739
PPP (Point-to-Point Protocol), 12
PRA retransmission time setting, 647
Preboot Execution Environment (PXE), 725
primary devices, 738–739
primary PAN (Policy Administration node), 745
principle username X.509 attribute, 470, 997
Privacy Enhanced Electronic Mail (PEM) format, 186–
187, 833
private keys, 468–469, 997
privilege levels, 932–933, 997
probe delay command, 267
probes, 409–423
Active Directory, 422
configuration, 409–411
DHCP and DHCPSPAN, 411–414
DNS, 417
HTTP, 420–421
NETFLOW, 419–420
Nmap, 415–417
publishing endpoint probe data on pxGrid, 450
pxGrid, 423
RADIUS, 414–415
SNMPQUERY and SNMPTRAP, 417–419
Process Host Lookup, 214
Profiled Cisco IP Phones rule, 237
Profiler Feed Service, 429–430
configuration, 429
verification of, 429–430
profiles, 884–886, 923–924. See also profiling
AMP Enabler, 642
AnyConnect NAM, 71–72
assignment in authorization policies, 450
endpoint identity groups, 450–452
EndPointPolicy, 453
BYOD (bring your own device) onboarding, 510–512, 516
CAPs (certificate authentication profiles), 23, 202, 469,
471–472, 991
Cisco WLC (Wireless LAN Controller)
Employee, 977
Helpdesk, 976
NetAdmin, 974–975
predefined TACACS profiles, 974
SecAdmin, 975–976
configuration, 320–322
device administration AAA with Cisco IOS, 932–934, 939–
941
Administration profile, 940–941
HelpDesk profile, 940
Downlink MACsec, 616
Employee Full Access, 241–243
Employee_Limited, 246–249
for hotspot guest portals, 362–364
Internet_Only, 243–246
license packages, 156
logical, 441–442, 995
MDM Onboard, 539–540
native supplicant, 642
for posture assessment, 693
for self-registered guest portals, 373–380
verification of
dashboard, 454
Device Sensor show commands, 457–458
endpoints database, 455–456
Global Search tool, 454–455
WSA (Web Security Appliance), 855–857
profiling, 107, 404–406. See also profiles
Anomalous Behaviour Detection, 406–408
Cisco ISE probes, 409–423
Active Directory, 422
configuration, 409–411
DHCP and DHCPSPAN, 411–414
DNS, 417
HTTP, 420–421
NETFLOW, 419–420
Nmap, 415–417
publishing endpoint probe data on pxGrid, 450
pxGrid, 423
RADIUS, 414–415
SNMPQUERY and SNMPTRAP, 417–419
CoA (Change of Authorization) and, 442–444
global CoA, 442–443, 994
per-profile CoA, 443–444
custom attributes, 445–448
definition of, 172, 995
DHCP (Dynamic Host Configuration Protocol), 98
evolution of, 404–406
global settings for, 444–445
endpoint attribute filtering, 444–445
SNMP, 444
infrastructure configuration, 424–427
DHCP helper, 424
IOS Device Sensor, 426–427
SPAN (Switched Port Analyzer), 424–425
VACLs (VLAN Access Control Lists), 425–426
VMware vSwitches, 427
MAB (MAC Authentication Bypass), 80–82, 96–99
DHCP (Dynamic Host Configuration Protocol), 97
RADIUS (Remote Access Dial-In User Service), 97
posture versus, 402
Profiler Feed Service, 429–430
configuration, 429
verification of, 429–430
Profiling tab (Policy page), 152
Promote to Primary option, 745
proof of value (PoV) service, 138
Protected Access Credentials (PACs), 45, 546, 558–
559, 997
Protected EAP (PEAP), 44–45, 48–49, 53–54, 55–56,
215
provisioning. See also CPP (client provisioning policy)
PACs (Protected Access Credentials), 558–559
supplicant provisioning reports, 534–535
PSNs (Policy Service nodes), 110, 210, 519, 633, 874–
876
PSNs (Public Services Networks), 210, 519
for large deployments, 912
load balancing, 751–752
for medium deployments, 913
for small deployments, 913
public certificates, importing, 476–477
public key infrastructure. See PKI (public key
infrastructure)
public keys, 468–469, 998
Public Services Networks. See PSNs (Public Services
Networks)
publish and subscribe (pub/sub) communication bus,
111
publishers, 824, 998
purge policies, endpoint, 345
Push Notification (Apple), 101
PXE (Preboot Execution Environment), 725
pxGrid (Platform Exchange Grid), 169, 190
communication between participants, 826–827
components of, 824, 825
Context-In, 827, 992
Context-Out, 827, 993
definition of, 998
FMC (Firepower Management Center) configuration, 831–
850
access rules, 840–844
active users, viewing, 844–845
FDM (Firepower Device Management), 832
pxGrid integration, 832–837
Rapid Threat Containment, 845–850
realms, 837–840
GCL (pxGrid common library), 825
ISE (Identity Services Engine) configuration, 828–831
license packages, 156
overview of, 824–825
password-based account creation, 837
persona, 111, 737
publishing endpoint probe data on, 450
pxGrid probe, 423
Stealthwatch, 857–866
capabilities of, 858
ISE integration, 862–866
pxGrid client identity certificate, importing, 859–862
version history, 825
WSA (Web Security Appliance) configuration, 850–857
access policy, 855–856
decryption policy, 857
ERS (External RESTful Services), 850–853
identification profiles, 855–857
integration with pxGrid and ISE, 850–855
policies, 855–857
pxGrid common library (GCL), 825
pxGrid Services tab (Administration screen), 169
pxGrid_Certificate_Template, 520
Q
Quarantine action (EPS), 821
Quick Filters counter, 769
R
RADIUS (Remote Access Dial-In User Service), 12–14
AV (attribute/value) pairs, 15
CoA (Change of Authorization)
CWA (Centralized Web Authentication) and, 311
definition of, 16, 95–96
messages, 110
definition of, 998
for device administration, 927
Drops counter, 768
fallback, 279–280
global configuration commands, 262–269
device tracking in IOS Xe 16.x and later, 267
global 802.1X commands, 266–267
IOS 12.2.x, 262–263, 264–266
IOS 15.x, 263–266
IOS XE, 263–266
local ACL (access control list) creation, 268–269
Layer 2 EAP communication with, 12–13
Live Log. See Live Log
Live Sessions, 145–146, 303
message types, 13–14
profiling, 97
RADIUS Authentication Troubleshooting tool, 785–786
RADIUS over Datagram Transport Layer Security (DTLS),
190
RADIUS probe, 414–415
with remote-access VPN, 88
role of, 107
server configuration
accounting servers, 278–279
authentication servers, 277–278
service-type values, 13
TACACS+ compared to, 13, 16
token servers, 23
radius server command, 263, 561
RADIUS Server Sequences tab (Network Resources),
165
RADIUS tab (Operations screen), 144–146
radius-server attribute command, 264, 265
radius-server dead-criteria time 5 tries 3 command,
264
radius-server host command, 263
radius-server load-balance command, 757
radius-server vsa send accounting command, 265,
562, 567
radius-server vsa send authentication command, 265,
562, 567
ransomware, WannaCry, 554–555, 868
Rapid Threat Containment, 821–823
ANC (Adaptive Network Control), 822–823
configuration, 845–850
definition of, 998
EPS (Endpoint Protection Services), 821–822, 993
RAs (registration authorities), 998
RBAC (role-based access control), 128, 934, 971. See
also WLC (Wireless LAN Controller)
Read-only admin role, 129
Realm Directory configuration, 838
realms, configuration in FMC (Firepower Management
Center), 837–840
reassessment, posture, 691–692
Record Selector, 770
redirected state, 695–696
redistribute static route-map STATIC-TO-EIGRP
command, 756
Refresh counter, 770
Registrar, 8
registration authorities (RAs), 998
registration form, self-registered guest portals, 368–
371
Registry conditions, 100, 675
RegistryKey option, 675–676
RegistryValue option, 675
RegistryValueDefault option, 675–676
Reinstate option (endpoint management), 543
REJECT message, 9
Reject option, authentication policy, 220
reload command, 946
remediation
posture, 679–686, 692, 997
anti-malware, 681–682
anti-spyware, 681–682
anti-virus, 681–682
application, 680
definition of, 679–680
file, 682
firewall, 682
launch program, 683
link, 684
patch management, 685
USB, 686
WSUS (Windows Server Update Services), 685
Rapid Threat Containment, 845–850
ANC (Adaptive Network Control), 822–823
EPS (Endpoint Protection Services), 821–822, 993
remediation timer, 645, 691
remote access connections, 88–89
Remote Access Dial-In User Service. See RADIUS
(Remote Access Dial-In User Service)
remote access VPN (virtual private network), 223–
224
Repeat counter, 767, 769
replication, 748
REPLY message, 9
reports
authentication details, 771–774
Device Administration, 927
supplicant provisioning, 534–535
TC-NAC (Threat Centric Network Access Control)
Coa-Events, 888–889
TC-NAC Live Log, 888–889
Threat-Events, 888
Vulnerability Assessment, 888
Reports tab (Operations screen), 150
repositories, Tenable.SC, 881–882
REQUEST message, 10, 11
requests for comments. See RFCs (requests for
comments)
RESPONSE message, 10, 11
restore, 229, 759–761
Results tab (Policy Elements), 154
reuse, saving conditions for, 249–251
revoked certificates, 33
checking for, 466–467
CRLs (certificate revocation lists), 33, 466
OCSP (Online Certificate Status Protocol), 33, 466, 996
validity period, 467
RFCs (requests for comments)
RFC 5176, 106
RFC 5281, 48
RFC 6238, 29
RFC 7170, 46–47, 48
role-based access control (RBAC), 128, 934, 971. See
also WLC (Wireless LAN Controller)
roles
Admin, 127–132
Cisco WLC (Wireless LAN Controller), 971–972
device administration AAA with Cisco IOS, 939
role-specific authorization rules, 241
route redistribution, 755–756
routed mode, 752
RSA SecurID, 23
rules, 239. See also policies and policy sets
authentication, 151
alternative ID stores based on EAP type, 224–227
MAB rule flowchart, 217
organization of, 216
policy sets, 211–212
remote access VPN, 223–224
wireless SSIDs (service set identifiers), 220–223
authorization, 151
AND/OR operators in, 252–256
for BYOD (bring your own device) onboarding, 517,
518
for device administration AAA with Cisco WLC, 977–
979
Employee and CorpMachine, 242–243
employee full access, 241–243
employee limited access, 246–249
for guest portals, 348–358
Internet-only access, 243–246
IT Users Access, 252–256
MDM On-boarding, 539–542
mobile posture, 710–712
PERMIT_ALL_IPV4_TRAFFIC, 241–243
for posture assessment, 693–694
role-specific, 241
for self-registered guest portals, 373–380
TC-NAC (Threat Centric Network Access Control), 884–
886
Wireless Black List Default, 239
correlation, 845–847
CPP (client provisioning policy), 652–653
CWA (Centralized Web Authentication)
custom authorization rules, 323–324
Guest Flow attribute, 323–324, 994
preconfigured authorization rules, 322
Profiled Cisco IP Phones, 237
Run SMB Discovery Script option (Nmap), 416
Russell, Paul, 337
S
Sales SGT (Security Group Tag), 555
SAML (Security Assertion Markup Language)
assertions, 395, 998
guest portal logins, 368, 394–400
IdPs (identity providers), 35, 394–400, 998
SPs (service providers), 394, 998
support for, 23
SANs (subject alternative names), 184–185, 752
SAP (Security Association Protocol), 616
sap mode-list no-encap command, 566, 568
sap pmk 26 mode-list gcm-encrypt command, 621
sap pmk pairwise-master-key mode-list gcm-encrypt
command, 621
scalability
ISE (Identity Services Engine), 118–119, 737–742
ISE cubes, 737
ISE persona types, 737
node personas, 742
PPAN (Policy Administration Node), 738–739
primary devices, 738–739
registration of ISE nodes, 739–742
SNS (Secure Network Server) appliances, 112–113
scans, Tenable.SC, 882–883
SCCM (System Center Configuration Manager), 673,
708
SCEP (Simple Certificate Enrollment Protocol), 500,
520–521, 999
SD-Access (Software-Defined Access), 613–614
/sdcards/downloads/spw.log command, 812
Search icon (Admin portal), 138
sec-admin group, 945
SecAdmin profile, 975–976
Second Port Disconnect, CDP, 991
secondary PAN (Policy Administration node)
auto PAN switchover, 745–746
automatic failover for, 746
promoting to primary, 745
Secure Network Server. See SNS (Secure Network
Server) appliances
Secure Shell. See SSH (Secure Shell)
Secure Sockets Layer. See SSL (Secure Sockets
Layers)
secure web gateways, 818
Security Administrator command set, 942–943
Security Administrators role, 939
Security Assertion Markup Language. See SAML
(Security Assertion Markup Language)
Security Association Protocol (SAP), 616
security context, 232, 235
Security Group Access. See TrustSec
security group ACLs. See SGACLs (security group
ACLs)
security group firewalls. See SGFWs (security group
firewalls)
security group tags. See SGTs (security group tags)
security holes. See vulnerability assessment
security information and event management (SIEM)
systems, 818
security information management (SIM), 744
Security Level tab (Cisco AnyConnect NAM
supplicant), 64–66
security posturing, 101
SECURITY role, 971
seed devices, 566, 999
self-management, MDM (mobile device management)
onboarding, 543–544
self-registered guest portals, 342, 515
authorization rule configuration, 373–380
BYOD settings, 372
configuration flowchart, 365–366
guest change password settings, 371–372
guest device compliance settings, 373
guest device registration settings, 371–372
guest location setting, 369–371, 994
login page settings, 367–368
portal settings, 366–367
registration form settings, 368–371
self-registration success, 371
Self-Registration Success page, 371
self-signed certificates, 181–182
serial replication, 748
SerialNumber attribute, 537
Server column (Live Log), 768
Server name rules setting (AnyConnect posture
profile), 647
servers, 276–280
authentication, 41, 277–278, 991
Cisco Access Control Server (ACS), 909, 910
HTTP/HTTPS, 314
RADIUS
accounting servers, 278–279
authentication servers, 277–278
fallback, 279–280
token servers, 23
SMTP (Simple Mail Transfer Protocol), 388
SNS (Secure Network Server) appliances, 177
Sun Directory Server, 25
XCP (Extensible Communication Platform), 825
service providers, 35
service set identifiers. See SSIDs (service set
identifiers)
service-level agreements (SLAs), 754–756
Service-Type attribute (RADIUS), 96, 265, 415
service-type values, 13
session IDs, 97
Session Key Assignment, 918
Session Trace tool, 801–804
Settings tab, 161, 163
setup command, 178
SGA (Security Group Access). See TrustSec
SGACLs (security group ACLs), 597–604
definition of, 998
Deny_All SGACL, 601–602
east-west deployment of, 598–599
egress policy, 597–598, 600–601
north-south deployment of, 598–599
Permit_HTTP_HTTPS SGACL, 601–602
Permit_ICMP SGACL, 602–603
Permit_Mgmt SGACL, 601
Permit_SRC_HTTP_HTTPS SGACL, 603–604
Permit_WEB_RDP SGACL contents, 598
syntax, 599–600
SGFWs (security group firewalls), 611–613
on ASA (Adaptive Security Appliances), 612
on ASR (Aggregation Services Router), 613
definition of, 999
on Firepower, 612–613
on ISR (Integrated Services Router), 613
SGTs (security group tags), 13, 236, 822
access-layer devices that do not support, 580
classification of, 575–577
configuration, 572–574
definition of, 172, 556
dynamically assigning via 802.1X, 577
egress enforcement with, 555–556
manually assigning via 802.1X, 577–578
mapping subnets to, 580
mapping VLANs to, 580
native tagging, 593–597
configuration on IOS XE switches, 595–597
Layer 2 frame format with, 593–594
pervasive tagging, 594
SXP (SGT Exchange Protocol), 110, 303, 581–593
configuration on Cisco ASA, 591–592
configuration on IOS devices, 588–590
configuration on ISE (Identity Services Engine), 584–
586
configuration on WLCs (wireless LAN controllers), 590–
591
definition of, 998
design, 582–583
verification in ASDM (Adaptive Security Device
Manager), 592–593
SHA-256 file type, 672
Shadow Brokers, 868
sho cts interface command, 596
sho run int command, 621
Short Message Service. See SMS (Short Message
Service)
should-secure policy (MACsec), 616, 618
show commands, 147, 457–458
show aaa server | incl host, 757
show aaa servers, 296–297
show application status ise, 741–742
show authentication interface, 812–813
show authentication session int g0/23, 696
show authentication session interface, 297–299, 328–329
show cts environment-data, 562, 568
show cts interface, 571, 622–623
show cts pac, 568
show cts policy peer, 570
show cts rbacl, 609
show cts role-based permissions, 562, 609
show cts sxp connections brief, 589, 591
show cts sxp sgt-map brief, 590
show device-sensor cache all, 457–458
show device-tracking database details, 267
show ip access-list ACL-WEBAUTH-REDIRECT, 314
show ip device tracking all, 267
show logging application, 781–782
show logging system, 781–782
show run, 11, 620
show running-config, 952, 961–963
show running-config aaa, 569
show running-config all | inc ip, 266
show running-config all | inc radius-server, 265
show udi, 747–748
show users, 955
Shutdown action (EPS), 821
SIEM (security information and event management)
systems, 818
signatures
AnyConnect posture profile, 645
CAs (certificate authorities), 31–32
SIM (security information management), 744
Simple Certificate Enrollment Protocol (SCEP), 500,
520–521, 999
simple conditions, 239, 251, 663–664, 999
Simple Mail Transfer Protocol. See SMTP (Simple Mail
Transfer Protocol) servers
Simple Network Management Protocol. See SNMP
(Simple Network Management Protocol)
single sign-on. See SSL (Secure Sockets Layers)
single SSID onboarding, 487–488
Android onboarding flow, 526–530
device provisioning, 529–530
device registration, 526–528
NSP app download, 528–529
definition of, 999
iOS onboarding flow, 523–526
device enrollment, 523–524
device provisioning, 526–527
device registration, 523–524
ISE configuration, 495–496, 510–523
Apple iOS example, 496–503
authorization profiles, 516
authorization rules for EAP-TLS authentications, 518
authorization rules for onboarding, 517
Blackberry example, 508–509
client provisioning policy configuration, 512–514
default unavailable client provisioning policy action,
515
ISE as certificate authority, 519–520, 521–523, 994
native supplicant profile, 510–512
SCEP (Simple Certificate Enrollment Protocol), 520–
521, 999
WebAuth configuration, 514–515
verification of BYOD flows, 534–535
endpoint identity groups database, 535
RADIUS Live Logs, 534
reports, 534–535
Windows and Mac onboarding flow, 531–533
device provisioning, 532–533
device registration, 531
WLC (Wireless LAN Controller) configuration, 489–495
ACLs (access control lists), 492–495
WLAN configuration, 490–491
Single-Host mode, 272, 298, 618
single-node ISE deployment, 113
SISE 300–715 exam preparation, 988–989
final study and review, 988–989
hands-on activities, 988–989
Skip NMAP Host Discovery option (Nmap), 416
SLAs (service-level agreements), 754–756
smart cards, 29
smart default policies, 318
smart devices
employee limited access, 246–249
Internet-only access, 243–246
SmartDevice logical profile, 245–246
SMS (Short Message Service), 388–389
SMTP (Simple Mail Transfer Protocol) servers, 388
SNAT (Source NAT), 752
SNMP (Simple Network Management Protocol)
global probe settings, 444
SNMP Ports option (Nmap), 416
SNMPQUERY and SNMPTRAP probes, 417–419
snmp trap mac-notification change added command,
418
snmp trap mac-notification change removed
command, 418
SNMPQUERY probe, 417–419
snmp-server community command, 419
snmp-server source-interface informs command, 266
snmp-server trap-source command, 266
SNMPTRAP probe, 417–419
snooping, DNS, 494
SNS (Secure Network Server) appliances, 177
form factors, 111–112
scalability, 112–113
social guest accounts, 348
social login, 23, 35
Softerra LDAP browser, 26
Software-Defined Access (SD-Access), 613–614
Source NAT (SNAT), 752
source SGT, 559
source tree view (TrustSec policy matrix), 552
sources, identity, 34, 35
SPAN (Switched Port Analyzer)
configuration, 424–425
DHCPSPAN probe, 411–414
HTTP SPAN design, 420–421
Sponsor Groups settings
contractor accounts, 346
weekly guest accounts, 348
sponsored guest portals, 342, 380–381
AUP (acceptable use policy) page settings, 386
configuration flowchart, 380–381
default sponsor portal, 384
login settings, 386
other settings, 387
portal settings, 385–386
provisioning guest accounts from, 389–394
sponsors
definition of, 341, 381, 999
sponsor groups, 381–382
SPs (service providers), 35, 394, 998
spyware
anti-spyware posture policy conditions, 663
anti-spyware remediations, 681–682
SSH (Secure Shell), 6
SSIDs (service set identifiers), 220–223, 487–488,
730–731, 999. See also dual SSID onboarding; single
SSID onboarding
SSL (Secure Sockets Layers), 25, 181
SSO (single sign-on), 35
ST (State) field, 184
START message, 9, 11
statements
deny, 280, 316
permit, 280, 314, 316
status, Live Log, 767
Status dashlet, 134
stealth mode, 645, 703
Stealthwatch
capabilities of, 858
configuration, 857–866
ISE integration, 862–866
pxGrid client identity certificate, importing, 859–862
STIX (Structured Threat Information eXpression),
890, 892–893, 999
STOP message, 11
subject alternative names (SANs), 184–185, 752
subnets, mapping to SGTs (security group tags), 580
subordinate CAs (certificate authorities), 521–523
subscribers, 824, 999
SUCCESS message, 11
Summary tab (Home page), 134
Sun Directory Server, 25
Super admin role, 130
supplicants
authenticators, 719
Cisco AnyConnect NAM, 59–73
AnyConnect NAM profiles, 71–72
Authentication Policy view, 60, 62
Client Policy view, 60, 61–62
EAP chaining, 73
Network Groups view, 60, 71
Networks view, 60, 62–70
overview of, 59–60
definition of, 41, 50, 999
devices without, 79–80
endpoint supplicant verification, 295–296
native supplicant profile, 510–512
policy for, 617
supplicant provisioning reports, 534–535
Windows native, 50–59
machine authentication, 58–59
user authentication, 58
Wired AutoConfig service, 50–57
support bundles, 782–784
categories of, 782–783
creating from CLI, 783–784
creating from GUI, 783
definition of, 782
support information page settings, hotspot guest
portals, 357–358
Switched Port Analyzer. See SPAN (Switched Port
Analyzer)
switches. See also ports; WLC (Wireless LAN
Controller)
authentication on, 261–276
AAA servers, 276–280
Cisco ISE verification, 302–303
endpoint supplicant verification, 295–296
global configuration AAA commands, 261–262
global configuration RADIUS commands, 262–269
interface configuration settings, 269–276
NAC (network access device) verification, 296–302
IOS XE
configuration for TrustSec, 560–563
manual SGT (security group tag) propagation on, 595–
597
MACsec, 618–619
sample configurations, 1034–1061
Catalyst 3000 Series, 12.2(55)SE, 1034–1038
Catalyst 3000 Series, 15.0(2)SE, 1038–1044
Catalyst 4500 Series, IOS-XE 3.3.0 / 15.1(1)SG, 1053–
1057
Catalyst 6500 Series, 12.2(33)SXJ, 1058–1061
Catalyst 9000 Series, 16.9.5, 1044–1052
verifying authentications with, 296–299
show aaa servers command, 296–297
show authentication session interface command, 297–
299
test aaa command, 297
WebAuth, 313–315
certificates, 313
HTTP/HTTPS server, 314
URL-redirect ACL, 314–315
switchport command, 269
SXP (SGT Exchange Protocol), 110, 303, 581–593
configuration on Cisco ASA, 591–592
configuration on IOS devices, 588–590
configuration on ISE (Identity Services Engine), 584–586
configuration on WLCs (wireless LAN controllers), 590–591
definition of, 998
design, 582–583
overview of, 581–582
verification in ASDM (Adaptive Security Device Manager),
592–593
sysContact option (Nmap), 416
sysDescr option (Nmap), 416
sysLocation option (Nmap), 416
syslog messages, 299–300
sysName option (Nmap), 416
System Activities option (Admin portal), 139
System admin role, 130
System Center Configuration Manager (SCCM), 673,
708
System Certificates settings, hotspot guest portals,
353
System logs support bundles, 783
System Scan module. See posture assessment
System Summary dashlet, 134
System tab (Administration screen), 155–161
Admin Access tab, 160–161
Backup & Restore tab, 160
Certificates tab, 158
Deployment tab, 155
Licensing tab, 155–158
Logging tab, 159
Maintenance tab, 159
Settings tab, 161
Upgrade tab, 160
SYSTEM_32 file path option, 669
SYSTEM_DRIVE file path option, 669
SYSTEM_PROGRAMS file path options, 669
SYSTEM_ROOT file path option, 669
T
TACACS Live Log tab (Operations screen), 147
TACACS+ (Terminal Access Controller Access Control
System)
accounting messages, 11
admin role, 131
authentication messages, 9
authorization messages, 10–11
Cisco WLC (Wireless LAN Controller) profiles
Employee, 977
Helpdesk, 976
ISE configuration on WLC TACACS+ servers, 979–980
NetAdmin, 974–975
predefined, 974
SecAdmin, 975–976
client/server communication, 7–8
command sets, 922–923
communication flows, 12
device administration AAA with Cisco IOS
policy sets, 943–946
TACACS command sets, 941–943
TACACS profiles, 932–934, 939–941
TACACS+ authentication and fallback, 946–948
TACACS+ command accounting, 951
TACACS+ command authorization, 948–950
TACACS+ command sets, 934–936, 992
enabling, 910–911, 914–915
Live Log. See Live Log
profiles, 923–924
RADIUS compared to, 13, 16
support for, 8
tags, security group. See SGTs (security group tags)
targets, logging, 743–744, 777–778
TAXII (Trusted Automated eXchange of Intelligence
Information), 890, 892–893, 999
TCAM (Ternary CAM), 554
TC-NAC (Threat Centric Network Access Control), 110,
886
AMP (Advanced Malware Protection) for Endpoints, 897–
904
adapter configuration, 900–904
capabilities of, 897–898
incidents, 899–900
indicators, 899
authorization profiles/rules, 884–886
capabilities of, 871–873
Coa-Events report, 888–889
CTA (Cognitive Threat Analytics), 890–897
authorization with, 896–897
CTA STIX/TAXII API account creation, 892–893
dashboard, 890–892
integration for TC-NAC, 894–896
CVE (Common Vulnerabilities and Exposures), 873, 992
CVSS (Common Vulnerability Scoring System), 873, 992
enabling, 874–878
endpoint transition on network with TC-NAC, 887
exploits, definition of, 872, 993
flows for, 873–874
goals of, 868
integration with threat sources, 890
integration with vulnerability assessment vendor, 878–
883
advanced settings, 881
basic setup, 880
configured vendor instances, 883
Tenable.SC repositories, 881–882
Tenable.SC scans, 882–883
users, 880
license packages, 156
TC-NAC Live Log, 888–889
Threat-Events report, 888
Vulnerability Assessment report, 888
vulnerability-based access control, 873–874
TCP (Transmission Control Protocol)
port 49, 8
port 389, 25
port 636, 25
port 64999, 580
TCP/7800, 748
TCP/7802, 748
TCPDump, 327, 798–801
TEAP (Tunnel EAP), 46–47, 48–49, 73, 216
temporal agents, 99–100, 999
Tenable.SC repositories, 881–882
Tenable.SC scans, 882–883
Terminal Access Controller Access Control System.
See TACACS+ (Terminal Access Controller Access
Control System)
Ternary CAM (TCAM), 554
test aaa command, 297
testing
device administration AAA with Cisco IOS
at IOS command line, 954–966
in ISE (Identity Services Engine), 952–954
device administration AAA with Cisco WLC, 981–986
themes, hotspot guest portals, 361
Threat Centric NAC reports, 150
Threat Centric NAC tab (Administration screen), 170
Threat Centric Network Access Control. See TC-NAC
(Threat Centric Network Access Control)
threat sources, TC-NAC integration with, 890
Threat tab (Home page), 137
Threat Watchlist dashlet, 137
Threat-Centric NAC Live Logs tab (Operations
screen), 146
Threat-Events report, 888
TIM (IBM Tivoli Identity Manager), 25
Time Selector, 770
Timeout option (TACACS profile), 933
timers
authentication, 275
remediation, 645, 691
Tivoli Identity Manager (TIM), 25
TLS (Transport Layer Security), 43, 45, 181–182, 214,
215, 235, 470, 737
token servers, 23
Top Threats dashlet, 137
Top Vulnerability dashlet, 136
topics (pxGrid), 824, 999
Total Compromised Endpoints dashlet, 137
Total Vulnerable Endpoints dashlet, 136
Touch ID, 310
tracking enable command, 267
Transmission Control Protocol. See TCP (Transmission
Control Protocol)
transport
native tagging, 593–597
SXP (SGT Exchange Protocol), 303, 581–593
configuration on Cisco ASA, 591–592
configuration on IOS devices, 588–590
configuration on ISE (Identity Services Engine), 584–
586
configuration on WLCs (wireless LAN controllers), 590–
591
design, 582–583
overview of, 581–582
verification in ASDM (Adaptive Security Device
Manager), 592–593
Transport Layer Security. See TLS (Transport Layer
Security)
Transportation Security Administration (TSA), 2
Troubleshoot tab (Operations screen), 147–148
“Troubleshooting Cisco’s ISE without TAC” (Woland),
815
troubleshooting tools
for device administration, 981–986
at IOS command line, 954–966
in ISE (Identity Services Engine), 952–954
Endpoint Debug, 796–798
endpoint diagnostics, 809–812
Cisco AnyConnect Diagnostics and Reporting Tool
(DART), 59, 809–811
supplicant provisioning logs, 812
Evaluate Configuration Validator, 788–793
Execute Network Device Command, 787–789
logs, 766–785
debug logs, 779–784
de-duplication of, 805–807
Live Log, 327, 766–775
Live Sessions, 776
logging categories, 744, 778–779
logging flows, 743
logging targets, 743–744, 777–778
network device troubleshooting, 812–815
client details, viewing on WLC, 813–814
debug commands, 815
show authentication interface command, 812–813
Posture Troubleshooting, 794–795
RADIUS Authentication Troubleshooting tool, 785–786
Session Trace, 801–804
support bundles, 782–784
categories of, 782–783
creating from CLI, 783–784
creating from GUI, 783
definition of, 782
TCP Dump, 798–801
troubleshooting methodology, 804–808
authentication and authorization flows, 804–805
log de-duplication, 805–807
USERNAME user, 807
trusted authorities, 999
Trusted Automated eXchange of Intelligence
Information (TAXII), 890, 892–893, 999
trusted CAs (certificate authorities), 31–32, 475–479
certificate status verification, 478–479
public certificates, 476–477
role in authentication process, 463–465
trusted certificates, 188, 537–538
Trusted for Client Auth field, 463
TrustSec
architecture of, 557–558
Cisco Software-Defined Access (SD-Access), 613–614
configuration
ASA (Adaptive Security Appliances), 564–565
IOS XE switches, 560–563
NAD (network access devices) settings, 559
PACs (Protected Access Credentials), 558–559
definition of, 172, 548, 555–556
domains, 557, 1000
environment data, 558, 993
goals of, 555
license packages, 156
native tagging, 593–597
configuration on IOS XE switches, 595–597
Layer 2 frame format with, 593–594
pervasive tagging, 594
NDAC (Network Device Admission Control), 566, 996
non-seed devices, 567–571, 996
seed devices, 566, 999
policy matrix, 604–609
configuration of, 605–609
views of, 604–605
reports, 150
SGACLs (security group ACLs), 597–604, 998
Deny_All SGACL, 601–602
east-west deployment of, 598–599
egress policy, 597–598, 600–601
north-south deployment of, 598–599
Permit_HTTP_HTTPS SGACL, 601–602
Permit_ICMP SGACL, 602–603
Permit_Mgmt SGACL, 601
Permit_SRC_HTTP_HTTPS SGACL, 603–604
Permit_WEB_RDP SGACL contents, 598
syntax, 599–600
SGFWs (security group firewalls), 611–613
on ASA (Adaptive Security Appliances), 612
on ASR (Aggregation Services Router), 613
definition of, 999
on Firepower, 612–613
on ISR (Integrated Services Router), 613
SGTs (security group tags)
access-layer devices that do not support, 580
classification of, 575–577
defining, 572–574
definition of, 556
dynamically assigning via 802.1X, 577
egress enforcement with, 555–556
manually assigning via 802.1X, 577–578
mapping subnets to, 580
mapping VLANs to, 580
native tagging, 593–597
SXP (SGT Exchange Protocol), 581–593
TrustSec-enabled NADs (network access devices)
defining TrustSec settings for, 559
PACs (Protected Access Credentials), 558–559
TSA (Transportation Security Administration), 2
TTLS (Tunneled Transport Layer Security)
EAP-TTLS, 45–46, 48–49, 216
TEAP, 216
Tunnel EAP (Tunnel EAP), 46–47, 48–49, 73, 216
tunneled EAP (Extensible Authentication Protocol)
types, 44–49, 214–216, 1000
EAP chaining, 216
EAP-FAS, 215
EAP-FAST, 48–49
EAP-GTC, 215
EAP-MS-CHAPv2, 215
EAP-TLS, 215
EAP-TTLS, 48–49, 216
PEAP, 44–45, 48–49, 215
TEAP, 46–47, 73, 216
Tunneled Transport Layer Security (TTLS), 45–46, 48–
49, 216
two-factor authentication (2FA), 26, 1000
two-node ISE deployment, 114–116
U
UDID attribute, 537
UDP (User Datagram Protocol) port 123, 32
Umbrella, 640
Unquarantine action (EPS), 821
unsupported devices, onboarding, 508–509
updates
to Cisco Identity Services Engine (SISE 300–715) Exam,
1034–1061
Catalyst 3000 Series, 12.2(55)SE, 1034–1038
Catalyst 3000 Series, 15.0(2)SE, 1038–1044
Catalyst 4500 Series, IOS-XE 3.3.0 / 15.1(1)SG, 1053–
1057
Catalyst 6500 Series, 12.2(33)SXJ, 1058–1061
Catalyst 9000 Series, 16.9.5, 1044–1052
to compliance modules, 637–638
Upgrade tab (System), 160
upgrades, 160
Uplink MACsec, 619–623
uploading AnyConnect deployment packages, 642–
644
URL policy, 612
URL redirection, 236
URL-redirect ACL
configuration for Cisco switch, 314–315
configuration for WLC, 316
URL-redirected MAC authentication bypass, 311–313
USB condition, 100, 679
USB remediations, 686
user agents (SAML), 35
User Auth tab (Cisco AnyConnect NAM supplicant),
68–69
user authentication. See authentication
User Datagram Protocol (UDP) port 123, 32
user identities, 920, 921–922
user identity groups, 22
definition of, 1000
FDM (Firepower Device Management), 840–844
Guest Access work center, 339–340
user interface, Device Administration work center,
919–920
user persistence, 752
USER_DESKTOP file path option, 669
USER_PROFILE file path option, 670
user-experience (UX), 337. See also guest services
username command, 263
username cts-user privilege command, 561
UserNotified attribute, 537
users, 807
internal, 21–22, 994
local, 195–196
network access, 21
TC-NAC (Threat Centric Network Access Control), 880
viewing in FMC (Firepower Management Center), 844–845
Users tab (Context Visibility screen), 143
UX (user-experience), 337. See also guest services
V
VACLs (VLAN Access Control Lists), 424, 425–426
Validate Server Certificate checkbox (Windows native
supplicant), 53
validity period, for certificate, 467
vendors
MDM (mobile device management), 101–102
TC-NAC integration with, 878–883
advanced settings, 881
basic setup, 880
configured vendor instances, 883
Tenable.SC repositories, 881–882
Tenable.SC scans, 882–883
users, 880
VSAs (vendor-specific attributes), 265–266, 1000
virtual ISE appliances, 111–113, 177
virtual private networks. See VPNs (virtual private
networks)
viruses
anti-virus posture policy conditions, 663
anti-virus remediations, 681–682
Visibility Setup option (Admin portal), 138
vlan access-map command, 426
VLAN detection interval setting (AnyConnect posture
profile), 646
VLAN DHCP release page settings, hotspot guest
portals, 355–356
VLANs (virtual LANs)
assignment of, 551–553, 726
authentication VLAN, 87–88
dynamic interfaces for, 284–286
employee dynamic interface, 284–285
guest dynamic interface, 285–286
mapping to SGTs (security group tags), 580
segmentation with, 322
VACLs (VLAN Access Control Lists), 424, 425–426
VMware
ISE support for, 113
vSwitches, 427
Workspace One, 708
VPNs (virtual private networks), 7
provisioning, 101
remote access, 88, 223–224
VRF instances, 548
VSAs (vendor-specific attributes), 265–266, 1000
vSwitches, 427
vulnerabilities, definition of, 872, 1000
vulnerability assessment
exploits
CVE (Common Vulnerabilities and Exposures), 873,
992
CVSS (Common Vulnerability Scoring System), 873,
992
definition of, 872, 993
TC-NAC (Threat Centric Network Access Control)
capabilities of, 871–873
Coa-Events report, 888–889
enabling, 874–878
endpoint transition on network with TC-NAC, 887
flows for, 873–874
integration with threat sources, 890
integration with vulnerability assessment vendor,
878–883
TC-NAC Live Log, 888–889
Threat-Events report, 888
Vulnerability Assessment report, 888
vulnerability-based access control, 873–874
Vulnerability Assessment report, 888
Vulnerability tab (Home page), 136
Vulnerability Watchlist dashlet, 136
Vulnerable Endpoints Over Time dashlet, 136
Vulnerable-LimitAccess authorization rule, 886
W
WannaCry ransomware, 554–555
Web Authentication. See WebAuth (Web
Authentication)
Web Authentication Redirection ACL, 280–282
WebAuth (Web Authentication)
configuration for BYOD onboarding, 514–515
CWA (Centralized Web Authentication), 730–731. See also
sponsored guest portals
authentication process, 85–87
authorization policies, 322–324
Cisco switch configuration, 313–315
CoA (Change of Authorization) and, 311
definition of, 991
dual SSID onboarding and, 496
ISE (Identity Services Engine) configuration, 317–322
services supported by, 311
with third-party network device support, 87–88
URL-redirected MAC authentication bypass, 311–313
verification from client, 324–326
verification from ISE UI, 327
verification on NAD (network access device), 327–331
WLC (Wireless LAN Controller) configuration, 98, 315–
316, 329–331
definition of, 306, 1000
guests, 309
LWA (Local Web Authentication), 310–311
with centralized portal, 84–85
definition of, 995
when to use, 84
overview of, 83
scenarios for, 309–310
WebAuthN, 310
weekly guest accounts, 347
WEP (Wired Equivalency Protection), 614
Wi-Fi Protected Access (WPA/WPA2), 615
wildcard certificates, 184
Windows BYOD (bring your own device) onboarding,
531–533
device provisioning, 532–533
device registration, 531
Windows Hello, 27, 310
Windows native supplicant, 50–59
machine authentication, 58–59
user authentication, 58
Wired AutoConfig service
Advanced Settings tab, 57
Authentication tab, 53, 56–57
EAP MSCHAPv2 Properties dialog, 54
local area connection properties, 52–53
Protected EAP Properties page, 53–54, 55–56
Windows services control applet, 51–52
Windows Server Update Services (WSUS)
remediations, 685
Windows Update Agent, 673
WinSPWizard, 513
wired authentication, 261–276
Cisco ISE verification, 302–303
Live Sessions, 303
RADIUS Live Log, 302–303
endpoint supplicant verification, 295–296
global configuration AAA commands, 261–262
global configuration RADIUS commands, 262–269
device tracking in IOS Xe 16.x and later, 267
global 802.1X commands, 266–267
IOS 12.2.x, 262–263, 264–266
IOS 15.x, 263–266
IOS XE, 263–266
local ACL (access control list) creation, 268–269
interface configuration settings, 269–276
application of initial ACL to port, 275–276
authentication settings, 274–275
authentication timers, 275
configuration of interfaces as switch ports, 269
FlexAuth (Flexible Authentication), 269–272
HA (high availability), 269–272
host mode of switch port, 272–274
NAC (network access device) verification, 296–302
with Cisco switches, 296–299
with Cisco WLC (Wireless LAN Controller), 300–302
with syslog messages, 299–300
Wired AutoConfig service
Advanced Settings tab, 57
Authentication tab, 53, 56–57
EAP MSCHAPv2 Properties dialog, 54
local area connection properties, 52–53
Protected EAP Properties page, 53–54, 55–56
Windows services control applet, 51–52
Wired Equivalency Protection (WEP), 614
Wired_802.1X condition, 242, 254
Wired_MAB condition, 242
wireless authentication, 731
airespace ACLs (access control lists), 280–284
Google URLs for ACL Bypass, 282–283
Posture Agent Redirection ACL, 283–284
Web Authentication Redirection ACL, 280–282
RADIUS, 276–280
accounting servers, 278–279
authentication servers, 277–278
fallback, 279–280
Wireless Black List Default rule, 239
Wireless LAN Controller. See WLC (Wireless LAN
Controller)
wireless LANs. See WLAN (wireless LAN)
configuration
wireless MAB, 489
WIRELESS role, 971
Wireless Setup (BETA) option (Admin portal), 139
wireless SSIDs, authentication policy for, 220–223
AD identity source, 223
allowed protocols, 221–222
completed authentication rule, 223
SSID name, 221
wizards, 179
Cisco Supplicant Provisioning Wizard, 513
CiscoPress-TLS, 513
CLI Setup Wizard, 178–179
ISE Setup Wizards, 141
WinSPWizard, 513
WLAN (wireless LAN) configuration, 286–295, 971
for BYOD onboarding, 490–491
corporate WLAN, 291–295
guest WLAN, 287–290
WLC (Wireless LAN Controller), 329–331
authentication configuration on
AAA servers, 276–280
airespace ACLs (access control lists), 280–284
Cisco ISE verification, 302–303
dynamic interfaces for client VLANs, 284–286
endpoint supplicant verification, 295–296
NAC (network access device) verification, 296–302
wireless LANs, 286–295
configuration, 315–316, 329–331
for BYOD onboarding, 489–495
ISE NAC feature, 315–316
MAC Filtering option, 315
URL-redirect ACL, 316
device administration AAA configuration
ISE configuration on WLC TACACS+ servers, 979–980
network device preparation, 972
policy results preparation, 974–977
policy sets, 977–979
testing and troubleshooting, 981–986
top-level menus, 971–972
Device Sensor feature, 98
DHCP probes with, 413
HTTP POST method, 84–85
SXP (SGT Exchange Protocol) configuration on, 590–591
verifying authentications with, 300–302
current clients, 300–302
debug clients, 302
viewing client details on, 813–814
Woland, Aaron, 482, 633
Work Centers, Device Administration, 918
Identities tab, 920
Network Resources tab, 921–922
Password Change Control settings, 918
Policy Elements tab, 922–924
Policy Sets tab, 925–927
Reports, 927
Session Key Assignment settings, 918
UI navigation for, 919–920
Work Centers screen, 142, 170–171
Workspace One, 708
WPA (Wi-Fi Protected Access), 548, 615
WSA (Web Security Appliance) configuration, 850–857
access policy, 855–856
decryption policy, 857
ERS (External RESTful Services), 850–853
identification profiles, 855–857
integration with pxGrid and ISE, 850–855
policies, 855–857
WSUS (Windows Server Update Services)
remediations, 685
X
X.509 certificates. See certificate-based
authentication
XCP (Extensible Communication Platform) server, 825
XenMobile, 708
XMPP (Extensible Messaging and Presence Protocol),
825
Y-Z
YubiKeys, 310
ZBF (zone-based firewall), 611
Appendix D
Study Planner
7. A Guided
Tour of the
Cisco ISE
Graphical User
Interface (GUI)
9.
Authentication
Policies
Practice Test
Take practice test in
study mode using Exam
Bank 1 questions for
Chapter 24 in practice
test software
27. Final
Preparation
Coupon Code:
www.ciscopress.com/title/9780136677871
Coupon Code:
If you wish to use the Windows desktop offline version of the application, simply
register your book at www.ciscopress.com/register, select the Registered
Products tab on your account page, click the Access Bonus Content link, and
download and install the software from the companion website.
This access code can be used to register your exam in both the online and
offline versions.
Activation Code:
CCNP Security
Identity Management
SISE 300-715
Official Cert Guide Enhance
Your Exam Preparation
Save 80% on Premium Edition eBook
and Practice Test The CCNP Security
Identity Management SISE 300-715
Official Cert Guide Premium Edition
and Practice Test provides three
eBook files (PDF, EPUB, and
MOBI/Kindle) to read on your
preferred device and an enhanced
edition of the Pearson Test Prep
practice test software. You also
receive two additional practice exams
with links for every question mapped
to the PDF eBook.
See the card insert in the back of the book for your
Pearson
CCNP Security
Identity Management
SISE 300-715 Official Cert
Guide
Companion Website
Access interactive study tools on this book’s companion
website, including practice test software, memory tables,
review exercises, Key Term flash card application, study
planner, and more!
1. Go to www.ciscopress.com/register.
2. Enter the print book ISBN: 9780136642947.
3. Answer the security question to validate your
purchase.
4. Go to your account page.
5. Click on the Registered Products tab.
6. Under the book listing, click on the Access Bonus
Content link.
Title Page
Copyright Page
Credits
Contents at a Glance
Reader Services
Contents
Dedications
Acknowledgments
Introduction
Chapter 14 Profiling
Hands-on Activities
Suggested Plan for Final Review and
Study
Summary
Part IX Appendixes
Index
Code Snippets
ii
iii
iv
vi
vii
viii
ix
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
xxxv
xxxvi
xxxvii
xxxviii
xxxix
xl
xli
xlii
xliii
xliv
xlv
xlvi
xlvii
xlviii
xlix
li
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
D-1