Home > Cisco > Interface > Cisco Ise 13 User Guide

Cisco Ise 13 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Ise 13 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 946
    							TheInlinePosturenode’suntrustedinterfaceshouldbedisconnectedwhentheInlinePosturenodeisbeing
    configured.IftheInlinePosturenode’strustedanduntrustedinterfacesareconnectedtothesameVLAN
    duringinitialconfigurationandtheInlinePosturenodeinitiallystartsafterchangingitspersona,multicast
    packettrafficgetsfloodedoutoftheuntrustedinterface.Thismulticaststormcanpotentiallybringdown
    devicesthatareconnectedtothesamesubnetorVLAN.TheInlinePosturenodeatthistimeisin
    Maintenancemode.
    Caution
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    65
    Inline Posture Node Guidelines 
    						
    							Inline Posture Node Authorization
    ThefollowingimagesillustratetheclientauthorizationflowandsessionrecoveryusingLazyFetchmechanism
    forInlinePosturenode.
    Figure 8: Inline Posture Node Client Authorization Flow
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    66
    Inline Posture Node Authorization 
    						
    							Figure 9: Inline Posture Node Session Recovery Using Lazy Fetch Mechanism
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    67
    Inline Posture Node Authorization 
    						
    							InlinePostureNodeSessionRemovalduetoClientDisconnect
    WhenawirelessclientiswanderingofffromtheWLCcontrol,theWLCisrequiredtosendaRADIUS
    AccountingStopsimilartotheVPNgatewaytoensurethattheInlinePosturenodecleansupthesession
    correspondingtotheclient.
    Deploy an Inline Posture Node
    TheinitialprocessfordeployinganInlinePosturenodeisthesame,whetheritisintendedtobeastandalone
    nodeorpartofanactive-standbypair.
    InlinePostureissupportedontheCiscoISE3415,ISE3315,ISE3355,andISE3395platforms.Note
    Procedure
    Step 1ConfigureanInlinePosturenode.
    Step 2CreateInlinePostureDownloadableAccessControlLists.
    Step 3CreateInlinePosturenodeprofiles.
    Step 4CreateanInlinePostureauthorizationpolicy.
    Configure an Inline Posture Node
    InlinePostureisadedicatednoderegisteredtotheAdministrationnode.YouconfigureInlinePosturefrom
    theadministrationconsole,andthatconfigurationisthenreplicatedtotheInlinePosturenode.Acopyofthe
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    68
    Deploy an Inline Posture Node 
    						
    							configurationisstoredlocallyintheadministrationdatabase.AfteranInlinePosturenodeisregistered,itis
    rebooted.
    TointroduceanInlinePosturenodeinyourCiscoISEnetwork,youmustfirstregistertheInlinePosturenode
    withthePAN,configuretheInlinePosturesettings,andthencreateauthorizationprofilesandpoliciesthat
    establishtheInlinePosturegatekeepingpolicies.
    TheInlinePosturenodeisaRADIUSproxythatinterfaceswithNADsastheirRADIUSserver,makingthe
    NADs(VPNgateway,WLC)RADIUSclients.Asaproxy,InlinePostureinterfaceswiththePolicyService
    nodeasaclientmakingthePolicyServicenodeitsRADIUSserver.
    Aftercompletingthefollowingprocedure,aNADentryisautomaticallycreatedfortheInlinePosture
    node.Forastandalonenode,theIPaddressforthatnodeisused.Forahigh-availabilitypair,theservice
    IPaddressfortheactivenodeisused.
    Note
    Before You Begin
    Toperformthefollowingtask,youmustbeaSuperAdminorSystemAdmin.
    InlinePostureisnotsupportedontheCiscoISE3495platform.EnsurethatyouinstallInlinePostureonany
    oneofthefollowingsupportedplatforms:ISE3315,ISE3355,ISE3395,orISE3415.
    FollowandapplytheguidelinesforconfiguringcertificatesforInlinePosture.RefertoCiscoIdentityServices
    EngineHardwareInstallationGuide,Release1.2fordetails.
    RegistertheInlinePosturenodewiththePAN.AllnodesmustberegisteredwiththePANtofunctionasa
    memberoftheCiscoISEdistributedsystem.
    RADIUSconfigurationismandatory.Atleastoneclientandoneserverconfigurationisnecessary.Youneed
    thecorrespondingsharedsecretinformationforbothsidestocompletethisprocedure.
    Haveallnecessaryconfigurationinformationforyourinstallationonhand.Forexample,youmightneedthe
    trustedanduntrustedIPaddresses,serviceIPaddress,IPaddressesforotherCiscoISEnodes,sharedsecret
    informationfortheRADIUSconfiguration,managementVLANID,WLC,orVPNIPaddress,andsoon.
    Checkwithyoursystemarchitectforacompletelistoftheinformationyouwillneed.
    DonotconfiguretheMACaddressinaMACFilterforadirectlyconnectedASAVPNdevicewithout
    alsoenteringtheIPaddress.WithouttheadditionoftheoptionalIPaddress,VPNclientsareallowedto
    bypasspolicyenforcement.ThisaccesshappensbecausetheVPNisaLayer3hopforclients,andthe
    deviceusesitsownMACaddressasthesourceaddresstosendpacketsalongthenetworktowardthe
    InlinePosturenode.
    Caution
    Procedure
    Step 1ChooseAdministration>System>Deployment.
    Step 2ChecktheInlinePosturenodecheckboxintheDeploymentNodespageandclickEdit.
    Step 3ChecktheInlinePEPcheckboxontheGeneralSettingstab.TheAdministration,Monitoring,andPolicy
    Servicecheckboxesareautomaticallyunchecked.
    ThetabschangetoGeneralSettings,BasicInformation,DeploymentModes,Filters,RadiusConfig,Managed
    Subnets,StaticRoutes,Logging,andFailover.
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    69
    Deploy an Inline Posture Node 
    						
    							AnewlyregisteredInlinePosturenodecomesupwithadefaultIPaddressof192.168.1.100,asubnet
    maskof255.255.255.0,andadefaultgatewayof192.168.1.1.Changethesevaluestofityour
    deploymentinStep3.
    Note
    Step 4Clickthefollowingtabsandentertheappropriateinformationforthefieldsinthetabs.
    •BasicInformation
    •DeploymentModes—AnewlyregisteredInlinePosturenodecomesupinmaintenancemode.For
    productionpurposes,youmustchoosetheRoutedorBridgedmode.
    •Filters—Enterthesubnetaddressandsubnetmaskfortheclientdevice,ortheMACaddressandIP
    addressofthedeviceonwhichtofilter.YoucanuseMACandsubnetfilterstobypassInlinePosture
    enforcementtocertainendpointsordevicesontheuntrustedsideofthenetwork.Forexample,ifVPN
    orWLCmanagementtrafficisrequiredtopassthroughInlinePosture,youwouldnotwanttosubject
    thoseparticularNADstoCiscoISEpolicyenforcement.ByprovidingtheMACaddressandIPaddress
    fortheseNADsonafilter,youcanthenaccesstheuserinterfaceorconfigurationterminalbywayof
    InlinePosturewithoutrestrictions.
    •RadiusConfig—RADIUSconfigurationismandatory.Atleastoneclientandoneserverconfiguration
    isnecessaryforInlinePosture.
    •ManagedSubnets—ForsubnetsofendpointsthatareinLayer2proximitytotheInlinePosturenode
    (suchasaWLC),youmustconfiguremanagedsubnets.ThisconfigurationrequiresanunusedIPaddress
    inthesamesubnetasthemanagedsubnet,alongwiththeVLAN(ifany)ofthesubnet.Youcanhave
    multiplemanagedsubnetentries.Youmustenterthefollowingvalues:IPAddress,SubnetMask,VLAN
    ID,andDescription.
    ◦StaticRoutes—Enterthesubnetaddress,subnetmask,andchooseTrustedorUntrustedfrom
    theInterfaceTypedrop-downlist.Repeatthisstepasneededforyourconfiguration.
    WhenthesubnetsoftheendpointsunderCiscoISEcontrolareLayer3awayfromtheInline
    Posturenode,astaticrouteentryisneeded.Forexample,ifaVPNgatewaydevice(thatsends
    managedsubnettraffictotheInlinePostureuntrustedinterface)istwohopsaway,itsclientsubnet
    needstohaveastaticroutedefinedforInlinePosture.Thenetworkonthetrustedsideshouldknow
    tosendtraffictotheInlinePosturetrustedinterface.
    ◦Logging—ClicktheLoggingtabandentertheIPaddressandportnumberfortheloggingserver,
    whichistypicallytheMonitoringnode.
    AnIPaddressandport(default20514)forloggingInlinePostureeventsaremandatory.This
    requirementensuresthattheviablestatusoftheInlinePosturenodeisdisplayedintheCiscoISE
    dashboardintheSystemSummarydashlet,andthatotherloginformationregardingthenodesis
    available.
    ◦Failover—ThistabisforInlinePostureHighAvailabilityconfiguration.
    Step 5ClickSave.TheInlinePosturenoderestartsautomatically.
    Step 6ToverifytheautomaticallygeneratedInlinePostureNADlisting,gotoAdministration>NetworkResources
    >DefaultDevice.
    Forastandalonenode,theIPaddressforthatnodeisused.Forahigh-availabilitypair,theserviceIPaddress
    fortheactivenodeisused.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    70
    Deploy an Inline Posture Node 
    						
    							What to Do Next
    TocompletethedeploymentoftheInlinePosturenode,youmustcreateDACLs,authorizationprofiles,and
    authorizationpolicyrules:unknown,compliant,andnoncompliant.
    Itisimportanttoassociatetheappropriatedownloadableaccesscontrollist(DACL)withthecorresponding
    profile.Forexample,theunknownDACLshouldbeassociatedwiththeunknownauthorizationprofile.
    Note
    Create Inline Posture Downloadable Access Control Lists
    Downloadableaccesscontrollists(DACLs)arebuildingblocksforauthorizationprofiles,andtheyprovide
    therulesfortheprofilestofollow.Accesscontrollists(ACLs)preventunwantedtrafficfromenteringthe
    networkbyfilteringsourceanddestinationIPaddresses,transportprotocols,andothervariables,usingthe
    RADIUSprotocol.
    AfteryoucreateDACLsasnamedpermissionobjects,addthemtoauthorizationprofiles,whichyouthen
    specifyastheresultofanauthorizationpolicy.
    Before You Begin
    Toperformthefollowingtask,youmustbeaSuperAdminorSystemAdmin.
    Procedure
    Step 1ChoosePolicy>PolicyElements>Results>Authorization>DownloadableACLs.
    Step 2ClickAdd.
    Step 3EnterthenameoftheDACLanditsdescription.
    Step 4CreatethefollowingDACLs:
    •ipn-compliant(PermitAll):Usethefollowingsyntax:permitipanyany
    •ipn-noncompliant(DenyAll):Usethefollowingsyntax:denyipanyany
    •ipn-unknown(Pre-Posture):UseatleastoneACLtoallowsupplicantsandthePolicyServicenodeto
    haveaccesstoeachotherforpostureevaluation.ThisDACLcanbeusedtoblockorquarantineusers
    untiltheypassauthentication.Hereisanexamplesyntax:
    denytcpanyanyeq80
    denytcpanyanyeq443
    permitipany10.1.2.40.0.0.0
    permitudpanyanyeq53
    denyipanyany
    Step 5SavetheDACLs.
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    71
    Deploy an Inline Posture Node 
    						
    							What to Do Next
    CreateInlinePosturenodeprofiles.
    Create Inline Posture Node Profiles
    YoumustcreatethreeInlinePostureauthorizationprofiles,aswellasanauthorizationprofileforaNAD.
    AllInlinePostureinboundprofilesareautomaticallysettocisco-av-pair=ipep-authz=truesothattheInline
    PosturenodeappliestheserulesinsteadofproxyingthemontotheNADs.TheURLredirectisessentialfor
    clientprovisioning,aswellasagentdiscoveryredirection.
    Before You Begin
    Toperformthefollowingtask,youmustbeaSuperAdmin,SystemAdmin,orPolicyAdmin.
    Procedure
    Step 1ChoosePolicy>PolicyElements>Results>Authorization>InlinePostureNodeProfiles.
    Step 2ClickAdd.
    Step 3Enteranameanddescriptionfortheauthorizationprofile.Supportedcharactersforthenamefieldare:space,
    !#$%&‘()*+,-./;=?@_{.
    YoucanconfigureaRADIUSReplyMessage=NADProfile,toseeNADProfileintheRADIUS
    logmessagesforInlinePosture.Thisconfigurationcanbehelpfulfortroubleshootingatalatertime.
    Note
    Step 4CreatethefollowingauthorizationprofilesforInlinePosturethatcorrespondtotheDACLsyoucreated.
    SpecifytheappropriateDACLforeachofthefollowingauthorizationprofiles:
    •IPN-Unknown-Compliant(Pre-Posture):ThisprofilerequiresthatyouenteraURLredirect.Todothis,
    checktheURLRedirectcheckbox.
    TheURLredirectappearsintheAttributesDetailsfield.
    Youareredirectedtoawebpagewhereyoudownloadandinstallanagent.Theagentthenscansyour
    system.Ifyoursystempasses,youareautomaticallygrantedfullaccess.Ifyoursystemdoesnotpass,
    youaredeniedaccess.
    •IPN-Compliant(PermitAll)
    •IPN-Noncompliant(DenyAll).
    Step 5ClickSubmit.
    What to Do Next
    CreateanInlinePostureauthorizationpolicy.
    Create an Inline Posture Authorization Policy
    Authorizationpoliciesprovidethemeansforcontrollingaccesstothenetworkanditsresources.CiscoISE
    letsyoudefineanumberofruleswhencreatingauthorizationpolicies.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    72
    Deploy an Inline Posture Node 
    						
    							Theelementsthatdefinetheauthorizationpolicyarereferencedwhenyoucreatepolicyrules.Yourchoice
    ofconditionsandattributesdefinestheauthorizationprofile.
    Before You Begin
    Toperformthefollowingtask,youmustbeaSuperAdminorSystemAdmin.
    Procedure
    Step 1ChoosePolicy>Authorization.
    Step 2Leavethedefaultrulesasis.
    Step 3CreatethefollowingUnknownPostureStatusRule:
    •IdentityGroup:Any
    •Condition:Session:PostureStatusEQUALS=Unknown
    •Permissions:IPN-Unknown-Compliant+nad-authorization-profile
    Step 4CreatethefollowingCompliantPostureRule:
    •IdentityGroup:Any
    •Condition:Session:PostureStatusEQUALS=Compliant
    •Permissions:IPN-Compliant+nad-authorization-profile
    Step 5CreatethefollowingNoncompliantPostureRule:
    •IdentityGroup:Any
    •Condition:Session:PostureStatusEQUALS=Noncompliant
    •Permissions:IPN-Noncompliant+nad-authorization-profile
    Step 6Savethepolicy.TheInlinePosturenodedeploymentisnowcomplete.
    What to Do Next
    ConfigureInlinePosturenodeasRADIUSclientinAdministrationnode.
    Configure a High-Availability Pair
    WhenyouconfiguretwoInlinePosturenodesforhighavailability,youspecifyonenodeastheprimaryunit
    inthepairanditbecomestheactivenodebydefault.Theotherbecomesthesecondarynode,whichisa
    standbyunitincaseofdefault.
    Ahigh-availabilitynodefailoverpromptsthestandbynodetotakeovertheserviceIPaddress.Afterthis
    processoccurs,anadministratormustcorrectthefailedInlinePosturenodeandrevertittotheearlier
    configurationasneeded.Becausehigh-availabilityfailoverisstateless,allactivesessionsareautomatically
    reauthorizedafterafailoveroccurs.
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    73
    Configure a High-Availability Pair 
    						
    							Intheexamplethatispresented,theserviceIPaddressusedforthebridgedmodehighavailabilitypairis
    differentfromthephysicalIPaddressesoftheInlinePosturenodes,effectivelycreatingacluster.TheWLC
    interactswiththeclusterasasingleunit,usingtheserviceIPaddress.Forthisreason,theserviceIPisdefined
    forthetrustedanduntrustednetworks.
    Bothnodesinahighavailabilitypairmustusethesamemode,eitherbridgedorrouter.Mixedmodesare
    notsupportedonInlinePosturehighavailabilitypairs.
    Note
    Before You Begin
    •Toperformthefollowingtask,youmustbeaSuperAdminorSystemAdmin.
    •Youshouldhavesuccessfullyconfiguredtwo(2)InlinePosturenodes,andregisteredthemontheCisco
    ISEnetwork.
    •Theeth2andeth3interfacesofbothnodesinanInlinePosturehighavailabilitypair(primaryand
    secondary)communicatewithheartbeatprotocolexchangestodeterminethehealthofthenodes.For
    theheartbeattowork,youmustconnecttheeth2interfaceoftheprimaryInlinePosturenodetotheeth2
    interfaceofthesecondarynodeusinganEthernetcable.Likewise,theeth3interfaceoftheprimary
    InlinePosturenodemustbeconnectedtotheeth3interfaceofthesecondarynodewithanEthernet
    cable.
    •ForRADIUSpurposes,youneedaserviceIPaddressthatyouwillassigntoboththetrustedanduntrusted
    interfacesoftheInlinePostureactive-standbyclusterduringthecourseofthisprocedure.
    •Haveallnecessarynetworkconfigurationinformationforyourinstallationonhand.Checkwithyour
    systemarchitectforacompletelistofinformationyouwillneed.
    Procedure
    Step 1ChooseAdministration>System>Deployment.
    Step 2CheckthecheckboxnexttotheInlinePosturenodethatyouwanttodesignateastheprimarynode,andclick
    Edit.
    Step 3OntheGeneralSettingstab,verifythenodename,thattheInlinePEPcheckboxisselected,thenchoose
    ActiveastheHARolefromthedrop-downlist.
    Step 4ClicktheFailovertab,andchecktheHAEnabledcheckbox.
    Step 5Entertheappropriateinformationinthefields.
    Step 6ClickSave.BothInlinePosturenodesrestart.Whenthenodescomebackup,theyareconfiguredasprimary
    andsecondary,accordingtothesettingsyouspecified.
    Step 7Verifythenodestatusbycheckingthecheckboxnexttoit,andthenclickingtheFailovertab.Ensurethat
    yourprimaryandsecondaryInlinePosturenodesareconfiguredcorrectly.
    What to Do Next
    ConfigureInlinePosturenodeasRADIUSClientinadministrationnode.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    74
    Configure a High-Availability Pair 
    						
    All Cisco manuals Comments (0)