Howto 30 Ise Profiling
Howto 30 Ise Profiling
Table of Contents
Table of Contents........................................................................................................................... 2
Introduction ................................................................................................................................... 4
What Is the Cisco TrustSec System? ............................................................................................................................................................................................................................... 4
About the TrustSec How-To Guides ............................................................................................................................................................................................................................... 4
What does it mean to be TrustSec Certified? ......................................................................................................................................................................................................................... 5
Device Sensor............................................................................................................................... 76
Device Sensor Overview .................................................................................................................................................................................................................................................. 76
Device Sensor Details........................................................................................................................................................................................................................................................ 76
Device Sensor Requirements ..........................................................................................................................................................................................................................................................77
Configuring Device Sensor for ISE Profiling ...........................................................................................................................................................................................................................78
HowTo-30-ISE_Profiling_Design_Guide
HowTo-30-ISE_Profiling_Design_Guide
Introduction
What Is the Cisco TrustSec System?
Cisco TrustSec, a core component of the Cisco SecureX Architecture, is an intelligent access control solution. TrustSec
mitigates security risks by providing comprehensive visibility into who and what is connecting across the entire network
infrastructure, and exceptional control over what and where they can go.
TrustSec builds on your existing identity-aware access layer infrastructure (switches, wireless controllers, and so on). The
solution and all the components within the solution are thoroughly vetted and rigorously tested as an integrated system.
In addition to combining standards-based identity and enforcement models, such as IEEE 802.1X and VLAN control, the
TrustSec system it also includes advanced identity and enforcement capabilities such as flexible authentication,
Downloadable Access Control Lists (dACLs), Security Group Tagging (SGT), device profiling, posture assessments, and
more.
Figure 1: TrustSec Architecture Overview
RADIUS
Guest Services
Posture
Profiler
Ingress Enforcement
Wireless
user
SXP
Wired
user
y
rit ag
cu T
Se oup
Gr
Campus
Network
MACsec
Ingress Enforcement
S
Gr ec
ou uri
p ty
Ta
g
Data Center
Egress Enforcement
HowTo-30-ISE_Profiling_Design_Guide
Many features may exist that could benefit your deployment, but if they were not part of the tested solution, they will not be
marked as TrustSec certified. The TrustSec team strives to provide regular updates to these documents that will include
new features as they become available, and are integrated into the TrustSec test plans, pilot deployments, and system
revisions. (i.e., TrustSec 2.2 certification).
Additionally, many features and scenarios have been tested, but are not considered a best practice, and therefore are not
included in these documents. As an example, certain IEEE 802.1X timers and local web authentication features are not
included.
Note: Within this document, we describe the recommended method of deployment, and a few different options depending on the level of
security needed in your environment. These methods are examples and step-by-step instructions for TrustSec deployment as prescribed
by Cisco best practices to help ensure a successful project deployment.
HowTo-30-ISE_Profiling_Design_Guide
To expose the profile to the ISE Authorization Policy, administrators must configure the profile via simple checkbox to
create a matching Identity Group. This simple process allows the profile to be selected in the form of an Endpoint Identity
Group as a condition in the Authorization Policy.
Profiles can change as new attributes are learned or previously learned attributes are overwritten. Changes can also occur as a
result of changes in the Profiling Policy. In some cases, the transition may be automaticfor example, from a generic HP
device to a more specific profile such as an HP-Color-LaserJet-4500. In other cases, an administrator may want to make a
deliberate action to bypass the default policy in the form of an Exception Action. Exception Actions allow static assignment
of an endpoint to a specific Profiling Policy such that further attributes collection or correlation has no impact on the profile
and optional Identity Group assigned.
HowTo-30-ISE_Profiling_Design_Guide
In each case aboveprofile transition and Exception Actionit may be desirable to allow ISE to enforce a new access
policy for the endpoint based on the new profile assignment. RADIUS Change of Authorization (CoA) is the facility to
accomplish this task in ISE. By sending CoA requests to the access the device to which the endpoint is connected, ISE can
require that the host be reevaluated against the Authentication and Authorization policy.
Scenario Overview
Network Topology
Figure 4 depicts the high-level network topology used in this guide. While all the scenarios pictured in Figure 1 are part of
the overall TrustSec architecture, this document will focus on the wired and wireless user scenarios for profiling. ISE
Profiling Services are not currently supported for the remote access VPN use case due to the lack of MAC address
information from the VPN gateway required to correlate profiling data to unique endpoints.
Figure 4 ISE Profiling Topology
Components
Table 1 lists the hardware and software components were used in the writing of this guide.
Table 1: Cisco TrustSec 2.0 System Tested Components
Component
Hardware
Features Tested
Software Release
HowTo-30-ISE_Profiling_Design_Guide
Component
Hardware
Features Tested
Software Release
Cisco Aironet
Lightweight Access
Point 1142N
Cisco Lightweight
Access Point Software
Release 12.4(25e)JA
Cisco IP Phone
Workstation
VMware Guest
Windows 7
Tablet
iOS 5.0.1
Smartphone
Motorola DROIDX
Android 2.3.4
Note: Cisco ISE Profiling Services is the key feature validated in this guide. Other TrustSec features were primarily deployed to support the
configuration and testing of profiling services.
The devices and versions shown in the table are those specifically used during the guide testing and documentation process and are
not reflective of all the devices that support TrustSec and ISE Profiling Services. For a more comprehensive listing of TrustSecenabled devices and recommended versions, please go to http://www.cisco.com/go/trustsec.
HowTo-30-ISE_Profiling_Design_Guide
One Advanced Endpoint license is required for each endpoint that is actively authenticated to the network and where
profiling data is used to make an Authorization Policy decision. Not taking into account other services, such as posture
assessment, that may require an Advanced Endpoint license, endpoints that are statically assigned to a profile do not consume
an Advanced license. It is possible to profile multiple endpoints and have visibility into connected devices and their
classification without requiring an Advanced Endpoint license for each if the profile information is not used to authorize the
endpoint. The minimum number of Advanced Endpoint or Wireless Only licenses is 100.
Appliance Requirements
ISE Profiling Services can only run on an ISE appliance configured for the Policy Service persona. Table 2 shows general
guidance for the number of active endpoints that can be profiled by an appliance dedicated to the Policy Service. Sizing for
VMware-based appliances is based on matching or exceeding the equivalent specifications for hardware-based appliances.
Table 2 ISE Appliance Sizing
Maximum Endpoints
ACS1121/NAC3315/ISE3315
3000
43
33
NAC3355/ISE3355
6000
Not available
Not available
NAC3395/ISE3395
10,000
100
3000/6000/10,000
VMware configuration
dependent
VMware configuration
dependent
ISE Appliance
VMware
Additionally, each appliance is limited in the rate at which it can process new events per second (EPS). This value is
dependent on whether the profiling data received is for a newly discovered endpoint or for an existing endpoint. The profiling
rate for existing endpoints is shown in the EPS Profiled column in Table 2. The rate at which newly discovered endpoints are
added to the database and profiled is shown in the EPS Saved column.
ISE Profiling Services can be scaled by distributing the service across multiple ISE appliances. An ISE Policy Service node
that is running Profiling Services may also be a member of a node group used to cluster Policy Services behind a load
balancer.
Network Requirements
ISE Profiling Services uses various collectors, or probes, to collect attributes about connected endpoints. Some of these
probes require specific support by the network infrastructure, access devices, or possibly the endpoints. These requirements
will be called out in greater detail in the sections that cover specific probes, but it is important to understand that some probes
may not be usable if the appropriate data is not made available from the network or the endpoints.
HowTo-30-ISE_Profiling_Design_Guide
Access the ISE administrative interface of the primary Policy Administration node (PAN) using a supported web
browser and your admin credentials: https://<ISE_PAN_FQDN_or_IP>
Navigate to Administration System Settings. Select Profiling from the left-hand-side (LHS) pane.
From the right-hand side (RHS) pane, choose the default CoA type to be used for profiling transitions and Exception
Actions (Figure 5).
If the goal is visibility only, leave the default value of No CoA. Otherwise, select Port Bounce. This will help ensure that
even clientless endpoints will go through complete reauthorization process, including an IP address refresh, if needed. If
multiple endpoints are detected on the switchport, ISE will revert to using the Reauth option to avoid service disruption of
other connected devices.
Figure 5 Global Profiling Settings: CoA Configuration
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Under the General Settings tab, verify that the node persona called Policy Service is selected and that Enable
Profiling Service is also selected (Figure 6).
HowTo-30-ISE_Profiling_Design_Guide
10
Procedure 2
Click the Profiling Configuration tab. View the various probes that can be enabled and configured simply by
checking the appropriate box and selecting optional probe parameters (Figure 7).
Figure 7 Probe Configuration
Whenever you make changes to the profiling configuration, be sure to click Save at the bottom of page to commit the
changes.
HowTo-30-ISE_Profiling_Design_Guide
11
Configuring Probes
Figure 8: Configuration Flow: Probes and Attribute Collection
Probe Overview
An ISE probe is the component of ISE Profiling Services that collects endpoint attributes. Each probe uses different
collection methods and can gather unique information about endpoints. Consequently, some probes are better suited than
others to classify certain device types, or may be preferred based on the particular environment.
ISE supports the following probes:
RADIUS
SNMP Trap
SNMP Query
DHCP
DHCP SPAN
DNS
HTTP
NetFlow
Network Scan (NMAP)
As suggested by their names, some probes such as DHCP and DHCP SPAN, for example, are uniquely capable of collecting
certain attributes; in this example, DHCP attributes and associated option fields in DHCP packets. The choice between
DHCP and DHCP SPAN will depend on whether the particular network environment supports the relay of DHCP traffic to
the ISE Policy Service node, or if use of a Switch Port Analyzer (SPAN) method is better suited to network topology and
capabilities of the infrastructure. This guide includes detailed guidance on probe selection under the individual sections for
each probe.
Each probe type varies in how simple or difficult it is to enable. Each probe type also has varying levels of impact to the
network or endpoints based on the protocols used and how they are deployed. Finally, each probe varies in the value of the
data it produces and its applicability to classifying the specific endpoints of interest in the network. This guide reviews how
each probe is configured and deployed and also aims to provide an overall understanding of each probes deployment
difficulty, network impact, and relative profiling value based on type of deployment.
Probe Configuration
ISE probes are enabled on ISE Policy Service nodes configured for Profiling Services. This section reviews the steps to
enable the various ISE probes to collect different endpoint attributes. Working configuration examples of supporting network
HowTo-30-ISE_Profiling_Design_Guide
12
infrastructure will also be provided along with the expected output from both the infrastructure and ISE administrative
interface.
The RADIUS probe also collects Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), and DHCP
attributes sent in RADIUS accounting packets using the Device Sensor feature. This feature is covered in detail later (see the
Device Sensor section). Figure 9 shows the topology of our RADIUS probe example.
Figure 9 RADIUS Probe Example
User-Name
NAS-IP-Address
NAS-Port
Framed-IP-Address
Calling-Station-Id
Acct-Session-Id
Acct-Session-Time
Acct-Terminate-Cause
Although dependent on the access device configuration, Calling-Station-ID is commonly the MAC address of the connecting
endpoint. This attribute provides immediate benefit in quickly identifying a unique endpoint based on MAC address as it
connects to the network and authenticates. It also provides information on the vendor network adapter based on the
Organizationally Unique Identifier (OUI) taken from the first three bytes of the MAC address.
The Framed-IP-Address present in RADIUS accounting packets provides the IP address of the connecting endpoint. This
attribute combined with Calling-Station-ID gives ISE the critical IP-to-MAC binding required to support other probes that
rely on IP address such as DNS, HTTP, Cisco NetFlow, and NMAP.
HowTo-30-ISE_Profiling_Design_Guide
13
Procedure 1
Go to AdministrationSystemDeployment. From list of deployed nodes on the RHS pane, select the Policy
Service node to perform profiling.
Select the Profiling Configuration tab and check the box to enable the RADIUS probe. The probe is automatically
enabled on the interfaces configured for RADIUS services (Figure 10).
Figure 10 RADIUS Probe Configuration
This guide assumes that the network access devices have already been configured in ISE under AdministrationNetwork
ResourcesNetwork Devices for standard RADIUS communications.
Procedure 3
Verify That Access Devices Are Configured to Send RADIUS to ISE PSN
This guide assumes that the network access devices have already been configured for RADIUS authentication, authorization,
and accounting to the ISE Policy Service node (PSN). Here is a sample RADIUS configuration for a wired switch:
aaa authentication dot1x default group radius
aaa authorization network default group radius
aaa accounting dot1x default start-stop group radius
ip radius source-interface <Interface>
radius-server attribute 6 on-for-login-auth
radius-server attribute 8 include-in-access-req
radius-server attribute 25 access-request include
radius-server host <ISE_PSN_Address> auth-port 1812 acct-port 1813 key xxx
radius-server vsa send accounting
radius-server vsa send authentication
Figure 11 shows a sample RADIUS server configuration for a wireless controller. To access this configuration page, go to
SecurityAAARADIUSAuthentication in the WLC web administrative interface.
Figure 11 Global RADIUS Server Configuration for Wireless Controller Example
HowTo-30-ISE_Profiling_Design_Guide
14
Best Practice: As shown in Figure 11, be sure to set the Call Station ID Type to System MAC Address to allow profiling of non-802.1X clients.
This will ensure that ISE is able to add the endpoint to the database and associate other profile data received to this same endpoint
based on known MAC address.
Similar entries should be present under the RADIUS accounting configuration for the wireless controller (Figure 12).
Figure 12 Global RADIUS Accounting Configuration for Wireless Controller Example
Each WLAN should also be configured to designate the appropriate ISE Policy Service node(s) (Figure 13).
Figure 13 WLAN RADIUS Configuration for Wireless Controller Example
HowTo-30-ISE_Profiling_Design_Guide
15
Procedure 4
HowTo-30-ISE_Profiling_Design_Guide
16
The Calling-Station-ID populates the MACaddress attribute. Additionally, the vendor OUI of the network adapter is
determined to be Cisco-Linksys. In this example, the network adapter is a Linksys Wireless USB adapter. Conditions that
match OUI are common entries in Profiling Policy rules. In some cases, such as a Nintendo or Sony game console, it may be
all that is required to classify the endpoint.
HowTo-30-ISE_Profiling_Design_Guide
17
The Framed-IP-Address value populates the ip attribute. We now have an IP-to-MAC address binding for this endpoint.
The EndPointSource attribute specifies the source of the last profile attribute update. In this case, it is the RADIUS probe
that provided the last update to this endpoint record.
Additional RADIUS attributes can be used for profiling but since most of these are available directly to the Authorization
Policy for creating policy conditions and rules, the focus is on the ones noted above.
If the RADIUS probe is already enabled, the SNMP Trap probe is likely not needed since RADIUS Accounting Start
messages can also trigger the SNMP Query probe. The primary use case for this probe would be for a predeployment
discovery phase whereby RADIUS has yet to be configured for network authentication. Another use case would be to
integrate environments that do not rely on RADIUS, such as Cisco NAC Appliance Release 4.9 and later.
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab and check the box to enable the SNMP Trap probe (Figure 16).
HowTo-30-ISE_Profiling_Design_Guide
18
Check the boxes labeled Link Trap Query and MAC Trap Query to enable the probe to respond to each trap type.
Verify the ISE PSN interface used to receive traps. In most cases this will be the default GigabitEthernet 0 interface
although it is possible to process traps received on other interfaces or to select All interfaces.
Figure 17: SNMP Trap ProbeInterface Configuration
If you decide to process traps on other interfaces, make sure those interfaces are enabled and have an IP address assigned.
These addresses must be configured in the access devices at the SNMP host trap target.
Click Save to commit the change.
Repeat the steps in this procedure for all other Policy Service nodes configured with Profiling Services.
Procedure 2
Typically, all network access devices that authenticate endpoints via RADIUS will be configured in ISE, but use of the
SNMP Trap probe often implies that access devices are not yet configured for RADIUS. If these access devices are not yet
configured, you must add the access devices that will be sending SNMP traps to ISE.
Go to AdministrationNetwork ResourcesNetwork Devices and click Add in the RHS pane.
Enter the device name and IP address information (Figure 18). The IP address should include the IP address that will
source SNMP traps. In simple configurations, there may be only one management IP address on the switch. In other cases,
there can be multiple IP addresses and by default SNMP will typically use the IP address of the egress interface. If necessary,
enter all possible IP addresses that access devices may use to source SNMP packets.
HowTo-30-ISE_Profiling_Design_Guide
19
Best Practice: If supported by the access device, use loopback interfaces for management traffic. Be sure to take advantage of options such
as source-interface to set the specific interface and IP address that will source management traffic. This will provide a uniform address
for all management traffic and also prevent connectivity failures if a specific interface is down.
Configure Access Devices to Send SNMP Traps to ISE Policy Service Node
Go to the management console of the access device and verify that it is configured to send SNMP traps to the ISE
Policy Service node running Profiling Services and enabled with the SNMP Trap probe.
Here is an example configuration from a Catalyst switch running Cisco IOS to send SNMP LinkUp/LinkDown traps as well
as MAC Notification traps:
HowTo-30-ISE_Profiling_Design_Guide
20
interface <Endpoint_Interface>
snmp trap mac-notification added
snmp trap mac-notification removed
!
mac address-table notification change
mac address-table notification mac-move
!
snmp-server trap-source <Interface>
snmp-server enable traps snmp linkdown linkup
snmp-server enable traps mac-notification change move
snmp-server host <ISE_PSN_IP_address> version 2c ciscoro
Note: Cisco ISE does not currently support SNMP traps from the Wireless LAN Controller.
Procedure 4
The SNMP Trap probe cannot populate endpoint attributes based on LinkUp or LinkDown traps alone as there is no
associated MAC address in these traps. They primarily signal the interface on which link has been established or lost.
However, MAC Notification traps do include the MAC address of the endpoint and can therefore provide updates to the ISE
Internal Endpoints database.
Delete the endpoint from AdministrationIdentity ManagementIdentitiesEndpoints.
Disconnect and then reconnect a wired client from the access switch configured for SNMP traps.
Go to the ISE Policy Administration node and navigate to Administration Identity Management Identities.
Select Endpoints from the LHS pane.
Find and select the MAC address of the newly connected endpoint to display the attributes captured by the SNMP
Trap probe (Figure 20).
HowTo-30-ISE_Profiling_Design_Guide
21
MACAddress was learned from the MAC Notification trap information and the vendor OUI was determined by correlating
against ISEs OUI database. In this example, we can see that the client is running VMware, which uses a virtual network
adapter.
As an optional verification that SNMP traps are being sent by the access switch, debug logging can be enabled to view the
SNMP Link and MAC Notification traps as they are sent. The output below is from a Catalyst switch with the following
debug enabled:
debug mac-notification
In the following example, upon enabling the switchport connected to a Cisco IP phone and Windows 7 PC connected to that
phone, SNMP LinkUp traps are sent for both the phone and PC to the ISE PSN followed by MAC Notification traps for both.
Only the traps related to the PC with MAC address 00:50:56:A0:0B:3A are highlighted.
Apr 26 16:53:06.735: %LINEPROTO-5-UPDOWN:
Apr 26 16:53:06.743: %LINEPROTO-5-UPDOWN:
Apr 26 16:53:06.743: SNMP: Queuing packet
Apr 26 16:53:06.743: SNMP: V2 Trap, reqid
sysUpTime.0 = 58970958
snmpTrapOID.0 = snmpTraps.4
ifIndex.10 = 10
ifDescr.10 = Vlan10
ifType.10 = 53
lifEntry.20.10 = up
HowTo-30-ISE_Profiling_Design_Guide
22
For reference, in addition to the debug logging available on the access devices, ISE also supports its own debug logging.
Debugging is beyond the scope of this guide, although an alternative method to validate the information received by ISE is to
use the built-in TCP Dump utility found under OperationsTroubleshotDiagnostic ToolsGeneral Tools. This tool will
allow ISE to capture SNMP traffic from the access device to the specified ISE Policy Service node interface (the one enabled
with the SNMP Trap probe). This information can then be downloaded and displayed in human-readable format, or else in a
standard packet capture format for import into a common packet analyzer such as Wireshark.
23
System Query
The System Query is performed periodically based on the Polling Interval set in NAD configuration of ISE. The MIBs polled
include the following:
IF-MIB
SNMPv2-MIB
IP-MIB
CISCO-CDP-MIB
CISCO-VTP-MIB
CISCO-STACK-MIB
BRIDGE-MIB
OLD-CISCO-INTERFACE-MIB
CISCO-LWAPP-AP-MIB
CISCO-LWAPP-DOT11-CLIENT-MIB
CISCO-AUTH-FRAMEWORK-MIB
HOST-RESOURCES-MIB
LLDP-MIB
Bridge, IP (ARP)
HowTo-30-ISE_Profiling_Design_Guide
24
If multiple Policy Service nodes have SNMP Query enabled, SNMP polling of network devices is distributed among all
available PSNs unless specific PSNs are configured to poll a given network device.
Address Resolution Protocol (ARP) table information is also collected during this polled query to build the IP-MAC ARP
Cache table in ISE. In environments where endpoints are connected to Layer 2-only switchports, it may be desirable to
configure upstream Layer 3 devices (for example, branch routers or Layer 3 distribution switches) as ISE network access
devices if they contain the ARP table information for the endpoints. This may be required to provide IP-to-MAC binding
information in deployments that do not have RADIUS configured on the access devices or in which DHCP probes are not
able to collect this data. In the example topology (Figure 21), the Cisco Catalyst 6500 Series Switch may be polled to acquire
ARP information for the wireless clients or for a downstream Layer 2 switch (not displayed).
Interface Query
Interface queries are triggered by either a RADIUS Accounting Start packet (requires RADIUS probe) or an SNMP
LinkUp/MAC Notification trap (requires SNMP Trap probe).
Best Practice: To simplify the deployment and to reduce traffic overhead due to SNMP traps, when possible, use the RADIUS probe to trigger
SNMP Query based on RADIUS Accounting Start messages.
Whereas System Queries read the access device MIBs, Interface Queries request the MIBs or portions of MIBs that concern
only a particular interface for which the trap is received. These triggered queries retrieve the following data from the access
device:
LLDP data
Some of the key profiling attributes collected during the triggered Interface Query include the Cisco Discovery Protocol
(CDP) and Link Layer Discovery Protocol (LLDP) tables. CDP and LLDP are link protocols that allow the switch to
dynamically learn attributes of the connected endpoint. Many devices, including IP video equipment, network infrastructure,
and Cisco appliances, support these protocols. Most major IP phone manufactures support CDP or LLDP. Consequently,
many endpoints can be classified based on this information alone. Additionally, there are numerous CDP/LLDP agents
available on a broad range of client operating systems at minimal or no charge.
The following output shows a sample of the type of information you can collect using SNMP Query to collect CDP data for
connected endpoints.
cat3750x#show cdp neighbor detail
------------------------Device ID: APc471.fe34.197a
Entry address(es):
IP address: 10.1.14.100
Platform: cisco AIR-LAP1142N-A-K9
, Capabilities: Trans-Bridge
Interface: GigabitEthernet1/0/2, Port ID (outgoing port): GigabitEthernet0
Holdtime : 123 sec
Version :
Cisco IOS Software, C1140 Software (C1140-K9W8-M), Version 12.4(25e)JA, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Fri 27-Jan-12 21:45 by prod_rel_team
advertisement version: 2
Duplex: full
Power drawn: 15.400 Watts
Power request id: 1358, Power management id: 2
Power request levels are:15400 14500 0 0 0
HowTo-30-ISE_Profiling_Design_Guide
25
Management address(es):
------------------------Device ID: SEP003094C4528A
Entry address(es):
IP address: 10.1.13.100
Platform: Cisco IP Phone 7960, Capabilities: Host Phone Two-port Mac Relay
Interface: GigabitEthernet1/0/1, Port ID (outgoing port): Port 1
Holdtime : 162 sec
Second Port Status: Up
Version :
P00308010100
advertisement version: 2
Duplex: full
Power drawn: 6.300 Watts
Management address(es):
-------------------------
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab and check the box to enable the SNMP Query probe (Figure 22).
Figure 22 SNMP Query Probe Configuration
Note: No interface needs to be configured for the SNMP Query probe. SNMP queries will be sent to access devices based on the appliance
routing table.
Leave the default values for Retries, Timeout, and Event Timeout:
Timeout (in milliseconds) specifies the amount of time to wait for an SNMP response.
Retries specifies the number of times the Policy Service node will attempt to establish an SNMP session after
an initial failed attempt.
EventTimeout (in seconds) specifies the time to wait after a RADIUS Accounting Start or SNMP Trap trigger
before sending a batched query to the access device.
HowTo-30-ISE_Profiling_Design_Guide
26
For triggered interface queries, verify that RADIUS probe is enabled. If RADIUS is not configured on the network
access devices, verify that the SNMP Trap probe is enabled.
Click Save to commit the change.
Repeat the steps in this procedure for all other Policy Service nodes configured with Profiling Services.
Procedure 2
Typically, all network access devices that authenticate endpoints via RADIUS will be configured in ISE, so all that must be
done is to verify the SNMP settings for each. If configuring SNMP Query probe for a network that does not have RADIUS
authentication deployed, you must add each access device and optionally select Layer 3 devices (for ARP information)
to the list of ISE network devices.
Go to AdministrationNetwork ResourcesNetwork Devices. If the device to be queried using SNMP is already
present, simply select the device from the list, or else click Add from the RHS pane.
For new devices, enter the device name and IP address information.
In the SNMP Settings box, specify the SNMP Version used by the access device and enter the SNMP RO
Community string for SNMP versions 1 and 2c, or else enter the SNMPv3 credentials and configuration as appropriate to the
access device (Figure 23).
Figure 23 Network Access Device Configuration: SNMP Query
For System (polled) Queries, set the Polling Interval and Originating Policy Services Node:
Polling Interval: In general, a longer polling interval is recommended in networks that have RADIUS or
DHCP probes deployed because the reliance on ARP information is reduced.
Originating Policy Services Node: Each PSN with the SNMP Query probe enabled will appear in the list.
Select the optimal Policy Service node to perform periodic polling of the network device. This will usually be
the PSN closest to the network device in terms of network bandwidth.
For Interface (triggered) Queries that rely on SNMP traps, be sure one or both of the Trap Query options are set.
HowTo-30-ISE_Profiling_Design_Guide
27
Note: The Originating Policy Services Node setting does not apply to Interface queries as those are always sent by the PSN that received
the trigger, such as RADIUS Accounting Start or SNMP Trap message.
Configure Wired Access Devices to Accept SNMP Queries from the ISE PSN
Go to the management console of the wired access device and verify that it is configured to support SNMP ReadOnly requests from the ISE Policy Service nodes with the SNMP Query probe enabled.
Here is an example configuration from a Cisco Catalyst switch running IOS to support SNMPv2c queries from ISE PSN
using the read-only community string ciscoro:
snmp-server community ciscoro RO
snmp-server community ciscorw RW
Procedure 4
Configure Wireless Access Devices to Accept SNMP Queries from the ISE PSN
Go to the web admin interface of the Wireless LAN Controller and verify that it is configured to support SNMP
Read-Only requests from the ISE Policy Service nodes with the SNMP Query probe enabled.
Go to ManagementSNMPCommunitiesSNMP v1 / v2c Community and configure one or more read-only
community strings used by the ISE Policy Service nodes that may query this device.
Figure 24 shows an example configuration from a WLC configured to support SNMPv2c queries from ISE PSN using the
read-only community string ciscoro:
Figure 24 SNMP Configuration for Wireless Controller Example
If SNMPv3 is deployed, be sure to configure the appropriate settings under ManagementSNMPSNMP V3 Users.
Procedure 5
To retrieve CDP and LLDP information from connected hosts, make sure the access device is configured to receive
these protocols on the switchports. Although CDP is typically enabled by default on Cisco devices, LLDP is not. Therefore,
be sure enable LLDP globally if wish to collect this information using the SNMP Query probe.
cdp run
interface <Endpoint_Interface>
cdp enable
!
lldp run
interface <Endpoint_Interface>
lldp receive
lldp transmit
HowTo-30-ISE_Profiling_Design_Guide
28
Note: The Wireless LAN Controller does not support CDP/LLDP for wireless clients.
Procedure 6
EndPointSource informs us that the last profiling update came from the SNMP Query probe.
The cdpCacheAddress provides the IP address and allows binding between the IP and MAC address.
The cdpCachePlatform attribute provides a detailed description of the connected endpointin this example, a
Cisco AIR-LAP1142N-A-K9 which is the Cisco Aironet 1142N wireless access point.
HowTo-30-ISE_Profiling_Design_Guide
29
To verify the expected attribute data, you can use the following commands from the access switch console:
switch# show cdp neighbor detail
switch# show lldp neighbor detail
DHCP Probe
HowTo-30-ISE_Profiling_Design_Guide
30
DHCP Probe
The DHCP Probe is intended for use with methods where the DHCP request is sent directly to the ISE Policy Service node,
for example, as the result of DHCP Relay functions in the network. A common DHCP Relay in Cisco networks is the ip
helper-address command applied to Layer 3 interfaces that are the gateway for local DHCP clients. Figure 26 shows an
example topology using the DHCP probe.
Figure 26 DHCP Probe Example
In the diagram, the Cisco Catalyst 3750-X has both an Employee Data VLAN 10 and a Voice VLAN 13. Under the interface
configuration for each Switched Virtual Interface (SVI) is an ip helper-address command to forward local DHCP broadcast
packets to the actual DHCP server at 10.1.100.100 (highlighted in green in Figure 26). This is the server that will respond to
DHCP requests. Under the same interfaces, another ip helper-address command is configured to point to the ISE PSN
interface enabled with the DHCP probe (highlighted in red). The ISE Policy Service node will not reply to these packets, but
the goal is simply to send a copy of the requests to ISE for parsing of DHCP attributes.
It is possible to configure multiple IP Helper targets on Cisco devices to allow multiple ISE Policy Service nodes to receive
copies of the DHCP requests.
Note: ISE DHCP probes can parse traffic from both a DHCP Relay and a DHCP Proxy. A key difference between these methods is that
DHCP Relay via ip helper-address command is capable of sending traffic to multiple destinations, thus allowing multiple real DHCP
servers and ISE Policy Services nodes to receive a copy of the DHCP requests. DHCP Proxy, on the other hand, will send the request
to only the primary DHCP server and only fall back to other configured DHCP targets if a valid response is not received. Although
possible to configure the ISE nodes as the first entry to allow fallback to the actual DHCP server, such an implementation will delay the
time required for an endpoint to acquire an IP address. This can impact the user experience, but may also result in the client timing out
as it waits for a response.
HowTo-30-ISE_Profiling_Design_Guide
31
The DHCP SPAN probe can also be used to capture DHCP traffic from local subnet broadcasts, whereas use of DHCP Probe
can capture only the DHCP traffic that is relayed by an upstream gateway. This may be necessary when the Layer 3 gateway
is also the DHCP Server for local clients. The Cisco IOS DHCP server will not relay DHCP for a segment if it is also
configured to serve DHCP for that subnet.
The sample topology illustrates the use of SPAN or network tap to copy packets from wireless clients connected to the WLC
to a dedicated interface on the Policy Service node (highlighted in blue in Figure 26). A dedicated interface is needed because
SPAN destination ports may have special properties that restrict the sending and receiving of normal traffic destined to the
PSN. Additionally, we do not want mirrored traffic to cause congestion on other critical interfaces of the PSN such as
RADIUS. Using SPAN methods, it is possible to send more data to the SPAN port than it can handle, resulting in packet
drops or delay of critical traffic.
DHCP Attributes
Both the DHCP and DHCP SPAN probes deliver the same key profiling attributes to ISE. These include some of the
following:
dhcp-class-identifier
dhcp-user-class-id
dhcp-client-identifier
dhcp-message-type
dhcp-parameter-request-list
dhcp-requested-address
host-name
domain-name
client-fqdn
Since DHCP provides both a MAC address (dhcp-client-identifier) and an IP address (dhcp-requested-address), it is also
capable of establishing IP-to-MAC address bindings for the ISE ARP cache table. This is useful in supporting other probes
that rely on IP address rather than MAC address. To apply and save the attributes they provide about a specific endpoint into
the ISE database, the IP address needs to be correlated to a specific endpoint based on its MAC address.
In addition to dhcp-client-identifier and dhcp-requested-address, other key attributes include dhcp-class-identifier, dhcpuser-class-id, and dhcp-parameters-request-list. The class identifier is often used to convey platform or OS information.
Class identifier as well as User Class ID may be customized on some client operating systems like Mac OS and Microsoft
Windows, respectively, to be used as unique corporate identifiers for profiling or to return unique scope values by the DHCP
server.
The dhcp-parameters-request-list offers a potentially unique indicator of the device type since the values and sequence of
parameters requested are often unique to a single or limited set of device types. For example, a dhcp-parameters-requestlist value of 1, 3, 6, 15, 119, 252 represents an Apple iOS device such as an iPad, iPod, or iPhone.
If a standard hostname, domain name, or Fully Qualified Domain Name (FQDN) naming convention is deployed to specific
endpoints, these attributes can be used to classify them. For example, if all Windows XP clients are assigned a name such as
jsmith-winxp, the host-name attribute or client-fqdn attribute can be used in a condition to classify Windows XP endpoints.
Similarly, if there is a convention to populate the host-name for corporate endpoints to something like jsmith-corp-dept,
then this attribute can be used to validate a corporate asset.
Caution must be taken to not confuse profile attributes as identity, but attributes can add a certain level of credence that the
endpoint is a certain type. For example, the Authorization Policy can be used with profiling to deny full access privileges to
employees where the host-name attribute of their PC (as indicated by matching Endpoint Identity group) does not include
expected values.
In general, DHCP offers many profiling benefits and will often be a cornerstone for classifying a large percentage of
endpoints in any environment as most endpoints provide a DHCP fingerprint with detailed platform information.
HowTo-30-ISE_Profiling_Design_Guide
32
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab.
To add support for the DHCP probe (for use with IP Helper, for example), check the box labeled DHCP as
shown in the upper left corner of Figure 27.
To add support for the DHCP SPAN probe (for use with SPAN or other port mirroring solution), check the box
labeled DHCPSPAN (Figure 28).
For use with IP Helper (DHCP Relay), the interface used is often the default interface used for Session Services.
However, in larger environments where higher volumes of DHCP traffic are expected, you may want to use a
dedicated interfacefor example, GigabitEthernet 1, 2, or 3.
For use with mirrored traffic (SPAN/RSPAN/taps), this should be a dedicated interface.
HowTo-30-ISE_Profiling_Design_Guide
33
Repeat the steps in this procedure for all other Policy Service nodes configured with Profiling Services.
Note: Because of the requirements for traffic mirroring, it may not be possible or feasible to configure multiple Policy Service nodes to
receive SPAN. If mirroring the same traffic flows, it may not be desirable to forward the same traffic to multiple Policy Service nodes.
Although adding some redundancy, doing so can greatly increase the load on the ISE nodes and result in unnecessary duplication of
profiling data which must be correlated and synced across other nodes.
Procedure 2
There are no specific steps required to complete this procedure. Although access devices supporting RADIUS or SNMP may
already be added to the list of ISE Network Devices (under AdministrationNetwork ResourcesNetwork Devices), it is
not required that a network device be added to ISE solely for the purpose of forwarding of DHCP to the DHCP probe or
DHCP SPAN probe.
Procedure 3
Configure ISE Policy Service Node Interface to Receive DHCP Relay Packets
(DHCP Probe Only)
If the DHCP Probe is enabled on the default GigabitEthernet 0 interface, this procedure is complete. If another interface is to
be used to receive DHCP Relay traffic, complete the following steps.
Physically connect the desired interface to a network switchport.
Access the ISE PSN console (CLI). Enable the appropriate interface and assign a valid IP address as shown in Figure
29.
Figure 29 DHCP Relay Configuration for Access Switch Example
HowTo-30-ISE_Profiling_Design_Guide
34
Verify connectivity to the new ISE probe interface by sending an ICMP ping from a network device that needs to
relay DHCP.
Save changes using the CLI command copy running-config startup-config.
Procedure 4
Physically connect the desired interface to the appropriate SPAN destination port or network tap interface.
Access the ISE PSN console (CLI). Enable the appropriate interface by simply entering no shutdown while in
configuration mode for the desired interface.
Save changes using the ISE CLI command copy running-config startup-config.
Note: For Policy Service Nodes Running on VMware Appliance
To use a dedicated interface for profiling, it is assumed that additional virtual interfaces were configured for the virtual appliance. If not
completed at the time of install, it will be necessary to shut down the ISE node and update the hardware and networking configuration of the
ESX appliance for the required interface(s) before continuing with the ISE configuration.
Additionally, to accept SPAN/mirror traffic on the ISE DHCP SPAN interface, the VMware appliance requires promiscuous mode to be set on
the virtual switch interface. To enable this mode, go to VMware HostConfigurationHardwareNetworkingvSwitchSecurity and set
Promiscuous Mode: Accept (Default = Reject), as follows:
HowTo-30-ISE_Profiling_Design_Guide
35
Procedure 5
Configure Wired Access Devices to Relay DHCP Packets to the ISE PSN
(DHCP Probe Only)
Go to the management console of the Cisco Catalyst switch or router. Under each routed interface that connects to an
endpoint subnet where DHCP traffic originates, add the following commands:
interface <Endpoint_VLAN>
ip helper-address <ISE_PSN_address>
The address specified should be to the PSN interface with the DHCP Probe enabled. For redundancy, you can add more IP
Helper statements to relay DHCP to other Policy Service nodes, but the recommendation is to keep this at a minimum to
reduce traffic duplication because each PSN will process the traffic received.
Procedure 6
Configure Wireless Access Devices to Relay DHCP Packets to the ISE PSN
(DHCP Probe Only)
It is recommended that you configure WLCs in DHCP Bridging mode rather than DHCP Proxy mode so that all DHCP
packets are forwarded from the wireless clients to the ISE PSN.
Go to the web administrative interface of the Cisco Wireless LAN Controller or Wireless Services Module. Navigate
to ControllerAdvancedDHCPDHCP Parameters.
If the checkbox labeled Enable DHCP Proxy is selected, deselect uncheck it (Figure 31).
Figure 31 DHCP Relay Configuration for Wireless Controller Example
HowTo-30-ISE_Profiling_Design_Guide
36
For each WLAN configured on the WLC using DHCP, be sure the upstream gateway is configured to relay DHCP to
the ISE Policy Service node as described in the previous procedure.
Procedure 7
Configure Network Devices to Send Copies of DHCP Traffic to the PSN (DHCP SPAN
Probe only)
There are multiple ways to mirror traffic to the ISE Policy Service node. This procedure will show one common way using
basic SPAN on a Cisco Catalyst switch.
Determine the interface(s) or VLAN(s) that will be the source of DHCP traffic. Certain chokepoints such as the
egress interface of a WLC or connection to DHCP server(s) can make ideal places to capture all client DHCP packets.
In the following example, interface GigabitEthernet 1/1 is a trunk connection to a Cisco 5500 Series Wireless LAN
Controller. Interface GigabitEthernet 2/37 is a switchport connection to a Cisco UCS server running VMware ESXi 4.1.
The ESX server hosts an ISE virtual appliance configured as a Policy Services node with Profiling enabled. Interface
GigabitEthernet 2/37 is link to a virtual interface linked to the ISE PSN as Gigabit Ethernet 3.
interface GigabitEthernet1/1
description WLC5508 ETH0 (Port 1)
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 40-44
switchport mode trunk
interface GigabitEthernet2/37
description UCS1 SPAN (port 3 of 4)
switchport
Configure SPAN to capture all inbound and outbound traffic on the 5500 Series switch connection and forward to the
ISE PSN connection. To do this, interface GigabitEthernet 1/1 is set as the SPAN source and interface GigabitEthernet 2/37
is the destination. Since ISE does not need to see tagged packets, 802.1Q trunking is not enabled on the switchport.
cat6500(config)# monitor session 1 source interface gigabitEthernet 1/1 both
cat6500(config)# monitor session 1 destination interface gigabitEthernet 2/37
Procedure 8
37
EndPointSource
OUI
HowTo-30-ISE_Profiling_Design_Guide
38
dhcp-class-identifier
dhcp-client-identifier
dhcp-parameter-request-list
dhcp-requested-address
The EndPointSource shows that the DHCP probe was the source of last attribute update.
The dhcp-client-identifier typically provides the MAC address, which in turn provides the vendor OUI information through
correlation from the MAC Address-OUI mapping table.
The dhcp-requested-address is the IP address requested by the endpoint. Along with the dhcp-client-identifier, this
provides the binding between the IP and MAC address.
The dhcp-class-identifier often provides a unique platform-specific attribute and in some cases provides a detailed
description of the connected endpoint in this example, Cisco Systems, Inc. IP Phone CP-7960.
The dhcp-parameter-request-list also indicates that the endpoint is a Cisco IP phone since the exact sequence 1, 66, 6, 3,
15, 150, 35, 151 is typically used only by certain Cisco IP phones.
In summary, one or more attributes can classify network endpoints using DHCP. As explained later in the Device Sensor
section of this guide, Cisco offers the capability to collect DHCP and other information using a local classification
technology referred to as Device Sensor. This feature makes it possible to collect DHCP attributes even when it is not
possible through IP Helper or SPAN techniques. This solution offers a much more scalable approach to endpoint attribute
collection and classification.
URL Redirection
The HTTP probe listens to communication from web browsers on both port 80 and port 8080. Both the URL Redirection and
SPAN methods provide the User-Agent attribute to the HTTP probe.
HowTo-30-ISE_Profiling_Design_Guide
39
URL redirection can be a function of the network access device (NAD). An example of a NAD-initiated redirect is Local
WebAuth whereby the wired switch or wireless controller redirects a clients browser to the ISE Guest portal to provide a
web authentication page.
URL redirection can also be initiated as a RADIUS authorization from ISE to the network access device. An example of a
URL redirect triggered by a RADIUS authorization is Central WebAuth whereby the access device helps facilitate the
redirection, but the actual session is established between the client and the ISE Policy Service node and is tracked via a
unique session ID.
The sample topology in Figure 33 illustrates the use of SPAN or a network tap to copy packets from wireless clients
connected to the WLC to a dedicated interface on the Policy Service node (highlighted in blue). A dedicated interface is
needed because SPAN destination ports may have special properties that restrict the sending and receiving of normal traffic
destined to the PSN. Additionally, we do not want mirrored traffic to cause congestion on other critical interfaces of the PSN
such as RADIUS. Using SPAN methods, it is possible to send more data to the SPAN port than it can handle, resulting in
packet drops or delay of critical traffic.
40
learned User-Agent attribute. Consequently, it is required to learn the IP-to-MAC address binding via another probe prior to
collecting HTTP data. Probes that can be used to provide this information include the following:
There are special HTTP profiling scenarios that offer exceptions to the IP-to-MAC binding requirement. These include:
HowTo-30-ISE_Profiling_Design_Guide
41
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab. To add support for the HTTP probe, select the box labeled HTTP (Figure 34).
Figure 34: HTTP Probe Configuration
For use with URL redirection, the interface used should be GigabitEthernet 0, the same interface used for
Session Services such as RADIUS, Web Authentication, Posture, and so on.
For use with mirrored traffic (SPAN/RSPAN/taps), this should be a dedicated interface (Figure 35).
HowTo-30-ISE_Profiling_Design_Guide
42
Procedure 2
There are no specific steps required to complete this procedure. When URL redirection is the method used to capture HTTP
data, the network access device must already be configured to support RADIUS-based authentication, so no additional steps
are required to add or edit the network access device.
When SPAN is the method used to capture HTTP data, there is no specific requirement to add the access device to ISE if it is
not performing RADIUS-based authentication.
Procedure 3
Configure ISE Policy Service Node Interface to Receive Redirected HTTP Traffic
There are no specific steps required to complete this procedure. When URL redirection is used, the HTTP probe should be
enabled on the default GigabitEthernet 0 interface. Therefore, no additional interface configuration is required.
Procedure 4
Configure ISE Policy Service Node Interface to Receive HTTP SPAN Traffic
When SPAN is used, the HTTP probe should be configured on a dedicated SPAN interface to receive HTTP traffic. To
configure a dedicated SPAN interface on ISE, complete the following steps:
Physically connect the desired interface to the appropriate SPAN destination port or network tap interface.
Access the ISE PSN console (CLI). Enable the appropriate interface by simply entering no shutdown while in
configuration mode for the desired interface.
Save changes using the ISE CLI command copy running-config startup-config
Note: For Policy Service Nodes Running on VMware Appliance
To use a dedicated interface for profiling, it is assumed that additional virtual interfaces were configured for the virtual appliance. If not
completed at the time of install, it will be necessary to shut down the ISE node and update the hardware and networking configuration of the
ESX appliance for the required interface(s) before continuing with the ISE configuration.
Additionally, to accept SPAN/mirror traffic on the ISE DHCP SPAN interface, the VMware appliance requires promiscuous mode to be set on
the virtual switch or interface. To enable this mode, go to VMware HostConfigurationHardwareNetworkingvSwitchSecurity and set
Promiscuous Mode: Accept (Default = Reject), as follows:
HowTo-30-ISE_Profiling_Design_Guide
43
Procedure 5
Configure Wired Access Devices to Redirect HTTP Packets to the ISE PSN
Access device configuration to support URL redirection for specific services including CWA, Posture, or Supplicant
Provisioning is beyond the scope of this guide. In summary, essential commands to support redirection based on RADIUS
authorization using a Cisco Catalyst switch will be similar to the following:
Under global configuration mode, enable HTTP and optionally HTTPS servers.
Configure the redirect ACL that is referenced in the ISE RADIUS authorization to specify traffic eligible for
redirection.
ip http server
ip http secure-server
ip access-list extended REDIRECT-ACL
deny tcp any any <PSN_IP_address>
permit tcp any any eq http
permit tcp any any eq https
For traffic initiated by the client, Catalyst switches can support redirection of both HTTP and HTTPS traffic. The traffic
redirected to ISE is always HTTPS.
Procedure 6
Configure Wireless Access Devices to Redirect HTTP Packets to the ISE PSN
Access device configuration to support URL redirection for specific services, including CWA, Posture, or Supplicant
Provisioning, is beyond the scope of this guide. In summary, essential steps to support redirection based on RADIUS
authorization using a Wireless LAN Controller will be similar to the following example:
Under SecurityAAARADIUSAuthentication(RADIUS Server)Edit, verify that Support for RFC 3576 is
set to Enabled (Figure 36).
Figure 36 CoA Configuration for Wireless Controller Example
Under WLANsEdit (WLAN)SecurityLayer 2, configure the WLAN for MAC Filtering. Layer 2 and Layer 3
Security should be set to None (Figure 37).
HowTo-30-ISE_Profiling_Design_Guide
44
HowTo-30-ISE_Profiling_Design_Guide
45
Under the Advanced tab, select Allow AAA Override and set the NAC State to RADIUS NAC (Figure 38).
Figure 38 RADIUS Authorization Configuration for Wireless Controller Example
For traffic initiated by the client, Cisco Wireless LAN Controllers support redirection of HTTP traffic only. Redirection of
HTTPS traffic is not supported. The traffic redirected to ISE is always HTTPS.
Procedure 7
ISE configuration to support URL redirection for specific services, including CWA, Posture, or Supplicant Provisioning, is
beyond the scope of this guide. In summary, essential steps to support redirection based on RADIUS authorization in the ISE
Authorization Policy will be similar to the following example:
From the ISE administration interface, go to PolicyPolicy ElementsResults.
Select AuthorizationAuthorization Profiles from the LHS pane, and then click Add from the RHS pane to add a
new Authorization Profile named Posture_Remediation, as shown in Figure 39.
HowTo-30-ISE_Profiling_Design_Guide
46
In the example shown in Figure 39, the Common Task labeled Web Authentication is select with the specific redirect selected
as Posture Discovery. This will result in the endpoint being redirect to Client Provisioning and Posture services, or CPP. The
redirect ACL is ACL-POSTURE-REDIRECT and must be preconfigured on the access device. The resulting RADIUS
authorizations are highlighted in blue.
Go to PolicyAuthorization and add an Authorization Policy rule named Employee_PreCompliant that uses the
new Authorization Profile for employees where the device type used is neither a workstation nor Apple iPad (see Figure 40).
Figure 40 Authorization Policy Rule for URL Redirection Example
In Figure 40 example, the rule labeled Employee_PreCompliant is deliberately placed after the previous rules to ensure that
it is only matched in the event that the employee connects to network and the device type does not match one of the explicit
Endpoint Identity Groups equal to Workstation or Apple-iPad. When the authenticated employee matches the
Employee_PreCompliant rule, they are assigned the Authorization Profile named Posture_Redirection. This will return an
RADIUS authorization to the access device to perform URL redirection to the Client Provisioning and Posture service.
Procedure 8
Configure Network Devices to Send Copies of HTTP Traffic to the ISE PSN
There are multiple methods to mirror traffic to the ISE Policy Service node. This procedure shows one common way using
VACL Capture on a Cisco Catalyst switch. This method has the added benefit of being able to forward only select traffic of
HowTo-30-ISE_Profiling_Design_Guide
47
Determine the interface(s) or VLAN(s) that will be the source of DHCP traffic. Certain chokepoints such as the
egress interface of a WLC or connection to DHCP Server(s) can make ideal places to capture all client DHCP packets.
In the following example, VLANs 40-44 are trunked to the Cisco 5500 Series Wireless LAN Controller. GigabitEthernet
2/37 is a switchport connection to a Cisco UCS server running VMware ESXi 4.1. The ESX server hosts an ISE virtual
appliance configured as a Policy Services node with profiling enabled. Interface GigabitEthernet 2/37 is link to a virtual
interface linked to the ISE PSN as Gigabit Ethernet 3.
interface GigabitEthernet1/1
description WLC5508 ETH0 (Port 1)
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 40-44
switchport mode trunk
interface GigabitEthernet2/37
description UCS1 SPAN (port 3 of 4)
switchport
Configure VACL Capture to match all HTTP traffic on VLANs 40-44 and forward to the ISE PSN connection.
a.
Configure an ACL to match only HTTP traffic and another to match all IP traffic, as follows:
b.
Configure a VLAN access map with a sequence that sets the capture bit on traffic that matches the
HTTP_TRAFFIC ACL. Configure another sequence in the same VLAN access map that forward all other
traffic (matches the ALL_TRAFFIC ACL).
c.
Configure a VLAN filter that applies the VLAN access map to VLANs 40, 41, 42, and 43, as follows:
d.
vlan-list 40-43
Configure the capture port (Gi2/37) to include all matching traffic on VLANs 40, 41, 42, and 43, including
traffic routed to upstream VLAN 100, as follows:
HowTo-30-ISE_Profiling_Design_Guide
48
Procedure 9
EndPointSource
MACAddress
OUI
User-Agent
The example shown is taken using only the HTTP probe to highlight the attributes collected using URL redirection. This
particular scenario allows the endpoint to be added to the Internal Endpoints database even without an IP-to-MAC address
binding.
As you can see in Figure 41, the EndPointSource shows that the HTTP probe is the latest source for attribute updates.
MACAddress is the value obtained from the session cache. OUI is derived from the MACAddress value.
User-Agent is the critical data point that reveals that this VMware-based client is running the Windows 7 operating system.
HowTo-30-ISE_Profiling_Design_Guide
49
Procedure 10
The key attributes highlighted are similar to those in previous example with the exception of the EndPointSource, which is
set to CP (Client Provisioning).
Procedure 11
50
Find and select the MAC address of the newly connected endpoint to display the attributes captured by the HTTP
probe.
Figure 43 shows only the HTTP probe enabled to highlight the attributes collected using SPAN.
Figure 43 HTTP Probe Attributes with SPAN Example
The key attributes include the same in previous examples as well as some new attributes:
Host
After the initial CWA process is completed, the output was similar to that using URL redirection. These additional attributes
represent the capture of additional HTTP header information collected by normal client browsing activity. As these attributes
change, ISE will be constantly updated. It is apparent that these numerous updates for attributes that may not be used can
result in a much higher impact to the database update and synchronization process. This highlights again how capture of the
User-Agent using the HTTP probe with URL redirection can be much more efficient than SPAN methods.
In summary, endpoints can be classified based on their operating system as determined by the User-Agent attribute. This
attribute can be collected by the HTTP probe and in special cases by Client Provisioning services. Two general methods to
collect HTTP traffic include URL redirection and SPAN techniques. In general, URL redirection is much more efficient,
although SPAN may be the only option if profiling is required in an environment without RADIUS authentication enabled.
HowTo-30-ISE_Profiling_Design_Guide
51
In addition to having a known IP address, the use of reverse DNS lookups has a number of other requirements to function:
1) In DNS, each endpoint requires an Address or A record (hostname) and a pointer or PTR record (IP address).
2) Assuming endpoints use DHCP, Dynamic DNS (DDNS) must be configured on the DHCP servers.
3) Depending on the DHCP server configuration, endpoints may require configuration to request dynamic updates.
4) ISE Policy Service nodes must be configured to resolve addresses from DNS servers that are dynamically updated.
Assuming DDNS is configured and working properly, the DNS probe can retrieve the FQDN. Otherwise, there will be no
attribute added if the reverse lookup fails.
If a standard hostname, domain name, or FQDN naming convention is deployed to specific endpoints, these attributes can be
used to classify them. For example, if all Windows XP clients are assigned a name such as jsmith-winxp, the host-name
attribute or client-fqdn attribute can be used in a condition to classify Windows CP endpoints. Similarly, if the convention is
to populate hostname for corporate endpoints to something like jsmith-corp-dept, that can be used to validate a corporate
asset.
Caution must be taken to not confuse profile attributes as identity, but attributes can add a certain level of credence that the
endpoint is a certain type. For example, the Authorization Policy can be used with profiling to deny full access privileges to
employees where the host-name attribute of their PC (as indicated by matching Endpoint Identity group) does not include
expected values. Note: This guide will discuss the relationship between profiles and Endpoint Identity groups in a later
section.
As this discussion suggests, it may be possible to collect the FQDN or its components using other probes. Therefore, the use
of the DNS probe may not be necessary if the same information, or portions of the FQDN, is already available by other
means. However, DDNS can be configured to be more secure, thus making the information retrieved via a DHCP client
packet less reliable than a reverse lookup to a trusted DNS server.
Figure 44 shows a sample topology using the DNS probe. As the figure shows, the ISE Policy Service node learns the IP
address for an endpoint using one of multiple methods. The PSN then initiates a reverse lookup for the IP address. If response
received, ISE Profiling services update the endpoint record with the FQDN attribute.
HowTo-30-ISE_Profiling_Design_Guide
52
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab.
a.
To add support for the DNS probe, select the box labeled DNS (Figure 45).
There is no interface selection with the DNS probe as all probe queries are initiated by the ISE Policy Service node
using the global routing table for reverse lookups to the locally configured DNS server(s).
b.
Leave the default value for Timeout. This value specifies the number of seconds the PSN waits for a reverse
lookup response.
Note: Configure Probes to Obtain the Endpoint IP Address In order for the DNS probe to perform a reverse DNS lookup for the FQDN, it must
first learn the IP address of the endpoint from the SNMP Query, DHCP, DHCP SPAN, HTTP, or RADIUS probe. Refer to the
appropriate section in this guide for details on the configuration of these probes.
HowTo-30-ISE_Profiling_Design_Guide
53
Procedure 3
When the ISE appliance is initially installed, a required configuration step is to configure one or more domain name servers.
If required, update the list of DNS servers used by the ISE Policy Service nodes running Profiling Services using the
ISE CLI command ip name-server in global configuration mode, as shown In Figure 46.
Figure 46 ISE Policy Service Node DNS Server Configuration Example
HowTo-30-ISE_Profiling_Design_Guide
54
FQDN = win7-pc.cts.local
HowTo-30-ISE_Profiling_Design_Guide
55
ip = 10.1.10.100
ADDomain = cts.local
client-fqdn = 00:00:00:77:69:6e:37:2d:70:63:2e:63:74:73:2e:6c:6f:63:61:6c
host-name = win7-pc
ADDomain value is the domain name learned from RADIUS attributes using the RADIUS probe.
The client-fqdn attribute is the fully qualified domain name of the endpoint learned from the DHCP probe and is expressed
in HEX format (Figure 48).
Figure 48 Hex to ASCII Conversion Example
The host-name attribute is the simple hostname of the endpoint learned from the DHCP probe.
This example illustrates that different probe attributes may supply similar information. Ultimately, the policy administrator
must choose which attributes are the most useful to profiling endpoints and which probes are can best acquire this
information. A comparison of probe and profiling methods will be discussed later in this guide.
Source IP address
Destination IP address
ToS byte
The ISE NetFlow probe is cable of receiving flow records from NetFlow Version 5 and Version 9-enabled devices to allow
parsing of critical information for profiling purposes.
HowTo-30-ISE_Profiling_Design_Guide
56
The sample topology in Figure 49 shows two different endpoints that have established traffic flows through a NetFlowcapable switch (Cisco Catalyst 6500 Series). The 6500 Series is configured to export the flows to the ISE Policy Services
node on a dedicated interface with IP address 10.1.200.5 on UDP/9996. This interface is separate from the one that
terminates user session services like RADIUS and Web Authentication.
Figure 49: NetFlow Probe Example
As you can see from the topology NetFlow must be enabled on routers or switches that are in the path of interesting traffic.
For example, if traffic flows between segments within a remote branch must be collected, NetFlow deployed at a hub or
central location will not offer the required visibility. Additionally, in order to collect specific traffic flows, that traffic must
first be allowed on the network. Therefore, if network access is dependent on a profile that relies on NetFlow data, you need
to determine how to best limit access while still allowing traffic required to complete profiling.
NetFlow Attributes
Table 4 shows some of the attributes collected by the NetFlow probe.
Table 4 NetFlow Probe Attributes
IN_BYTES
PROTOCOL
L4_SRC_PORT
L4_DST_PORT
IPV4_NEXT_HOP
OUT_BYTES
IPV6_DST_ADDR
IPV6_FLOW_LABEL
IN_SRC_MAC
DST_VLAN
IN_PKTS
SRC_TOS
IPV4_SRC_ADDR
IPV4_DST_ADDR
LAST_SWITCHED
OUT_PKTS
IPV6_SRC_MASK
ICMP_TYPE
OUT_DST_MAC
IP_PROTOCOL_VERSION
FLOWS
TCP_FLAGS
SRC_MASK
DST_MASK
FIRST_SWITCHED
IPV6_SRC_ADDR
IPV6_DST_MASK
DST_TOS
SRC_VLAN
DIRECTION
In ISE Profiling Services, NetFlow is typically used to identify endpoints based on the traffic they generate. Conversely, it
can provide an indicator of anomalous behavior when specific endpoints appear to generate traffic that is not characteristic of
that endpoint. For example, if an endpoint initially profiled as an IP phone began to suddenly start communicating to remote
destinations on port 443 as reflected by NetFlow attributes, this would represent an anomalous condition and potential
spoofing exploit. However, please note that the use of NetFlow with ISE Profiling Services is not to be positioned as an antispoofing feature or solution.
Focusing on the positive classification of endpoints, NetFlow is most useful in scenarios where general-purpose hardware
may be used for mission-specific functions whereby the only information that uniquely classifies them is traffic-related.
Examples of these types of devices include those used in manufacturing or healthcare industries. For example, a heart
monitor in a hospital may use an embedded Windows OS or hardened Linux kernel using standard hardware technology, but
HowTo-30-ISE_Profiling_Design_Guide
57
can run applications that communicate on very specific protocols, ports, and destinations. For these types of endpoints,
NetFlow may be the only feasible option.
In general, it is not recommended to randomly enable NetFlow and/or use the NetFlow probe as an all-purpose profiling
method. If not deployed with caution, NetFlow can have a negative impact on device resources depending on the platforms
used, as well as on the NetFlow configuration and traffic volumes. NetFlow can also generate a high load on the ISE Policy
Service nodes if large volumes of traffic are continuously sent from one or more sources. Unlike other ISE probes, the
NetFlow probe does not support attribute filters to optimize data collection and database efficiency.
Where available on network devices, NetFlow Version 9 is recommended over Version 5 for NetFlow export to the ISE
Policy Service node. Version 9 supports Flexible NetFlow and numerous enhancements for filtering flow data collected and
exported to the NetFlow probe. Although sampled NetFlow can reduce overall traffic volume, sampling may not satisfy all
profiling requirements because some scenarios may require that all flows be seen by the NetFlow probe.
It should be noted that NetFlow Version 9 does support the option to include source and destination MAC addresses within
the flow record, whereas version 5 does not. However, these reported MAC addresses are that of the adjacent nodes in the
path, typically Layer 3 routers and switches, not the MAC address of endpoints more than one hop away. Unless the end
systems are directly connected to the NetFlow device, this functionality offers little value.
Best Practice: Use of NetFlow for profiling can result in a potentially high volume of data being sent to ISE for parsing. Restrict the use of
NetFlow to scenarios where other probes are insufficient. If required, NetFlow Version 9 is advocated to take advantage of filtering
enhancements as found in Flexible NetFlow. Although ISE will not prevent the use of the default interface, it is highly recommended that
NetFlow be exported to an ISE PSN interface dedicated to the NetFlow probe.
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab and select the box to enable the NetFlow probe (Figure 50).
Select the interface to be used for collecting NetFlow traffic. This should be a dedicated interface with a routable IP
address (Figure 50)
HowTo-30-ISE_Profiling_Design_Guide
58
Select the UDP port to listen for exported NetFlow. This value should be the same as that configured on the NetFlow
export device. The default port is UDP/9996.
Click Save to commit the changes.
Repeat the steps in this procedure for all other Policy Service nodes configured with Profiling Services.
Note: Many NetFlow-capable routers and switches support only a single target for NetFlow export. Therefore, consideration must be taken
into account regarding high availability. It is also recommended that all profile data for a given endpoint be received by the same Policy
Service node. This may not always be possible due to network configuration and other limitations.
Procedure 2
Access devices may also be capable of NetFlow but there is no specific requirement that other network devices capable of
sending NetFlow to the NetFlow probe be configured as a network device in ISE.
Procedure 3
The NetFlow probe should be configured on a dedicated interface to receive NetFlow traffic. To configure a dedicated
NetFlow interface on ISE, complete the following steps:
Physically connect the desired interface to a network switchport.
Access the ISE PSN console (CLI). Enable the appropriate interface and assign a valid IP address as shown in Figure
51.
Figure 51 ISE Probe Dedicated Interface Configuration Example
HowTo-30-ISE_Profiling_Design_Guide
59
Verify connectivity to the new probe interface by sending an ICMP ping from a network device that needs to export
NetFlow data.
Save changes using the CLI command copy running-config startup-config.
Physically connect the desired interface to the appropriate SPAN destination port or network tap interface.
Note: For Policy Service Nodes Running on VMware Appliance
To use a dedicated interface for profiling, it is assumed that additional virtual interfaces were configured for the virtual appliance. If not
completed at the time of install, it will be necessary to shut down the ISE node and update the hardware and networking configuration
of the ESX appliance for the required interface(s) before continuing with the ISE configuration
Procedure 4
NetFlow configuration is specific to the NetFlow-capable device. This procedure includes an example configuration for a
Catalyst 6500 Series switch.
Under global configuration mode, enable NetFlow, configure NetFlow Version 9 support, the interface IP address
from which to source NetFlow data, and the Policy Service node to export data. Note the specification of the ISE default port
of UDP 9996.
mls netflow interface
mls flow ip interface-full
mls nde sender
mls nde interface
ip flow-cache timeout active 1
ip flow-export source Vlan100
ip flow-export version 9
HowTo-30-ISE_Profiling_Design_Guide
60
Note: In the preceding example, the Catalyst 6500 Series Switch has a Supervisor 720 where the Policy Feature Card (PFC) performs
hardware-based NetFlow and flows punted to Multilayer Switch Feature Card (MSFC) are performed in software. The PFC must be
configured to perform NetFlow Data Export (NDE) using the mls nde sender command.
flow-capture
flow-capture
flow-capture
flow-capture
ttl
vlan-id
ip-id
mac-addresses
IP Helper commands are also shown to highlight the configuration to support the DHCP probe, which is used to obtain IP-toMAC address binding information. This allows the NetFlow probe to apply attributes based on the matching IP attribute.
Figure 53 illustrates the interfaces where NetFlow is applied as well as the destination for NetFlow Data Export (NDE). The
goal is to capture traffic from wired endpoints connecting through the Cisco Catalyst 3750-X Series Switch as well wireless
endpoints connecting through the Cisco 5500 Series Wireless LAN Controller.
HowTo-30-ISE_Profiling_Design_Guide
61
Procedure 5
HowTo-30-ISE_Profiling_Design_Guide
62
HowTo-30-ISE_Profiling_Design_Guide
63
L4_DST_PORT = 80 (HTTP)
L4_SRC_PORT = 53149
PROTOCOL = 6 (TCP)
If flow capture statements are used, you may see the following additional attributes:
DST_VLAN/SRC_VLAN
IN_SRC_MAC/OUT_DST_MAC
MAX_TTL/MIN_TTL
To verify that NetFlow data is being collected, you can use the show ip cache flow and the show mls netflow ip
commands. The following example uses the show ip cache flow command:
cat6503#show ip cache flow
------------------------------------------------------------------------------Displaying software-switched flow entries on the MSFC in Module 1:
IP packet size distribution (348128 total packets):
1-32
64
96 128 160 192 224 256 288 320 352 384 416 448 480
.548 .342 .077 .005 .000 .000 .000 .000 .000 .000 .015 .000 .000 .000 .000
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.000 .000 .007 .000 .000 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 278544 bytes
2 active, 4094 inactive, 15760 added
251284 ager polls, 0 flow alloc failures
Active flows timeout in 1 minutes
Inactive flows timeout in 15 seconds
IP Sub Flow Cache, 33992 bytes
6 active, 1018 inactive, 47280 added, 15760 added to flow
0 alloc failures, 2775 force free
1 chunk, 24 chunks added
last clearing of statistics never
Protocol
Total
Flows
Packets Bytes Packets Active(Sec) Idle(Sec)
-------Flows
/Sec
/Flow /Pkt
/Sec
/Flow
/Flow
TCP-Telnet
44
0.0
91
42
0.0
14.4
7.8
TCP-WWW
1361
0.0
22
45
0.0
0.0
14.2
TCP-other
1602
0.0
25
51
0.0
0.1
13.6
UDP-DNS
128
0.0
1
70
0.0
0.0
15.4
UDP-NTP
1375
0.0
1
76
0.0
0.0
15.5
UDP-other
2880
0.0
3
338
0.0
3.8
15.4
ICMP
6985
0.0
34
30
0.0
0.4
13.4
IP-other
1383
0.0
13
65
0.0
58.3
2.0
Total:
15758
0.0
22
46
0.0
6.0
13.0
SrcIf
Gi2/47
Gi2/47
SrcIPaddress
10.1.50.2
10.1.13.1
DstIf
Null
Null
DstIPaddress
224.0.0.10
10.1.100.7
Pr SrcP DstP
58 0000 0000
11 0043 0043
Pkts
4
3
10.1.50.1
10.1.50.2
10.1.50.2
10.1.100.1
10.1.50.2
10.1.13.1
10.1.13.1
10.1.13.1
10.1.50.2
10.1.40.1
10.1.50.2
10.1.13.1
10.1.10.100
10.1.50.2
HowTo-30-ISE_Profiling_Design_Guide
Gi2/47
----Gi2/47
Vl100
Vl100
Vl100
Vl100
----Vl100
--Vl100
Vl100
10.1.50.2
10.1.100.1
10.1.50.1
10.1.50.2
10.1.100.5
10.1.100.100
10.1.100.5
10.1.100.6
224.0.0.10
224.0.0.10
10.1.100.4
10.1.100.7
10.1.100.100
10.1.100.5
58
11
58
11
11
11
11
11
58
58
11
11
11
11
0000
007B
0000
007B
CC9B
0043
0043
0043
0000
0000
C8D5
0043
CA72
066E
0000
007B
0000
007B
00A2
0043
0043
0043
0000
0000
5022
0043
0035
0715
Pkts
0
0
0
0
15
124
124
124
84
0
30
0
1
128
64
Vl41
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
Gi2/47
--
10.1.41.1
10.1.50.2
10.1.50.2
10.1.50.2
10.1.50.2
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
10.1.10.100
0.0.0.0
--Vl100
Vl100
--Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
Vl100
---
224.0.0.10
10.1.100.5
10.1.100.6
10.1.100.7
10.1.100.5
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
10.1.100.100
0.0.0.0
58
11
11
11
11
11
11
11
11
11
11
11
11
11
00
0000
06A4
E6D7
C748
066D
E5CC
DA8B
C114
FC03
D295
ED48
E7E8
D770
D5AB
0000
0000
7195
00A2
00A2
0714
0035
0035
0035
0035
0035
0035
0035
0035
0035
0000
0
2
15
0
6
1
1
1
1
1
1
1
1
1
31K
:AdjPtrPkts
Bytes
------------------------------------------------------------------------------------------------------------------------------10.1.50.2
10.1.100.1
udp :ntp
:ntp
Gi2/47
:0x00
0
43
20:26:48
L2 - Dynamic
10.1.44.90
10.1.14.100
udp :16792 :5246
Gi2/47
:0x03
359
35
20:27:26
L3 - Dynamic
10.1.100.100
10.1.13.1
udp :67
:67
Gi2/47
:0x04
1846
32
20:27:30
L3 - Dynamic
10.1.100.5
10.1.50.2
udp :52379 :162
Gi2/47
:0x015
2734
335
20:23:02
L3 - Dynamic
10.1.100.4
10.1.50.2
udp :51413 :20514
Gi2/47
:0x030
5286
334
20:23:58
L3 - Dynamic
10.1.100.5
10.1.50.2
udp :1646
:1813
Gi2/47
:0x04
2680
32
20:27:30
L3 - Dynamic
10.1.100.100
10.1.10.100
udp :51826 :dns
Gi2/47
:0x01
61
211
20:24:00
L3 - Dynamic
10.1.44.90
10.1.14.100
udp :16792 :5247
Gi2/47
:0x06
901
30
20:27:30
L3 - Dynamic
224.0.0.10
10.1.41.1
88 :0
:0
Vl41
:0x00
0
426
20:27:27
Multicast
10.1.100.5
10.1.50.2
udp :1700
:29077
Gi2/47
:0x02
132
335
20:23:56
L3 - Dynamic
10.1.100.6
10.1.50.2
udp :59095 :162
Gi2/47
:0x015
2734
335
20:23:02
L3 - Dynamic
10.1.100.7
10.1.50.2
udp :51016 :162
Gi2/47
:0x00
0
335
20:23:02
L3 - Dynamic
10.1.100.5
10.1.50.2
udp :1645
:1812
Gi2/47
:0x06
1365
270
20:23:56
L3 - Dynamic
10.1.100.100
10.1.10.100
udp :54699 :dns
Gi2/47
:0x01
64
211
20:24:00
L3 - Dynamic
10.1.100.1
10.1.50.2
udp :ntp
:ntp
Gi2/47
:0x00
0
43
20:26:48
L3 - Dynamic
17.172.232.209 10.1.40.101
tcp :61858 :443
Vl40
:0x02
173
17
20:27:14
L3 - Dynamic
17.172.232.209 10.1.40.101
tcp :61858 :443
Vl40
:0x00
0
17
20:27:14
L2 - Dynamic
10.1.40.101
17.172.232.209 tcp :443
:61858
Vl40
:0x00
0
17
20:27:14
L2 - Dynamic
0.0.0.0
0.0.0.0
0
:0
:0
-:0x032283
20941051
1573 20:27:31
L3 - Dynamic
To verify the NetFlow export configuration and that flows are being sent to the ISE Policy Service node, use the
show ip flow export command, as follows:
cat6503# sh ip flow export
Flow export v9 is enabled for main cache
Export source and destination details :
VRF ID : Default
Source(1)
10.1.100.1 (Vlan100)
Destination(1) 10.1.99.5 (9996)
Version 9 flow records
HowTo-30-ISE_Profiling_Design_Guide
65
The operating system (OS) scan is used to detect the OS and version of endpoint. This is an intensive operation.
The SNMP Port Scan tries to detect if UDP port 161 (SNMP daemon) and 162 (SNMP Trap) are open. If so, an SNMP query
is initiated to the endpoint using a community string of public to collect additional information about the endpoint from the
System MIB and others. This probe has proven especially useful in endpoints like network printers that have SNMP enabled
by default with the default community string public.
Note: The NMAP probe can only use the default community string public to directly query endpoints. This value is currently not
configurable.
This should not be confused with the SNMP Query probe which queries network devices, not endpoints, and has configurable SNMP
settings under the Network Device settings.
The Common Ports Scan performs a scan of 15 common TCP and UDP ports, as shown in Table 5:
Table 5 NMAP Probe Common Ports Scan: TCP and UDP Ports
TCP Ports
Port
Service
UDP Ports
Port
Service
21/tcp
ftp
53/udp
domain
22/tcp
ssh
67/udp
dhcps
23/tcp
telnet
68/udp
dhcpc
25/tcp
smtp
123/udp
ntp
53/tcp
domain
135/udp
msrpc
80/tcp
http
137/udp
netbios-ns
110/tcp
pop3
138/udp
netbios-dgm
135/tcp
msrpc
139/udp
netbios-ssn
HowTo-30-ISE_Profiling_Design_Guide
66
139/tcp
netbios-ssn
161/udp
snmp
143/tcp
imap
445/udp
microsoft-ds
443/tcp
https
500/udp
isakmp
445/tcp
microsoft-ds
520/udp
route
3306/tcp
mysql
631/udp
ipp
3389/tcp
ms-term-serv
1434/udp
ms-sql-m
8080/tcp
http-proxy
1900/udp
upnp
Administrators may choose to classify and secure endpoints differently based on services they run. For example, a Windows
server running web services may require a specific authorization policy applied (dACL, VLAN, SGT) to ensure it is
protected from non-HTTP requests. Conversely, a Windows or Linux workstation running a web server may need to be
denied access or quarantined using similar authorization methods.
The NMAP probe can be initiated using one of two methods:
Network Scan
Endpoint Scan
The sample topology in Figure 55 depicts a Network Scan being initiated across the 10.1.10/24 subnet (highlighted in red).
Figure 55 NMAP Probe Example
HowTo-30-ISE_Profiling_Design_Guide
67
The sample topology in Figure 55 depicts this process. A new endpoint is detected as a result of a recent probe event (shown
in blue). Based on the profile data collected, the endpoint is known to be an Apple device based on OUI from its MAC
address, but it is not known if the endpoint is a Mac OS X workstation, Apple iDevice, or other Apple endpoint. A policy rule
is matched that triggers a pointed OS scan against the Apple device (shown in green). As a result, it is learned that the
endpoint is running Apple iOS and its profile is updated to that of a mobile Apple device.
Endpoints that match the Unknown profile are automatically scanned using both an SNMP port and OS scan. This is not a
configurable response. It is intended to allow ISE Profiling to quickly gain more information about any endpoint that is
discovered but not profiled.
Note: Some endpoints have personal firewalls or other agent software enabled, which blocks attempts to scan the endpoint. These
endpoints will yield little or no NMAP data. Additionally, any endpoints that have restricted network access may not be able to receive
or reply to NMAP operations.
Best Practice: During the discovery phase of an ISE deployment when ISE is not yet authenticating endpoints, the Network Scan can be run
against larger network blocks to scan and detect endpoints along with any relevant OS and endpoint information. It is recommended that
the SNMP Query probe also be enabled during this phase for all network devices that store endpoint ARP table information. This will
allow discovery of endpoint MAC and IP addresses, including statically addressed endpoints. This, in turn, will support NMAP probe
collection, as the PSN should now have MAC addresses for each IP address discovered during the Network Scan.
Go to AdministrationSystemDeployment and select the Policy Service node that will perform the Network Scan
from list of deployed nodes on the RHS pane.
Select the Profiling Configuration tab.
To run a Network Scan, select the Network Scan (NMAP) option to expand its contents (Figure 56).
HowTo-30-ISE_Profiling_Design_Guide
68
Note: As shown in Figure 56, enabling the probe is not a requirement to perform a manual Network Scan.
Enter the IP subnet address and mask to scan in the format shown in the example. The example shows that a Class C
subnet (10.1.10.0) is entered along with the appropriate number of mask bits (24) for a Class C subnet.
Other subnet sizes can be selected, but consideration must be given to the scope of network and number of endpoints covered
by the selection to reduce overall time and load to execute the scan.
Click Run Scan.
To cancel an active scan, click Cancel Scan. Otherwise select Click to see latest scan results to navigate directly to
the AdministrationIdentity ManagementIdentities page. Even though you have navigated away from the page, scanning
will continue until completed.
From the Identities page select Latest Network Scan Results from the LHS pane. Depending on the progress of the
scan, endpoints with positive scan results should appear on the RHS pane (Figure 57).
Figure 57 NMAP Network Scan Results Example
Click endpoint entries by MAC address to view the results, as shown in Figure 58. (The blue hash lines in Figure 58
indicate sections that have been removed for display purposes.)
HowTo-30-ISE_Profiling_Design_Guide
69
The selected endpoint is a Windows 7 PC. As you can see from the output of the manual Network Scan, NMAP has detected
the general OS class (Windows 7 and Windows 2008 share common code bases), but insufficient information is available to
further classify the endpoint beyond the current VMware profile that is based on a match to an OUI condition. The
EndPointSource is shown as NMAP Probe. The ScanID refers to the ID assigned to the manual Network Scan event.
Note: It was necessary to disable the default Windows 7 Firewall settings to allow a successful scan from the NMAP probe.
Procedure 2
Go to AdministrationSystemDeployment and select the Policy Service node to perform profiling from list of
deployed nodes on the RHS pane.
Select the Profiling Configuration tab and select the box labeled Network Scan (NMAP) (Figure 59).
Figure 59 NMAP Probe Configuration
HowTo-30-ISE_Profiling_Design_Guide
70
Procedure 3
Go to PolicyPolicy ElementsResults and select ProfilingNetwork Scan (NMAP) Actions from the LHS pane.
Review the default NMAP Actions (Figure 60).
Figure 60 NMAP Scan Actions
Additional NMAP Actions can be defined if required, although the most common options have been configured. For
example, a new Scan Action named CommonPorts or SNMPPorts can be created to perform only a scan of Common Ports
or SNMP Ports as part of a triggered response.
Procedure 4
Go to PolicyProfiling and select the Apple-Device profile from the list on the RHS pane (Figure 61).
Figure 61 Profiling Policy with NMAP Scan Action Example
The Apple-Device profile has two conditions. Click to the right of the second condition name to review the contents
of the rule entry (Figure 62).
Figure 62 Profiling Policy Rule for NMAP Scan Example 1
HowTo-30-ISE_Profiling_Design_Guide
71
This rule is used to match endpoints to this profile by increasing its certainty factor (CF). The condition matches if the OUI
from MAC address matches Apple.
Click to the right of the first condition name to review its contents (Figure 63).
Figure 63 Profiling Policy Rule for NMAP Scan Example 2
This rule is used to trigger an endpoint scan. The first condition is the same condition as used in the second rule. Therefore,
any endpoint matching this profile based on the second condition will automatically match the first rule and trigger the
selected Network Scan Action, which is OS-scan.
Individual rule entries can be added or removed by clicking the gear icon to the right of the existing rule table.
When you finish reviewing or making changes, click Save at the bottom of the page to commit changes.
The intent of this procedure is to review how Network Scan Actions can be applied to a profile based on matching conditions.
Profiling Policy configuration will be discussed in greater detail in the section Configuring Profiling Policies.
Procedure 5
HowTo-30-ISE_Profiling_Design_Guide
72
The truncated output shows that an initial scan has been run against this endpoint (NmapScanCount), but the profile
assignment to Apple is still based on the OUI. The scan is triggered based on the matching profile conditions for AppleDevice.
After a brief period, the OS scan should complete. Exit and reselect the same endpoint to review any updated
profiling attributes (Figure 65).
The key attributes highlighted include:
EndPointPolicy
LastNmapScanTime
NmapScanCount
OUI
operating-system
HowTo-30-ISE_Profiling_Design_Guide
73
In this example, it is apparent that the NMAP scan completed. The EndPointSource attribute indicates that RADIUS made
the last updates. This is possible, as the value will constantly change as different sources supply profiling data.
The LastNmapScanTime and NmapScanCount attributes are not really critical to device classification, but are highlighted
to show attributes added by the NMAP probe.
The OUI attribute is Apple but now the profile assigned is that of Apple-iDevice instead of the more generic Apple-Device.
This is due to a match on the triggered NMAP scan result, which revealed that the endpoint OS is Apple iOS. If you review
the contents of the Apple-iDevice profile under PolicyProfiling, you can see that this profile can match on one of two
conditions based on NMAP OS scan results (Figure 66).
HowTo-30-ISE_Profiling_Design_Guide
74
This profile matches if either the NMAP scan returns an operating-system attribute value containing Apple iOS or Apple
iPhone OS. In this example, it matched on Apple iOS.
In summary, the NMAP probe can be useful in classifying endpoints based on their operating system as determined by the
Operating System scan. Many clientless devices support SNMP agents that can be queried for device classification. Other
devices can be classified based on their open ports, and policy may govern that certain devices running specific services
should be granted more or less restrictive permissions. Independent of authorization policy assignments, each probe offers an
additional level of visibility that can be invaluable to the operational and security management of the entire network.
HowTo-30-ISE_Profiling_Design_Guide
75
Device Sensor
Device Sensor Overview
Device Sensor is an access device feature that is currently supported on Cisco access switches and wireless controllers, such
as Cisco Catalyst 3650 and 3750 Series and 4500 Series Switches. Device Sensor collects network information from
connected endpoints through protocols such as Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP),
and Dynamic Host Configuration Protocol (DHCP) and forwards this information to the ISE PSN in RADIUS accounting
packets (Figure 67). ISE is able to collect and parse the profiling data using only the RADIUS probe.
Figure 67 Device Sensor Overview
The Device Sensor represents the embedded collector functionality of the access device such as a Cisco Catalyst switch or
Cisco Wireless LAN Controller. Figure 68 shows the Device Sensor in the context of the profiling system and also depicts
other possible consumers of the sensor data.
A switch or wireless controller with sensor capability gathers endpoint information from network devices using protocols
such as CDP, LLDP, and DHCP, subject to statically configured filters, and makes this information available to its registered
clients in the context of an access session. An access session represents an endpoint's connection to the network device.
The Device Sensor has internal and external clients. The internal clients include components such as the embedded Device
Classifier (DC, or local analyzer), Cisco Auto SmartPorts (ASP), MSI-Proxy, and Cisco EnergyWise (EW). Device Sensor
uses RADIUS accounting to send data to external clients such as the Identity Services Engine (ISE) Profiling analyzer.
HowTo-30-ISE_Profiling_Design_Guide
76
Client notifications and accounting messages containing profiling data along with the session events, and other sessionrelated data, such as MAC address and ingress port data, are generated and sent to the internal and external clients (ISE). By
default, for each supported peer protocol, client notifications and accounting events are only generated where an incoming
packet includes a profiling attribute, or type-length value (TLV), that has not previously been received in the context of a
given session. You can enable client notifications and accounting events for all TLV changes, where either a new TLV has
been received or a previously received TLV has been received with a different value using CLI commands.
The sensor limits the maximum device monitoring sessions to 32 per port (access ports and trunk ports). In other words, a
maximum of 32 endpoints may be monitored per port. An inactivity timer will age out sessions older than 12 hours.
CDP
LLDP
DHCP
HTTP
15.0(1)SE1
15.0(1)SE1
15.0(1)SE1
15.1(1)SG
IOS-XE 3.3.0SG
15.1(1)SG
IOS-XE 3.3.0SG
15.1(1)SG
IOS-XE 3.3.0SG
7.2.110.0
7.3
mDNS
-
15.1(1)SG
IOS-XE 3.3.0SG
-
Note: Be sure to reference the applicable Release Notes for your platform to verify software version and feature support. As an example,
there are a number of Catalyst 3560 and 3750 switches that do not meet the requirements for Cisco IOS Software Release 15.0(1)SE1
and Device Sensor functionality.
Device Sensor feature support for the Catalyst 3560-C and 3560-CG Series Switches is provided in Cisco IOS Software Release
15.0(2)SE.
HowTo-30-ISE_Profiling_Design_Guide
77
When Device Sensor is deployed on a Cisco wireless controller, DHCP profiling is enabled for all clients that join the
WLANs configured for sensing. Both DHCP Proxy and Bridged modes are supported for client DHCP requests. Limitations
in 7.2MR1 include the following:
In summary, the Device Sensor offers significant benefits in scaling data collection for ISE Profiling Services. With Device
Sensors, data collection is highly distributed across the access layer, the points closest to the endpoint and source of data.
Information is then selectively filtered at the point of origin and transmitted in RADIUS accounting packets to centralized
Policy Service nodes for analysis and classification. This alleviates many of the design challenges and infrastructure
requirements to capture this same data using traditional ISE probes.
Procedure 1
The steps for enabling the RADIUS probe have been covered in detail under the section Configuring the RADIUS Probe.
Refer to that section for proper enabling and configuration for the RADIUS probe.
One exception to the instructions provided in that section relates to use of Device Sensor in deployments that do not use
RADIUS-based authentication and authorization. In this scenario, it is not expected that the access devices have been added
to ISE, but since they need to communicate RADIUS accounting to ISE, it will be necessary to add all access devices that
support Device Sensor under AdministrationNetwork ResourcesNetwork Devices.
Be sure that the IP address entered in ISE matches the value sourced by the access device for sending RADIUS. Also be
certain that the RADIUS shared key matches the value configured on access devices. These steps are required to support
reception of RADIUS accounting packets from the Device Sensor.
Procedure 2
To collect CDP, LLDP, or DHCP attributes from the endpoint, the access switch needs to have these protocols enabled to
allow it read and gather the associated attributes.
Access the command console of an access switch with Device Sensor support.
Enable the switch to support CDP.
a.
CDP is enabled globally on Cisco switches by default. If disabled, enable it using this global command:
b.
CDP is enabled on each switchport by default. If disabled, enable using the following interface command:
HowTo-30-ISE_Profiling_Design_Guide
78
Verify CDP is working on the switch using the show cdp neighbors command as shown:
cat3750x# show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
D - Remote, C - CVTA, M - Two-port Mac Relay
Device ID
Local Intrfce
APc471.fe34.197a Gig 1/0/2
SEP003094C4528A Gig 1/0/1
cat6503.cts.local
Gig 1/0/24
Holdtme
137
150
Capability
T
H P M
140
R S I
Platform Port ID
AIR-LAP11 Gig 0
IP Phone Port 1
WS-C6503
Gig 2/47
HowTo-30-ISE_Profiling_Design_Guide
79
IP address: 10.1.50.1
LLDP is disabled globally on Cisco switches by default. To enable it enter the following global command:
b.
LLDP is enabled on each switchport by default. If disabled, enable using the following interface command:
Verify that LLDP is working on the switch using the show lldp neighbors command, as shown:
cat3750x# show lldp neighbors
Capability codes:
(R) Router, (B) Bridge, (T) Telephone, (C) DOCSIS Cable Device
(W) WLAN Access Point, (P) Repeater, (S) Station, (O) Other
Device ID
AVA4FF00E
AVAEC8C79
AVAF694AC
AVAEC8C79
80
Capabilities: NP, IN
Device type: Endpoint Class III
Network Policy(Voice): VLAN dot1p, tagged, Layer-2 priority: 6, DSCP: 46
Power requirements - not advertised
Location - not advertised
----<snip>---Total entries displayed: 4
Enable the switch to snoop DHCP. Enter the following commands in global configuration mode to enable DHCP
Snooping on select access VLANs:
cat3750x(config)# ip dhcp snooping
cat3750x(config)# ip dhcp snooping vlan <VLANs>
At a minimum, access VLANs that connect endpoints to be profiled should be included in the list.
To trust DHCP information that is sent from an interface connected directly or indirectly to a trusted DHCP server,
use the following interface configuration command:
cat3750x(config)# interface <interface_to_DHCP_Server>
cat3750x(config-if)# ip dhcp relay information trusted
Verify DHCP Snooping is enabled on the switch using the show ip dhcp snooping command, as shown:
cat3750x# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
10-14
DHCP snooping is operational on following VLANs:
10-14
Smartlog is configured on following VLANs:
none
Smartlog is operational on following VLANs:
none
DHCP snooping is configured on the following L3 Interfaces:
Insertion of option 82 is enabled
circuit-id default format: vlan-mod-port
remote-id: 1cdf.0f8f.6000 (MAC)
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Verification of giaddr field is enabled
DHCP snooping trust/rate is configured on the following Interfaces:
Interface
-----------------------
Trusted
-------
Allow option
------------
Verify DHCP Snooping is working (binding tables are created for DHCP clients) on the switch using the show ip
dhcp snooping binding command as shown:
cat3750x# show ip dhcp snooping binding
MacAddress
IpAddress
Lease(sec)
------------------ --------------- ---------00:30:94:C4:52:8A
10.1.13.100
691187
00:50:56:A0:0B:3A
10.1.10.100
653260
C4:71:FE:34:19:7A
10.1.14.100
653068
Total number of bindings: 3
Type
------------dhcp-snooping
dhcp-snooping
dhcp-snooping
VLAN
---13
10
14
Interface
--------------------GigabitEthernet1/0/1
GigabitEthernet1/0/1
GigabitEthernet1/0/2
HowTo-30-ISE_Profiling_Design_Guide
81
Procedure 3
Define filters that select CDP, LLDP, or DHCP attributes to be included or excluded from data collection.
a.
CDP TLV values can be entered by name or by number. Table 7 displays a list of CDP TLV names and
corresponding descriptions available from the Cisco Catalyst 3750-X Series Switch console interface.
Table 7 Device Sensor: CDP TLV Names and Descriptions
Define a filter for LLDP attributes starting in global configuration mode, as follows:
cat3750x(config)# device-sensor filter-list lldp list <my_lldp_list>
cat3750x(config-sensor-lldplist)# tlv name system-name
cat3750x(config-sensor-lldplist)# tlv name system-description
cat3750x(config)# device-sensor filter-spec lldp include list <my_lldp_list>
LLDP TLV values can be entered by name or number. Table 8 displays a list of LLDP TLV names and
corresponding descriptions available from the Cisco Catalyst 3750-X Series Switch console interface.
Table 8 Device Sensor: LLDP TLV Names and Descriptions
LLDP Name
chassis-id
end-of-lldpdu
management-address
port-description
port-id
system-capabilities
system-description
HowTo-30-ISE_Profiling_Design_Guide
LLDP Description
Chassis Chassis Id
End Of LLDP
Management Address
Port Description
Port Id
System Capabilities
System Description
82
system-name
time-to-live
c.
System Name
Time To Live
Define a filter for DHCP attributes starting in global configuration mode, as follows:
cat3750x(config)# device-sensor filter-list dhcp list my_dhcp_list
cat3750x(config-sensor-dhcplist)# option name host-name
cat3750x(config-sensor-dhcplist)# option name default-ip-ttl
cat3750x(config-sensor-dhcplist)# option name requested-address
cat3750x(config-sensor-dhcplist)# option name parameter-request-list
cat3750x(config-sensor-dhcplist)# option name class-identifier
cat3750x(config-sensor-dhcplist)# option name client-identifier
cat3750x(config)# device-sensor filter-spec dhcp include list my_dhcp_list
DHCP options can be entered by name or number. Table 9 displays a list of DHCP option names and
corresponding descriptions available from the Cisco Catalyst 3750-X Series Switch console interface.
Table 9 Device Sensor: DHCP Option Names and Descriptions
Best Practice: The sample filters shown for CDP, LLDP, and DHCP provide reasonable selections for most use cases. To understand which
attributes are available, use the show commands for CDP and LLDP to view which TLVs the endpoints in the network present and
determine if any specific attributes will assist in uniquely classifying the endpoint. Device Sensor can also be deployed initially without
filters to see which attributes are presented to ISE under AdministrationIdentity ManagementIdentities. Appropriate filters can be
applied based on those determined to be required to match profiling conditions of customer endpoints.
Note: Entering a specific TLV or option value does not mean that this information is being transmitted by the endpoint. Filters are applied
based on the attributes that the endpoint presents to switch or network. For example, if DHCP option client-fqdn is selected for inclusion
by the filter, but that option is not requested by DHCP client, no information on that option will be available to Device Sensor or ISE.
Enable sensor data to be sent in RADIUS accounting, including all changes, as follows:
cat3750x(config)# device-sensor accounting
cat3750x(config)# device-sensor notify all-changes
Disable local analyzer to prevent duplicate updates from being sent to ISE:
cat3750x(config)# no macro auto monitor
cat3750x(config)# access-session template monitor
The embedded Device Classifier is enabled by default on Cisco switches, which programmatically enables Device Sensor.
Therefore, Device Sensor is also enabled by default. When RADIUS authentication and accounting are enabled to send
sensor data to ISE, a duplicate RADIUS accounting packet may be sent for each TLV change. This is due to the session
monitoring by the local analyzer. To prevent duplicate accounting messages, the local analyzer must be disabled.
If RADIUS authentication is disabled (for example, in networks that are in a pre-ISE deployment/discovery phase or have
implemented ISE Profiling Services with Cisco NAC Appliance), no sensor data will be sent if local analyzer disabled. To
allow sensor data to be sent independent of the local analyzer, use the command access-session template monitor.
Configure the switch to send session accounting information to ISE using RADIUS accounting.
If RADIUS authentication and authorization have already been configured, this step should already be complete. Refer to the
section Configuring the RADIUS Probe for additional details on configuring the switch for RADIUS communication with
ISE.
If RADIUS/802.1X has not yet been deployed, be sure to include the following commands in the switch configuration:
HowTo-30-ISE_Profiling_Design_Guide
83
cat3750x(config)#
cat3750x(config)#
cat3750x(config)#
cat3750x(config)#
aaa new-model
aaa accounting dot1x default start-stop group radius
radius-server host <PSN_ip> auth-port <port> acct-port <port> key <shared-secret>
radius-server vsa send accounting
03
46
6E
0A
50
06
54
37
64
56
2C 2E 2F 1F 21 79 F9 2B
20 35 2E 30
2D 70 63
00
00
63
63
6C
00
00
69
61
00
00
73
74
29
01 01 01 CC 00 04 0A 01 32 01
63 6F 20 57 53 2D 43 36 35 30 33
36 35 30 33 2E 63 74 73 2E
00
00
63
32
41
0E
73
0F
63
71
00
00
69
4E
50
64
63
2C
34
FE
00
00
73
2D
63
02
01
63
41
34
01
6F
2D
37
6F
03
37
34
20
21
31
19
41 50 20 63 31 31 34 30
96 2B
2E 66 65 33 34 2E 31 39 37 61
7A
00
43
39
00
53
0D
06
73
2E
36
50
30
00
69
36
00
45
64
03
63
20
30
30
94
00
73
30
04
50
01 01 01 CC 00 04 0A 01 0D 64
63 6F 20 49 50 20 50 68 6F
0F
6F
49
00
30
C4
96 23
20 53 79 73 74 65 6D 73 2C
50 20 50 68 6F 6E 65 20 43
Procedure 4
A0 0B 3A
01
20
4B
31
CC
41
39
2E
00
49
20
66
04
52
20
65
0A 01 0E 64
2D 4C 41
20
33 34 2E 31 39 37 61
90
30 30 33 30 39 34 43 34 35 32 38 41
33 30 39 34 43 34 35 32 38 41 00
52 8A
Device Sensor for DHCP on supported wireless controllers can be enabled using the CLI or web administrative interface.
To configure Device Sensor on the Cisco Wireless Controller via the CLI, enter the following command:
> config wlan profiling radius enable <wlan-id>
Device Sensor is enabled for all wireless clients on the specified WLAN.
HowTo-30-ISE_Profiling_Design_Guide
84
Configure the wireless controller to send session accounting information to ISE using RADIUS accounting.
If RADIUS authentication and authorization have already been configured, this step should already be complete.
Refer to the section Configuring the RADIUS Probe for additional details on configuring the wireless controller for RADIUS
communication with ISE.
From the WLC web interface, go to WLANs(WLAN-id)Edit. The screen display in Figure 69 shows where to
enable Device Sensor.
Figure 69 Device Sensor Configuration for Wireless Controller Example
Procedure 5
EndPointPolicy
EndPointSource
OUI
HowTo-30-ISE_Profiling_Design_Guide
85
If we use Device Sensor alone with EndPointSource set to RADIUS probe, we can see that EndPointPolicy is correctly
matched to Cisco-IP-Phone-7960. The profiling attributes received from Device Sensor that contributed to the profile match
include OUI = Cisco Systems, Inc., cdpCachePlatform = Cisco IP Phone 7960, and dhcp-class-identifier = Cisco Systems,
Inc, IP Phone CP-7960.
HowTo-30-ISE_Profiling_Design_Guide
86
Note that the CDP and DHCP attributes include only those specified by the filter, which shows how data collection is
optimized. The Policy Service node was not required to parse and synchronize unneeded attributes across all Administration
and Policy Service nodes in the ISE deployment. Based on the Device Sensor configuration, updates are received only when
changes occur. SNMP Query and DHCP Probes, on the other hand, will update attributes upon each query or DHCP renewal.
Best Practice: Deploy ISE Profiling using Device Sensor when possible to greatly increase scalability and simplify overall management and
profiling configuration. Device Sensor can be deployed across wired access switches and wireless controllers for both RADIUSauthenticated environments and other types of deployments such as a pre-ISE discovery phase or integration with NAC Appliance.
HowTo-30-ISE_Profiling_Design_Guide
87
Profiling Conditions
Many profiling attributes can be collected by various ISE probes. Once attributes are collected by the ISE Policy Services
nodes, the next step in the profiling process is to match these attributes to Profiling Conditions (Figure 72). Each condition
represents a match to a supported attribute listed in the System Dictionary under PolicyPolicy ElementsDictionary.
Figure 72 Configuration Flow: Profiling Conditions
HowTo-30-ISE_Profiling_Design_Guide
88
Dictionary Attributes
Table 10 presents the attributes listed in the System Dictionary under PolicyPolicy ElementsDictionary. These attributes
are selectable when profiling conditions are created or modified under PolicyPolicy ElementsConditionsProfiling.
Table 10 Dictionary Attributes
RADIUS
MAC
SNMP
IP
CDP
NetFlow
NMAP
LLDP
DHCP
(incomplete listing)
HowTo-30-ISE_Profiling_Design_Guide
(incomplete listing)
89
Go to PolicyPolicy ElementsConditions and select Profiling from the LHS pane. Scroll through the list of
conditions to get an understanding of the common attributes used to create conditions such as OUI, dhcp-class-identifier,
host-name, User-Agent, and SNMP MIB data such as cdpCachePlatform, lldpSystemDescription, and hrDeviceDescr.
To illustrate the process for creating a custom profiling condition, we will use a real-world example. Under the list of
EndpointsIdentities are endpoints that display the following (Figure 73):
Figure 73 Unknown Endpoints Example
The two entries in diagram both show as Unknown profile; in addition, they share the same MAC prefix. Reviewing the
detailed attributes for the first endpoint reveals the following (Figure 74):
Figure 74 NMAP Probe Attributes from Endpoint Scan Example 1
It is determined by direct inspection of the endpoint connected to GigabitEthernet1/0/8 or simple deduction from the
OUI (American Power Conversion Corp) that these endpoints are SNMP Network Management connections for the APC
Uninterruptible Power Systems (UPS) installed in the lab data center. Since there is no default condition in the library for
these endpoints, we will create them and ultimately build a new policy to support all these devices throughout the network.
Click Add from the RHS pane.
a.
b.
c.
In this example, the name APC-OUICheck is used to indicate the vendor and type of check.
Enter descriptionCustom OUI check for American Power Conversion Corp in this example. We
recommend that you add a unique identifierthe word Custom in this examplethat will allow quick
filtering and display of all user-defined conditions created.
There are a number of categories under Type. For this check, the Type is Mac (Figure 75).
HowTo-30-ISE_Profiling_Design_Guide
90
d.
e.
f.
Note: Be sure to use exact case when specifying Attribute Value strings.
In the example given, an Operator of MATCH with Attribute Value set to AMERICAN POWER or AMERICAN POWER
CONVERSION could have optionally been used rather than en exact match (EQUALS).
In event that the OUI database lacks an entry for a particular MAC address prefix, it is possible to create a condition for the unknown
OUI using the following settings:
Type = Mac
Attribute Name = MACAddress
Operator = CONTAINS
Attribute Value = XX:XX:XX (3-byte prefix of the MAC address)
Click the Submit button (or Save for successive edits) to commit changes.
HowTo-30-ISE_Profiling_Design_Guide
91
HowTo-30-ISE_Profiling_Design_Guide
92
There are four Profiling Policy assignment criteria. The endpoint is assigned to a profile if all of the following conditions are
met:
1) The policy must be enabled. (Policy Enabled checkbox must be checked/enabled).
2) Endpoint cumulative CF value for a profile meets the Minimum Certainty Factor.
3) The CF rating for the profile is higher than any other profile where 1 and 2 are also true.
4) The endpoint meets the Minimum CF for the parent profile (if profile is part of a hierarchy).
Per the first rule in the Android policy example shown in Figure 79, if an endpoints User-Agent contains the string
Android, its CF for this profile is increased to 30. If the endpoint matches the second rule (DHCP host-name value
contains the string android), that will also increase its CF for this profile to 30. If it matches the conditions for both rules,
its CF will be 60.
HowTo-30-ISE_Profiling_Design_Guide
93
Even with a CF of 60, it is technically possible for the endpoint to match the conditions of another policy where the CF value
is greater than 60. If all other conditions are met, the endpoint would be assigned to that profile even though it met all
conditions for the Android policy.
Typically, the CF values for predefined policies should be left at the default value. In some cases it may be necessary to
modify the default values to ensure certain policies take precedence over others based on network policy or preference. In
that case, increase the CF value for the applicable rules in the preferred policy the minimal amount to achieve your desired
profiling goals.
Similarly, if you are creating new profiles, set initial CF values to a relatively low setting, say 10 or 20, then monitor policy
assignments to validate desired outcome. If the initial values are set too high, it may not be possible for other profiles with a
potentially closer alignment to the actual endpoint to ever be applied based on CF calculation if the rules for one profile are
set with inordinately high CF values relative to other policies.
For example, if an endpoint matches a single rule for custom Profile_A which increases CF to a value of 100, then the
endpoint may never be assigned to Profile_B where it matches four rules that increase the CF by only 20 each. It is even
possible that the rule in Profile_A is identical to a rule in Profile_B, but has disparate CF values assigned. Therefore, it is a
general recommendation to use consistent CF ratings across policy rules.
Best Practice: In general, it is recommended to keep the CF values at their default settings. If modification of default settings is required to
ensure certain profile assignments take precedence, only increase the value of the rules in the preferred profile to minimal value to effect
the desired policy assignment.
If create custom profiles, keep the initial values for CF relatively low, or at the same value set for other profiles.
94
Take Exception Action allows ISE to statically assign an endpoint to a policy based on the setting of the Exception Action
field. This function is covered in greater detail in the Exception Actions section.
Both these actions can only be triggered if the endpoint matches the policy AND matches the specified condition. If the
condition matches but the endpoint does not match the profile policy, action is not taken.
Also note that it is possible to match multiple rules in a policy such that multiple actions are taken. For example, it is possible
to match a rule that increases the CF by 10 and match another rule such as Take Exception Action or Take Network Scan
Action provided the policy also is matched.
Procedure 2
In this procedure, a custom Profiling Policy will be created for the lab APC UPS devices using the previously configured
condition.
Go to PolicyProfiling. Click Add from the menu of RHS pane.
Enter the profile Name as APC-UPS.
Enter the Description as Custom profile for APC UPS Network Management module. Similar to the description
for the APC custom condition, using the keyword Custom will allow simple filtering for al all user-defined policies based on
this string.
Keep the setting for Minimum Certainty Factor at its default value of 10.
Select the radio button Use Hierarchy instead of the default setting Create Matching Identity Group.
Under Rules, click the
symbol next to Condition and choose Select Existing Condition from Library.
Leave the default rule action Certainty Value Increases with the value of 10 (Figure 80).
Figure 80 User-Defined Profiling Policy Example
HowTo-30-ISE_Profiling_Design_Guide
95
Go to AdministrationIdentity ManagementIdentities and select Endpoints from the LHS pane. The APC
devices should no longer appear in the list as Unknown, but with the new matching Profiling Policy assignments, as shown in
Figure 81.
Figure 81 Endpoints with User-Defined Profile Example
Note that the Policy Assignment is APC-UPS, but the Identity Group Assignment is set to Unknown. This is a result of the
decision to change the default setting in the profile from Create Matching Identity Group to User Hierarchy. This option was
chosen deliberately to illustrate the relationship between Profiling Policy and Endpoint Identity Groups.
HowTo-30-ISE_Profiling_Design_Guide
96
To map a Profiling Policy to an Endpoint Identity Group, select the radio button labeled Create Matching Identity Group
under the profile as shown in Figure 84.
Figure 84 Profiling PolicyCreate Matching Identity Group Example
Selection of the Create Matching Identity Group option is mutually exclusive of the Use Hierarchy setting, the default
selection for most prebuilt profiles. In the Android policy example in Figure 84, the default setting was changed to create an
Endpoint Identity Group based on the policy name. The default setting for user-defined profiles is to create a matching
Identity Group.
HowTo-30-ISE_Profiling_Design_Guide
97
Right-arrows in front of specific entries indicate the presence of child policies for those profiles. Per the above graphic, the
Android policy has no children, whereas Apple-Device is a parent policy. Clicking the arrow reveals the child policies for
Apple-Device.
The hierarchy is beneficial in organizing the display and management of policies. It also provides a method to define a set of
common conditions for multiple child policies such that matching a child policy implies a match of a parent without having
to repeatedly define those higher-level conditions under the more granular rules.
A common use of the hierarchy is to match on OUI. For example, all Apple Devices will have an OUI equal to Apple.
Therefore, it is not necessary to repeat this condition for an iPad, iPod, iPhone, and so on. To match an Apple-iPhone profile
requires that endpoint also have an Apple OUI. This is why use of the simple Firefox browser plugin named User Agent
Switch, which mimics other browser User-Agent strings alone, will not pass the profile conditions for an Apple iPhone.
Without an Apple MAC address, the parent condition fails the test. As noted earlier in this guide, profiling is not positioned
as an anti-spoofing solution, but there are features of the solution that naturally thwart certain spoof activity.
The hierarchy is also beneficial to simplify the match of Identity Group assignments. If a parent policy is mapped to an
Identity Group, it is not necessary to map all child policies to an Identity Group. For example, there are many prebuilt
profiles for Cisco IP Phones. By creating a matching Identity Group for Cisco-IP-Phone (a default setting), it is possible to
create an authorization policy based on this parent without requiring individual Identity Groups for each child policy. This
can greatly simplify Authorization Policy rules. Unless individual IP phone models need special treatment, they can be
treated uniformly through reference of the parent profile and Identity Group assignment.
Procedure 3
In this procedure, an Identity Group is created for the user-defined profile policy named APC-UPS.
Go to PolicyProfiling and select APC-UPS from the list of profiles.
Select the option Create Matching Identity Group and then click Save to commit changes.
Return to the list of Internal Endpoints under AdministrationIdentity ManagementIdentitiesEndpoints and
again select one of the endpoints assigned to the APC-UPS profile (Figure 86).
HowTo-30-ISE_Profiling_Design_Guide
98
Note: The Identity Group Assignment has changed from Unknown to APC-UPS.
Go to AdministrationIdentity ManagementGroups and click the arrow ( ) to the left of Endpoint Identity
Groups in the LHS pane to expand its contents as shown in Figure 87.
Figure 87 Viewing Endpoint Identity Groups Example 1
This list represents the default top-level Identity Group designations. By default, all endpoints assigned to profiling policies
that do not have a matching Identity Group will be members of the Identity Group Unknown. All endpoints assigned to
profiling policies with a matching Identity Group will appear as members of that Identity Group under the parent Identity
Group Profiled. The Blacklist and RegisteredDevices group are special groups. Blacklist is used to identify endpoints denied
network access. RegisteredDevices is used by MyDevicesPortal and Native Supplicant Provisioning to designate endpoints
registered by network access users.
Click
HowTo-30-ISE_Profiling_Design_Guide
99
Note that there are some profiling policies that have matching Identity Groups by default, including Cisco-IP-Phone and
Workstation. APC-UPS also appears in the list of Endpoint Identity Groups and is now selectable as a matching condition in
an Authorization Policy rule.
Using ISE Profiling Services to classify devices and assign them to Identity Groups allows ISE to apply different policies to a
nonauthenticating endpoint such as a printer or IP phone using MAB, or to apply a different policy to an authenticated
employee when connecting using a personal device such as an iPad versus a corporate workstation (Figure 90).
Figure 90 Authorization Policy Example
As depicted in the sample Authorization Policy, the Identity Group named Cisco-IP-Phone is used to assign special phone
authorizations to endpoints that are profiled as Cisco IP phones. These endpoints are authenticated using MAB. The use of
hierarchical policy also allows this policy to apply to any Cisco IP phones regardless of profile match to a specific IP phone
model.
The Authorization Policy also highlights the use of profiling to uniquely authorize Employees who connect using a personal
device, those classified as Apple-iPad or Android, to Internet-only access (Guest permissions), while at the same time
Employees who connect via a workstation are granted full access (Employee permissions).
HowTo-30-ISE_Profiling_Design_Guide
100
Procedure 4
In this procedure, endpoints profiled as APC UPS devices will be assigned special permissions based on MAB authentication
and Authorization Policy rule match to the Identity Group named APC-UPS.
Go to PolicyAuthorization and insert a new rule below the Profiled Cisco IP Phones rule named Profiled UPS
Systems.
Under the Identity Group condition, navigate to Endpoint Identity GroupsProfiled and select APC-UPS.
Under Permissions, select the appropriate Authorization Profile such as UPS then click Save to commit the changes.
The Policy Rule should appear similar to Figure 91.
Figure 91 Authorization Policy Configuration Example 1
Validate that the Authorization Policy is working as expected by disconnecting and reconnecting the UPS device
connections, or by simply resetting the connecting switchports by issuing shut / no shut commands under the appropriate
interfaces.
Go to OperationsAuthentications to view the Live Authentications log. Entries similar to those in Figure 92
following should appear.
Figure 92 Authorization Policy Configuration Example 2
The log shows two endpoints profiled as APC-UPS being authenticated and authorized using the Authorization Profile named
UPS. In this example, a downloadable ACL (dACL) is sent to the switch after the first endpoint is authorized. The second
endpoint reuses the dACL that has already been downloaded, so there is no second dACL sent.
101
Profile transition results in a change to endpoint access per the Authorization Policy rules.
Exception Actions
By default, there are three predefined, nonconfigurable Exception Actions. Go to PolicyPolicy
ElementsResultsProfilingException Action to see the list (Figure 94).
Figure 94 Exception Actions
EndpointDelete sends a CoA when the endpoint is deleted or transitions from a Profiled profile to the Unknown
profile (no Profiling Policy match).
FirstTimeProfile generates a CoA when the endpoint transitions from the Unknown profile to a specific Profiling
Policy assignment. This Exception Action does not trigger CoA if the endpoint transitions between known profiles,
for example, for Apple-Device to Apple-iPod.
StaticAssignment results in a CoA if an endpoint is statically assigned to a profile from a dynamic profile
assignment. Once assigned to a static policy assignment, a new endpoint Profiling Policy cannot be assigned even if
profiling attributes would normally dictate a transition.
The default CoA Type sent for each Exception Action is configured under global settings at
AdministrationSystemSettingsProfiling (Figure 95).
HowTo-30-ISE_Profiling_Design_Guide
102
Configuration of global profiling settings is covered in the Configure Global Profiling Settings section of this guide. The Port
Bounce setting is reduced to the Reauth setting when multiple sessions are connected through the same switchport to
minimize disruption to other sessions.
System-defined Exceptions Actions are not configurable and cannot be assigned as actions under the Profiling Policy. They
are triggered automatically based on the defined transition. However, an administrator can define custom Exception Actions.
These user-defined Exceptions can be used in a Profiling Policy to apply a static Profiling Policy assignment and specify if
CoA is sent.
In this procedure, an Exception Action is configured for a medical device to assign it to a static Profiling Policy once the
specified conditions are matched. The example device is a Draeger M300, a portable wireless heart monitor.
Caution: Due to the inherent compliance factors involved with healthcare solutions, the goal of this example is strictly to illustrate the use of
custom Exception Actions. It is not intended to validate the appropriateness of ISE Profiling Services as a method to secure network
access for medical devices.
Go to PolicyProfiling and select Draeger-M300 from the list. By default, this profile does not include a rule that
references an Exception Action. Additionally, an Exception Action has not been defined (Figure 96).
HowTo-30-ISE_Profiling_Design_Guide
103
Go to PolicyPolicy ElementsResults and click the arrow ( ) to the left of Profiling in the LHS pane to
expand its contents.
Select Exception Actions from the LHS pane and then click Add from the menu in RHS pane.
A new Exception Action is added using the values shown in Figure 97.
In this example, no additional CoA will be sent upon static policy assignment to the profile Draeger-M300. This is the same
profile previously shown.
Return to the Draeger-M300 Profiling Policy under PolicyProfiling and complete the following steps to define an
Exception Action for the profile:
a.
b.
c.
Change the action (Then) from default value, Certainty Factor Increases, to Take Exception Action. The
resulting Profiling Policy should appear similar to the one in Figure 99.
HowTo-30-ISE_Profiling_Design_Guide
104
Save changes.
In this example policy, we have used the same criteria that were used to assign the policy to the endpoint to also statically
assign the endpoint to the policy. The Authorization Policy can use the fact that the parent policy called Draeger-Device has a
matching Identity Group. Otherwise this policy can have an Identity Group assigned whereby the Authorization Policy will
reference this specific profile.
Configure a wired switch to support CoA. Use the aaa server radius dynamic-author command in global
configuration mode as shown:
cat3750x(config)# aaa server radius dynamic-author
cat3750x(config-locsvr-da-radius)# client <ISE_PSN_IP_address> server-key <secret-key>
Add a separate client entry for each ISE Policy Service node that will communicate to the switch via RADIUS.
Configure a wireless controller to support CoA.
a.
HowTo-30-ISE_Profiling_Design_Guide
105
b.
Go to WLANs(WLAN)EditAdvanced. For each WLAN to support CoA, Set Allow AAA Override to
Enabled and set the NAC State to RADIUS NAC, as shown in Figure 101.
HowTo-30-ISE_Profiling_Design_Guide
106
Looking at the Profile library (under PolicyProfiling) and also reviewing the Profiler Conditions (under PolicyPolicy
ElementsConditionsProfiling) (Figure 103) can provide a reasonable understanding of the attributes used and probes
required to profile those or similar endpoints.
HowTo-30-ISE_Profiling_Design_Guide
107
Once the key profiling attributes are known, determine the best option from available probes and other collection methods to
gather the required profile data. Refer to the individual sections on ISE probe configuration for details on specific
requirements to support each probe type. Additional recommendations on probe selection best practices are provided at the
end of this section.
HowTo-30-ISE_Profiling_Design_Guide
108
Best Practice: Be sure to set the Call Station ID Type shown in figure above to System MAC Address to allow profiling of non-802.1X clients.
This will ensure that ISE is able to add the endpoint to the database and associate other profile data received to this same endpoint
based on known MAC address.
If possible, deploy ISE Profiling in the early stages of the deployment. ISE can profile wired endpoints without network
authentication or authorization to begin the discovery process. This can offer huge benefits in terms of visibility and
understanding the types of endpoints trying to connect to the network. During these early stages, the ISE Profiling Policy can
begin to evolve if the specific endpoint types requiring profiling for network access are not already clear.
Another consideration is the overall access policy that is initially applied to the port or applied during intermediate or final
authorization states. For example, when an endpoint first connects to the network, it may be granted access based on a port
ACL (assuming Low-Impact Mode) or on an initial VLAN. If the endpoint is unknown and fails MAB lookup or its posture
state is unknown, it may proceed to Central WebAuth or a Posture state, which places a new ACL on the port or VLAN
assignment. Upon successful web authentication or remediation, the port may be authorized with a new ACL or VLAN. In
each state, there will be different levels of network access. If profiling relies on collecting certain data, that access must be
allowed.
A simple example is DHCP. If DHCP is not allowed, profiling that relies on data from DHCP probes may not be available. If
Network Scan is used, but the port blocks access to the ports interrogated by the NMAP probe, again that information will
not be available to make a profiling decision. This includes access to SNMP ports even if enabled on the endpoint.
Additionally, the endpoint itself must allow the traffic. A common example is the use of NMAP to perform an OS scan. If a
personal firewall blocks attempts to scan the endpoint, the probe will yield no results.
The use of the NetFlow probe can be particularly challenging because the endpoint must be allowed access to communicate
on the network for NetFlow data to be collected. Therefore, policy must allow for the initial collection of data without
assuming complete network access for any endpoint. One possible solution would be to profile endpoints in VLAN A, which
disallows access to secured resources but does not block general access to the specified ports. Once profiled based on
matching traffic, the endpoint can be reauthorized to VLAN B, which allows privileged access to the secured resources.
Another option is to initially allow the traffic but upon detection of uncharacteristic traffic, match a more specific profile that
changes the port authorization. For example, if a process control endpoint communicates on an unexpected port, an Exception
Action can be applied to assign the endpoint to a Quarantine Identity Group and policy. Again, ISE Profiling is not targeted
to be an anti-spoofing solution, but may be used to enforce policy based on anomalous traffic or other profiling attributes. In
environments that include critical devices, these will often be locked down or access limited to a known list of endpoints. In
these cases, the value of profiling may be for visibility to ensure that all endpoints that match a specific Profiling Policy
display attributes consistent with those device types.
The use of Exception Actions can be a tool in cases where a static policy assignment needs to be made. Realize however, that
once an endpoint is statically assigned to a profile, only an administrator can change that assignment.
HowTo-30-ISE_Profiling_Design_Guide
109
Probe Attributes
When determining which probes to enable in the network, it is helpful to understand which attributes can be collected by
each probe. Table 11 summarizes the different probes, the key attributes collected, and the applicable use cases.
Table 11 Probes and Key Attributes
Probe
RADIUS
RADIUS
CDP/LLDP
w/Device Sensor DHCP
SNMP
MAC Address/OUI
CDP/LLDP
ARP tables
DHCP
DHCP
NMAP
DNS
FQDN
HTTP
User-Agent
Operating system detection; some browsers like Chrome may mask actual OS.
NetFlow
Protocol
Source/Dest IP
Source/Dest/Ports
Unique vendor IDs for hardware and software. DHCP fingerprints for OS
detection. Hostname/FQDN for common name patterns may indicate OS or
device type. Additionally provides MAC-to-IP bindings to support other
probes.
Table 12 provides a more detailed list of key attributes per probe. Other attributes may also be available per probe, but the
following list highlights the most common or useful attributes for typical deployments.
HowTo-30-ISE_Profiling_Design_Guide
110
Probe
RADIUS
Calling-Station-ID (OUI)
Framed-IP-Address
cdpCachePlatform
cdpCacheAddress
cdpCacheCapabilities
lldpSystemDescription
lldpSystemName
dhcp-requested-address
dhcp-class-identifier
dhcp-client-identifier
dhcp-parameter-request-list
host-name
domain-name
client-fqdn
SNMP Query
MACAddress(OUI)
MAC-IP (ARP)
cdpCachePlatform
cdpCacheAddress
cdpCacheCapabilities
lldpSystemDescription
lldpSystemName
DHCP
dhcp-requested-address
dhcp-class-identifier
dhcp-client-identifier
dhcp-parameter-request-list
host-name
domain-name
client-fqdn
NMAP
operating-system
tcp-x
udp-x
SNMP Attributes
DNS
FQDN
HTTP
User-Agent
NetFlow
IPV4_DST_ADDR
IPV4_SRC_ADDR
PROTOCOL
L4_SRC_PORT
L4_DEST_PORT
MIN_TTL
MAX_TTL
HowTo-30-ISE_Profiling_Design_Guide
111
PortalUser
EndPointSource
DeviceRegistrationStatus
Other
Which probes have the least or highest impact to my network (in terms of traffic overhead, ISE server load, or
additional components to support)?
What is the general value that this probe adds to my ability to profile my endpoints?
Table 13 provides a legend for the metrics and ratings used in Tables 14, 15, and 16 to aid in probe selection for different use
cases.
Table 13 Legend for Probe Ratings
Metric
Name
Rating
Description
DDI
Easy
Medium
Difficult
NII
Low Impact
Medium Impact
High Impact
PVI
High Value
Medium Value
Low Value
HowTo-30-ISE_Profiling_Design_Guide
112
Probe (Method)
Key Profiling
Attributes
Notes
RADIUS
N/A
RADIUS
w/Device Sensor
CDP/LLDP
DHCP
SNMPTrap
SNMPQuery
DHCP (Helper)
DHCP SPAN
HTTP (Redirect)
DHCP
DHCP
NMAP
DNS
HTTP (SPAN)
NetFlow
HowTo-30-ISE_Profiling_Design_Guide
FQDN
N/A
User-Agent
Protocol
Source/Dest IP
Source/Dest Ports
113
Probe (Method)
RADIUS
RADIUS
w/Device Sensor
SNMPTrap
SNMPQuery
DHCP (Helper)
DHCP SPAN
HTTP (Redirect)
Notes
CDP/LLDP
DHCP
DHCP attributes
DHCP Attributes
NMAP
DNS
Key Profiling
Attributes
HTTP (SPAN)
2
HowTo-30-ISE_Profiling_Design_Guide
User Agent
User Agent
Protocol
Source/Dest IP
Source/Dest Ports
NetFlow
3
FQDN
114
Probe (Method)
RADIUS
RADIUS
w/Device Sensor
SNMPTrap
SNMPQuery
DHCP (Helper)
DHCP SPAN
HTTP (Redirect)
Notes
CDP/LLDP
DHCP
DHCP
DHCP
NMAP
DNS
Key Profiling
Attributes
HTTP (SPAN)
2
HowTo-30-ISE_Profiling_Design_Guide
User Agent
User Agent
Protocol
Source/Dest IP
Source/Dest Ports
NetFlow
3
FQDN
115
Profiling Plan
After reviewing the different types of endpoints that require device classificationfor either visibility or network access
based on device typeand agreeing on the best probes to collect the required data, the next step is to document the profiling
plan. At a minimum, this plan should include all the devices to be profiled and how that profiling data will be used to
authorize network access. The plan should also include the list of unique attributes required to classify each endpoint, the
probe or method used to capture those attributes, and the specifics of the collection method. For example, will URL
redirection or SPAN be used to capture HTTP? Where will the data be captured? Which PSNs will receive the data?
Another critical aspect of the plan is how scalability and redundancy will be deployed.
Note: Profiling high availability and scalability, including load balancing, are beyond the scope of this document.
Device
Profile
Where Used in
Auth Policy Rules?
Unique Attributes
Probes Used
Collection Method
Cisco IP
Phone
Cisco-IP-Phones
(MAB)
OUI
RADIUS
RADIUS Authentication
CDP
SNMP Query
IP Camera
Cisco-IP-Cameras
(MAB)
OUI
RADIUS
RADIUS Authentication
CDP
SNMP Query
Printers (MAB)
OUI
RADIUS
RADIUS Authentication
DHCP
MAC Address
RADIUS (MAC
Address
discovery)
RADIUS Authentication
SNMP Query
DNS name
DNS
Triggered by IP Discovery
Employee_Personal
OUI
RADIUS
RADIUS Authentication
(802.1X/CWA)
HTTP
DHCP
MAC Address
RADIUS (MAC
Address
discovery)
RADIUS Authentication
DHCP
SNMP Query
Triggered by RADIUS
Accounting Start
Traffic to Destination
Port/IP
NetFlow
Printer
Apple
iDevice
Device X
Critical_Device_X
(MAB)
HowTo-30-ISE_Profiling_Design_Guide
116
SNMP Queries will be issued by the same PSN that receives the RADIUS Accounting Start or SNMP trap
packet.
HTTP traffic resulting from URL redirection is sent to the PSN that is handling the RADIUS session.
DHCP Helper can be sent to more than one PSN, so recommendation is to send to same PSNs as
configured for RADIUS for particular access device.
DNS queries are sent by the same PSN that learns the IP address. This PSN is typically the one that handles
the RADIUS session and receives the IP address from either the Framed-IP-Address from RADIUS
Accounting, dhcp-requested-address from DHCP, or triggered SNMP Query of cdpCacheAddress.
Triggered NMAP Scans are sourced by the same PSN that receives the profiling data resulting in a policy
rule match. For example, if an NMAP action is assigned to a profile rule condition based on OUI match,
then the first PSN that receives the endpoint MAC address via RADIUS, DHCP, or other probe will be the
one that sources the NMAP scan.
In other cases, such as using DHCP SPAN, HTTP SPAN, or NetFlow probe, it is not always possible to ensure
traffic reaches the same PSN in a distributed deployment.
HTTP Probe:
Use URL redirection instead of SPAN to centralize collection and reduce traffic load related to SPAN/RSPAN.
In general try to avoid data collection using HTTP SPAN. If used:
o
o
Look for key traffic chokepoints such as the Internet edge or wireless controller connection
Use intelligent SPAN/tap options or VACL Capture to limit amount of data sent to IS.
It can be difficult to provide high availability for SPAN without an intelligent network tap infrastructure.
DHCP Probe:
Use DHCP Relays (IP Helpers) when possible.
In general, try to avoid data collection using DHCP SPAN. If used, make sure probe captures traffic to central
DHCP Server.
Be aware that layer 3 devices serving DHCP will not relay DHCP for same network.
It can be difficult to provide high availability for SPAN without an intelligent network tap infrastructure.
SNMP Probe:
Be careful of high SNMP traffic due to triggered RADIUS accounting updates as a result of high re-authentication
(low session/re-auth timers) or frequent interim accounting updates.
For polled queries, be careful not to set polling interval too low. Be sure to set optimal PSN for polling in ISE
network device configuration.
SNMP Traps are primarily useful for non-RADIUS deployments like integration with NAC Appliance, not for a
network using RADIUS-based authentication and authorization.
NetFlow: Use only for specific use cases. NetFlow has the potential for high load on network devices and PSN.
HowTo-30-ISE_Profiling_Design_Guide
117
Appendix A: References
Cisco TrustSec System:
http://www.cisco.com/go/trustsec
http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/landing_DesignZone_TrustSec.html
HowTo-30-ISE_Profiling_Design_Guide
118