Building An Enterprise Access Control Architecture Using ISE Group Based Policies PDF
Building An Enterprise Access Control Architecture Using ISE Group Based Policies PDF
Building An Enterprise Access Control Architecture Using ISE Group Based Policies PDF
Building an Enterprise
Access Control
Architecture using ISE and
Group Based Policies
Subtitle goes here
Imran Bashir
Technical Marketing Engineer, Security Business Group
BRKSEC-2695
#CLUS
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Find this session in the Cisco Events App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Session Abstract
This session will focus on: 1. Emerging business requirements and ISE services such as: Guest,
profiling, posture, BYOD and MDM. 2. Secure policy based access control including 802.1X, MAB,
Web Authentication, and certificates/PKI. The session will show you how to expand policy decisions
to include contextual information gathered from profiling, posture assessment, location, and external
data stores such as AD and LDAP. 3. Enforcing network access policy through conventional means
such as VLANs and ACLS and emerging technologies such as Group Based Policies .
Cisco Group Based Policies technology is used to segment the campus and datacenter to increase
security and drive down the operational expenses associated with managing complex ACL firewall
rule tables and ACLs lists. This session is an introduction to the following advanced sessions:
BRKSEC-3699; BRKSEC-3698; BRKSEC-3690; TECSEC-3691.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Important: Hidden Slide Alert
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
ISE Sessions @Live Orlando 2018
Sunday Wednesday Thursday
TECSEC-2672 BRKSEC-3697 BRKSEC-3699
Identity Services Engine Advanced ISE Services, Tips & Tricks Designing ISE for Scale & High
2.4 Best Practices Craig Hyps, Wednesday 8:00-10:00 Availability
Jesse Dubois, Craig Hyps
Eugene Korneychuk, BRKCOC-2018 Thursday 8:00-10:00
Kevin Redmon, Inside Cisco IT: How Cisco Deployed ISE and Group
Vivek Santuka Based Policies throughout the Enterprise
BRKSEC-2038
Monday 9:00-6:00 Raj Kumar, David Iacobacci
Security for the Manufacturing
Wednesday 8:30-10:00
Floor - The New Frontier
Shaun Muller
Monday BRKSEC-2464
Thursday 10:30-12:00
Lets get practical with your network security
BRKSEC-2059 by using Cisco ISE
Deploying ISE in a Imran Bashir, Wednesday 10:30-12:00 BRKSEC-2039
Dynamic Environment Cisco Medical Device
Clark Gambrel BRKSEC-2695 Segmentation
Monday 1:30-3:30 Building an Enterprise Access Control Architecture Tim Lovelace, Mark Bernard
using ISE and Group Based Policies Thursday 1:00-2:30
Imran Bashir, Wednesday 1:30-3:30
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
ISE Integrations and Lab Sessions
BRKSEC-3889 DEVNET-1010
LABSEC-1200 Advanced Security Using Cisco pxGrid for
ISE 2.3 : Dot1x : Architecture Integrations Security Platform
Troubleshooting tips and using APIs and pxGrid Integration
tricks Jamie Sanbower Nancy Cam-Winget,
Kushagra Kaushik, Wednesday 1:30-3:30 Syam Appala
Prachi Chauhan Thursday 10:30-11:15
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Software Defined Segmentation Sessions
Monday Tuesday Wednesday Thursday
BRKSEC-2026 BRKRST-2129 BRKRST-2100 BRKCLD-2412
Building Network The Evolution of Building Intent-Based Consistent Group-based
Security Policy Network Segmentation: Segmentation Policies Policy for On-premise, Hybrid
Through Data From Traditional for On-premise and & Multi-cloud with Cisco DNA
Intelligence methods to Software Public Cloud Intent-based Networking
Matthew Robertson, Defined Segmentation Fay-Ann Lee Ken Hook
Darrin Miller Paul Bourassa, Wed 10:30-12:00 Thursday 08:30-10:00
Monday 4:00-5:30 Ken Kaminski
Tuesday 4:00-6:00 BRKSEC-3690
Tuesday Thursday Advanced Security Group
LTRSEC-1571 Tags: The Detailed Walk
BRKCRS-2812 BRKCRS-2812 Through Darrin Miller
Software Defined
Cisco SD-Access – Cisco SD-Access – Thursday 10:00-10:00
Access with Cisco ISE
Integrating with Your Integrating with Your
and DNA Center Naman
Existing Network Existing Network
Latif, CCSCRS-2000
Kedar Karmarkar Kedar Karmarkar
Keith Simmons Cisco SD-Access: Secure
Tuesday 4:00-6:00 Thursday 8:00-10:00
Wednesday 8:00-12:00 Segmentation Design
Ankush Arora, Subodh Gajare
Thursday 10:00-11:00
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Managing policy based on ‘Trust’
Connecting Trusted Devices to Trusted Services
User-Groups Device-type
Cloud
Cloud App A
Cloud App B
Server A
Server B
Partners
Location Posture
Trusted Asset ✓ ✕ ✓ ✓ ✓ ✓
On Prem
Trusted User ✕ ✓ ✓ ✓ ✓ ✕
Time Threats Partners ✕ ✕ ✓ ✓ ✕ ✕
Behavior Vulnerability
RESULT RESULT
ACCESS TO IP (ANY DEVICE / USER) ROLE BASED ACCESS
?
? ?
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Cisco ISE and Anyconnect
CISCO ISE SIEM, MDM, NBA, IPS, IPAM, etc.
WHO WHEN
Cisco ISE WHAT WHERE PxGRID
& APIs
HOW HEALTH
Context aware policy service, THREATS CVSS
to control access and threat Partner Eco System
ACCESS POLICY
across wired, wireless and
VPN networks FOR ENDPOINTS FOR NETWORK
WIRED WIRELESS VPN
Cisco Anyconnect
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Introducing Cisco Identity Services Engine
A centralized security solution that automates context-aware access to
network resources and shares contextual data
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Why customers buy ISE?
Cisco ISE can reach deep into the network to deliver superior visibility into
Asset Visibility who and what is accessing resources.
Access Control Consistent access control in to wired, wireless and VPN Networks. 802.1X,
MAC, Web Authentication and Easy connect for admission control.
Fully customizable branded mobile and desktop guest portals, with dynamic
Guest Access visual workflows to easily manage guest user experience.
Simplified BYOD management with built-in CA and 3rd party MDM
BYOD Access integration for on boarding and self-service of personal mobile devices
Topology independent Software-defined segmentation policy to contain
Segmentation network threats by using Cisco Group Based Policies technology.
Context sharing with partner eco-system to improve their overall efficacy
Threat Control and accelerate time to containment of network threats.
Cisco ISE supports device administration using the TACACS+ security
Device Admin protocol to control and audit the configuration of network devices
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Asset Visibility
Visibility Attributes
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Security starts with ‘Visibility’
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Cisco ISE Profiling
1.5
million
High-level canned
profiles. +Periodic feeds Feed Service
(Online/Offline)
250+ Cisco Network ACTIVE PROBES Netflow DHCP DNS HTTP RADIUS NMAP SNMP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Cisco ISE Profiling overview
ACTIVE PROBES Netflow DHCP DNS HTTP RADIUS NMAP SNMP AD
Endpoints send DS
interesting data,
that reveal their DS
Feed Service
device identity
Cisco ISE (Online/Offline)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Visibility based on Threat
Threat Endpoints based on Incident and Indicators
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
ISE Visibility Setup Wizard
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Visibility Setup
Endpoint Discovery
ISE scans for endpoints within given IP MAC Address IPv4 Address Endpoint Profile OUI
subnet range. 00:22:BD:D3:5B:2F 10.1.0.13 Cisco-IP-Camera Cisco Systems
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Visibility Setup
Network Access Device Discovery
ISE 2.1 can do a SNMP scan of the network Name IP Address Device Type Location Description
and populate the Network Devices. Just add Cat3850-1 10.1.100.1 Switch Bldg-A Cisco IOS Software XE..
RADIUS secret to each NAD.
ISR4KX-1 10.1.100.2 Router Bldg-A Cisco IOS Software XE..
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Visibility Demo
Demo
Asset Visibility
IPFIX/NetFlow
Collector
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Cisco ISE Profiling
1.5
million
High-level canned
profiles. +Periodic feeds Feed Service
(Online/Offline)
250+ Cisco Network ACTIVE PROBES Netflow DHCP DNS HTTP RADIUS NMAP SNMP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Cisco ISE Profiling overview
ACTIVE PROBES Netflow DHCP DNS HTTP RADIUS NMAP SNMP AD
Endpoints send DS
interesting data,
that reveal their DS
Feed Service
device identity
Cisco ISE (Online/Offline)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Profiling – How does it work?
A0:99:9B:00:01:AA
= Apple-MacBook
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Custom Profiles
What can I do when Cisco® ISE can’t
recognize and profile a specific type of
endpoint (example: APC UPS)?
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
RADIUS DHCP HTTP SPAN DNS SNMP NMAP NETFLOW AD
Note: If AD probe enabled after endpoint learned and hostname acquired, then no AD query.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
RADIUS DHCP HTTP SPAN DNS SNMP NMAP NETFLOW AD
Sample Attributes
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Simplify profiling with ‘Device Sensor’
Network devices send endpoint raw data to ISE via RADIUS
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Feed Service
• Introduced in ISE 1.2
• No need to wait for new Cisco® ISE version
• Zero-day support for popular endpoints is added using Cisco Feed Server
• Updates Profile Policies and IETF OUI Information
PSN Cisco
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Endpoint Custom Attributes
Administration > Identity Management > Settings
Once defined, Custom Attributes
can be set using:
• Admin UI
• File Import
• LDAP Import
• ERS API
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Edit Custom attributes
864444923566 Save/Delete
Edit
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Authorization Policy
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Medical NAC and Internet of Things
Medical profiles XML upload. Profiling data collection via usual means
250+ Medical
device profiles
UPLOAD
pxGrid
IND
Cisco Industrial
Network Director
FACTORY INDUSTRIAL DEVICES
#CLUSIoT profiles ships with ISE 2.4. Cisco
© 2018 Profiling
and/or data collection
its affiliates. via pxGrid
All rights reserved. from
Cisco PublicIND 43
Medical NAC Whitepaper
• Technical Whitepaper - How to use ISE
profiling to identify, classify, and segment
medical devices
• Profiling options and best practices
• Custom Profile checklist
• How to obtain and install…
• Cisco Medical Device Profile Library:
• 250+ pre-built clinical device profiles
• https://communities.cisco.com/docs/DOC-66340
http://www.cisco.com/c/dam/en/us/products/collateral/security/medical-nac-white-paper.pdf
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Planned PoC
Connector: FDA GUDID based Access
GUDID over Device-Sensor/
LLDP-MED / DHCP SNMP
Segmentation Policy
Swithces API ISE API
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Cisco ISE support for Secure Access
SAML iDPs Single Sign-On
Native Supplicants /
Cisco AnyConnect
Certificate based Auth
Certificate Authorities
500,000 concurrent sessions
Upto 100K
Network Devices APIs Passwords / Tokens
SCEP / CRL
External Identity Stores
Active Directory
802.1X
EAP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Fundamentals of 802.1X
Port-Authorized
EAP EAP
802.1X RADIUS
RADIUS: ACCESS-ACCEPT
EAP: EAP-SUCCESS
Port-Unauthorized
(If authentication fails)
EAP: Extensible Authentication Protocol
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Authentication vs. Authorization
Driving Home the Point
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Network Access Control
PROTECTED SHARED PUBLIC
SERVERS SERVICES NETWORK
Certificates / Passwords
NETWORK ACCESS
EMPLOYEE
CONTRACTOR alice
*****
AUTHENTICATION AUTHORIZATION
Who are you? What you can do?
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
ISE Authentication and Authorization policy
Authorization conditions
End result
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Authorization Policy
CONTRACTORS
Harry
Jim
Cisco ISE
EMPLOYEES
Alice
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Authorization Options
Beyond RADIUS ‘ACESS-ACCEPT’ / ‘ACCESS-REJECT’
Remediation
Guest
VLAN 4
Employees
Contractor VLAN 3
Employee 16 bit SGT assignment and
permit ip any any deny ip host <protected>
permit ip any any Per port / Per Domain / Per MAC SGT based Access Control
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
MAC Authentication Bypass (MAB)
Endpoints without supplicant will fail 802.1X authentication! Bypassing “Known” MAC Addresses
Cisco ISE
00-10-23-AA-1F-38 Network Device
802.1X
Cisco ISE
Network Device
LAN
No
802.1X Any Packet User: 00-10-23-AA-1F-38
ACCESS-ACCEPT
MAB requires a MAC database | ISE can build this database dynamically
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Change of Authorization (CoA)
RFC 5176
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Central Web Authentication (CWA)
Endpoint Network Device Cisco ISE
NETWORK
Google.com
alice
….... ISE login page
Username + password
CoA
Full Access ACL
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
CoA use cases
RFC 5176
Limited Full Access (E.g. Posture)
Security Posture: ‘Non Complaint’
• Central Web Authentication
Authorization : Limited Access
• Guest Access
• Bring your Own device flows Security Posture: ‘Complaint’
• Device Profiling
Malware activity
• Easy Connect Threat
notification
Change of Authorization : Limited Access
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Active V/s Passive Identity
1 DOMAIN\Jim
(AD Login)
Jim 3
2
Jim Logged in
Passive Identity
Alice?
Active Identity
Yes AD
Cisco ISE
1 2
3
Alice
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Easy Connect
Identity Based Access without 802.1X
DOMAIN
DOMAIN\bob
CONTROLLER Bob logged in
FULL ACCESS
LIMITED ACCESS UNKNOWN LIMITED ACCESS
Limited
CoA: Full Access
EMPLOYEES FULL ACCESS
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
802.1x & EasyConnect
Demo
What About That 3rd “A” in “AAA”?
Accounting
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Detailed Visibility into Passed/Failed Attempts
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Detailed Visibility into All Active Sessions and Access Policy Applied
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Let’s Begin by Securing User Access with 802.1X
I’ve done my
homework in Proof
of Concept Lab and
it looks good. I’m
turning on 802.1X
tomorrow…
IT Mgr.
Enabled 802.1X
I can’t connect to my
network. It says
Authentication failed
but I don’t know how
to fix. My presentation
is in 2 hours…
Port Open permit eap dhcp dns permit ip any any Only EAP
Unconditionally deny any Allowed
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Monitor Mode
interface GigabitEthernet1/0/1
switchport access vlan 100
switchport mode access
switchport voice vlan 10
authentication host-mode multi-auth Monitor
authentication open Mode
authentication port-control auto
Before Authentication After Authentication Basic
mab
dot1x pae authenticator
1X/MAB
Traffic always allowed irrespective of authentication status authentication violation restrict
MONITOR MODE : GOALS MONITOR MODE : CONFIGURATION
.1X
Failures
.1X-Pass
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Limiting sessions: Host Modes
Single Host Mode Switch Multi-Host Mode Switch
authentication host-mode single-host Endpoint-1 Endpoint-2 authentication host-mode multi-host Endpoint-1 Endpoint-2
authentication host-mode multi-domain Endpoint-1 Endpoint-2 authentication host-mode multi-auth Endpoint-1 Endpoint-2
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
From 15.2(1)E / 03.05.00E
C3850/C3650 FCS
15.2(1)SY on C6500
IBNS 2.0 Features 03.06.00E on Sup8E
Authentication
Access Session
Manager
Manager
Parameter Service
Class-maps Templates RADIUS
Map VLAN VLAN
802.1X
Authenticator Server
MAB
dACL dACL
802.1X
VLAN
Policy-map (Identity Control Policy) Authentication
SGT SGT
Manager RADIUS
WebAuth
Interface Template(s) dACL MAB
LAN
Modular Configurations SGT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Critical ACL
Scenarios today with Low Impact Mode:
Before Authentication Authentication Success AAA Server Unreachable
Before authentication success, the On authentication success, the The endpoint may be authorized to a
endpoint has limited access to the RADIUS server authorizes the critical VLAN, but the PRE-AUTH-
network resources, defined by the endpoint with a dACL (permit ip any ACL on the port would still block the
PRE-AUTH-ACL on the port any) granting full access access during AAA outage*
* Critical authorization wont apply to endpoints that were authorized by AAA server
© 2018 whenits itaffiliates.
Cisco and/or was reachable
All rights reserved. Cisco Public 74
username 000c293c8dca password 0 000c293c8dca
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Handling Guests and Employees Without 802.1X
Guest Users
Employee Guest
**** ****
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Guest Network
DMZ Anchor Controller
Wireless INTERNET
• Open SSID
• Central Web Authentication
• Controller in DMZ Foreign Controller
• ISE separate interface for DMZ
CORP
Wired LAN
Corp Guest
SSID SSID
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
WebAuth Evolution.. The Need for a Better WebAuth
• LWA requires local configuration on each:
• Switch
• Wireless LAN controller Switch
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Flex Auth
Converging Multiple Authentication Methods on a Single Wired Port
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
ISE Central Web Auth (CWA) Configuration
Condition is to match RADIUS Attribute
Service Type = 10 (Call-Check)
AND
[NAS-Type = 15 (Ethernet)
OR
NAS-Type= 19 (Wireless IEEE 802.11)]
• MAB Requests from Failed Auth user or Timed out user can still be processed to return specific
authorisation rule (VLAN, dACL, URL-Redirect, and SGT)
• By default, ‘If user not found’ value is set to ‘Reject’ before ISE 1.3
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
CWA Flow
Tracking session ID provides support for session lifecycle management including CoA.
https://ise.company.com:8443/guestportal/gateway?sessionId=0A010A...73691A&action=cwa
Try MAB
Connect to WLAN=Corp
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
CWA Flow
CoA allows re-authentication to be processed based on new endpoint identity context.
CoA
ISE Policy Server
VPN
Existing Session matches Employee Policy
= Remove Redirect + ACL permit ip any any
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
A Systems Approach
Switch/Controller is the Enforcement Point
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
3 Key Concepts
URL Redirect
• ISE returns URL redirect to the NAD per User Session
• URL ACL sent with URL Redirect
• Used for CWA, CPP, BYOD Cert and Supplicant Provisioning, MDM …
Session ID
• sessionid is generated by the NAD and is sent over to ISE in the access-
request packet.
• Unique per Auth session
• Multiple Users can be on same port (Multi-Auth)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
URL Redirection
ISE uses URL Redirection for:
Central Web Auth
Client Software Provisioning
Posture Discovery / Assessment
Device Registration WebAuth
BYOD On-Boarding
Certificate Provisioning
Supplicant Configuration
Mobile Device Management
External Web Pages
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Session ID
C0A8013C00000618B3C1CAFB
NAS IP Address Session Count Time Stamp
RADIUS
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
CoA from Live Sessions Log
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Why ISE for Guest?
Need
Internet
GUEST
ISE GUESTBRKSEC-2695
FEATURES © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
ISE Is Best For Guest
1
million API
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Guest Demo
Demo
Pre-Expiration Notification
DESKTOP Mobile
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Oracle Access Manager SAML SSO
User Login for Sponsor, Guest, and Device Registration Portals
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
SAML Flow
• In diagram,
• ISE is Service Provider for different portal
access.
• Oracle OAM is the IDP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Customizing Portals
• 17 languages
• All portal support
(hotspot, self
registered, BYOD, ... )
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Access your portals to
manage and share For Use with
ISE 1.3 Only!
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Supports all Supports all
portal pages languages
(plus RTL –
Supports all Arabic &
portal types Hebrew)
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Portal Uploader for Firefox
Cisco ISE
***************
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Posture:
Are my Endpoints Compliant with the
Company Security Policy?
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
VPN
Aggregation Layer
Access Layer
Non-Compliant BYOD
Disk Encryption Etc ..
PSN
ISE provisions agents
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Cisco ISE Posture service
ISE Node
PAN
MnT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Cisco ISE Posture service
ISE Node
PAN
PSN
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Cisco ISE Posture service
ISE Node
PAN ISE Marks Endpoints
• Compliant
• Non-Compliant
PSN Then Apply Policy (COA)
MnT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Simplify posture administration and user experience
Next-level posture capabilities
…
UserABC
can onboard to AnyConnect faster and Other –x
Terms of Service
without interruptions.
I Agree
Benefits
Admin
More flexibility User123
Deploy AnyConnect even with
non-Cisco NADs
Less user error
Capabilities
Enforce policy automatically
• Set up automatic AnyConnect installations • Streamline client provisioning with 3rd party NAD
Better user experience support
• Install AnyConnect and enforce posture in the
Eliminate interruptions with background with AnyConnect Stealthmode • Avoid cert errors using common posture certificates
posture in the background
• Gain better visibility into endpoint activity without a
user-disrupting agent
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Always-on Policy Compliance
Posture defines the state of compliance with the company’s security policy
AUTHENTICATE USER/DEVICE
Posture: Unknown / Non-Compliant ?
QUARANTINE
Anti-Virus?
Limited Access: VLAN / dACL / SGTs
POSTURE ASSESMENT
Check Hotfix, AV, Pin lock, USB Device, etc.
REMEDIATION
WSUS, Launch App, Scripts, MDM, etc.
AUTHORIZATION CHANGE
Full Access – VLAN / dACL / SGTs.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
ISE Architecture
Where does ISE Posture service run
STANDALONE ISE Policy Services Node (PSN) MULTI-NODE ISE
- Makes policy decisions
- RADIUS / TACACS+ Servers
pXGrid Controller
- Facilitates sharing of context
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Endpoint considerations ENDPOINTS
Temporal Agent
Temporal Stealth Agent - Use Case: Temporary access, Contractor
- Use Case: Discovery - ISE gets posture status from endpoints
- ISE gets posture status from endpoints - User gets redirected to a Web Portal
- No User Interaction required - Posture conditions customizable
- Discovers Apps and HW - Remediation: Not Supported
- Applies AM and Firewall checks
- Remediation: Not Supported
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Posture Assessment options for Windows
Temporal Stealth Temporal Agent AnyConnect agent AnyConnect
Agent in Stealth Mode Agent
AM installation
Firewall enabled AM installation
Application inventory Firewall enabled
AM installation Hardware inventory Application inventory
Firewall enabled USB check Hardware inventory
Application inventory AV installation USB check
Hardware inventory AV version/AV definition date AV installation
AM installation USB check AS installation AV version/AV definition date
Posture Firewall enabled + AS version/AS definition date AS installation
Conditions Application inventory AV installation Application/ File check AS version/AS definition date
Hardware inventory AV version/AV definition date Patch Management Application/ File check
USB check AS installation OS/service packs/hotfixes Patch Management
AS version/AS definition date Process, Registry & File check OS/service packs/hotfixes
Application/ File check + Process, Registry & File check
OS/service packs/hotfixes Patch Management Disk Encryption
Process, Registry & File check Disk Encryption Service Condition
Service Condition Registry Condition
Registry Condition Dictionary Condition
Dictionary Condition
Partial Automatic Remediation
Remediation
Manual Remediation not Supported Automatic Remediation
Actions None Manual Remediation
File, Link, WSUS show UI remediation, Supported.
PM activate UI remediation, Message
(PRA) Passive- txt, AUP Policy.
AM installation AM installation
Firewall enabled Firewall enabled
Application inventory Application inventory
Hardware inventory Hardware inventory
AV installation AV installation
AV version/AV definition date AV version/AV definition date
Posture Not supported Supported AS installation AS installation
Conditions AS version/AS definition date AS version/AS definition date
Application/ File/ plist check Application/ File/ plist check
Patch Management Patch Management
OS/service packs/hotfixes OS/service packs/hotfixes
Disk Encryption Disk Encryption
Service Condition Service Condition
Dictionary Condition Dictionary Condition
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Endpoint considerations ENDPOINTS
Installation rights
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Deploying ISE Posture Best Practice
Discover your Start designing your Run Posture Polices Enable Posture
Network and the Posture Polices and in Monitor/ Audit enforcement and
current state of Conditions mode remediation
Compliance
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
AnyConnect Stealth Mode
AnyConnect can run as a service without any UI
• Stealth mode (no UI) supports all Posture features which does not
require user interactions (and no UAC as well).
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
New Application Inventory
New Summary View in
Context Directory
Hover
Multi-select
Adv Filtering
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
New Hardware Inventory
Rich Context
Utilization Filters
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Get Ahead of Threats with a Growing Intelligence Ecosystem
Threat-Centric NAC Enhancements
With the 2.2 release, ISE now takes Dynamic
in threat intelligence from Tenable, Standardized policy changes
Rapid7 and Cisco Cognitive Threat Reporting
Analytics (CTA). These new
solutions enhance posture AMP CTA
NEW
STIX Framework
assessment with a broader range
of threat-incident intelligence. Unknown Insignificant Distracting Painful Damaging Catastrophic
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Cisco ISE Posture service (2)
• The Posture Service is not typically deployed during initial deployment rollouts.
• The Posture Service may be deployed in three modes :
Audit Client is not notified of any failure results based on posture assessment policy.
Optional Client is notified of failure results and given the option to continue in order to bypass the
posture assessment policy.
Mandatory Client is notified of failure results and given a remediation timer to make corrective action
to comply with the posture assessment policy.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
AnyConnect PSN Node Discovery
Default Gateway of primary interface.
Such as 10.86.116.1, (/auth/discovery, redirection expected.
Discovery Host
If it was set in the agent profile ISEPostureCFG.xml
/auth/discovery, redirection expected
enroll.cisco.com
hard coded
/auth/discovery, redirection expected
List of PSN’s
ConnectionData.xml
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
FOR YOUR REFERENCE
8
Simple Conditions
Posture
Subscription 9 Compound 3 Download CPP
and Policy
Conditions Packages
10 Remediation 11 Posture
4 Agent Profiles
Actions Requirements and configs Client
Provisioning
12 5
Posture Policy CPP Policy
6 7 Status?
Client
Authorization Authorization Compliant
Provisioning
Profiles (DACLs) Policy NonCompliant
Unknown Portal
Authorization Policy Unknown/
Compliant NonCompliant
URL Redirect to CPP for
Endpoint NAC and Web agents
BRKSEC-2695 Access © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Posture Flow
If Posture Status = Unknown/Non-Compliant, then Redirect to ISE for Posture Assessment
If Posture Agent not deployed, then provision Web Agent or Persistent NAC Agent
https://ise.company.com:8443/guestportal/gateway?sessionId=0A010A...73691A&action=cpp
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Posture Remediation and Client Resources
CoA allows re-authentication to Hourly updates for latest posture definitions
be processed based on new New posture agents and modules
endpoint identity context (posture automatically downloaded
status).
CoA Cisco.com
Remediation Servers
ISE Policy Microsoft.com
Remediate Server
Windows
Posture Compliant = Full Access Updates
Agent
ASA
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
From ISE 1.3
Posture Lease Once postured compliant, user may disconnect/ reconnect multiple
times before re-posture
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Cisco ISE and Microsoft SCCM
Agent to Agent Communication
Per Policy e.g. Update Critical (with specific Moderate, Important & critical
Get Patch
patches) etc … Severity
Low to critical
Update the list of Patches reported by ALL
AnyConnect
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Cisco ISE and Microsoft SCCM
Pros
Agent to Agent
AnyConnect checks compliant state with the SCCM client using OPSWAT
libraries and returns ISE the state
If the SCCM Client reports that machine is compliant, no action is taken
from ISE.
If SCCM client reports machine is non-compliant, then ISE can work with
AC to apply a network policy (VLAN, dACL, etc ..) and remediate the
Any Connect SCCM Agent endpoint via SCCM client (trigger update etc …).
Cons
If the SCCM client has not sync’d in for a while, it reports AC that the client
SCCM Compliance State could
is compliant, endpoint gets network access even when they are truly non-
be out of sync. compliant.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
ISE and SCCM Integration overview
ISE 2.1 integrates with SCCM Microsoft SCCM as external MDM servers for Cisco ISE
to retrieve compliance status
of Windows managed
Cisco ISE STATUS CHECKS
endpoints.
Registered
This integration uses MDM Registered + Non-Compliant
Posture Status Registered + Compliant
flows. (ISE communicates
with SCCM Server using WMI
WMI
to retrieve the current
attributes for a device.) WMI
Managed Asset
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Cisco ISE and Microsoft SCCM
Server to Server
Pros
Current ISE
ISE Server checks compliant state (SCCM policies, last check-in for x
days, …) directly with the SCCM Server and returns ISE the state
ISE can then apply a network policy (VLAN, dACL, etc ..) based on the
MS SCCM ISE state returned from SCCM Server.
Server
Cons
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Cisco ISE and Microsoft SCCM
ISE supports configuring both flows together
MS SCCM ISE
Any Connect SCCM Agent Server
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
ISE and SCCM
Documentation
https://communities.cisco.com/docs/DOC-66933
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Why ISE for BYOD?
Need BYOD
access
EMPLOYEE
ISE BYODBRKSEC-2695
FEATURES © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Bring Your Own Device
Device Support PUBLIC
EMM integrations
Android
Resources
✕✓✕✓✓✓
Devices
MAC OSx
✓✓✕✓✕✕
✕✓✓✕✕✕
Windows
CORPORATE
Register Device
Certificate Enrollment
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Single Versus Dual SSID Provisioning
• Single SSID • Dual SSID
• Start with 802.1X on one SSID • Start with CWA on one SSID
using PEAP
SSID = BYOD-Open
(MAB / CWA)
• End on same SSID with 802.1X • End on different SSID with 802.1X
using EAP-TLS using PEAP or EAP-TLS
WLAN Profile WLAN Profile
SSID = BYOD-Closed SSID = BYOD-Closed
EAP-TLS PEAP or EAP-TLS
Certificate=MyCert (Certificate=MyCert)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Dual SSID
Device Enrollment and Provisioning
Full Access
CA
Redirect
Profiles
AD
Partial Access
MDM
EAP-TLS
open
BYOD_Provisioning
BYOD_Employee Wireless
Mobile Device Corporate
SSID LAN Resources Internet
Controllers
Full Access
CA
Redirect
Profiles
AD
Partial Access
MDM
?
PEAP
EAP-TLS
BYOD_Employee
BYOD_Employee Wireless
Mobile Device Corporate
SSID
SSID LAN Resources Internet
Controllers
Access
BYOD
Add personal device Configure adapter [Optional] If EAP-TLS [Optional] Enroll &
to ‘Registered Device’ settings (WiFi) & for authentication, compliance check for
Endpoint Group authentications install a certificate MDM policy
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Client Provisioning Policy
CONDITIONS RESULT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Client provisioning methods
Mac OSX Yes Yes ISE will redirect the client to download the setup Wizard (.dmg file format)
Windows Yes Yes ISE will redirect the client to download the setup Wizard (.exe file format)
ChromeOS Yes Yes Clients need to be pre-enrolled to Google Admin Console and also have
ISE NSA Chrome extension
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
BYOD
Native Supplicant Provisioning (iOS use-case) ForYour
For Your
Reference
Reference
PSN
Device Provisioning
CSR sent to ISE SCEP to MS Cert Authority
RUN Access-Accept
BRKSEC-2695 147
state #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
BYOD
NSP (Android use-case)
PSN
RegisteredDevice
Employee Wireless Controller ISE / SCEP Proxy s CA / SCEP Server Google Play
SSID = BYOD-Open / CWA CWA Redirect / Redirect ACL = CWA Device Registration
CENTRAL_WEB_AUTH
User opens browser
state
Redirect to ISE for CWA
CWA login
CWA login successful / Redirect to NSP Portal
User clicks Register
CoA to WLC Sample WLC ACL: Download SPW
ALLOW_GOOGLE
Redirect browser to http://play.google.com (Session:DeviceOS=Android)
permit udp any any dns
Access-Request permit tcp any <ISE_PSN>
NSP Redirect / Redirect ACL = deny ip any <internal_network>
SUPPLICANT_PROVISIONING ALLOW_GOOGLE permit tcp any 74.125.0.0
state Download Supplicant Provisioning Wizard (SPW) app from Google 255.255.0.0
Playstore
permit tcp any 173.194.0.0
User installs application and launches 255.255.0.0 Device Provisioning
App sends request to
Redirect Discovery to ISE permit tcp any 206.111.0.0
http://DFG/auth/discovery
255.255.0.0
ISE sends Device BYOD_Profile to Android Device deny ip any any
SCEP to MS Cert
CSR sent to ISE
Authority
Certificate sent to
ISE sends User Certificate to Android User Cert Issued
ISE
Device
SSID = CTS-CORP / EAP-TLS CN = Employee
Connect using EAP-TLS SAN = 00-0a-95-7f-
Access-Accept de-06
RUN
state #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
ISE BYOD Certificate options
Ease of deployment and management
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
ISE Internal CA
Why use ISE as a Certificate Authority?
Benefits of internal CA
• Internal CA simplifies ISE deployment
• Focused on BYOD, MDM, and pxGrid use-cases only, not a general purpose CA
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
ISE CA Hierarchy
Multi Node Deployment with 2 PANs and a Single PSN
P-PAN
S-PAN
• The NODE_CA on the Primary and Secondary PAN are signed by the ROOT_CA on the Primary PAN
• The NODE_CA on the Primary PAN is also responsible for signing the EP_CA and OCSP certificate for the PSNs
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
ISE internal Certificate Authority
Simplifying Certificate management for BYOD devices
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Certificate Template(s)
• Define Internal or
External CA
• Set the Key Sizes
• SAN Field Options
• MAC Address
• Set length of validity
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
EST – Enroll Over Secure Transport RFC 7030
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
ECC EAP-TLS Support
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Certificate Renewals
Works Comments 1.2.1
Before Expiry
iOS
Android
Windows
MAC-OSX
After Expiry
iOS
Android
Windows Supplicant will not use an expired cert
MAC-OSX Not tested yet
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Allowing Expired Certificates
1.2.1
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Redirect Expired Certs
1.2.1
Windows
Everything Else
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Certificate Renewal: Optional Message 1.2.1
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
ISE BYOD Certificate Configuration
SCEP Enrollment Profile and CA Certificate Import
Administration > System > Certificates > SCEP CA Profiles
The SCEP server certificate and CA and
registration authority (RA) certificates of the
certificate chain for the SCEP server are
automatically retrieved into the Cisco® ISE
trust store.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
NSP Flow – Internal CA
PSN
SSID = CORP
RA CA
Employee
PSN
CA Selection
CPP Certificate Template = Internal
User Certificate Issued:
Sent to Internal CA
CN = AD UserName
Certificate sent to ISE SAN = Values from Template
RADIUS Access-Accept BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
• Primary PAN is Root CA for ISE deployment
PKI Hierarchy and Roles • All PSNs are Subordinate CAs to PAN
PSNs are SCEP Registration Authorities
(RAs)
Enterprise Root
(optional) • ISE PAN may be Subordinate to an existing
Root CA or may be Standalone Root.
Primary PAN
• Promotion of Standby PAN:
ISE CA
Standby PAN Will not have any effect on operation of the
subordinate CAs.
For Standby to become Root CA must
PSN PSN PSN PSN manually install the Private/Public keys from
Primary PAN.
Subordinate CA Subordinate CA Subordinate CA Subordinate CA
SCEP RA SCEP RA SCEP RA SCEP RA
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Native Supplicant Profile
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
ISE is OCSP Responder for cert
Revoke Certificates from ISE validation – no CRL Lists !
• Automatically Revoked when an Endpoint is marked as “Lost”
• Certificates may be Manually Revoked
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
BYOD Security Practices from the Field
If you can, Create an Identity Group for your Corporate Owned
Devices.
• May be populated by .CSV import, or REST API
• Uses the Endpoint ID Group for what it was designed to do: MAC Address
Management
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Mobile Device compliance
MDM Policy Checks Posture Compliance assessment for Mobile devices
Device registration status
Device compliance status
1. Register with ISE 2. Internet Access
Disk encryption status
Pin lock status
Jailbreak status Cisco ISE Internet
Employee
Manufacturer *******
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
ISE Integration with 3rd-Party
MDM Vendors
• MDM device registration via ISE
• Non registered clients redirected to MDM
registration page
• Restricted access
• Non compliant clients will be given restricted
access based on policy
MCMS
http://www.cisco.com/c/en/us/products/security/partner-ecosystem.html
Version: 5.0 Version: 6.2
Version: 7.1 Version: 2.3
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Multiple MDM Support
Multiple MDM vendors can be added to ISE and used simultaneously in policy
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Configure ISE Authorization Policy
Path: Policy > Authorization (MDM Attributes)
MDM Server reachability
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
MDM Dictionary Attributes
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
MDM Authorization Profiles
Redirection authorization profile
example for MobileIron and
Meraki
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
Sample Authorization Policy
Combining BYOD + MDM
MDM:DeviceRegistrationStatus MDM:DeviceCompliantStatus
EQUALS UnRegistered EQUALS NonCompliant
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
MDM Flow
If MDM Registration Status EQUALS UnRegistered, then Redirect to MDM for Enrollment
If MDM Compliance Status EQUALS NonCompliant, then Redirect to MDM for Compliance
https://ise.company.com:8443/guestportal/gateway?sessionId=0A010A...73691A&action=mdm
ISE Policy
Google Server
Play/AppStore Cloud MDM
Authentication
MDM API
Connect to WLAN=Corp
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
MDM Remediation
CoA allows re-authentication to MDM Agents downloaded directly from MDM
be processed based on new Server or Internet App Stores
endpoint identity context (MDM Periodic recheck via API; CoA if not compliant
enrollment/compliance status).
CoA
ISE Policy
Server
Cloud MDM
ReAuth
MDM API
ReAuth after Comply
I
S
E
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
MDM Onboarding Off-Premise Devices
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
MDM Integration
Remediation
• Administrator / user can issue remote actions
on the device through MDM server (Example:
remote wiping the device)
• My Devices Portal
• ISE Endpoints Directory
Options
• Edit
• Reinstate
• Lost?
• Delete
• Full Wipe
• Corporate Wipe
• PIN Lock
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
Reporting
Mobile Device Management Report
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
For Your
MDM Serviceability - Get Device Info API Reference
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 183
Incident Response challenge
Contextual awareness key to security event prioritization and response
Check Endpoint
Associate User to Posture Where is it on
Authorization the Network?
Associate User What Kind of
to Event NAC Device is it?
IAM ???
Potential AAA
???
Logs
Breach How Do I
Event! Mitigate?
Security ???
Event
???
???
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 184
“a real platform is something that,
somebody else can develop code for,
somebody else can integrate within
a fundamental way….”
Marty Roesch @ RSA Conference 2016
Cisco Security VP
https://youtu.be/pafHZmWWGo8
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
Integrating the traditional way
I have reputation info! I have application info!
I need threat data… I need location & auth-group…
I have NetFlow!
• Single-purpose function = need for manyProprietary
APIs/dev (and lots of testing)
I have location!
I need entitlement…
• Not configurable = too much/little info for APIs aren’t
interface I need identity…
systems (scale issues)
the solution
I have data
• Pre-defined threatexchange
data! = wait until next release if you need aI change
have MDM info!
I need reputation… I need location…
• Polling architecture = can’t scale beyond 1 or 2 system integrations
I have firewall logs! I have app inventory info!
• Security can beI “loose”
need identity… I need posture…
INFRASTRUCTURE
FOR A ROBUST
Direct, Secured ECOSYSTEM
Interfaces
• Single framework – develop once,
instead of multiple APIs
pxGrid
Context • Customize and secure what
Sharing context gets shared and with
which platforms
Single, Scalable
Framework • Bi-directional – share and
consume context
• Enables any pxGrid partner to
share with any other pxGrid
partner
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
pxGrid – Industry Adoption Critical Mass
50+ Partner Product Integrations and 12 Technology Areas
IAM & SSO • Application Protection: Arxan, DB Networks
Vulnerability • SIEM and Analytics: HanSight, Hawk*, Huntsman*,
SIEM & Assessment LogRhythm*, Micro Focus NetIQ*, Splunk*, TripWire*, IBM-
Threat Defense
? User Behavior
Qradar, Secureonix
• CASB: Elastica*, NetSkope, Skyhigh
Analytics • Deception: Attivo, illusive*, TrapX*
Net/App
Performance Packet Capture • Endpoint and Custom Detection: Invincea*, Redshift*,
& Forensics ThreatTrack, CloudPost Networks***, McAfee DXL,
TriagingX
IoT
Cisco pxGrid Rapid Threat • Firewall and Policy Management: Bayshore*, Check Point,
InfoBlox*, Intelliment, Cisco FMC*
Containment
Security SECURITY THRU (RTC) • Forensics and IR: Cisco Cognitive Threat Analytics*,
Lumeta, Endace, Cisco Stealthwatch*, Lemonfish*,
INTEGRATION TripWire*, WireX Systems
Firewall & Cloud Access • IAM/SSO: Ping Identity, Secureauth*, Situational
Access Control Security • Other: Cisco WSA, Ark NSS****, Cisco ISE PIC
• Threat Intelligence: Infocyte*
DDI • UEBA: E8*, Exabeam*, Fortscale*, Niara, Greenlight****
• Vulnerability Management: Rapid 7*, SAINT*, Tenable*,
Cisco ISE Tripwire*
Cisco WSA
Solutions
Cisco FirePOWER Cisco Stealthwatch * Rapid Threat Containment, ** Regulatory and Compliance Solution
***IoT, ****Regulatory and Compliance
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
Context based ‘Web filtering’
With Cisco Web Security Appliance (WSA) and Identity Service Engine (ISE)
Who: Doctor
What: Laptop
Where: Office RADIUS PxGRID
Internet
Who: Doctor
What: iPad
Enterprise W ww
Where: Office Backbone
Web
Security
Who: Guest
What: iPad Appliance
Where: Office
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
ISE PxGrid Ecosystem
Sharing Contextual data with Stealthwatch
Context Information
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 191
ISE PxGrid Ecosystem
Sharing Contextual data with Splunk
Context Information
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
Integrated Threat Defense
(Detection & Containment)
Employee
Change Authorization
ISE Supplier
Quarantine Server
Event: XYZ
Source IP: 10.4.51.5
Role: Supplier
Lancope Response: Quarantine
StealthWatch
or 3rd party App Network Fabric
Such as Splunk
Quarantine High Risk
Segment
Shared Internet
Server
Employee
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
pxGrid enables these 4 scenarios
CONTEXT TO PARTNER ENRICH ISE CONTEXT THREAT MITIGATION CONTEXT BROKERAGE
ISE makes Customer IT Enrich ISE context. Make Enforce dynamic policies in ISE brokers Customer’s IT
Platforms User/Identity, ISE a better Policy to the network based on platforms to share data
Device and Network Aware Enforcement Platform Partner’s request amongst themselves
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
• pxGrid Operation
• Context Exchange Use cases
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
PxGrid components External
TLS / 5222
HTTP / 443
PxGrid
PxGrid Publisher PxGrid Controller
Subscriber
Listens on ports:
TCP/7400: Connection from internal processes
TCP/5222: Accepts connection from pGrid Clients
TCP/1521: Accepts connections to DB from XCP
TCP/694: Heartbeat traffic between pxGrid nodes
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
Enabling PxGrid
ISE PSN nodes that control the Grid
Needs ISE ‘Plus’ License
PxGrid Controller
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
PxGrid Controller
Password authentication support from ISE 2.1 (discussed later)
Client connection can be auto approved or can be set to manual approval
PxGrid Controller
PxGrid Pub/Sub
EndpointProfileMetada provides pxGrid clients with available device information from ISE.
PxGrid
Subscriber
GROUP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
PxGrid Client Groups
pxGrid uses group-based authorization.
When a client connects for the first time, the client is associated with a group.
Basic provides ISE pxGrid node connectivity. ANC Adaptive Network Control, access to
No session data ’exception policy’
Session Members can subscribe to session notification, EPS Earlier version of ANC (used by Splunk,
query session info, download bulk session data. Lancope, FireSIGHT Management Center 5.4)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
The Grid controller authorizes exchange
Publisher GCL Client pxGrid Controller XCP Server GCL Client Subscriber
Publish Success
I Published Message to Subscriber
N Subscribe Success
F Publisher Capability & JID Query
R Publisher JID
A XMPP:Bulk Download Query
PASSWORDS
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 206
CA signed PxGrid certificate
Special cert template with
Root CA
EKU for both client and
Public
server authentication
ISE
C
Grid Controller Grid Client
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
ISE 2.1 CA for certificates
No need for a external CA server WWW
1. Use a Single Certificate Authority
2. Each pxGrid Participant Trust That Certificate
Authority
3. Each pxGrid Client use a ‘pxGrid’ Certificate
from that CA
4. *Controller Must still Authorize the
Splunk > FMC
Communication Controller
X.509
X.509
X.509
X.509X.509
pxGrid
pxGrid
pxGrid
pxGrid
X.509
pxGrid pxGrid
MnT
ISE 2.1 CA
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
New template in 2.1
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
PxGrid publication
IETF
https://datatracker.ietf.org/doc/draft-appala-mile-xmpp-grid/
Cisco
DevNet
https://developer.cisco.com/site/pxgrid/
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
• pxGrid Operation
• Context Exchange Use cases
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Firepower polices based on SGT
‘Access Control Policies’ based on ISE Attributes
PxGRID
NGIPS /
ASA + Firepower
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Context based ‘Web filtering’
With Cisco Web Security Appliance (WSA) and Identity Service Engine (ISE)
Who: Doctor
What: Laptop
Where: Office RADIUS PxGRID
Internet
Who: Doctor
What: iPad
Enterprise W ww
Where: Office Backbone
Web
Security
Who: Guest
What: iPad Appliance
Where: Office
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Secure cloud access
Context enables Single-Sign-On (SSO) and role-based access
SAML:EMP_CORP
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
Cloud access policy based on ISE attributes
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 216
ISE and Infoblox
Context based IPAM: IP address management with user and device context.
Threat containment: Infoblox detects suspicious DNS resolutions and requests ISE quarantine over ANC
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Cisco ISE provides context to Stealthwatch
Context Information
Syslog
pxGrid
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
ISE ecosystem partners
http://www.cisco.com/c/en/us/products/security/partner-ecosystem.html
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
PxGrid Use cases – 1
Use-Case Description Partner
IAM/SSO: ISE device, posture context to IAM to control application access. Situational
Device/Access-Aware Application (ID/IP)
Access
IAM/SSO: ISE user, group, access, device context to drive escalate auth policy. ISE auth Situational
Escalated Auth & SSO via Network state to SSO for network-to-application “zero sign-on” user experience. (ID/IP)
Auth SecureAuth,
NetIQ Network
Access Manager
Vulnerability Assessment: ISE identity and user role to vulnerability assessment platform to prioritize endpoint Tenable,
Prioritize Endpoint Vulnerabilities vulnerability remediation and drive Rapid Threat Containment quarantine actions Rapid 7, SAINT
via pxGrid Adaptive Network Control.
P-Cap/Forensics: ISE IP:user:device binding & related context to packet capture system to attribute Emulex
Simplify Packet Capture Forensics user, device, role, etc. to packet capture.
IoT Security: Associate Group Based Policies policy with IoT devices. ISE user/device context Bayshore
Network Access Policy for IoT with DLP. Rapid Threat Containment for quarantining non-compliant devices via Networks
Devices pxGrid Adaptive Network Control.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
PxGrid Use cases – 2
Use-Case Description Partner
Cloud Access Monitoring: ISE user, group, access, device context to enhance monitoring & SkyHigh, Elastica
User/Device-Aware Cloud-Hosted reporting of access to cloud services by end-users.
Resource Monitoring
Network/App Performance Monitoring: ISE IP:user:device binding & related context to network data system to Savvius
User/device-aware network topology & attribute user, device, role, etc. to visualization and performance
performance management management data.
Threat Defense: Assess typical behavior of individual and groups of users and then FortScale,
User-behavior anomaly (UBA) detection look for anomalous behavior. Utilizes ISE user/device context in Rapid 7, E8
analytics and event reporting.
WSA+ISE: Web access decisions based on ISE user/device context. Enables Cisco WSA
User-aware web security policies customers to differentiate web content access policies based on real-
time user and device situational awareness.
DNS, DHCP & IP Address Management: Associate users and user network privileges with DHCP leases, IP Infoblox
User, Group and Device Based DDI address assignments and domain name access by using ISE
Monitoring & Reporting user/network context.
SIEM/TD: Same use-cases as existing SIEM/TD ecosystem, but utilizing pxGrid NetIQ, Lancope,
User/Device-Aware SIEM/ThreatDefense for context and Rapid Threat Containment. Splunk, FireSIGHT
Integration Management Center
BRKSEC-2695 © 2018 5.4, LogRhythm
Cisco and/or its affiliates. All rights reserved. Cisco Public 221
Single-Purpose APIs are Great for One Purpose
…Integrating One System to One Other System
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 222
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
Policy and Segmentation
Design needs to be replicated to multiple locations, buildings, floors
ACL
Aggregation Layer
VLAN Addressing DHCP Scope
Access Layer
Simple
More Policies
Segmentation
using more
with 2VLANs
VLANs
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
Software-Defined Segmentation with Cisco
Group Based Policies / SGT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
How Group Based Policies / SGT is used today
User to DC
Access Control
Network & Role BYOD Application Secure PCI & PHI
Segmentation Security Protection Contractor Access Compliance
Campus & DC
Segmentation
Server Firewall Rule Fast Server Threat Defense Machine-
Segmentation Reduction Provisioning Machine Control
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
Segmentation with Security Group
DC-MTV (SRV1)
DC-MTV (SAP1) Production
DC-RTP (SCM2) Servers
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
Enforcing Policy Downstream
Propagation Enforce
Classify
&
Timecard
Mark application
server
Credit Card
Firewall transaction server
Context Telemetry:
• Manager Enforcement
• Windows PC
• Compliant
Cisco ISE
Classify Mark, Propagate, Enforce
• IP Precedence and DiffServ code points
• 802.1Q User Priority
• MPLS VPN
• Group Based Policies
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
Classification
Classification Summary
SGT Assignment
Common Classification for Mobile Devices Common Classification for Servers, Topology-
based policy, etc.
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Classification
Enterprise
Backbone
SRC: 10.1.100.98
Hypervisor SW
VLAN is mapped
WLC FW
to SGT
Virtual Machine is
BYOD device is mapped to SGT
classified with
SGT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Classification
Static Classification
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Classification
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Classification
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 234
Propagation
10.1.100.98 50
ASIC ASIC ASIC
Optionally Encrypted L2 Ethernet Frame
SRC: 10.1.100.98
(No CMD)
Enterprise
Backbone
WLC FW
Inline Tagging (data plane): IP Address SGT SRC
Inline Tagging
• SGT embedded within Cisco Meta Ethernet Frame Cisco Meta Data MACsec Frame
Data (CMD) in Layer 2 frame Destination MAC CMD EtherType Destination MAC
Source MAC Version Source MAC
• Capable switches understands and 802.1Q 802.1AE Header
Length
process SGT at line-rate CMD 802.1Q
AES-GCM 128bit
SGT Option Type
ETHTYPE CMD
• Optional MACsec protection
Encryption
SGT Value
ETHTYPE
PAYLOAD Other CMD Option
• No impact to QoS, IP
PAYLOAD
MTU/Fragmentation CRC
16 bit
• L2 Frame Impact: ~40 bytes 64K name space 802.1AE Header
ETHTYPE:0x8909 CRC
• Recommend L2 MTU~1600 bytes
ETHTYPE:0x88E5
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 236
Propagation
Packet Format
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
Propagation
SXP Flow
IP Src: 10.1.3.2 Dst:
10.1.3.1
TCP Src Port: 16277 Dst Port: 64999
IP Src: 10.1.3.1 Dst:
Flags: 0x02 (SYN)
10.1.3.2
IP Src: 10.1.3.2 Dst: TCP Src Port: 64999 Dst Port: 16277
10.1.3.1 Flags: 0x12 (SYN, ACK)
TCP Src Port: 16277 Dst Port: 64999
Flags: 0x10 (ACK) TCP SYN
Speaker TCP SYN-ACK Listener
TCP ACK
CTS6K CTS7K
10.1.10.100 (SGT6) 10.1.3.2 10.1.3.1
Cisco ISE
SXP OPEN
IP Src: 10.1.3.2 Dst:
10.1.3.1 SXP OPEN_RESP
TCP Src Port: 16277 Dst Port: 64999
Flags: 0x10 ( ACK) SXP UPDATE
IP Src: 10.1.3.1 Dst:
SXP Type: Open 10.1.3.2
Version: 1 TCP Src Port: 64999 Dst Port: 16277
Device ID: CTS6K Flags: 0x18 (PSH, ACK)
IP Src: 10.1.3.2 Dst: SXP Type: Open_Resp
10.1.3.1 Version: 1
TCP Src Port: 16277 Dst Port: 64999 Device ID: CTS7K
Flags: 0x10 (ACK)
SXP Type: Update
Update Type: Install
IP Address: 10.1.10.100 SGT: 6
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 238
Enforcement
Destination Classification
Web_Dir: SGT 20
CRM: SGT 30
End user authenticated
FIB Lookup
Classified as Employee (5)
Destination MAC/Port SGT 20
ISE
Web_Dir
SRC\DST CRM (30)
(20)
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
SGACL Policy on ISE for Switches
2
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Enforcement
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Review: SGFW flow
Business Data What was missing in SGFW ? Classification
App / Storage
Firewall Rules
Source Destination Action
Firewall
IP SGT IP SGT Service Action Propagation
Any Employee Any Biz Server HTTPS Allow Enforcement
Any Suspicious Any Biz Server Any Deny
Corp Asset
Endpoints
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 242
Visibility and Control for Remote Access
Production Apps Development
Data Center
Data Center ISE
Firewall
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Confidentiality
MACsec and NDAC
Media Access Control Security and Network Device Admission Control
• MACsec: Layer-2 Encryption (802.1AE)
• Industry Standard Extension to 802.1X
• Encrypts the links between host and switch and links between switches.
• Traffic in the backplane is unencrypted for inspection, etc.
• Client requires a supplicant that supports MACsec and the encryption key-exchange
SWITCHPORT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
Use Case: DC Access Access Control
Traditional Firewall Rules
Policy Source Policy Dest. Svc Act.
Reduced OPEX Object - S Object- D
Admin reduction 24 -> 6 10.1.1.0/24 Fin Web
People Finance 10.1.2.0/24 Server 172.1.1.1 Web Permit
10.1.3.0/24
Reduced “ACE” Entries 10.1.1.0/24 Devlp
Reduction 60 - 90%. Engr 10.1.2.0/24 Server 172.1.1.2 Web Permit
10.1.3.0/24
Topology Independent SGA Firewall Rules
Rules with no IP addresses SGT - User SGT - Service Svc Act.
Fin Web
Contextual Access
Finance-Corp-PC Server Web Permit
User+Device
Fin Web
User+Device+Access_type Finance-IPAD Server Web Deny
Devlp Server
Engr-All-Devices Web Permit
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Use Case: Peer-to-Peer Malware Control
Production
Employee
Servers
HR Database
Cisco ISE
Assets
Sales Developer Guests Malware Blocking
Internet ACL
Access
Source
Malware
Sales DENY DENY PERMIT
Blocking Deny tcp dst eq 445 log; block SMB file
Malware sharing
Developer DENY DENY PERMIT
Blocking
Deny tcp dst range 137 139 log; block
Guest DENY DENY DENY PERMIT
NetBios Session Service
Permit all
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Group Based Policies : Controlling Bonjour Peer-to-
Peer Bonjour Sender: Bonjour Sender:
Bonjour Receiver: Professor iPAD Student iPhone
Classroom Display
mDNS Service Advertisements
Controlling Bonjour:
1. Filtering mDNS Service Advertisements:
2. Blocking Bonjour UDP data packets
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
Use Case: Data Center Segmentation
Protected Assets
Production Development HR
Storage
Servers Servers Database
Production
PERMIT DENY DENY PERMIT
Servers
Source
Development
DENY PERMIT DENY PERMIT
Servers
HR
DENY DENY PERMIT PERMIT
Database
Storage PERMIT PERMIT PERMIT PERMIT
Enforcement Classification
HR Database
Development
DC FW DC Switch server
SGT Propagation
Segmentation
No VLANs
Cisco ISE
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Use Case: Data Center VM Automation
5 Days
Admin Clone Boot VM Security Firewall rules New VM
Log-in Template to and Team added installed
Hypervisor new VM provision provisions
3 Days
Admin Clone Boot VM N1KV Auto learns IP,
Log-in Template to and Policy pushed to
Hypervisor new VM provision Firewall
1 Hour
Admin Log-in UCS N1KV Auto learns IP,
Director and clicks on Policy pushed to
new VM catalog Firewall
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
Group Based Policies Functions and Platform Support
Classification Propagation Enforcement
Catalyst 2960-S/-C/-Plus/-X/-XR SXP Catalyst 2960-S/-C/-Plus/-X/-XR Catalyst 3560-X
Catalyst 3560-E/-C/-X SXP Catalyst 3560-E/-C/, 3750-E
SGACL Catalyst 3750-X
Catalyst 3750-E/-X Catalyst 3560-X, 3750-X Catalyst 3850/3650
SXP SGT
Catalyst 3850/3650 SGACL WLC 5760
SXP SGT Catalyst 3850/3650 Catalyst 4500E (7E)
WLC 5760
SXP Catalyst 4500E (Sup6E) Catalyst 4500E (8E)
Catalyst 4500E (Sup6E/7E) SGACL Catalyst 6500E (2T)
SXP SGT Catalyst 4500E (7E, 8), 4500X
Catalyst 4500E (Sup8) Catalyst 6800
Catalyst 6500E (Sup720/2T) SXP Catalyst 6500E (Sup720)
Nexus 7000
Wireless LAN Controller SXP SGT Catalyst 6500E (2T), 6800 SGACL
2500/5500/WiSM2 Nexus 6000 NEW
SXP WLC 2500, 5500, WiSM2
Nexus 7000 Nexus 5600 NEW
SXP SGT WLC 5760 SGACL
Nexus 6000 NEW
Nexus 5500
SXP SGT
SGT Nexus 1000v NEW inline tagging
Nexus 5600 NEW Nexus 1000v NEW
Nexus 5500 SXP SGT Nexus 6000/5600 NEW SGACL
Nexus 1000v (Port Profile) SXP SGT Nexus 5500/22xx FEX ISR G2 Router, CGR2000
SGFW
SXP SGT Nexus 7000/22xx FEX
ISR G2 Router, CGR2000 SXP SGT GETVPN. DMVPN, IPsec ISRG2, CGS2000 ASR 1000 Router
SGFW
SXP SGT GETVPN. DMVPN, IPsec ASR1000 CSR-1000v Router
IE2000/3000, CGS2000 NEW
SXP SGT ASA5500 Firewall, ASASM
ASA 5500 Firewall
NEW
ASA5500 (VPN RAS) NEW SGFW ASAv Firewall NEW
• Inline SGT on all ISRG2 except 800 series:
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
SXP: IETF Internet Draft
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 251
ISE Deployment
Architecture
ISE Node Personas = Functional Roles
Policy Administration Node Policy Service Node Monitoring and Network Access
All Management UI Activities RADIUS, Profiling, Web Troubleshooting Device
Synchronizing all ISE Nodes Auth, Posture, Sponsor Logging and Access-Layer Devices
Portal, Client Provisioning Reporting Data Enforcement Point for
all Policy
PAN PSN MnT NAD
SWITCHPORT
Admin
User All Policy is Synchronized
User
from PAN to PSNs
RADIUS From NAD to Policy Service Node
AD
RADIUS From PSN to NAD w/ Enforcement Result
RADIUS Accounting
Logging
Logging
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 253
Basic 2-Node ISE Deployment (Redundant)
Maximum Endpoints = 10,000 (Platform dependent)
Admin Admin
MnT PSN MnT PSN
HA Inline
Campus B WLC
Posture Nodes
Campus A
ASA VPN Switch
802.1X
AP
WLC
PSN
HA Inline
Campus B WLC
Posture Nodes
Campus A
PSN
ASA VPN PSN Switch
802.1X
AP
WLC
PSN • Dedicated Management Appliances
AP • Primary Admin / Secondary MnT
Branch A Switch
• Primary MnT / Secondary Admin
Branch B
802.1X
• Dedicated Policy Service Nodes
• Up to 5 PSNs
Switch Switch • No more than 10,000 Endpoints Supported
AP 802.1X AP 802.1X
• 3355/3415 as Admin/MnT = Max 5k endpts
• 3395/3495 as Admin/MnT = Max 10k endpts
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Fully Distributed Deployment
Maximum Endpoints = 250,000 / Maximum 40 PSNs
HA Inline
Campus B WLC
Posture Nodes
Campus A
PSN
ASA VPN PSN Switch
802.1X
AP
WLC • Dedicated Management Appliances
PSN • Primary Admin
AP • Secondary Admin
Branch A Switch Branch • Primary MnT
802.1X
B • Secondary MnT
• Dedicated Policy Service Nodes
Switch Switch • Up to 40 PSNs
AP 802.1X AP 802.1X
• Up to 100k endpoints using 3395 Admin and MnT
• Up to 250k endpoints using 3495 Admin and MnT
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 256
VMware OVA Templates!
• Finally! We have supported OVA Templates
• Ensures customers will not misconfigure their VMware settings
• Preset: Reservations, vCPUs, Storage
• Based on following Specs:
ISE-1.3.x.x-Eval-100-endpoint.ova:
• 2 CPU cores
• 4 GB RAM
• 200 GB disk
• 4 NICs
ISE-1.3.x.x-Virtual-SNS-3415.ova: ISE-1.3.x.x-Virtual-SNS-3495.ova:
• 4 CPU cores • 8 CPU cores
• 16 GB RAM • 32 GB RAM
• 600 GB disk • 600 GB disk
• 4 NICs • 4 NICs
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Agenda
• Introduction
• Visibility
• Profiling
• AAA (802.1X & MAB)
• ISE Guest & Employee WebAuth
• Compliance: Desktop Posture, BYOD & MDM
• pxGrid: Enabling a Security EcoSystem
• Group Based Policies / Licensing / Roadmap
• Conclusion
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
Licensing Enhancements
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 259
Brief Licensing Overview
Access Context Compliance
• Endpoint must be online & Using the feature for it to consume a license
• Leaving the network will free the license & return it to the pool
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 260
A Systems Approach to
Building an Identity
Access Control
Architecture
Choosing the Correct Building Blocks
The “Group Based Policies ” Portfoliowww.cisco.com/go/Group Based Polic
Policy
Administration
Policy Decision Identity Services Engine (ISE)
Identity Access Policy System
Policy
Enforcement
Group Based Policies Cisco 2960/3560/3700/4500/6500, Nexus 7000 Cisco ASA, ISR, ASR 1000
Powered switches, Wireless and Routing Infrastructure
Policy
Information NAC Agent Web Agent 802.1X Supplicant
Group Based Policies No-Cost Persistent and Temporal Clients AnyConnect or
Powered for Posture, and Remediation OS-Embedded Supplicant
Identity-Based Access Is a Feature of the Network
Spanning Wired, Wireless, and VPN
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 262 262
Group Based Policies Design and How-To Guides
Secure Access Blueprints
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
ISE Public Resources
ISE Public Community
http://cs.co/ise-community
BRKSEC-2695
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 264
Public ISE Community
@ http://cs.co/ise-community
BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Complete your online session evaluation
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 266
Recommended Reading
• Buy our book, help us afford more beer!
http://amzn.com/1587144263 http://amzn.com/1587143259
Continue
your Demos in
the Cisco
Walk-in
self-paced
Meet the
engineer
Related
sessions
education campus labs 1:1
meetings
#CLUS BRKSEC-2695 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 268
Thank you
#CLUS
#CLUS