81819-ISE Posture Configuration Exercise
81819-ISE Posture Configuration Exercise
Lab Overview
This lab is designed to help attendees understand how to deploy Identity Services Engine (ISE)
Posture Services. ISE Posture Services provide assessment and policy enforcement for
endpoints including optional remediation and traffic control for Windows and MacOS clients. This
lab covers the configuration of Posture Services including Client Provisioning, Posture Policy
creation, and configuration of access policies based on endpoint assessment results. Attendees
will use a Windows client to validate assessment, remediation, and access policies. Lab
participants should be able to complete the lab within the allotted lab time of 3 hours.
Lab Exercises
This lab guide includes the following exercises:
• Lab Exercise 1: Introduction to ISE Posture Services and Configuration Workflow
• Lab Exercise 2: Configure and Deploy Client Provisioning Services
• Lab Exercise 3: Define Authorization Policy for Client Provisioning and Posture
Compliance
• Lab Exercise 4: Test and Monitor Client Provisioning Services for Web Agent
• Lab Exercise 5: Test and Monitor Client Provisioning Services for NAC Agent
10 ACCESS 10.1.10.0/24 Netw ork for authenticated users or access netw ork
using A CLs
70 ASA (trusted) 10.1.70.0/24 ASA inside netw ork to IPEP untrusted interface
100 DA TACENTER 10.1.100.0/24 Netw ork services (AAA, AD, DNS, DHCP, NTP, etc.)
Note: Dedicated VLANs have been preconfigured for optional access policy assignments based on user identity,
profiling, or compliance status. These VLANs inc lude MA CHINE, QUA RA NTINE, and GUEST. This lab w ill
focus on the use of dow nloadable ACLs (dACLs) rather than VLA N assignment for policy enforcement. By
default, all c lient PC access w ill remain in the ACCESS VLAN 10 and IP phones w ill be placed in V OICE
VLAN 40.
Note: Admin PC access is through RDP, therefore you must have an RDP c lient installed on your computer
Connect to a POD
Step 1 Launch the Remote Desktop application on your system.
a. In the LabOps student portal, click on the Topology tab
b. Click on the Admin PC, then click on the RDP Client option that appears:
c. Clicking on this option should launch your RDP client and connect you to the
Admin PC. Log in as DEMO\admin / cisco123 (Domain = DEMO)
d. All lab configurations can be performed from the Admin client PC.
Step 1 From the Admin client PC, click the VMware vSphere Client icon on the desktop
Step 2 The IP address of your pod’s ESX server is 10.1.11.X where X = 10+(your pod number)
Note: Be careful to only connect to your pod’s ESX server. If unsure, contact your class proctor.
Step 2 Once logged in, you will see a list of VMs that are available on your ESX server:
Step 6 To access the VM console, select Open Console from the drop-down.
Step 7 To login to a Windows VM, select Guest > Send Ctrl+Alt+del from the VM Console menu:
You can also use the shortcuts in the Windows Quick Launch toolbar.
b. If prompted, click Yes to cache the server host key and to continue login.
c. Login using the credentials listed in the Accounts and Passwords table.
Step 2 To access the console for other devices using SSH:
a. From the Admin client PC, go to Start and select from the Windows Start
Menu to open a terminal session using PuTTY.
b. Refer to the Internal IP Addresses table, and then enter the hostname or IP address of
the desired device in the Host Name (or IP address).
c. Click Open.
d. If prompted, click Yes to cache the server host key and to continue login.
e. Login using the credentials listed in the Accounts and Passwords table
Note: The ping test may fail for VMs that have not yet completed the boot process.
Step 5 Enter the credentials admin / cisco123 when prompted to allow the AD operation, and then
click OK.
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 9
Step 6 After a few moments, a message should appear to indicate that the node has successfully left
the domain. Click OK.
Exercise Objective
In this exercise, your goal is to:
• Understand basic ISE Posture Services and configuration workflow
Step 2 Note that the Posture Services workflow is comprised of three main configuration sections:
• Client Provisioning
• Posture Subscription and Policy
• Authorization Policy
The diagram depicts the logical grouping of configuration tasks under each section.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Complete general system settings to support Client Provisioning and Posture Services
• Download AV/AS support files for use in posture assessment and policies
• Download client agent software to deploy to the lab client
• Create a NAC Agent profile to deploy to the lab client
• Define a Client Provisioning Policy to deploy agents based on user identity and client OS
The diagram highlights the key tasks covered in this exercise including System Settings,
Download of Dynamic Updates and CPP Packages, Agent Profiles and CPP Policy:
Note: You may continue w ith the lab exercise at this time. Please return to this page in approximately fifteen
minutes to verify that the Update Infor mation has been populated w ith date/time of Last Update and version
info for Cisco conditions and AV/AS support.
Attribute Value
Remediation Timer 4 (Minutes)
Network Transition Delay 3 (Seconds)
Default Posture Status Compliant
Automatically Close Login Success [✓]
Screen After 2 (Seconds)
c. Click Save.
Note: Values assigned through the agent profile w ill override these global settings.
Note: The AUP for w eb-authenticated users is set under Adm inistration > Guest Management > Settings >
Guest > Multi-Portal Configurations > (Portal Nam e).
Step 7 Set the location and policy for downloading Client Provisioning updates.
Click Client Provisioning from the left-hand pane and verify the following default values are
set:
Attribute Value
Enable Provisioning Enable
Enable Automatic Download Disable
Update Feed URL http://www.perfigo.com/ise/provisioning-update.xml
e. At a minimum, select the current NAC Agent, Web Agent and Compliance Module
(AV/AS support module) from the list and click Save.
f. Wait until the files are downloaded to the ISE appliance.
Note: The “ merge” option updates the current agent profile parameter only if value not already defined; this option
w ill not update parameters w ith an existing value. The “overwrite” option w ill update a parameter w hether
explicitly defined or not.
Step 10 Define Client Provisioning Policy for AD Employees and Guest users.
Go to Policy > Client Provisioning. Add two new Client Provisioning rules per the following
table values, and then click Save:
Note: Click to the right of any rule entry to insert or duplicate entries.
Note: If multiple versions of same file type ( NA C Agent/Web Agent/Compliance module) w ere dow nloaded to the
Client Prov isioning repository, select the most current version available.
Step 11 Configure web authentication portal to download posture agent per Client Provisioning Policy.
a. Navigate to Administration > Guest Management > Settings and click the icon to left
of Guest (or double-click Guest) to expand its contents.
b. Select Multi-Portal Configurations from the left-hand pane and then select
DefaultGuestPortal.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Define a Downloadable ACL (dACL) that restricts network access for endpoints whose
compliance state is either Unknown or NonCompliant.
• Define a new URL Redirect ACL on the access switch to ensure that general http/https
traffic is redirected to the ISE Policy Service node while allowing access to remediation
servers.
• Define new Authorization Profiles for 802.1X and web-authenticated users that apply the
“quarantine” dACL and Redirect ACL to redirect endpoints to provisioning and posture
services.
• Add new rules to the Authorization Policy that leverage the new Authorization Profiles to
quarantine, assess posture, and remediate endpoints that are not posture compliant.
• Update existing Authorization Policy rules such that privileged network access is based
on posture compliance.
The diagram highlights the key tasks covered in this exercise including Authorization Profiles,
their component dACLs, and Authorization Policy:
Note: There is currently NO A CL syntax checking for DACL contents so it is imperative that entries be carefully
review ed for errors prior to submitting.
Note: The final access list entry in the POSTURE_REMEDIA TION dA CL is technically not required since http is
already per mitted for any destination in a previous entry. Its inclusion here is simply to emphasize the need
to make sure that access is allow ed to remediation servers. It also highlights the need to include an entry in
the URL Redirect ACL to explicitly deny redirection of traffic destined to remediation servers.
a. From the Admin client PC, use the desktop shortcut for the PuTTY SSH client to
launch a terminal session to the 3k-access switch (10.1.250.2) using the credentials
admin / cisco123 (enabled password cisco123).
b. Enter configuration mode and add the following IP access list named ACL-POSTURE-
REDIRECT if not already present:
3k-access# conf t
3k-access(config)# ip access-list extended ACL-POSTURE-REDIRECT
3k-access(config-ext-nacl)# deny udp any any eq domain
3k-access(config-ext-nacl)# deny udp any host 10.1.100.21 eq 8905
3k-access(config-ext-nacl)# deny udp any host 10.1.100.21 eq 8906
3k-access(config-ext-nacl)# deny tcp any host 10.1.100.21 eq 8443
3k-access(config-ext-nacl)# deny tcp any host 10.1.100.21 eq 8905
3k-access(config-ext-nacl)# deny tcp any host 10.1.252.21 eq www
3k-access(config-ext-nacl)# permit ip any any
3k-access(config-ext-nacl)# end
3k-access# wr mem
This ACL will be called by the Authorization Profile and work in conjunction with the
accompanying dACL applied to the switchport interface.
Step 4 Define a new Authorization Profile for 802.1X-authenticated/NAC Agent users named
Posture_Remediation that leverages both the new dACL for port access control and the URL
Redirect ACL for traffic redirection.
a. Return to the ISE admin interface from the Admin client PC.
b. Click Authorization Profiles from the left-hand pane under Policy > Policy Elements >
Results > Authorization.
c. Click Add from the right-hand pane and enter the values for the Authorization Profile as
shown below.
Attribute Value
Name Posture_Remediation
Permit access to posture and remediation services;
Description redirect traffic to client provisioning and posture
services.
Access Type ACCESS_ACCEPT
DACL Name [ ✓ ] POSTURE_REMEDIATION
Posture Discovery [ ✓ ] ACL-POSTURE-REDIRECT
d. The resultant Attribute Details should appear at the bottom of the page as the following:
Step 5 Define a new Authorization Profile for web-Authenticated/Web Agent users named
CWA_Posture_Remediation that leverages both the new dACL for port access control and the
URL Redirect ACL for traffic redirection.
a. Click Authorization Profiles from the left-hand pane under Policy > Policy Elements >
Results > Authorization.
b. Click Add from the right-hand pane and enter the values for the Authorization Profile as
shown below.
Attribute Value
Name CWA_Posture_Remediation
Permit access to posture and remediation services;
Description
redirect traffic to central web auth services.
Access Type ACCESS_ACCEPT
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 23
Attribute Value
DACL Name [ ✓ ] POSTURE_REMEDIATION
Centralized Web Authentication [ ✓ ] ACL-POSTURE-REDIRECT
c. The resultant Attribute Details should appear at the bottom of the page as the following:
Note: The difference betw een the tw o profiles is the URL Redirect cisco-av-pair attribute. Users that need to be
authenticated using CWA w ill be initially redirected to the guest portal for w eb authentication (cw a) and then
automatically redirected to the Client Pr ovisioning Portal (cpp) as needed. Users authenticated through
802.1X w ill be redirected directly to the Client Pr ovisioning Portal.
Identity
Status Rule Nam e Other Conditions Perm issions
Groups
Pr ofiled Cisco IP Phones Cisco-IP- - Cisco_IP_Phones
Phone
Domain_Computer Any demo.local:ExternalGroups AD_Login
EQUALS demo.local/Users/Domain
Computers
Employee Any demo.local:ExternalGroups Employee
EQUALS demo.local/Users/employees
AND
Session:PostureStatus EQUALS Compliant
Employee_PreCompliant Any demo.local:ExternalGroups Posture_Remediation
EQUALS demo.local/Users/employees
AND
Session:PostureStatus NOT EQUALS
Compliant
Contractor Contractor Session:PostureStatus EQUALS Compliant Guest
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Login to the secured lab network from a Windows 7 PC client as a Guest user via Central
Web-based Authentication (CWA) and verify Web Agent provisioning.
• Review ISE and switch logs to validate proper operation and application of the
Authorization Policy.
Step 2 Establish a terminal session with the access switch (10.1.250.2) and simulate a new network
connection from the Win7 Client PC connected behind a Cisco IP phone on port
GigabitEthernet0/1.
a. From the Admin client PC, use the desktop shortcut for the PuTTY SSH client to
launch a terminal session to the 3k-access switch (10.1.250.2) using the credentials
admin / cisco123. If not already in privileged mode, enter enable mode using password
cisco123.
b. To view log messages from the terminal session, enter the terminal monitor command
at the switch exec prompt:
Note: Use the command terminal no monitor if need to disable the monitoring of terminal logging
without exiting the session.
c. Enter configuration mode for interface GigabitEthernet 0/1 and enter shut followed
shortly by a no shut command:
3k-access> en
Password: cisco123
3k-access# conf t
Enter configuration commands, one per line. End with CNTL/Z.
3k-access(config)# int gi0/1
3k-access(config-if)# shut
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 25
3k-access(config-if)# no shut
3k-access(config-if)# end
3k-access#
d. If logging to terminal is enabled, a series of log messages should appear on the screen
during port shutdown and re-activation. Enter CTRL+Z or end to exit configuration mode.
Step 3 After issuing the ‘no shut’ command, use the following exec command to view the current
authorization status of interface GigabitEthernet 0/1:
Note: You can also issue exec-level commands from within configuration mode using the do command.
Example:
After approximately 10-15 seconds, the output should appear similar to the following:
Note: For this exercise, disregard the authorization status info for the IP phone on VLA N 40 and IP address
10.1.40.x (Domain = VOICE) .
In the above output, note that the dACL (ACS ACL) = POSTURE-REMEDIATION has been
pushed to the interface along with a named URL Redirect ACL = ACL-POSTURE-REDIRECT
that defines the traffic to be redirect to the link specified by URL Redirect. The redirect URL
must include the domain name of the ISE Policy Service node, reference to port 8443, the
Step 4 Display the current dACL applied to the interface using the command show ip access-lists
interface GigabitEthernet 0/1. The output should appear similar to the following:
The following provides descriptions for the individual dACL entries applied to the interface (Host
10.1.40.x is the Cisco IP phone and this entry does not apply to the Win7 client with an address
in the 10.1.10.0/24 subnet in VLAN 10):
a. From the Win7 client, launch a web browser. The page should be redirected to the URL
specified in the URL Redirect output and display the ISE web authentication portal.
b. Click the Self Service button from the login portal and enter the following values into the
form, and then click Submit:
Attribute Value
First Name Guest
Last Name User
Email Address [email protected]
Phone Number (optional)
Company Company ABC
Optional Data 1 Web Agent test
Optional Data 2 (enter optional comments)
Timezone UTC
Username: _________________________
Password: __________________________
To facilitate login, select and copy the password entry, making sure not to include any
extra characters. Click the OK button.
d. The web authentication login page again displays. Enter your new Username/Password
credentials and click the Log In button.
e. If an AUP was enabled for web authentication, check the box to Accept terms and
conditions and then click Accept.
f. The Agent download page should appear. Click the button Click to install agent.
g. The ISE certificate is self-signed and has not been installed on the client PC. Click Yes if
prompted with any browser certificate warnings. Also, applets may be required to
facilitate download of the Web Agent. Click Yes (or Install) if prompted to install applets
as part of Web Agent download and install process.
h. The Cisco NAC Web Agent window should appear and indicate that posture assessment
is being performed. Since no posture policy has been configured yet, the client will pass
assessment and the agent will indicate “Host is compliant with network security policy” as
shown below:
j. The original browser window should display a message at the bottom of page “Cisco
Agent finished checking your system.”
Reattempt access to the browser’s home page via the home icon, or else manually enter
the address of www.cisco.com in the address field. Access to the external website
should now display.
Step 6 Verify the session status on the switchport for Guest authorization.
b. Repeat the show authentication sessions and the show ip access-lists output for
interface GigabitEthernet0/1. The output should appear similar to that shown below:
d. For reference, the following table provides descriptions for the dACL entries:
a. From the Admin client PC, access the admin interface of the ISE Administrative node
(admin / default1A).
b. Go to Monitor > Authentications. View the recent entries associated with the web
authentication session by MAC Address, IP address, interface, or Session ID. It may be
help to filter the log entries by entering a couple bytes of the Session ID or MAC address
(Calling Station ID) into the appropriate column header and hitting Enter. Click the circled
x in the field to clear the filter.
c. Referring to the example authentication log below (split across two screens), you should
see entries similar to the following that match the output received from the switch:
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Login to the secured lab network from a Windows 7 PC client as an Employee via 802.1X
machine authentication and user authentication and verify NAC Agent provisioning.
• Review ISE and switch logs to validate proper operation and application of the
Authorization Policy.
Step 2 Log into the Windows 7 PC client as DEMO\employee1 / cisco123, where DEMO is the
Windows domain name.
Step 3 Configure the Win7-PC client for 802.1X authentication to simulate an Employee:
ii. Open the Network Connections shortcut from the Lab Tools window.
iii. Right-click on the entry for the Local Area Connection and select Properties. If
prompted by Windows 7 User Account Control (UAC), enter the Domain
Administrator credentials admin / cisco123.
iv. Select the Authentication tab at the top of the Properties window.
vi. Verify that authentication method is set to Microsoft: Protected EAP (PEAP)
and then click Settings to open the PEAP Properties page.
vii. Under Select Authentication Method:, click Configure and verify that the EAP
MSCHAPv2 Properties are set to enable Automatically use my Windows login
name and password (and domain if any) as shown:
xi. Exit any open windows and restart the PC by going to Start (Start menu) and
selecting Restart:
Warning: Do NOT select Shutdown or Sleep. If PC is shut or pow ered dow n, then any changes made to client
w ill be lost upon restart and you w ill need to redo changes made from the start of this lab exercise.
Step 4 Verify the authorization status on the switchport before Windows login (802.1X Machine
authentication):
Upon detection of the PC connection, the switchport will first attempt MAB authentication due to
the switcport configuration (authentication order mab dot1x). MAB authentication may
even complete with the default Authorization Policy rule (Authorization Profile =
CWA_Posture_Remediation) being applied to the interface as shown in the example below:
Method State
mab Not run
dot1x Authc Success
Note: Due to actual timing, it is possible that 802.1X authentication may initiate prior to the completion of MAB
processing. Therefore, the above output may not be seen.
Since 802.1X authentication has been given higher priority as per the switchport configuration
(authentication priority dot1x mab), a new authentication will be triggered on the port
once the Win7 supplicant initiates an EAPOL-Start message for 802.1X machine authentication.
After successful 802.1X machine authentication, the Authorization Policy should match the
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 37
Domain_Computer rule (Authorization Profile = AD_Login). The output should appear similar to
that shown below:
Step 5 Verify the session status of the switchport authorization after Windows login (802.1X User
authentication):
From the Win7-PC client, login to Windows domain as user DEMO\employee1 / cisco123.
Repeat the show authentication sessions and the show ip access-lists output for interface
GigabitEthernet0/1. After successful 802.1X user authentication, the Authorization Policy
should match the Employee_NonCompliant rule (Authorization Profile = Posture_Remedation).
The output should appear similar to that shown below:
Method State
mab Not run
dot1x Authc Success
A named URL Redirect ACL = ACL-POSTURE-REDIRECT has also been applied that defines
the traffic to be redirected to the link specified by URL Redirect. The redirect URL must include
the domain name of the ISE Policy Service node, reference to port 8443, the current session ID,
and reference action to cpp (Client Provisioning Portal). If any of these items are missing, then
web authentication will fail.
Note: The authorization dA CL named POSTURE_REMEDIA TION is the same one applied during the Web Agent
lab exercise for users in a non-compliant posture state. Please refer to the previous lab exercise for
reference on individual dACL entries.
a. Launch a web browser. Immediate redirection to the agent provisioning page (CPP)
should occur as shown:
b. Click the Click to install agent button to begin NAC Agent installation.
Note: Admin pr ivileges are required to install NA C Agent for the first time. Once installed, upgrades can occur
w ithout escalated pr ivileges. NA C Agents can also be distributed using an MSI installer package.
e. A message should appear in original window indicating “Cisco Agent was successfully
installed!” Close this window.
f. The Acceptable Use Policy page should display indicating Temporary Network Access.
The AUP was configured in a previous lab step to display for any NAC Agent user and to
point to a URL on an internal web server. Click the link Network Usage Policy Terms
and Conditions to see the hosted AUP:
g. A new web page will open to display the AUP. Close this window when ready to
proceed.
h. Click Accept to agree to the AUP. The login success screen should display indicating
Full Network Access and automatically close after 2 seconds per the NAC Agent profile
configuration named ProfileWindows.
Step 7 Verify the session status of the switchport authorization for a compliant Employee.
a. Repeat the show authentication sessions and the show ip access-lists output for
interface GigabitEthernet0/1. The Authorization Policy should match the Employee rule
(Authorization Profile = Employee) and output should appear similar to that shown below:
Step 8 Verify the authentication/authorization phases of the 802.1X Auth and Client Provisioning
session from the ISE admin interface.
a. Go to Monitor > Authentications. View the recent entries associated with the Employee
session by MAC Address, IP address, Interface, or Session ID. It may be help to filter the
log entries by entering a couple bytes of the Session ID or MAC address (Calling Station
ID) into the appropriate column header and hitting Enter. Click the circled x in the field to
clear the filter.
b. Referring to the example authentication log below (split across two screens), you should
see entries similar to the following that match the output received from the switch, where
1 is the lowest, or first, entry:
a. From the Win7-PC client, the NAC Agent tray icon should now be present in the Windows
task tray. Right-click the icon and select About to view NAC Agent and Compliance
Module software versions:
c. Right-click the task tray icon again and select Properties to view current Discovery Host
setting and detected AV/AS software as per the following:
Note: By default, the NA C Agent program files are installed under <Root_Drive>:\Program Files \Cisco\Cisco NAC
Agent. The agent XML-based profiles and configuration files are also located in this directory. By default,
the log and report files are stored under <Root_Drive>:\ProgramData\Cisco\Cisco NA C Agent.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Define AV posture conditions that validate the installation and signature version of
ClamWin AV on an endpoint.
• Define AV posture conditions that validate the installation and signature version of any
approved AV on an endpoint.
• Define remediation actions for installing and updating AV software.
• Configure requirements for AV to be installed and signatures current on an endpoint.
• Configure a Posture Policy for Employees to have ClamWin AV installed and current
• Configure a Posture Policy for Guest users to have any AV installed and current
The diagram highlights the key tasks covered in this exercise including Simple and Compound
Conditions, Remediation Actions, Posture Requirements, and Posture Policy:
Step 2 Define an AV posture condition that validates the installation of ClamWin AV on an endpoint.
This check will be used in posture requirements applied to Employees.
Go to Policy > Policy Elements > Conditions and click the icon to right of Posture. Select
AV Compound Condition from the left-hand pane and then click Add from the right-hand pane
menu. Enter the following values and then click Submit at the bottom of the page:
Note: If no AV products appear under Vendor field, then posture updates have not yet been dow nloaded or
dow nload has not yet completed.
Step 3 Define an AV posture condition that validates the signature version of ClamWin AV on an
endpoint. This check will be used in posture requirements applied to Employees.
Select AV Compound Condition from the left-hand pane and then click Add from the right-
hand pane menu. Enter the following values and then click Submit at the bottom of the page:
Attribute Value
Name ClamWin_AV_Current
Description Check ClamWin AV is current
Operating System Windows 7 (All)
Vendor ClamWin *** Note: There is also an entry for ClamAV ***
( ) Installation
Check Type
( o ) Definition
[✓ ] Allow virus definition files to be
days older than 0 days older than
( o ) latest file date
( ) current system date
[ ✓ ] ClamWin Antivirus
Products for Selected Vendor
[ ✓ ] ClamWin FREE Antivirus
Step 4 Define an AV posture condition that validates the installation of any supported AV on an
endpoint. This check will be used for posture requirements applied to Guest users.
Select AV Compound Condition from the left-hand pane and then click Add from the right-
hand pane menu. Enter the following values and then click Submit:
Attribute Value
Name Any_AV_Installed
Description Check Any AV is installed
Operating System Windows All
Vendor ANY
( o ) Installation
Check Type
( ) Definition
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 48
Attribute Value
[ ] Allow virus definition files to be
days older than 0 days older than
( ) latest file date
( ) current system date
Products for Selected Vendor [ ✓ ] ANY
Step 5 Define an AV posture condition that validates the signature version of any supported AV on an
endpoint. This check will be used for posture requirements applied to Guest users.
Select AV Compound Condition from the left-hand pane and then click Add from the right-
hand pane menu. Enter the following values and then click Submit:
Attribute Value
Name Any_AV_Current
Description Check Any AV is current
Operating System Windows All
Vendor ANY
( ) Installation
Check Type
( o ) Definition
[✓ ] Allow virus definition files to be
days older than 0 days older than
( o ) latest file date
( ) current system date
Products for Selected Vendor [ ✓ ] ANY
Step 8 Define a Posture Remediation Action that updates any supported AV on an endpoint.
Select AV/AS Remediation from the left-hand pane and then click Add from the right-hand
pane menu. Enter the following values and then click Submit:
Attribute Value
Name Update_Any_AV_Definitions
Description Trigger signature updates for Any AV vendor
AV/AS Remediation Type AV Definition Update
Remediation Type Automatic
Interval 2
Retry Count 2
( o ) Windows
Operating System
( ) Mac
AV Vendor Name ANY
Step 9 Define Posture Requirements that will be applied to Employees and Guest users.
Select Requirements from the left-hand pane (under Policy > Policy Elements > Results >
Posture).
Enter the following entries into the table using the selector at the end of a rule
entry to insert or duplicate rules. Click Save when finished:
Note: If a preconfigured condition does not display under the list of Conditions, be sure you have selected the
appropriate Operating System setting for both the condition as w ell as requirement rule. Only conditions that
are the same or subset of the OS selected for the rule w ill display in the Conditions selection list.
Note: A remediation action of Message Text Only prov ides the message content in the Description field to the user
if requirement fails. This can be used to provide instructions to end user such Help Desk contact numbers,
URL links, or other text to assist in the remediation process. Also note that basic html can be entered into
this field.
Step 10 Configure the Posture Policy to ensure ClamWin AV is installed and current on Employee
computers running Windows 7 and that Any supported AV is installed and current on Guest user
computers.
Go to Policy > Posture and create new policy rules using the values provided in the table, and
then click Save to apply your changes:
Identity Operating
Status Rule Nam e Other Conditions Requirements
Groups Systems
Employee_Window s_AV Any Window s 7 demo.local:External AV_Installed ( Mandatory)
_Installed_and_Current (All) Groups AV_Current ( Mandatory)
EQUALS demo.local/
Users/employees
Guest_Window s_AV_Ins Guest Window s - Guest_AV_Installed ( Mandatory)
talled_and_Current All Guest_AV_Current ( Mandatory)
Note: Be sure to set the posture policy rules to DISABLED using the selector on the left hand side of the rule:
You w ill enable the posture rules individually dur ing testing.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Define Registry posture conditions that validate the Windows desktop screen saver
settings to be enabled and secure (require password to unlock computer) with a short
timeout and screen saver selected (not set to None).
• Define a Remediation Action to update the registry configuration that controls the screen
saver to policy compliant values.
• Configure a Posture Requirement for the screen saver to be enabled and secure.
• Configure a Posture Policy to apply the screen saver policy to any Windows user
Step 4 Create a Registry Condition that checks that the current user’s screen saver is secure
(password set).
Click Add from the right-hand pane menu. Enter the following values and then click Submit:
Attribute Value
Name ScreenSaver_Secure
Description (optional)
Registry Type RegistryValue
Registry Root Key HKCU
Sub Key Control Panel\Desktop
Value Name ScreenSaverIsSecure
Value Data Type Number
Value Operator Equals
Value Data 1
Operating System Windows All
Step 5 Create a Registry Condition that checks that the current user’s screen saver timeout is less than
or equal to 300 seconds (5 minutes).
Click Add from the right-hand pane menu. Enter the following values and then click Submit:
Attribute Value
Name ScreenSaver_Timeout
Description (optional)
Registry Type RegistryValue
Registry Root Key HKCU
Sub Key Control Panel\Desktop
Value Name ScreenSaveTimeOut
Value Data Type Number
Value Operator less than or equal to
Value Data 300
Operating System Windows All
ISE_1.0_Posture_Services_Lab_Guide.docx 9/21/2011 Page 54
Step 6 Create a Compound Condition that includes each of the specific Screen Saver registry checks
as a single condition.
a. Select Compound Condition from the left-hand pane, and then click Add from the right-
hand pane menu. Enter the following values from the table:
Attribute Value
Name ScreenSaver
Description (optional)
Operating System Windows All
((ScreenSaver_On & ScreenSaver_Secure) &
Expression
ScreenSaver_SCR) & ScreenSaver_Timeout
Note: Although the Ex pression content in a Compound Condition can be manually entered, it is recommend that
the Condition List be used to navigate and select the desired checks. This helps to ensure values are
entered correctly. Use the operand buttons [( ) & ! |] to select the correct logical separators.
i. Click the icon to right of Registry Condition in the Condition List section.
ii. Select ScreenSaver_On from the list. Item should appear in open text field.
iii. Click the & symbol button under the open text field. The symbol should be
appended to the content in the open text field.
iv. Complete the condition expression using the following selections:
ScreenSaver_Secure
&
ScreenSaver_SCR
&
ScreenSaver_Timeout
b. Click icon to the right of the expression window to see basic syntax help for creating a
compound condition based on individual checks (simple conditions).
c. Click Validate Expression to have the system verify the basic expression logic and that
expression is composed of valid checks.
d. Click Submit when finished.
Step 7 Define a Posture Remediation Action that updates the screen saver registry keys on a Windows
PC to compliant values.
Navigate to Policy > Policy Elements > Results and expand the contents under Posture, and
then expand Remediation Actions.
Select Link Remediation from the left-hand pane and then click Add from the right-hand pane
menu. Enter the following values and then click Submit:
Attribute Value
Name Enable_Secure_Screen_Saver
Description Download compliant screen saver registry values
Remediation Type Manual
Step 8 Define Posture Requirements that will be applied to Employees and Guest users.
Select Requirements from the left-hand pane (under Policy > Policy Elements > Results >
Posture).
Add a Screen Saver requirement into the table using the following values and then click Save:
Step 9 Configure the Posture Policy to ensure a Secure Screen Saver is present on Employee and
Guest user computers running Windows.
Go to Policy > Posture and create new policy rules using the values highlighted in the table,
and then click Save to apply your changes:
Identity Operating
Status Rule Nam e Other Conditions Requirements
Groups Systems
Employee_ScreenSaver Any Window s demo.local:External Screen_Saver_On_and_Secure
All Groups (Mandatory)
EQUALS demo.local
/Users/employees
Employee_Window s_AV Any Window s 7 demo.local:External AV_Installed ( Mandatory)
_Installed_and_Current (All) Groups AV_Current ( Mandatory)
EQUALS demo.local
/Users/employees
Guest_ScreenSaver Guest Window s - Screen_Saver_On_and_Secure
All (Mandatory)
Guest_Window s_AV_Ins Guest Window s - Guest_AV_Installed ( Mandatory)
talled_and_Current All Guest_AV_Current ( Mandatory)
Note: Be sure to set the posture policy rules to DISABLED using the selector on the left hand side of the rule:
You w ill enable the posture rules individually dur ing testing
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Login as an Employee via 802.1X authentication and verify proper execution of NAC
Agent discovery, posture, and remediation process.
• Test AV Posture Policy using NAC Agent.
• OPTIONAL: Test Screen Saver Posture Policy using NAC Agent.
• Review switch commands to validate correct application of policies.
• Review ISE authentication log monitoring tools to validate correct application of policies.
• OPTIONAL: Configure and test Passive Re-Assessment (PRA).
AV POSTURE TESTING
Step 1 Delete ClamWin AV signatures on the Win7 PC to ensure that the client AV software is out of
compliance with AV signature updates.
a. Log into the Windows 7 PC client as DEMO\employee1 / cisco123, where DEMO is the
Windows domain name.
b. From the Win7-PC client, open the Lab Tools shortcut from the Windows desktop and
run (double-click) the Delete_ClamWin_AV_Updates script.
c. A command window should open to execute processing of the script and indicate
“Process Complete!” when finished. Press any key to continue.
b. Verify the authorization status of the PC switchport using the command show
authentication sessions interface GigabitEthernet 0/1.
c. The DATA domain should show successful 802.1X authentication from machine auth
(User-Name: host/Win7-PC.demo.local) and the current dACL (ACS ACL) should be
AD_LOGIN_ACCESS.
• If the current status is not as described above, then perform a shut / no shut on
interface gi0/1. This will clear out any previous session that may have been
established. After about 30 seconds, the port status should indicate that 802.1X
machine authentication has completed successfully and AD login privileges have
been granted.
a. From the Admin client PC, access the ISE admin interface and go to Policy > Posture.
as follows:
b. The previously installed NAC Agent should automatically launch after Windows login and
begin the posture assessment process. Due to an out-of-compliance condition for the AV
policy, remediation should be initiated. The Remediation Action was set to Automatic so
the message “Remediating System” should appear at the bottom of the agent window as
shown:
The remediation server (updates.demo.local) is configured to dow nload current AV signature files upon start
of the pX-www-int VM. If this process fails to complete, then the ClamAV client may fail to dow nload the AV
signature files from the remediation server as show n above. If the above process fails, then go to Policy >
Posture from the ISE admin interface, and change the requirements for the posture rule named
Employee_Windows_AV_Installed_and_Current policy from Mandatory to Optional.
To spec ify posture requirements as Optional, nav igate to the Requirements column of the posture policy rule
and expand the contents of the requirement. Click the icon to the r ight of the requirement name and
select Optional from the drop-dow n menu. Repeat for each requirement in the rule.
d. The AUP page should display following successful remediation. Click Accept to accept
the Network Usage Policy Terms and Conditions.
e. A message will appear stating Full Network Access and will auto-close per our NAC
Agent profile settings.
b. Verify the authorization status of the PC switchport using the command show
authentication sessions interface GigabitEthernet 0/1.
c. The DATA domain should show successful 802.1X authentication from user auth (User-
Name = DEMO\employee1) and the current dACL (ACS ACL) should be
PERMIT_ALL_TRAFFIC.
Step 6 Prepare the Win7-PC client for testing the full Posture Policy for Employees.
a. Run the Delete_ClamWin_AV_Updates script from the Lab Tools shortcut on the
Windows desktop. This will remove the AV client’s current signature definitions.
b. From the Lab Tools shortcut on the Windows desktop, double-click the Personalization
shortcut to open the Control Panel’s Personalization settings.
c. Select Screen Saver from the Control Panel windows (bottom right corner).
d. Verify that the Windows screen saver settings are disabled:
• Screen saver = (None)
• Wait = Value > 5 minutes
• On resume, display logon screen = <Not checked>
a. From the Admin client PC, access the ISE admin interface and go to Policy > Posture.
b. The NAC Agent should automatically launch after Windows login and begin the posture
assessment process. Since we reverted the AV signatures to a non-compliant state,
automatic AV signature remediation will again need to be performed.
The Remediation Action for the Screen Saver Posture Requirement was set to Manual so
deliberate user input is required to trigger remediation.
Read the instructions (this information was entered into the requirement description
during creation of the Posture Requirement) and click Go To Link:
d. The file ScreenSaver.reg is downloaded to the Win7-PC client. Double-click the filename
to install the new registry settings:
g. Close any remaining browser windows opened as part of the remediation process.
h. The AUP page should display following successful remediation. Click Accept to accept
the Network Usage Policy Terms and Conditions.
i. A message will appear stating Full Network Access and will auto-close per our NAC
Agent profile settings.
Step 9 Test the Employee login experience when fully compliant with Posture Policy.
a. Logoff from the Win7-PC and then log back in as user DEMO\employee1.
b. Upon Windows login, the NAC Agent should open and detect that the client PC is fully
compliant with Posture Policy. Only the AUP should require user input. Click Accept to
accept the AUP. The NAC Agent should close and full network access be granted.
Step 10 Verify the Screen Saver policy settings:
a. From the Lab Tools shortcut on the Windows desktop, double-click the Personalization
shortcut to open the Control Panel’s Personalization settings.
b. Select Screen Saver from the Control Panel windows (bottom right corner).
c. Verify that the Windows screen saver settings are disabled:
• Screen saver = Blank
• Wait = 5 minutes
• On resume, display logon screen = <Checked>
Step 11 Review the ISE Authentication logs for proper authentication, authorization, and policy
assignment.
a. Access the ISE admin interface from the Admin client PC.
b. Go Monitor > Authentications.
c. Review the entries associated with the Win7-PC client based on IP address. Note the
following progression of entries that indicate proper application of the Authorization Policy
based on authentication and posture compliance state:
• Username=host/Win7-PC.demo.local, Authorization Profile=AD_Login
• Username=DEMO\employee1, Authorization Profile=Posture_Remediation
• Username=Demo\employee1, Authorization Profile=Employee
a. Go to Administration > System > Settings and click the icon to the left of Posture in
the left-hand pane to expand the contents of the Posture settings
b. Click Reassessments in the left-hand pane, and then click Add from the menu in the
right-hand pane.
c. Enter the following values for the new PRA policy and click Submit when finished:
Attribute Value
Configuration Name PRA_Any_User
Configuration Description (optional)
Use Reassessment Enforcement? [✓]
Enforcement Type remediate
Interval 2
Grace Time 1
Select Roles Any
Note: The standard m inim um settings for PRA Interval and Grace Tim e are 60 and 5 m inutes, respectively.
The settings used in this lab are for training purposes only. Specific code changes were necessary
for the ISE appliance in this lab to allow these low er values to be configured.
a. Access the ISE admin interface from the Admin client PC.
b. Go to Policy > Posture and update the Posture Policy conditions for Employees with the
values shown below:
AND
Note: If you have not completed the OPTIONA L Screen Saver posture policy configuration, you can alternatively
test PRA for the AV policy by setting the Session:Agent-Request-Type EQUALS Periodic Reassessment
for the Em ployee_Windows_AV_Installed_and_Current policy.
Note: If login is required to unlock screen, be sure to login first to active login session to unloc k desktop, and then
logoff Windows.
b. Upon Windows login, the NAC Agent should open and detect that the client PC is fully
compliant with Posture Policy. Only the AUP should require user input. Click Accept to
accept the AUP. The NAC Agent should close with full network access granted.
c. From the Lab Tools shortcut on the Windows desktop, run the
Delete_ClamWin_AV_Updates script from the Windows desktop to remove the AV
client’s signature definitions.
d. Run the RemoveScreenSaver script from the Windows desktop to revert the screen
saver settings to non-compliant values. Click Yes and then OK to accept and
acknowledge the registry changes.
f. Allow the 1 minute Grace Time to expire. The following message will display:
Return to the access switch terminal session and verify the authorization status of the PC
switchport using the command show authentication sessions interface FastEthernet 0/1.
The current dACL (ACS ACL) should now be POSTURE-REMEDIATION (changed from
PERMIT_ALL_TRAFFIC).
a. From the ISE admin interface, go to Administration > System > Settings and click the
icon to the left of Posture in the left-hand pane to expand the contents of the Posture
settings
b. Click Reassessments in the left-hand pane, select PRA_Any_User and then click Edit
from the menu in the right-hand pane.
c. Change the PRA policy per the following table and then click Save to apply changes:
Attribute Value
Configuration Name PRA_Any_User
Configuration Description (optional)
Use Reassessment Enforcement? [✓]
Enforcement Type continue
Interval 60
Grace Time 5
Select Roles Any
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Login as a Guest user via Central Web Authentication and verify proper execution of the
Web Agent posture and remediation process.
• Test AV Posture Policy using Web Agent.
• OPTIONAL: Test Screen Saver Posture Policy using Web Agent.
• Review switch commands to validate correct application of policies.
• Review ISE authentication log monitoring tools to validate correct application of policies.
AV POSTURE TESTING
Step 1 Prepare the Win7-PC client for Web Agent posture assessment and policy testing as a Guest
user.
a. Login as DEMO\employee1
b. From the Lab Tools shortcut on the Windows desktop, run the
Delete_ClamWin_AV_Updates script to remove the AV client’s signature definitions.
c. Run the RemoveScreenSaver script under Lab Tools to revert the screen saver settings
to non-compliant values. Click Yes and then OK to accept and acknowledge the registry
changes, and then close the Lab Tools window.
d. Uninstall the NAC Agent:
i. Go to Start (Start Menu) > Control Panel > Programs and Features. Select
Cisco NAC Agent from the list and click Uninstall from the menu options.
ii. Click Yes if prompted to confirm the uninstall process.
iii. If prompted, enter the Domain Admin credentials admin / cisco123 to permit the
process as a non-admin user.
iv. When the uninstall process is complete, the program listing for Cisco NAC
Agent will be removed. Exit the Control Panel window.
Step 2 Exit any open windows and restart the PC by going to Start (Start menu) and selecting Restart:
Warning: Do NOT select Shutdown or Sleep. If PC is shut or pow ered dow n, then any changes made to client
w ill be lost upon restart and you w ill need to redo changes made from the start of this lab exercise.
Wait until the Win7-PC client has restarted and returned to the CTRL+ALT+DEL screen, then
return to the terminal session of the access switch.
To verify the switch authorization status at any point during the Guest login and Web Agent
posture process, use the following switch commands:
Step 4 Enable the AV and Screen Saver Posture Policies for Guest users.
a. From the Admin client PC, access the ISE admin interface and go to Policy > Posture.
Attribute Value
First Name Guest
Last Name User
Email Address [email protected]
Phone Number (optional)
Company Company ABC
Optional Data 1 (enter reason for access)
Optional Data 2 (enter optional comments)
Timezone UTC
Username: _________________________
Password: __________________________
To facilitate login, select and copy the password entry, making sure not to include any
extra characters.
e. Click the OK button to display the Web authentication login page again.
a. Enter your new Username/Password credentials and click the Log In button.
b. If an AUP was enabled for Web authentication, check the box to Accept terms and
Conditions and then click Accept.
c. The ISE Agent Downloader page should appear. Click the button Click to install agent
at the bottom of the page.
e. The Cisco NAC Web Agent window should appear and indicate that posture assessment
is being performed.
Step 5 Remediate the non-compliant screen saver policy using the Web Agent.
a. Both Guest user Posture Policies for AV and Screen Saver should fail as shown below:
Note: If excessive time has passed and the Remediation Timer has expired, you can repeat the Web Agent
posture assessment process by returning to the ISE Agent Dow nloader page and re-clic king the button
Click to install agent at the bottom of the page.
a. Click the Re-Scan button in the Web Agent window to have posture re-assessed based
on the recent remediation. The Web Agent should be updated as per the following:
Right-click on the ClamWin icon in the Windows task tray and click Download Virus
Database Update:
c. The ClamWin AV window will open and show the progress of the signature updates.
Click Close when AV update is complete:
The remediation server (updates.demo.local) is configured to dow nload current AV signature files upon start
of the pX-www-int VM. If this process fails to complete, then the ClamAV client may fail to dow nload the AV
signature files from the remediation server as show n above. If the above process fails, then go to Policy >
Posture from the ISE admin interface, and change the requirements for the posture rule named
Contractor_Windows_AV_Installed_and_Current policy from Mandatory to Optional.
a. Click the Re-Scan button in the Web Agent window to have posture re-assessed based
on the recent remediation. The Web Agent should be updated as per the following:
b. Click Continue to complete the Web Agent session. The login success screen should
auto-close after two seconds per the configured policy.
c. From the original agent install window, click the browser Home icon, or re-enter
www.cisco.com into the URL address field to verify the Guest user now has Internet
access.
Step 8 Review the ISE Authentication logs for proper authentication, authorization, and policy
assignment.
a. Access the ISE admin interface from the Admin client PC.
b. Go Monitor > Authentications.
c. Review the entries associated with the Win7-PC client based on IP address. Note the
following progression of entries that indicate proper application of the Authorization Policy
based on authentication and posture compliance state:
Exercise Objective
In this exercise, your goal is to complete the following tasks:
• Review ISE Authentications log and verify session details related to Posture Services.
• Review the ISE Dashboard for high-level posture status and statistics.
• Troubleshoot posture events using ISE Diagnostic Tools.
• Run ISE reports for Posture Services.
b. Review the log entries associated with the Win7-PC client sessions. Click the Details
link to see information regarding how the endpoint was authenticated, identity store used,
Authorization Profile applied including dACLs and other RADIUS attributes assigned.
Step 2 From the ISE admin interface, go to Home (Dashboard). Review the Posture Compliance
dashlet including Compliance pass percentage and Mean-Time-To-Remediate values.
Step 3 Click the upper right corner of the dashlet to expand in a new window:
Step 7 Select one of the pass/fail (green/red) entries and then click Troubleshoot at the bottom of the
page:
Step 8 When processing is complete, a window similar to the following will display:
Click Show Results Summary. The output displays a summary of all the passed and failed
requirements for the posture event along with the condition names and associated remediation
actions:
Step 9 Click Done to return to the Search page. Optionally enter new search criteria and repeat the
steps to troubleshoot passed/failed posture events.
Step 10 Go to Monitor > Reports > Catalog. Select Posture from the left-hand pane:
Step 11 Run the Posture Detail Assessment report and review the contents.
Step 12 Click the Details icon for any Failed (Red) posture entry. Review the overall details for the
posture session. Review the requirements which passed and those that failed:
This report provides an overall picture of posture compliance and non-compliance as well as the
number of passes/failures by posture requirement.