ISE Integeration With Eduroam
ISE Integeration With Eduroam
Use Case
ISE Integration with Eduroam External
Server
Prepared By
M ANN AI TR ADING CO W LL
WLC of each location is configured with ISE as an authentication and accounting server. The
eduroam SSID will be configured according to 802.1x standard.
ISE of each location is configured with local WLC as a network device with RADIUS functionality
enabled. ISE to be configured with protocols, identity source sequence, and
authentication/authorization policies.
Based on the policy set, ISE checks whether the user is a member of a local AD group or a
roaming AD group. If it is an external domain user, ISE sends the traffic to external eduroam
servers (which are hosted in the cloud) if the user belongs to an external AD. Eduroam validates
the request from ISE and checks if the user is a part of remote AD and sends the response
back to ISE. ISE will authorize based on the policies mapped. ISE assigns a VLAN tag to the
user based on the AD group.
WLC of each location to be configured with ISE as an authentication and accounting server.
The eduroam SSID is configured according to 802.1x standard.
ISE of each location is configured with local WLC as a network device with RADIUS functionality
enabled. ISE to be configured with protocols, identity source sequence, and
authentication/authorization policies.
The customer seeks an identity and access control policy solution that automates and enforces
authentication and authorization for endpoints. This will include employees, endpoints, contractors, and
non-user endpoints and hence we propose a Cisco Identity service Engine that can meet customer
requirements.
1.3 Background
Below is the list of components used in this setup. ISE version compatibility needs to be validated before
the setup.
Eduroam server
Combines authentication, authorization, accounting (AAA), posture, and profiler into one
appliance.
Provides comprehensive guest access management for the Cisco ISE administrator,
sanctioned sponsor administrators, or both.
Provides support for discovery, profiling, policy-based placement, and monitoring of endpoint
devices on the network.
Enables consistent policy in centralized and distributed deployments that allows services to be
delivered where they are needed.
Supports scalability to support a number of deployment scenarios from small office to large
enterprise environment.
3.1.1 Supplicant
The supplicant is a piece of software on the device (workstation, laptop, etc.) that requests access to
the WLC or wireless services, and responds to requests from the authenticator (WLC or WLC). The
device must be running IEEE 802.1x-compliant client software such as that offered in the Microsoft
Windows operating system. The client is the supplicant in the IEEE 802.1x specification.
3.1.2 Authenticator
The authenticator is a device such as a Cisco wireless controller that controls physical access to the
network based on the authentication status of the client. The authenticator usually acts as an
intermediary (proxy) between the client and the authentication server.
When the WLC receives EAP over LAN (EAPOL) frames and relays them to the authentication server,
the Ethernet header and EAP frame are re-encapsulated into the RADIUS format.
RADIUS uses a client-server model in which secure authentication information is exchanged between
the RADIUS server and one or more RADIUS clients.
For this setup, two ISE nodes are configured as administration, monitoring and policy service enabled.
In future Additional nodes can be registered by clicking Navigate to Administration->Deployment and
then Register menu on primary node and then selecting the Register an ISE node. Before registering
an ISE node, we need to have the DNS entry of the ISE nodes so that FQDN should be resolved.
Network devices or NAD are devices to which endpoints directly connect to. These devices can be
WLC, access points, etc. This POC will use WLC for NADs. Below is a list of NADs and their information.
ISE offers the functionality to create Network Device Groups that allow a structured way to group the
different NADs. Follow these steps to add two NADs to our ISE configuration:
1. Add the network devices for your WLC with the Name, IP and Network Device groups. Location
as shown in the following screenshot:
2. Enable RADIUS and on this NAD and set the shared secret for RADIUS to ISE.
3. Click Submit to save the WLC NAD configuration.
The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate
credentials in user authentication functions, and to retrieve group information and other attributes that
are associated with the user for use in authorization policies. For Network Administration access,
authentications will be validated against the Active Directory domain.
• Includes flexible identity rewriting rules to smooth the solution’s transition and integration.
• Supports Microsoft Active Directory 2003, 2008, 2008R2, 2012, 2012R2, 2016, and 2019.
The next step is to create a RADIUS server sequence and map previously created external RADIUS
servers. To configure the RADIUS server sequence, navigate to Administration > Network
Resources > RADIUS Server Sequence > Add. The below screenshot shows that ISE is configured
with the RADIUS server sequence.
The Allowed Protocols Service enables only the authentication methods/protocols that ISE supports
during Radius Authentication. In order to configure from ISE GUI, navigate to Policy > Policy
Elements: Results > Authentication > Allowed Protocols, and then it binds as an element to the
A Policy Set is a collection of rules for authenticating and authorizing the users of an ISE deployment.
With multiple Policy Sets available in an ISE deployment, how does ISE decide which one to use for a
given authentication request? Below policy set is for eduroam internal and external user authentication.
ISE does not send the traffic to external eduroam servers if the user belongs to local AD. Instead, the
user is authenticated by local AD which has been added to ISE. ISE will authorize based on the policies
mapped.
Authentication policies define the protocols that Cisco ISE should use to communicate with the network
devices and the identity sources that it should use for authentication. A policy is a set of conditions and
a result. A policy condition consists of an operand (attribute), an operator (equal to, not equal to, greater
than, and so on), and a value. Compound conditions are made up of one or more simple conditions that
are connected by the AND or operator.
1. Enter a name for your authentication rule. We have two authentications for 2 policy sets.
2. Select the plus (+) icon in the condition field.
3. From the Conditions Studio add Device type and Device location and click Save.
4. Use the Identity source sequence created before.
5. One for the external domain users pointing identity source sequence to eduroam and one for
the internal domain user pointing to local AD.
6. Click Options and Choose Reject from the If user not found a drop-down list.
Authorization policies are a component of the Cisco ISE network authorization service that allows for
defining authorization policies and configuring authorization profiles for specific users and groups of
users that will access network resources.
Published Link:
References:
https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/release_notes/b_ise_31_RN.html
https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/compatibility_doc/b_ise_sdt_31.html
ISE Security Ecosystem Integration Guides - Cisco
------------------------------------------------------End of Document---------------------------------------------------------