Lab 3 - Policy Sets, Conditions Studio, and Network Devices
Lab 3 - Policy Sets, Conditions Studio, and Network Devices
htm
Lab Overview
In this lab, you will work with Policy Sets, the Conditions Studio and Network Devices. Policy sets enable
you to logically group authentication and authorization policies within a single set name. They enable you
to create policies based on location, access type, or other similar parameters based on your
organizational needs. Policy sets are evaluated in a first match top down mode. Use the Conditions Studio
to create, manage and re-use conditions. Conditions can include more than one rule, and can be built
with any complexity including only one level, or multiple hierarchical levels. When using the Conditions
Studio to create new conditions, you can use the condition blocks previously stored in the Library and
you can also update and change those stored condition blocks. While creating and managing conditions
later, easily find the blocks and attributes that you need by using quick category filters, and more.
Lab Procedures
Examine the Default Policy Set
Students attending a live instructor-led training, regardless if in-class or virtual, would not have
performed a reset, unless directed to by the instructor. So, go directly to Task 1.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 1/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
If you have performed a reset to this lab or are using the Global Knowledge e-Labs (meaning that you are
accessing the system after you have attended the 5-day course), you will need to prepare or verify the
environment. Perform the following:
Access the module in the lab guide titled Post Reset and follow the directions there.
In this task, you will examine the Default Policy Set including the current Authentication and
Authorization policies.
Note:
All labs have been verified using Google Chrome to manage the ISE GUI.
1.4. In the web console of ISE, navigate to Policy > Policy Sets, it should look as follows.
Note:
The Default Policy Set has no conditions (it is a catch all for sessions from all known network devices)
and allows the use of protocols defined in Default Network Access.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 2/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
1.6. In the navigator (to the left), expand Authentication > Allowed Protocols.
1.7. Select and edit Default Network Access; it should look as follows (shown with all options shown
collapsed).
Note:
Process Host Lookup is for MAB, PAP/ASCII is for VPN, and the various EAP protocols (shown collapsed
here) are for 802.1X. You will leave the defaults for now as they suffice for much of what you will be
doing.
2.1. Navigate back to Policy > Policy Sets and expand the Default Policy Set.
Note:
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 3/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
2.2. Expand the Authentication Policy, it should look as follows (shown with options expanded):
Status: Allows for Enabling, Disabling, and Monitoring of a rule. (When Monitoring, the rule
will be evaluated, but the result will not be enforced. You can view the results in Live Logs.)
Rule Name: Three rules make up the default Authentication Policy: MAB (wired or wireless),
Dot1X (802.1x) (wired or wireless) and a catch-all Default rule for everything else.
Conditions: Smart Conditions are used here as defined in the Conditions Library. You will use
it soon to create reusable conditions.
Use: The Identity Source or Identity Source Sequence used to authenticate the rule.
REJECT: Sends a RADIUS Access-Reject Message back to the NAD. This is the default
on Authentication failure which happens when credentials are incorrect.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 4/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
CONTINUE: Allows the session to continue onto Authorization. This is also the
default for User not found (on MAB only) which is used for Centralized Web
Authentication and Guest Access scenarios.
DROP: Sends no message back to the NAD. This is the default on Process fail which
happens when an Identity Source doesn't respond to ISE.
Gear Icon: The Actions here allow for insertion, duplication, and deletion of rules in the
policy.
2.3. Click the OR in the MAB rule, which will take you to the Conditions Studio.
Note:
If, following a Reset, when opening the condition studio, the Loading icon is pulsing with no end, you
have to reset to the next lab: a ise reload won′t do it. This is a known 2.7 bug.
You may see a pop-up that illustrates how to use the Conditions Studio.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 5/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Note:
On the left side of the Conditions Studio is a list of conditions from the Library. You can drag to add
conditions to the Editor (area on right), or you can create new conditions in the Editor. Once editing is
done, you can choose save, to add a new condition in the Library, or use the condition without saving it
to the Library. Choosing the option Use will use the current condition in the associated rule.
2.4. If you see the pop-up, click anywhere in the pop-up to continue, and in the editor, note that the
conditions for the rule are displayed.
Note:
All current conditions in the Conditions Library are listed to the left. You can search for a condition by
name or click on the filter icon to filter by condition type.
2.5. In the Search by Name field type wired to see some pre-built conditions; your result should look
as follows:
2.6.
Delete the wired entry from the search box and click on the protocol icon. Your results should
look as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 6/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
2.7. One at a time, click on the other icons to vary the filter of conditions. Clicking on any icon more
than once will toggle its selection.
2.8. In the Editor (to the right), without adding any additional conditions, pull down on the drop-down
next to OR to reveal the additional Boolean option of AND. DO NOT make any changes, leave the
selection at OR.
Note:
The arrows point to the x icons that can be used to delete a condition from the Editor. DO NOT DELETE
any of the conditions.
The option to save is available should you want to add the results to the condition library for later use.
DO NOT save.
2.9. Click Close and then OK to exit the Condition Studio and discard any changes made.
3.1. Back at the Policy > Policy Sets > Default window, expand the Authorization Policy. Take a minute
to examine the default ISE authorization rules.
Note:
There are numerous default authorization policies, too many to drill into detail on here. Over time, Cisco
has added more default authorization policies to provide examples from which to build. Many of these
policies are disabled by default and won′t have any effect on authorization until enabled. We will revisit
some of these in subsequent labs.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 7/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Status: Allows for Enabling, Disabling, and Monitoring of a rule. (When Monitoring, the rule
will be evaluated, but the result will not be enforced. You can view the results in the Live
Logs.)
Conditions: Allows for access to the Conditions Studio where ID Groups and Dictionary
Attributes, as well as pre-configured conditions can be specified.
Results: Allows for specifying the Authorization Profiles and/or Security Group assigned to the
rule.
Hits: Indicates how often the rule has been used. Refreshes every 15 minutes and can be
reset and manually refreshed by clicking on the # of hits.
Actions: The Actions here allow for insertion, duplication, and deletion of rules in the policy.
3.2. Examine the conditions of the Wireless Black List Default rule by clicking anywhere in the
conditions of the rule.
3.3. The Conditions Studio opens and the Editor should look as follows:
Note:
Two conditions exist; Wireless_Access AND the Blacklist Endpoint Identity Group.
3.4. Click the Wireless_Access condition. It will expand to reveal the options: Set to 'Is not',
information , Duplicate and Edit.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 8/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
3.5. Mouse over the information icon to reveal the underlying elements of the condition.
Note:
This is a simple condition made up of a single Attribute-Value from the Radius Dictionary. The form
shown: Dictionary:Attribute Operator Value, is used for all conditions defined in ISE.
3.6. Click the next Condition for Identity Group. You may see a pop-up with directions on how to use
the interface.
Note:
When working with specific attributes (as is the case here), you need to choose the appropriate
Dictionary, Attribute, and Value to fill in all the elements required.
3.7. If you do see the pop-up, click anywhere in the pop-up to continue.
3.8. Click the IdentityGroup Name field and pull down on All Dictionaries and select IdentityGroup.
There might be a slight delay for the pull down menu to appear.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 9/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
3.9. Once you have selected the IdentityGroup Dictionary, choose the Name attribute on the resulting
page.
3.10. Click in the Choose from list or type field, then select Blacklist.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 10/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
3.12. Click Close and OK to discard any changes to the authorization rule conditions.
In this task, you examine the Condition Studio and add a condition to be used in a later lab.
4.2. In the navigator to the left, click Smart Conditions; it should look as follows.
Note:
Policy conditions are created and maintained in the Conditions Studio Library. Upon initial installation,
Cisco ISE includes predefined smart conditions that you can easily use when configuring your policy sets
and rules, and that are used in the predefined authentication and authorization rules.
4.3. Click Wired_802.1X to reveal the underlying elements of the Smart Condition.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 11/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Note:
The smart condition is made up of two Attribute-Value pairs from the Radius dictionary. NAS-Port-Type
= Ethernet (wired), and Service-Type=Framed (802.1X). The condition is a match for Wired AND 802.1X.
This smart condition is also applicable to third party vendors: Alcatel, HP, and Brocade.
5.2. You will create the following condition, explained in the next few steps:
Field Value
DictionaryAirespace
Attribute Airespace-Wlan-Id
Operator Equals
Value 1
5.3. In the Editor (to the right), click the field Click to add an attribute. The select attribute for
condition window should drop-down. In All dictionaries, pull down and select Airespace.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 12/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
5.4. Next, select the attribute Airespace-Wlan-Id (at the bottom of the list).
5.5. With the operator set to Equals type in a value of 1 (the number 1) into the Attribute Value field.
Your condition should look as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 13/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
5.7. Click Save and then click the WiFi icon to filter the conditions in the library. Your output should
look as follows.
6. Create additional Conditions in the Library from the Default Policy Set.
One feature that is still not available in ISE 2.7 is the ability to copy rules from one Policy Set to another.
For now, we will take advantage of the Conditions Library to store the conditions associated with the
default rules so that we can easily reference them later.
6.1. Navigate to Policy > Policy Sets > Default > Authorization Policy.
6.2. Click the Conditions for Wireless Black List Default (the first rule in the policy). You should see the
following:
6.3. Click Save, and select Save as a New Library Condition. Name the Condition Wireless Blacklist,
and then save it.
6.4. In the Library, click the Identity Group icon and then mouse over the information icon. It should
look as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 14/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Note:
6.5. In the Conditions Studio, click Close and OK to discard the change currently queued up in the
Editor.
Note:
Although you created a new condition in the Library, you have not chosen to use it yet. You will use it in
subsequent labs.
6.6. You will now repeat the above process for the following Authorization rules and Conditions. For
each rule name, do as follows:
One-by-one, click in the Conditions box for a Rule listed in the table below. The condition
studio should open.
Once in Condition Studio, under Editor, click Save to open the Save condition window.
Select Save as a new Library Condition and type in the condition name shown in the table
below for that specific rule. Click Save.
Back in the Condition Studio, click Close and OK to discard the rule change. Don′t worry: you
are discarding the rule change, which you haven′t changed really, not the condition that you
just saved.
6.7. Repeat the process for every rule shown in the table below:
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 15/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
6.8. When you are finished, navigate to Policy > Policy Elements > Conditions and verify that the
Conditions Library show the following. When using Search by Name, deselect the icons below the
search box.
Note:
You have added five new conditions to the library for later use.
In this task, you will add Network Access Device Groups and Network Access Devices.
7.1. Navigate to Work Centers > Network Access > Network Resources > Device Groups (or
Administration > Network Resources > Network Device Groups).
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 16/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
7.2. Select All Device Types and click Add and separately create the following network device groups.
7.3. Select All Locations and click Add and separately create the following network device group
locations.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 17/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
8.1. In ISE, navigate to Work Centers > Network Access > Network Resources > Network Devices (or
Administration > Network Resources > Network Devices).
8.2. Click Add to configure a new network device using the following information.
Field Value
Name L3-Switch
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 18/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Location Test
IPSEC No
8.3. Click Show to confirm the shared secret and then click Submit.
Note:
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 19/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
We′ll come back to the TACACS+ and SNMP settings later. The SNMP settings are used for policy
querying (collection technique) from ISE when performing Profiling. Also, you will set the Location as
Test to allow for testing out a feature called Passive Identity. You will see that Device Groups can play an
important role when determining which Policy Set ISE will use for a session.
Using the Import method provided here, you can import Network Devices and their respective
credentials simultaneously.
Note:
9.1. Click Add to configure a new network device using the following information.
Field Value
Name WLC
IP Address (careful here, you have two addresses to add for the 10.10.2.80 /32
WLC as a NAD)
10.10.10.2 /32
Location HQ
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 20/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
IPSEC No
9.2. Click Show to confirm the shared secret and then click Submit.
10.1. Click Add to configure a new network device using the following information.
Field Value
Name HQ-ASA
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 21/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Location HQ
IPSEC No
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 22/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
10.2. Click Show to confirm the shared secret and then click Submit.
11.2. Click the + (plus sign) below the label Policy Sets, to create a policy set above the Default set and
configure by clicking on the respective fields to change or insert the values shown in the table.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 23/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Note:
Use the Conditions Studio for the Condition below. Click + in the condition field to access the Condition
Studio. Click in the box Click to add an attribute. Then use the All Dictionaries drop-down menu to
select the dictionary and adjust the attribute, Operator and Value by clicking on Choose from list or
type. Remember to click Use instead of Save in the Conditions Studio. You want to Use the Condition
you create in the Studio, but you do not want to save it to the Library.
Field Value
[IMPORTANT:read Note
above] Attribute Device Type
Operator EQUALS
Allowed Protocols Default Network Access (selected once back in the Policy Sets
window, by clicking on Select from list)
11.4. Click the + (plus sign) below the label Policy Sets, to create a policy set above Wireless, and
configure as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 24/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Field Value
Conditions DictionaryDEVICE
Operator EQUALS
Value All Device Types#Wired (pay attention: select Wired). Click Use.
Allowed Protocols Default Network Access (selected once back in the Policy Sets window,
by clicking on Select from list)
11.6. Click the + (plus sign) below the label Policy Sets, to create a policy set above Wired, and
configure as follows.
Field Value
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 25/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
ConditionsDictionaryDEVICE
Operator EQUALS
Value All Device Types#VPN (pay attention: select VPN). Click Use.
Allowed Protocols Default Network Access (selected once back in the Policy Sets window, by clicking on
Select from list)
11.7. When finished, click Save at the bottom right of the Policy Sets window. Your Policy Sets should
look as follows.
Policy Sets are processed top to bottom. We want to move the VPN Policy set to the bottom (just before
Default).
12.1. Drag the VPN Policy to the bottom of the List by selecting the icon to the left of the Status icon.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 26/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
In a subsequent lab, you will be testing out a feature of ISE called Passive Identity (Easy Connect). Here,
you will set up the Policy set to allow ISE to process Passive Identity sessions from NADs that are Wired
AND on the Test network. This is an effective way to test out features in a production ISE environment
while limiting the scope of the test.
13.1. Navigate to Policy > Policy Elements > Results > Authentication > Allowed Protocols.
Note:
You will need to clear all options other than Process Host Lookup. Currently Passive Identity works
exclusively via MAB (Host Lookup). Collapsing each protocol and clearing the top level will suffice. You
might need to click precisely in the middle of the square to successfully disable a protocol.
13.5. Click the + (plus sign) below the label Policy Sets, to create a policy set above Wired and configure
as follows.
Note:
In the Conditions Studio, after adding the first condition, click New to add the second condition and fill
in accordingly. Remember to click Use to use the resulting condition. The Allowed Protocols will be
selected once back in the Policy Sets window.
Field Value
DictionaryDEVICE
Allowed Protocols Host Lookup Only (selected once back in the Policy Sets window, by
clicking on Select from list)
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 28/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
13.7. Click Save to commit your changes. Your Policy set order should look as follows.
Note:
Remember that Policy sets are processed in a top-down fashion. First hit determines the Policy Set used
for the session.
14. Configure the Authentication Policy rules of the new Policy Sets.
14.1.
Expand the Passive Identity Policy Set and then expand the Authentication
Policy. It should look as follows.
14.2. Click the in the middle of the new rule to add a new rule and fill in as follows.
Field Value
Condition Wired_MAB (first, Search by Name for Wired. Then, drag and drop in the Conditions
Studio. Then, click Use.)
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 29/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Options
14.4. Save to commit your changes, then click Policy Sets to view all sets.
14.5. Expand the Wired Policy Set by clicking on the > on the right of that specific policy. Expand the
Authentication Policy. Click on the + sign in the middle of the new rule to add the following.
Field Value
Condition Wired_802.1X (Click on Search by Name. Type Wired… Drag and drop Library Condition in
the Conditions Studio). Click Use.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 30/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Use All_User_ID_Stores
14.6. Add a second rule above (gear icon > Insert new row above)
Field Value
Condition Wired_MAB (Drag and drop Library Condition in the Conditions Studio). Click Use.
14.8. Click Save to commit your changes, then click Policy Sets to view all sets.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 31/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
14.9. Expand the Wireless Policy Set by clicking the > on the right of that specifi policy and add the
following Authentication Rule. Expand the Authentication Policy and click on the + sign in the
middle of the window.
Field Value
Condition Wireless_802.1X (Drag and drop Library Condition in the Conditions Studio). Click Use.
Use All_User_ID_Stores
14.10. Add a second rule above (gear icon > Insert new row above).
Field Value
Condition Wireless_MAB (Drag and drop Library Condition in the Conditions Studio). Click Use.
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 32/33
1/8/23, 1:04 PM https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm
Note:
There is no need to modify the VPN Policy Set. It will be OK with the Default Authentication Policy.
Lab complete
https://www.remotelabs.com/ldhtm/Gb/cisco/4879c/4879_03.htm 33/33