Ise Wired Access Depl Guide-V01
Ise Wired Access Depl Guide-V01
Ise Wired Access Depl Guide-V01
Hariprasad Holla
June 2018
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Table of Contents
Introduction .................................................................................................................................... 4
About Cisco Identity Services Engine (ISE) ........................................................................................... 4
About This Guide .................................................................................................................................... 4
Define ............................................................................................................................................. 6
ISE Deployment Components .................................................................................................................................................. 6
Authentication Authorization and Accounting (AAA) ............................................................................................................... 6
Session Aware Networking.................................................................................................................................................... 10
Design........................................................................................................................................... 12
Design Considerations ......................................................................................................................... 12
Endpoint considerations ........................................................................................................................................................ 12
Network Device considerations ............................................................................................................................................. 12
ISE deployment considerations.............................................................................................................................................. 15
Deploy .......................................................................................................................................... 18
Preparing for Identity Based Network Access .................................................................................... 18
Preparing ISE for Identity Based Network Access ................................................................................................................. 18
Preparing Switch for Identity Based Network Access ............................................................................................................ 19
Validating Basic Settings ....................................................................................................................................................... 21
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Introduction
About Cisco Identity Services Engine (ISE)
Cisco ISE is a leading, identity-based network access control and policy enforcement system. It is a common policy engine for
controlling, endpoint access and network device administration for enterprises. ISE allows an administrator to centrally control
access policies for wired, wireless, and VPN endpoints in a network.
ISE builds context about the endpoints that include users and groups (Who), device type (What), access time (When), access
location (Where), access type (Wired/Wireless/VPN) (How), threats, and vulnerabilities. By sharing vital contextual data with
technology partner integrations and the implementation of the Cisco TrustSec® policy for software-defined segmentation, ISE
transforms a network from a conduit for data into a security enforcer that accelerates the time-to-detection and time-to-
resolution of network threats.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
This document is aimed at providing guidance to Cisco ISE customers that wants to protect their wired network access operated
with the Cisco Catalyst switch platforms. The configuration example listed in this document are working configurations validated
with a Cisco Catalyst 9300 series switch running IOS version 16.6.8 and Cisco ISE version 2.4.
The following are the features and variations captured in this document
• Cisco Identity Based Networking Services (IBNS) 1.0 and 2.0
• Monitor, Low-Impact and Closed deployment modes
• Critical Access Control List
• Role Based Critical Authorization
• Identity Based Wired Access in IPv6 Networks
• 802.1X on Cisco IP Phones
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Define
This initial section focusses on defining and understanding important terms and technologies involved in identity-based
networking
The endpoints need network access. The network devices provide network access to the endpoints, based on instructions from
ISE. ISE can optionally leverage external services to understand more about the endpoints for policy decisions. When it comes to
rolling out an identity-based network, these four parts of the network will be touched, various teams and individuals needs to be
involved. Several ISE use cases such as Guest access, BYOD, Posture and more require endpoints communicating to ISE via the
network devices.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Authentication Methodologies
IEEE 802.1X
The 802.1x standard defines a client-server-based access control and authentication protocol that prevents
unauthorized clients from connecting to a LAN through publicly accessible ports unless they are properly authenticated.
The authentication server authenticates each client connected to a switch port before making available any services
offered by the switch or the LAN. The supplicants on the endpoints, use Extensible Authentication Protocol (EAP) to
pass the credentials such as passwords or certificates to ISE. EAP payloads are typically transported over 802.1X in
Ethernet networks (EAP over LAN or simply EAPoL) and over RADIUS in an IP networks. ISE evaluates the endpoint’s
identity and instructs the network device whether to open the port or not, what VLAN and or ACL to apply, for that
endpoint’s access session.
MAB enables port-based access control using the MAC address of the endpoint. A MAB-enabled port on the switch
can be dynamically enabled or disabled based on the MAC address of the device that connects to it. The MAC
addresses of the endpoints must be whitelisted in some database, either on ISE or somewhere external to grant
network access to known endpoints. MAB is not truly an authentication method, instead an authentication bypass for the
endpoint’s inability to do 802.1X. While MAB can protect networks from unauthorized access, it’s not a secure
alternative to 802.1X, since MAC addresses can be spoofed easily.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Web Authentication
Web authentications are typically used to onboard guest users for internet access. Cisco platforms provide couple of
options for web authentication, Local Web Authentication (LWA) and Central Web Authentication (CWA). In case of the
former, the web pages are hosted in the network devices (like a switch or Wireless LAN controller) and in case of the
later, all the web portals are hosted centrally on ISE. CWA being the preferred method, is typically a MAB session with
URL-Redirect authorization on the switchport. Until the endpoint is authenticated successfully, any web traffic from it
can be redirected to ISE, so that ISE can throw up a login portal for end users to input their credentials. Upon
successful authentication, ISE will initiate a Change-of-Authorization (COA) to permit more access.
Easy Connect
Cisco ISE Easy Connect feature enables enterprises to implement identity-based network access without the need for
802.1X. No supplicants or supplicant configurations needed on the endpoint. Similar to the Central Web Authentication
flow, Easy Connect session starts with a MAC authentication bypass. ISE learns about the endpoint’s location, MAC
address and IP addresses via an initial MAB session. This initial MAB session will be authorized with limited access from
ISE, so that a Windows Active Directory managed endpoint can do a Windows domain login. Upon successful domain
login, the user-ID to IP address mapping from the Active Directory domain controller is pulled down to ISE and is
merged with the initial MAB session. Once the user-ID and its AD group membership are resolved, ISE can change the
authorization to permit more access.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
IEEE 802.1X is the most secure and flexible authentication methods out of the options discussed so far. There are
several EAP methods that allows for a variety of credentials types to be handled depending on the endpoint and the
environment type. Web authentication and Easy Connect options provide the necessary user-ID context for visibility and
access control, however they are constrained to specific type of endpoints. Like Web Authentication requires user
interaction and a device with a compatible web browser and Easy Connect works only for Window Active Directory
managed endpoints. Finally, MAB is more of a band aid than a real authentication method but is the easiest option to
turn on a basic level of controlled access.
Authorization Options
ISE authorization policy can result in to a permit, deny or limited network access. While RADIUS ACCESS-ACCEPT and
ACCESS-REJECT commands indicate the network devices to permit or deny access, ‘limited access’ authorization may vary
from environments to environments. The question to be asked is, what should be limited and how?
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
One of the traditional means of limiting network access is by putting endpoints in different VLANs based on their role.
Endpoints in specific VLANs can be access controlled by policies defined at the layer-3 boundaries such as on the
routers or firewalls. ISE can authorize endpoints to specific VLANs either by the VLAN name or number. Also, in
platforms such as Cisco 2960X, 3650, 3850 and the 9300s VLANs can be applied on a per MAC address basis.
ACLs can be used to control network access at the port level. ACLs can either be downloaded to the network from ISE
or be configured locally on the switch and be referenced by ISE during authorization. Named ACL authorization can be
done with RADIUS standard attribute called the ‘Filter-ID’ with the ACL name. For ACL downloads, either Per-User-ACL
or Downloadable ACL (dACLs) can be used. Both these ACL download options use Cisco custom RADIUS Attribute
Value Pair (AVP). The per-User ACL is limited by a size of 4000 characters, while downloadable ACLs do not have a
limit on its size. However the practical recommendation for dACLs are 64 Access Control Entries (ACE)s.
SGTs offer an efficient alternative to VLAN based segmentation. Just like VLAN authorization, assigning an SGT alone to
an endpoint doesn't control access. Instead after SGT assignments, the endpoints must be subject to egress
enforcement policies based on Security Group Tags. Though in most cases identity-based access is necessary for SGT
based segmentation, this guide does not cover the tag-based segmentation in any detail.
URL Redirection
The access switch can redirect endpoints to specific URLs authorized by ISE for redirection. Typically, the URL
redirection are towards the ISE nodes, so that the endpoints can do web authentication with ISE, however endpoints
can be subject to custom URLs as part of RADIUS authorization from ISE. Custom AVPs are used for URL redirection in
an identity-based network.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
When an endpoint connects to the network, the network device generates a unique session identifier that's a combination of the
network device IP address, the session count on the network device and the timestamp of endpoint’s initial connection
ISE can invoke the network device to enforce specific policies for the endpoint using the session identifier. Upon initial
authorization, ISE can issue a Change of Authorization (COA) by referencing the same session-ID. Distinct access policies for the
endpoints on the same port, can be applied because of the separation maintained by the session ID.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Design
Design Considerations
Endpoint considerations
There a few important things to consider for endpoints in an identity-based network. Firstly, how will these endpoints
authenticate to the network, is it using 802.1X or Web Authentication or some other means. Secondly, do we need custom
agents to do specific functions that the native supplicants in the OS can’t. And, finally, how to configure the endpoints for
appropriate access, which could be manual, using some centralized management tools and so on.
Agents
For most of the secure wired access stuff, an agent on the endpoint is unnecessary. However, there are a few scenarios
that can only be handled by Cisco AnyConnect endpoint agent:
EAP Chaining – Many organizations want to grant network access to trusted users on trusted devices. While
Cisco ISE feature like Machine Access Restriction (MAR) can handle such cases with native supplicants, it is
vulnerable and inflexible in various terms. With Cisco AnyConnect Network Access Manager (NAM) module on
the endpoint and Cisco ISE, user and machine authentications can be tied in a common EAP session, making it
a secure alternative to MAR.
MACSec – While protocols such as IEEE 802.1X provides authenticated network access, to keep it tightly
secure the layering of IEEE 802.1AE (MACSec) based data encryption, would be desirable. Cisco AnyConnect
is the only supplicant that can support MACSec on the endpoints.
Note: Cisco AnyConnect NAM module is compatible only on Microsoft Windows Operating systems. So
essentially both EAP Chaining and MACSec features can be enabled on Windows based endpoints only
today.
Automation
It’s evident that implementing port access control with 802.1X, means considerable changes to the endpoint. Some of
the changes that can be thought of are, supplicant configurations, certificate installation (optional), agent installation and
setup (optional). Rolling out these changes to thousands of endpoints, will need some sort of automation. Some of the
options to automate supplicant configuration are:
Always try to use some systems manager or device managers to configure endpoints at scale.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
The global AAA and RADIUS server configurations govern how the switch talks to ISE, how RADIUS transactions are load
balanced, how frequently accounting updates are sent, how it handles failure scenarios when ISE is not reachable, and so on.
The endpoint side configuration includes interface level commands to handle specific authentication methods like 802.1X or
MAC authentication bypass in a particular order. The port configurations can be done either in Identity Based Networking
Services (IBNS) 1.0 or 2.0 methods, which will be discussed shortly. ISE may authorize an endpoint with VLAN, ACL, Security
Group Tag (SGT), port configuration and more. Some of the authorization attributes needs to be configured locally on the switch.
One of the critical consideration, when it comes to the switch configurations required for ISE deployment, is whether to go with
IBNS 1.0 or IBNS 2.0 style commands. Identity Based Networking Services, as the name goes, are the identity-based session
management services on Cisco IOS, meant for handling access services for endpoints connecting to the network. It’s the policy
functions on the switch that determines how to facilitate endpoint’s network authentication to a centralized AAA (Authentication
Authorization and Accounting) server, how to treat the endpoint when there are authentication failures or AAA server
unreachability and so on. IBNS can be implemented in two ways, depending on the platform support and policy needs.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Apart from significant changes in the Cisco IOS components that handle identity-based services, from an administration and
operations perspective there are considerable differences between IBNS 1.0 and IBNS 2.0. As the picture depicts, in case of
IBNS 1.0, or sometimes referred to as ‘legacy’ mode in CLI, the switch local policy for handling endpoint’s identity-based
network access is all contained within interface configurations (a list of interface commands applied to a switchport). Whereas in
case of IBNS 2.0, the configurations take the structure of a Cisco Modular Quality of Service Command Line Interface (MQC).
One or more subscriber policies are used, defined by ‘policy-map’ command, that classifies various endpoint events in to
classes, that are defined by the class-map command arguments. The several endpoint event classifications are subject to
specific actions, some that are local and some that are enforced upon instructions from Cisco ISE. The use of templates
provides, modularity, flexibility and reusability of certain policy objects within the switch platform.
There are certain important benefits of using IBNS 2.0 over IBNS 1.0. The following table compares the two:
Policy Interface IBNS 2.0 is configured similar to a router QoS policy, while IBNS
MQC style
configuration commands 1.0 is configured with a list of interface subcommands
Intelligent IBNS 2.0 has better way to detect disconnects from indirectly
No Yes
aging connected hosts
Phased deployments
Enabling 802.1X on switchports can be disruptive. The need for endpoints to prove their identity with some sort of authentication
and then get network access, may not work well for all the device types. With wireless this is a norm, because the endpoints do
not plug to the network, rather needs to be configured (for SSIDs) to connect to the network. The notion of configure and
connect is built grounds up in wireless world, while the same is not the case with wired side of the networks. For decades the
expectation is that the endpoint must get IP address the moment they plug in to the wired Ethernet port.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Cisco recommends a phased deployment model that can allow for limited impact on network access while gradually introducing
authentication and authorization on the wired network. The three deployment modes are:
1. Monitor Mode (Open Mode) – Is a first step. Where on the wired network access, authentication is enabled while
authorization is kept open. Which means that irrespective of the endpoint’s authentication status, either success or
failure the port is always open. When a user plugs in a device one morning after monitor mode is enabled in the
network, he or she will not see any difference to how the devices gets network services. Such a setting, provides
adequate visibility, centrally to the security operator to know how many endpoints authenticate successfully, how many
fail, why do they fail, where they are located, and so on. Once most of the failures are fixed, one of the two following
enforcement modes can be enabled.
2. Low Impact Mode – Low Impact mode builds on monitor mode. With open access in place, IP Access Control Lists
(ACLs) will be used to control pre-authentication and post-authentication network access. A Pre-Auth-ACL on the
switchport, controls the network access before an endpoint could successfully authenticate and a named or
downloadable ACL received from ISE grants specific level of access upon successful authentication. Low Impact Mode
is ideal for Preboot eXecution Environment (PXE) boot environments where the thin clients need to download the OS
from the network before attempting network authentication. Since devices get IP address immediately when they
connect to the network and authentication may happen in parallel or later, it is recommended not to do VLAN changes
in Low Impact Mode.
3. Restricted Mode (Closed Mode) – In closed mode, the port is closed by default. Only EAPoL payloads are allowed
for 802.1X authentication. Upon successful authentication, the endpoints can have access to network services. Since
endpoints won’t acquire dynamic IP address without authentication, this mode is ideal for VLAN authorizations.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
ISE can be deployed as a standalone service or a cluster of multiple ISE nodes. While the former is a good option for small size
networks, the latter is the choice for medium and very large environments. Both standalone and multi-node ISE deployments can
be done on bare metal servers (Cisco Secure Network Server – SNS) or on supported Hypervisors. Choose the right deployment
type and install option, applicable to your requirements. Refer ISE Performance & Scale page for more details on the scale
limitations and performance numbers for each ISE deployment method.
The access switches need to talk to ISE servers for Authentication, Authorization and Accounting (AAA). Typically, two or more
RADIUS servers are defined on the switches for AAA and CoA. For large networks involving multiple PSNs per site, use of Load
Balancers are recommended. When Load Balancers are used, the virtual IP address of the Load Balancer must be configured as
the RADIUS server IP address on the switches. The following table summarizes the configuration practice to follow depending up
on the type of deployment and use of Load Balancers or not
Switch Side Configuration 2-Node Standalone ISE Multi Node ISE Multi Node ISE
with Load Balancers
RADIUS Server configuration IP address of the standalone IP address of the PSNs IP address of the Virtual IP address
for AAA ISE nodes of the Load Balancers
RADIUS Server configuration IP address of the standalone IP address of the PSNs and IP address of the Load Balancer VIP,
for COA ISE nodes PANs PSNs and PANs
ISE Licensing
Cisco ISE requires one or more of the three license packages, Base, Plus and Apex to service endpoints. However, for most of
the AAA and access control services, just the Base licenses are enough. For ISE to automatically detect the endpoint type, using
profiling service and to control access to them both Base and Plus licenses are required. For deeper visibility in to applications
and processes on endpoints and to control them Apex licenses will be needed additionally. Note, all these licenses are applied
to the endpoint’s session that is active at a given point of time, thereby budgeting for adequate licenses must not be on the total
number of endpoints, but for an estimate of active endpoints at a possible peak duration. More about licenses can be read at
Cisco ISE Ordering Guide
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Certificates
Certificates are used to identify Cisco ISE to an endpoint and also to secure the communication between that endpoint and the
Cisco ISE node. Certificates are used for all HTTPS communication and the Extensible Authentication Protocol (EAP)
communication. The following is a summary of certificates and their use in the context of endpoint authentication and access
control:
It is recommended not to use ISE self-signed certificates for production use, instead use a Certificate Authority (CA) signed
certificates on the ISE nodes for all possible purposes. When dealing with internal endpoints that are managed by an
organization an internal enterprise PKI (Public Key Infrastructure) can be used. For use cases such as guest internet access and
Bring-Your-Own-Device (BYOD) registration, ISE node certificates signed by public CA is recommended, to avoid poor user
experience due to certificate warnings on the endpoints. ISE has a built-in Certificate Authority service, but its largely limited to
BYOD identity and authentication. Read How To: Implement ISE Server-Side Certificates for more about certificates.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Deploy
Preparing for Identity Based Network Access
This section shows how to configure ISE and a switch for basic RADIUS connectivity.
This section covers the minimum required configuration on ISE for it to accept AAA requests from a Cisco Catalyst switch.
Step 1 Login to ISE admin node and navigate to Administration > Network Device
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Perform the following steps to configure a Cisco Catalyst Switch for basic RADIUS connectivity
c9300-Sw(config)#interface Vlan254
c9300-Sw(config-if)#description ** Switch management interface **
c9300-Sw(config-if)#ip address 172.20.254.101 255.255.255.0
c9300-Sw(config-if)#end
Note: In the example here, the switch is a VTP client and has the necessary VLANs configured. Also, the
uplink port connected to the data center is configured as a trunk port. The management IP address for
the switch can be an SVI or a Loopback interface. Ensure proper routing is setup between the access
switch and the ISE nodes.
c9300-Sw(config)#aaa new-model
Step 3 Configure one or more ISE Policy Services Nodes as the RADIUS servers
Ensure that, the RADIUS key is identical to the shared secret configured on ISE
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The default authentication port (auth-port) is 1645/UDP and accounting port (acct-port) is
1646/UDP, unless explicitly configured to 1812 and 1813 respectively as above. ISE can receive
RADIUS authentication and accounting requests on either of the two port number combinations.
Step 4 Define a method-list for the ISE RADIUS servers and reference the two server definitions under it.
Step 5 Configure network authentication to use the RADIUS method-list ("ISE" in our example)
Step 6 Configure the switch for network (access) authorization via ISE RADIUS Server(s). This is for network access
authorization from ISE, such as dynamic VLAN assignment, downloadable ACLs, URL-redirection and more.
Step 7 Configure switch to send accounting information to ISE upon endpoint session start and end events
Step 8 For switch to send periodic accounting updates for active sessions, every 2 days once
Note: Once a network access session of an endpoint is logged to ISE, it stays there for 5-days without
any additional accounting updates. In order to keep the session active on ISE, a periodic accounting
update, once in 2-days is a best practice.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Perform the following tasks to validate if the basic AAA and RADIUS configurations are working as expected
Step 2 Execute the following test command on the switch, to validate if the switch and ISE can communicate over RADIUS
The test-user and test-password are not real user names and passwords, it is to test if the switch and ISE can talk
over RADIUS protocol
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note-1: The Authen Requests Replied : 1 message in the output indicates that a RADIUS server is
responding to the switch’s requests.
Note-2: Such detailed output for test aaa command is available only from 16.X IOS version
Step 3 Login to ISE web User Interface (UI) and navigate to Operations > RADIUS: Live Logs.
You must see one or two failed entries for test-user identity, which indicates that the switch and ISE are talking over
RADIUS successfully
Step 4 If you click on the details page icon corresponding to the test-user, you will see the reason for failure: 22056
Subject not found in the applicable identity store(s), which means that user account “test-user” could not be
found anywhere, which is very obvious at this stage of the deployment.
Another important thing to notice is that, the switch is using its management IP address to communicate with ISE
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Define how the switch must detect a RADIUS server reachability failure
• time - The time during which no properly formed response must be received from the ISE server
• tries - The number of times the switch must fail to receive a response from ISE server to mark it as dead
Step 2 When multiple RADIUS servers are defined, and the primary server is unavailable, it is a good practice to hold that
server’s dead status for some time. This avoids sending RADIUS requests to a server that could be flapping its
status.
c9300-Sw(config)#radius-server deadtime 15
Step 3 With the configuration defined in Step-1, the switch will mark the server to be dead upon that server meeting the
dead criteria. However, to revert the server status back to “Up” state, the switch needs to send periodic probes,
which can be enabled by the following command
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The ‘test-user’ is a dummy username. The ‘ignore-acct-port’ keyword indicates that the switch
must not validate the accounting port number that the server will use and an ‘probe-on’ keyword
indicates that the switch must send test probes only when the server is marked ‘Dead’
Step 4 If the probe user is a real user account on ISE internal or external database, then a password is required too. The
password for this account can be configured on the switch as per below:
Step 5 The following command, makes switch send canned EAPoL success message to the client when the port fail-opens
or fail-closes in the event when none of the ISE servers are reachable.
Step 6 The following command, sends the Service-Type attribute in the authentication packets, which is important for ISE
to distinguish between the different authentication methods
Step 7 To send the IP address of the endpoint to the RADIUS server in the access request.
Step 8 To include the class attribute in access-request for network access authorization
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 9 The following command sets the MAC address of the endpoint in IETF format and in upper case.
Step 10 The following includes MAC address only, if available in the Calling Station ID of the RADIUS request
Device Tracking
Beginning in Cisco IOS XE Denali 16.1.1, the new Switch Integrated Security Features (SISF)-based IP device tracking feature
acts as a container policy that enables snooping and device tracking features available with First Hop Security (FHS), in both
IPv4 and IPv6, using IP agnostic CLI commands.
The device tracking configuration is very critical to learn the endpoint’s IP address and map that to its network access session. It
is also essential for features such as downloadable ACLs, device profiling, URL-redirection and more.
c9300-Sw(config-device-tracking)#tracking enable
Step 14 It's a best practice to disable device tracking IOS feature from gleaning UDP protocols
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The device-tracking policy is only effective when applied under the switchports, with the
following command:
Device Sensor
Device Sensor is a Cisco IOS and AireOS feature that simplifies device profiling on ISE. The switch gathers raw endpoint data
from protocols such as CDP, LLDP, DHCP and others, packages and sends it over to ISE in RADIUS accounting messages. ISE
collects these device attributes and profiles the endpoint in to specific device groups.
Step 15 The following command enables device sensor globally on the switch
c9300-Sw(config)#device-sensor accounting
Step 16 For the switch to send updates to ISE as and when the device attributes change, the following configuration must be
done:
Step 17 Configure and apply filter lists for CDP, LLDP and DHCP protocols, so that only the critical attributes required for
identifying the endpoint type reaches ISE.
c9300-Sw(config)#cdp run
c9300-Sw(config)#lldp run
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: Device sensor configuration, without filter list will overload ISE with unnecessary attributes that
does not help much in the context of device profiling. The best practice attribute list provided above
works well for most environments. For more details on profiling, refer the profiling guide
For instance, when users are not able to authenticate successfully, they can be redirected to an internal portal such as the
following to inform, how to self-resolve the issue:
Step 20 Configure the HTTP service on the switch for URL redirection
Step 21 Disable web admin access to the switch, so that the HTTP server on it can be used for URL-redirection only
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: HTTPS redirection is not recommended for production environments, due to the following
reasons:
• Security concern - HTTPS redirection is intended to hijack a secure web connection initiated
by the endpoint, which is not a good idea.
• Certificate warnings - Even if the web browsers allow for access, there can be certificate
warnings because the switch presents its own certificate for TLS handshake
• Scalability issues - Multiple HTTPS redirections can overload the switch CPU and thereby put
the switch to denial of service
Note: Do not run the 'ip http secure-server' command prior to generating the keys. If you perform the
commands out of order, the switch automatically generates a certificate with a smaller key size. This
certificate can cause undesirable behavior when redirecting HTTPS traffic.
Step 26 Limit the number of HTTP connections (Default on Catalyst 9300 is 25, maximum 50)
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
This ACL defines which traffic is redirected to ISE during CWA, BYOD, and Posture scenarios. Any traffic that is
permitted per ACL is redirected (192.168.1.10 in the example below). Implicit deny prevents other traffic types from
being redirected. We recommended that you specify only HTTP (and HTTPS) here to be permitted since this traffic
gets pushed to the switch CPU. If additional access control is needed in conjunction with the redirect ACL, then we
recommend using dACLs along with the redirect ACL.
Note: The ACL name referenced above is identical to the default redirect ACL name used in fresh ISE
2.0 installation. If different name is desired, make sure you update both the switch and the ISE
Authorization Profile with new redirect ACL name.
Step 28 It is also a good idea to have a separate URL redirect ACL for black listed devices on ISE. The default rules can
redirect all web traffic, however depending on your environment and policies, bypass redirection to specific
services.
Step 29 Configure a Pre-Authentication ACL (Pre-Auth-ACL). This is being required if the deployment transitions to low-
impact mode.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The Pre-Auth-ACL is meant to provide basic network access before successful port
authentication in low-impact mode. Thereby the rules in the ACL must permit only specific service
access deemed necessary in a given environment. Typically, DHCP and DNS services are permitted so
that time sensitive assets can acquire dynamic IP address while their authentication request is
processed by ISE.
The subsequent sections will go in to the details of the configurations required for performing an 802.1X and MAB
authentications, however the following global configurations are essential for most of the deployment scenarios:
c9300-Sw(config)#dot1x system-auth-control
Step 31 (Optional) This command allows sessions without dACL to connect to ACL enabled interface with full access.
Note: In earlier IOS versions the “epm access-control open” command was used. This feature is
useful in environments where a mixture of authorization profiles uses dACLs and others don't. For
example, user devices are enforced with dACL to limit access to the network, but no dACL is used on
IP phones. When IP Phones are connected, the IP phone is authorized to the voice resources by
MAB/802.1X (without dACL). When a user's device is connected behind the IP Phone, the switch
enforces user device dACL, which applies the ACL at the interface level. This denies IP access to the IP
Phone, since the IP Phone lacks dACL for authorization. However, when this command is entered
globally, the switch dynamically inserts 'permit ip any any' ACL for any sessions without dACL, including
the IP Phone. This is also true for multiple devices connected through an unmanaged hub. If there are
multiple devices already connected without dACL, then when a new device with dACL authorization is
authenticated to the same interface that the unmanaged hub is connected to, then this feature applies
'ip permit any any' ACL to previously connected device’s sessions.
Step 32 The following command permits endpoints to move from 802.1X enabled port to another.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Assuming that most environments have a directory service, typically Microsoft Windows Active Directory (AD), the following
section focusses on the integration between ISE and Microsoft Windows AD. If your environment uses a directory service other
than Microsoft Windows AD, then follow an appropriate guide at the ISE Design & Integration Guides, page
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
• The Cisco ISE servers and the Active Directory Domain Controllers (DC) must be time synced over Network Time
Protocol (NTP)
• Ensure that trust relationships exist between the domain to which Cisco ISE is connected and the other domains that
have user and machine information to which you need access.
• At least one global catalog server is operational and accessible by Cisco ISE, in the domain to which you are joining
Cisco ISE.
• Domain user account with rights to search, add and delete machine accounts for ISE, in the Active Directory domain.
• TCP/UDP ports open for communication between ISE and DCs. (DNS, NTP, MSRPC, Kerberos, LDAP, LDAP-GC and
IPC)
For more details, refer Active Directory Integration with Cisco ISE 2.x, guide
Step 3 Click Add and enter a custom name for Joint Point Name and specify the Active Directory domain name.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Click Yes for the subsequent notification that asks you, Would you like to Join all ISE nodes to this Active
Directory Domain?
Note: The credentials used for the join or leave operation are not stored in Cisco ISE. Only the newly
created Cisco ISE machine account credentials are stored.
Step 7 You should see the Join Operation Status as Completed if everything went well. Click Close to finish the join
procedure.
Step 8 Click on the Groups tab and select Add > Select Groups From Directory option:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 9 Retrieve Groups, select desired AD groups that you want to use for the authorization policies and click Ok
Note: The assumption is, that there are Active Directory domain users that are members of these
whitelisted groups.
Step 11 Click Connection tab within Active Directory configuration, check the configured ISE Node and then click Test User
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 12 A new window will pop-up. Type a valid domain user name and password and see if the authentication succeeds
USER ATTRIBUTES
username 0 "harry"
c9300-Sw#
AAA/SG/TEST Platform: Testing Status
AAA/SG/TEST: Authen Requests to Send : 1
AAA/SG/TEST: Authen Requests Processed : 1
<Output truncaked>
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 2 Click Default Device and then change the status to Disabled
Step 4 Select Network Devices and then once the Network Device page loads, click Add
Step 5 Fill in a Name and IP Address mandatorily. Check the RADIUS Authentication Settings box and type the Shared
Secret
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: You can optionally configure the other parameter in the Network Device configuration such as
Model Name, Software version, Location, Device type, and others. The value defined for these
attributes can used in the ISE authentication and authorization polices to match specific criteria.
Note: ISE allows for bulk configuration of the network devices. One of the options is to upload a CSV file
that contains the network device details:
The other option is to use REST API calls to ISE admin node to configure the network devices. For more
details refer the Cisco ISE API Reference Guide
Step 1 Login to the Catalyst Switch and get in to the interface configuration mode.
Step 2 Configure the switch port mode as access. None of the authentication related commands will be accepted on the
interface without this basic configuration.
c9300-Sw(config-if)#spanning-tree portfast
Step 4 Attach the device tracking policy to the port. This configuration is essential in 16.X IOS versions, for downloadable-
ACLs, URL-redirection, Security Group Tags (SGT) and other authorization options to work.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 The following command enables monitor mode (or Open mode) access for the endpoints. Any new MAC address
detected on the port will be allowed unrestricted Layer 2 access to the network even before any authentication has
succeeded.
c9300-Sw(config-if)#authentication open
Step 6 By default, an 802.1X enabled switch port will accept only one MAC address. Since the idea of open mode is to
ensure no disruption, enabling multi-auth host mode is recommended, which allows for one voice an unlimited
number of data endpoints to authenticate on the interface.
c9300-Sw(config-if)#mab
Step 10 By default, the 802.1X to MAB timeout period is 90 seconds. 30 second timeout for each EAP request sent to the
endpoint, with 2 retries. 90-seconds could be significant delay for certain endpoints to obtain IP address and gain
network access. In open mode, this is not a concern, because the port is always open. However, when the network
transitions to closed mode, this could be a concern. The best practice configuration for 802.1X timeout period that
works for most environments is about 30 seconds. The following two commands can be configured to achieve it
Step 11 (Optional) Enable reauthentication & inactivity timer for the port. This command is needed whether the values is
statically assigned on the port or derived from the RADIUS server.
c9300-Sw(config-if)#authentication periodic
Step 12 (Optional) Allows reauthenticate timer interval (Session timer) to be downloaded to the switch from the RADIUS
server
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 13 (Optional) Allow inactivity timer interval to be downloaded to the switch from the RADIUS server. The 'dynamic'
keyword instructs the switch to send out ARP-Probe before removing the session to make sure the device is indeed
disconnected.
interface GigabitEthernet1/0/1
description ** Endpoints and Users **
switchport access vlan 100
switchport mode access
switchport voice vlan 101
device-tracking attach-policy IPDT_POLICY
authentication host-mode multi-auth
authentication open
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
mab
dot1x pae authenticator
dot1x timeout tx-period 7
dot1x max-reauth-req 3
spanning-tree portfast
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 Start the Wired AutoConfig service. Also set the Startup type to Automatic
Step 4 Navigate to the Wired Ethernet port’s adapter settings. Start > Settings > Ethernet > Change Adapter Settings and
click on Properties,
Step 5 In the network adapter properties, click the Authentication tab
Step 6 Click Settings for Microsoft: Protected EAP (PEAP) authentication method.
Step 7 Have the Verify the server’s identity by validating the certificate option unchecked.
Step 8 Click Configure under Select Authentication Method and in the subsequent window, uncheck Automatically use my
Windows logon name… option. If the endpoint is an Active Directory managed endpoint and if the windows domain
login name is preferred for 802.1X authentication, then this option can be checked.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: It is strictly not recommended to disable the server certificate validation option on the supplicant.
This can subject endpoints to Man-in-the-middle and various other attacks. While disabling the server
certificate validation in the supplicant can help in quickly testing an endpoint for 802.1X authentication,
it is highly recommended to do the opposite in a production environment.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: Though the configuration explained in this section enables 802.1X on a Microsoft Windows
endpoint and can be used to validate the end to end configuration in an ISE deployment, it is not a
recommended configuration method for a large-scale production network. When it comes to production
setup, the following guidelines must be considered:
• Install the ISE server certificate or have the root-CA certificate (that signed ISE certificate)
installed on the endpoint’s trusted certificate store.
• Enable server certificate validation in the supplicant settings for PEAP
• If it is an Active Directory managed Windows endpoint, then user or computer authentication
option can be enabled
• If it is an Active Directory managed Windows endpoint, then the Windows domain login
credentials can be set to be used for 802.1X authentication, by checking the Automatically use
my Windows logon name and password option
• For Active Directory managed Windows endpoints, enable the 802.1X settings via Group Policy
management.
• For BYOD Windows endpoints, use ISE’s native supplicant provisioning flow to install server
certificate and configure the adapter settings.
Step 1 Connect the USB to Ethernet or thunderbolt Ethernet adapter to the MacBook
Step 2 Go to System Preferences > Network
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 In a few seconds an authentication window will pop up asking for 802.1X username and password. Type the
Account name and Password and click OK
Step 4 You will be asked accept the server certificate, click Continue
Step 5 At this time, you must provide the local system administrator username and password to add the ISE certificate to
the local trusted certificate store
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 6 You should notice the change in IP address and domain name. Also, the 802.1X session timer kicks in once the
authentication is successful
Note: Like Microsoft Windows Active Directory and 3rd party systems managers for Windows endpoints,
there are systems managers available for Apple OS X devices. The systems managers can manage
inventory, build and deploy applications, and enforce polices on all the managed OS X endpoints in a
given environment. Here is an example of how a systems manager can be used to remotely manage
802.1X configuration on Apple Mac endpoints: 802.1X Network Authentication for Mac
Step 1 Login to ISE. In the dashboard you will see the total number of endpoints connected to the network
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 Navigate to Operations > RADIUS: Live Logs, you should notice that all the endpoints connected to the network so
far have received a permit access.
Step 4 Login to the Catalyst switch and check the authentication sessions
<Output trunckated>
Server Policies:
Security Policy: None
Security Status: Link Unsecured
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
----------------------------------------
Interface: GigabitEthernet1/0/1
IIF-ID: 0x14A4B799
MAC Address: 0064.40b5.794e
IPv6 Address: Unknown
IPv4 Address: 172.20.101.3
User-Name: 00-64-40-B5-79-4E
Status: Authorized
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Session timeout: N/A
Common Session ID: 65FE14AC000000201D049D86
Acct Session ID: 0x00000016
Handle: 0xb5000016
Current Policy: POLICY_Gi1/0/1
Server Policies:
Building on top of the configurations done in the previous section, a few changes can be made in the network for restricted
network access. The idea is, once we thoroughly understand how endpoints behave in the monitor mode and fix failures, we
move on with a more controlled network access.
Since in Closed mode, there is no network access prior to successful authentication, this is the right deployment mode for
dynamic VLAN assignments.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to the switch. On a per port basis, disable open mode configuration done in the previous section
Critical Authentication
When in Closed mode, the endpoints won't have network access unless they authenticate successfully or are given
fail open access because of ISE authorization policy. What if the ISE service itself is unavailable? The best practice
recommendation thereby is to configure fail open access locally on the switch.
Step 2 Use the Inaccessible Authentication Bypass (IAB) feature, also referred to as critical authentication or the AAA fail
policy, when the switch cannot reach the configured RADIUS servers and new hosts cannot be authenticated. When
a new host tries to connect to the critical port, that host is moved to a user-specified access VLAN, the critical
VLAN. The critical VLAN can be same as the default VLAN on the port. The administrator gives limited authentication
to the hosts.
Note: To support inaccessible bypass on multiple-authentication (multi-auth) ports, you can use the
authentication event server dead action reinitialize vlan vlan-id. When a new host tries to connect to
the critical port, that port is reinitialized and all the connected hosts are moved to the user-specified
access VLAN. The authentication event server dead action reinitialize vlan vlan-id interface
configuration command is supported on all host modes.
Step 3 Enable critical voice VLAN feature to allow access to IP phones when ISE server is unreachable for its authentication.
When traffic coming from the host is tagged with the voice VLAN, the connected device (the phone) is put in the
configured voice VLAN for the port. The IP phones learn the voice VLAN identification through CDP (Cisco devices),
through LLDP or DHCP.
Step 4 To reinitialize a session when a previously unreachable ISE server becomes available, use the authentication event
server alive action reinitialize command in interface configuration mode.
Wake-on LAN
The IEEE 802.1x standard is implemented to block traffic between the unauthenticated clients and network
resources. This means that unauthenticated clients cannot communicate with any device on the network except the
authenticator. The reverse is true, except for one circumstance, when the port has been configured as a
unidirectional controlled port.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Unidirectional State
The IEEE 802.1x standard defines a unidirectional controlled port, which enables a device on the network to "wake
up" a client so that it continues to be reauthenticated. When you use the authentication control-direction in
command to configure the port as unidirectional, the port changes to the spanning-tree forwarding state, thus
allowing a device on the network to wake the client and force it to reauthenticate.
Bidirectional State
When you use the authentication control-direction both command to configure a port as bidirectional, access to
the port is controlled in both directions. In this state, the port does not receive or send packets.
Step 5 (Optional) Allows broadcast traffic in from the network to the unauthenticated port. This assists with WoL (Wake on
LAN) process, so the network management server can wake the clients up on demand. It also assists in MAB
process for certain types of devices that doesn't generate much traffic on its own without network request from
another host.
c9300-Sw(config-if)#authentication control-direction in
MAC Limits
Limiting the number of MAC addresses on an 802.1X enabled port is not straight forward. There are couple of
options to achieve MAC limits to a certain extent:
• Host modes – There are 4 host modes that can be configured on the port and following are the details:
Host Mode Number of endpoints Interface command
Single Host 1 Voice / Data device authentication host-mode single-host
(default in IBNS 1.0)
Multi-Domain Authentication 1 Voice and 1 Data device authentication host-mode multi-domain
(MDA)
Multi-Host Mode 1 Voice and Unlimited Data authentication host-mode multi-host
(At least one MAC address
must authenticate
successfully)
Multi-Auth Mode 1 Voice and Unlimited Data authentication host-mode multi-auth
(Each MAC address must
authenticate)
When you opt for restrictive host modes such as Single-host mode or Multi-domain authentication host
modes, when an authentication violation occurs, (such as more MAC addresses appearing on the same
port) the port will be error disabled. This may require administrator’s attention to remediate the shutdown
port state. It is thereby recommended to have a restrictive, yet non-disruptive option to handle
authentication violations:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
• Device tracking policy - The other option to limit number of endpoints from getting identity-based
services, is to use the device tracking policy. The device tracking policy can be configured to limit the
number of endpoints (IP addresses) being tracked for the IP based services (like dACL/URL-redirect /
SGTs, etc). This does not limit the number of endpoints from connecting or authenticating on the port. The
following is the configuration:
Note: Even though port-security interface command enforces MAC address limit, it is not compatible
with the authentication / dot1x configurations on the switchport. In general, Cisco does not recommend
enabling port security when IEEE 802.1x is enabled.
interface GigabitEthernet1/0/1
description ** Endpoints and Users **
switchport access vlan 100
switchport mode access
switchport voice vlan 101
device-tracking attach-policy IPDT_POLICY
authentication control-direction in
authentication event server dead action reinitialize vlan 100
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 7
dot1x max-reauth-req 3
spanning-tree portfast
It is always important to have policy goals in mind before configuring ISE access policies. In this example, we’ll have 802.1X
authentication resulting in either basic access or access to Employee segment depending up on the user’s Active Directory
group membership. The IP Phones will be authorized for voice VLAN and rest will be subject to guest portal. When the ISE
servers are unreachable, the switch will authorize newly connecting endpoints to Critical VLAN (which can be same as the
default VLAN). Here is a flow chart on the policy, most part of the decision tree and critical authorization is already configured on
the switch, the 802.1X and MAB authorization policies must be configured on ISE:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to ISE and click on Policy > Policy Elements: Results
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The VLAN name or number that you specify in the Authorization Profile must exactly match the
VLAN name or number configured on the access switch. In this example there exists a VLAN on the
switch named Employees:
Step 5 You can either create a new policy-set or edit the Default policy-set that comes with the ISE installation. In this
example, we will work with the Default policy set. Click on the > icon to expand the default policy set.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 7 Scroll down and create a new rule above Basic_Authenticated_Access rule
Step 8 Give a descriptive name for the policy rule and click on the + button
Step 9 If it’s your first time configuring the policy in ISE after its installation, you will see Screen-tip explaining how to use
the condition studio. Click on the ‘x’ button and you will land on the policy editor. Within the Condition Studio, click
on the field that reads ‘Click to add an attribute’
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 10 Once the Editor options load, click on the user group icon and then select Active directory ExternalGroups
Step 11 Configure a condition to match on Active directory group of choice. In this example we will configure a condition to
match on Active Directory Group Employees
Note: Within the Condition studio, in the condition Editor, there is a Save option once you configure a
condition. If you click on the Save option, you can save this condition with an arbitrary name and reuse
the condition with that name later for other authorization policies.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 13 Once you land back in the Authorization policy page of the policy-set, click the field under results (reading Select
from list), then choose the authorization profile created for this user group (which is EmployeeVLAN in this
example)
Step 14 Optionally you can also add a Security Group Tag as an additional authorization result.
Step 15 To adhere to our policy goals, edit the default policy to result in a web portal.
Step 16 Once the policy looks good, click the save button
Step 17 Also note, for IP Phones, there is already a policy rule by default that authorizes profiled IP Phones with voice VLAN
permission:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to the Catalyst switch and test AAA authentication, you must see that the Active Directory user (member of
Employee Group) will be returned with VLAN authorization
USER ATTRIBUTES
username 0 "harry"
tunnel-type 1 13 [vlan]
tunnel-medium-type 1 6 [ALL_802]
tunnel-private-group 1 "Employees"
security-group-tag 0 "0004-0"
Step 2 If you bounce the access port where the IP Phone and employee are connected, you must observe the new
authorization results as follows:
Local Policies:
Idle timeout: 65536 sec
Server Policies:
Vlan Group: Vlan: 150
Security Policy: None
Security Status: Link Unsecured
SGT Value: 4
----------------------------------------
Interface: GigabitEthernet1/0/1
IIF-ID: 0x1AABEBEF
MAC Address: 0064.40b5.794e
IPv6 Address: Unknown
IPv4 Address: 172.20.101.3
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
User-Name: 00-64-40-B5-79-4E
Status: Authorized
Domain: VOICE
Oper host mode: multi-auth
Oper control dir: in
Session timeout: N/A
Common Session ID: 65FE14AC0000002E27DEBD9D
Acct Session ID: 0x00000024
Handle: 0xf7000024
Current Policy: POLICY_Gi1/0/1
Local Policies:
Idle timeout: 65536 sec
Server Policies:
ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-57f6b0d3
Step 3 Login to ISE and navigate to Operations > RADIUS: Live Logs. You will notice the two endpoints being
authenticated and authorized
Step 4 Click on the Details (magnifier) icon for the specific entry in the live log and you will see the details.
Step 5 The result Overview section shows what Authorization policy rule that was hit and what was the end result
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 6 If you scroll down to the end of the page, you will the result details under the Results section
Naturally after gaining enough visibility in the monitor mode, the next step is to enforce restricted access. While in Closed mode
there is no access (even IP address assignment) before successful authentication, there are scenarios where some level of
network access must be granted prior to authentication. PXE boot environments are a classic example. On top of open access
(monitor mode) IP ACLs can be used to control pre and post authentication access. While pre-authentication access control can
be done via a port based IP Access Control List (ACL), the post authentication access control can be done via downloadable or
named, ACLs.
Note: Dynamic VLAN assignment is not a recommended authorization option for Low-Impact Mode. Since
endpoints acquire IP address prior to network authentication in the default VLAN, change in the VLAN assignment
forces them to renew their IP address(s), which may not happen automatically, thereby locking them out of the
network in spite of an authorized access permission as per ISE policy.
Some endpoint types have intelligence to detect network changes. The Windows workstation for instance, will
upon receiving an EAP-Success from the switch, attempts to ping the default gateway (thrice within seconds) with
TTL=1. If the router responds, it assumes no change in VLAN and remains with its IP address, if not it releases the
IP address and re-discovers a new one. This was introduced in Windows XP SP2 with the following KB:
KB822596: DHCP does not obtain a new address when EAP reauthenticates across access points with IP
subnets that differ
The behavior with OSX is similar, but when the system receives an EAP success, it tries to reach the same DHCP
server to renew the same IP address, thrice with 1-minute wait time between the attempts.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
In open mode, we do not need critical authorization, because the port is always open for full network access. In closed mode,
we normally deal with VLAN authorizations and thereby we can apply a critical VLAN when endpoints can’t authenticate during a
server failure. In low-impact mode, we need to have a port ACL to control pre-authentication access, which leads to a problem
during AAA server unreachability. With IBNS 1.0, we can apply critical VLAN for endpoints trying to authenticate when the ISE
service is down, but the Pre-Auth ACL on the interface will still block traffic from the authenticating endpoints. IBNS 2.0
framework offers switch-local template-based authorization and thereby facilitates the idea of critical ACL; Access Control Lists
that can be applied during a critical authorization state. IBNS 2.0 thereby, because of its effectiveness in handling failure
scenarios is a recommended configuration mode to deal with low-impact mode and closed modes.
Step 1 Login to the switch. Have it pre-configured for best practice global configurations and Closed mode interface
configuration on just one interface.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 You will notice on the interface that the identity configurations have changed:
Note: The authentication display new-style command converts an existing IBNS 1.0 configuration to
IBNS 2.0. The new-style configurations can be reverted back to the old style with authentication display
legacy exec-mode command. If in new-style, any changes are made to the policy-map or any other
IBNS 2.0 specific commands, or if the system is reloaded with new-style configurations written to the
startup-configuration, then you won’t be able to revert back to IBNS 1.0 style configurations from IBNS
2.0
Step 4 Copy the policy-map and class-maps to a text editor and customize the configuration
<Output truncated>
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Convert the switch’s authentication configuration mode to new-style (aka IBNS 2.0 style)
c9300-Sw#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
c9300-Sw(config)#
c9300-Sw(config)#authentication convert-to new-style
This operation will permanently convert all relevant authentication commands to their CPL control-
policy equivalents. As this conversion is irreversible and will disable the conversion CLI
'authentication display [legacy|new-style]', you are strongly advised to back up your current
configuration before proceeding.
Do you wish to continue? [yes]: yes
c9300-Sw(config)#
c9300-Sw(config)#service-template CRITICAL_AUTH_ACCESS
c9300-Sw(config-service-template)#description ** Access Policy For IAB **
c9300-Sw(config-service-template)#access-group IPV4_CRITICAL_ACL
Step 9 Review the two service-template configurations before configuring the class-maps
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 10 Ensure the following class-maps exists in the system before configuring a new policy-map for low-impact mode
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 11 Configure a new policy-map as per below (in global configuration mode)
The highlighted part of the policy-map PORT-AUTH-POLICY, indicates the changes done to the system generated
policy
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Copy the interface configuration from the switchport and configure an interface template as per below
c9300-Sw(config)#template PORT-AUTH-TEMPLATE
c9300-Sw(config-template)#description ** Endpoints and Users **
c9300-Sw(config-template)#switchport access vlan 100
c9300-Sw(config-template)#switchport mode access
c9300-Sw(config-template)#switchport voice vlan 101
c9300-Sw(config-template)#authentication periodic
c9300-Sw(config-template)#authentication timer reauthenticate server
c9300-Sw(config-template)#access-session control-direction in
c9300-Sw(config-template)#access-session port-control auto
c9300-Sw(config-template)#mab
c9300-Sw(config-template)#dot1x pae authenticator
c9300-Sw(config-template)#spanning-tree portfast
c9300-Sw(config-template)#service-policy type control subscriber PORT-AUTH-POLICY
c9300-Sw(config-template)#end
Note: Certain interface commands are not supported within Interface templates today. They need to be
configured on the port explicitly. The following are the caveats:
Note: Notice that the access-session closed command got from the conversion is being omitted in the
interface template configuration. This is because, this section focusses on low-impact mode, which is
minor variation to open mode and in IBNS 2.0 the default port mode is open mode. If you wish to move the
port to closed mode, then the access-session closed interface command must be configured explicitly
either within the interface template or on the interface directly.
Step 2 Default the port configuration and apply the interface template along with other supporting commands for IBNS
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: Global AAA and RADIUS server configuration for IBNS 1.0 and IBNS 2.0 are very alike, barring a few
minor differences.
aaa accounting dot1x command will be converted to aaa accounting Identity in IBNS 2.0 style.
authentication mac-move permit command is default in IBNS 2.0 and thereby the configuration won’t
show up in the running configuration. If you want to disable mac-move, then you need to configure
‘access-session mac-move deny’ explicitly in the global configuration mode.
device-sensor accounting command is replaced with access-session attributes filter-list command set
Switch Global Configuration Dump for AAA, RADIUS and More in IBNS 2.0
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to ISE and navigate to Policy > Results: Authorization > Downloadable ACLs. Click Add
Step 2 Create a dACL each for Employees and IP Phones. Once the dACL rules are written they can be validated by clicking
the Check DACL Syntax option. Save the dACLs by clicking the Submit button.
Note-1: In this example, the Employees are denied access to specific subnet (Let’s say payment card
network) and are given access to everything else. The IP Phones have access to the subnet where Call
Manager, DHCP, DNS servers and other peers in the default and voice VLANs reside, rest of the
network access is denied.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note-2: In terms of the Access Control Entries (ACEs) for the downloadable ACLs, the recommendation
is to keep it small so that it is easy to download the policy to the network device and also small ACLs
can optimize the TCAM (Ternary Content Addressable Memory) memory consumption on the access
switches. The best practice limit for dACLs are 64 ACEs (64 lines).
Step 4 Create a new Authorization Profile and reference the Employee ACL. Click Submit once done
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Repeat the same procedure for the Voice ACL. However, for IP Phones, you need to check the Voice Domain
Permission too. Click Submit once done.
Step 6 Navigate to the ISE authorization policy page for Employees and IP Phones (Your custom policy-set if configured or
the default policy set accessible via Policy > Policy Sets)
Step 7 Update the Employee and IP Phone authorization rule as per below and save the configuration.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Within ISE, navigate to Operations > RADIUS: Live Logs, you will notice that both the Employee computer and the IP
Phones have dACL authorization applied to them
Step 3 In the details page, if you scroll down and look at the results, you will notice individual dACL rules that are
downloaded to the switch
Note: In IBNS 2.0, most of the “authentication” commands are converted to “access-session”
commands. So, show authentication sessions is now show access-session in IBNS 2.0
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Local Policies:
Idle timeout: 65536 sec
Server Policies:
ACS ACL: xACSACLx-IP-VoiceACL-5aee9aa7
----------------------------------------
Interface: GigabitEthernet1/0/1
IIF-ID: 0x1645C323
MAC Address: 0050.56a7.fa8a
IPv6 Address: fe80::e55d:20e1:8f:d008
IPv4 Address: 172.20.100.10
User-Name: harry
Status: Authorized
Domain: DATA
Oper host mode: multi-auth
Oper control dir: in
Session timeout: N/A
Common Session ID: 65FE14AC0000003432D7C631
Acct Session ID: 0x0000002a
Handle: 0x7d00002a
Current Policy: PORT-AUTH-POLICY
Local Policies:
Idle timeout: 65536 sec
Server Policies:
Security Policy: None
Security Status: Link Unsecured
SGT Value: 4
ACS ACL: xACSACLx-IP-EmployeeAccessACL-5aee9a60
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The dACL names when downloaded the switch will be appended with session timestamps. For
instance, EmployeeAccessACL on ISE becomes xACSACLx-IP-EmployeeAccessACL-5aee9a60 on the
switch when downloaded.
Step 5 You can check the downloaded ACLs on the switch with the following show command:
Step 6 Further you can run platform specific exec command(s) to understand what ACLs are applicable for specific
endpoints. Here is an example for Catalyst 9300:
In the example below, we understand that on GigabitEthernet 1/0/1 interface, any MAC address (0000.0000.0000)
is subject to IPV4_PRE_AUTH_ACL, the IP Phone MAC address is subject to IP-Voice-ACL + IPV4_PRE_AUTH_ACL
and the Employee’s PC is access controlled by EmployeeAccessACL + IPV4_PRE_AUTH_ACLs:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: Similar ACL programming information can be got on Catalyst 3650 / 3850 switch platforms with
‘show platform acl le’ exec mode command.
In the other platforms, just ‘show ip access-list interface <interface-id>’ will output the cumulative list of
Access Control Entries (ACE) applied on that port
One of the many advantages of using IBNS 2.0 is that it can handle failure scenarios efficiently. With a few additional tweaks to
the previously configured IBNS 2.0 configuration, endpoints that have been authorized previously by ISE can be given the same
level of network access even when the server is not reachable next time. The idea is to grant role-based access during critical
condition, instead of applying a common critical authorization.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to the switch and configure IP ACL for Employee users. Note, the ACL rules are same as the downloadable
ACL configured on ISE for Employee user group
Step 2 Configure a Service Template that exactly matches the ISE authorization policy result in ISE for Employee user group
c9300-Sw(config)#service-template EMPLOYEE_CRITICAL_AUTH_ACCESS
c9300-Sw(config-service-template)#description ** Policy For Employees during IAB **
c9300-Sw(config-service-template)#access-group IPV4_EMPLOYEE_CRITICAL_ACL
c9300-Sw(config-service-template)#sgt 4
Step 3 Create a class-map to match on ‘Employee’ user-role and AAA down condition
Step 4 Modify the two class-maps that evaluate critical authorization conditions. Note, the changes are highlighted below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Either modify existing policy or create a new policy-map to match on the user-role and apply the new service-
template when the ISE service is unavailable for the Employee devices. In this example we create a new policy-map
(in global configuration mode) with minor changes compared to the previous ones. The changes are highlighted
below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
c9300-Sw(config)#template PORT-AUTH-TEMPLATE
c9300-Sw(config-template)#description ** Endpoints and Users **
c9300-Sw(config-template)#switchport access vlan 100
c9300-Sw(config-template)#switchport mode access
c9300-Sw(config-template)#switchport voice vlan 101
c9300-Sw(config-template)#authentication periodic
c9300-Sw(config-template)#authentication timer reauthenticate server
c9300-Sw(config-template)#access-session control-direction in
c9300-Sw(config-template)#access-session port-control auto
c9300-Sw(config-template)#mab
c9300-Sw(config-template)#dot1x pae authenticator
c9300-Sw(config-template)#spanning-tree portfast
c9300-Sw(config-template)#no service-policy type control subscriber PORT-AUTH-POLICY
c9300-Sw(config-template)#service-policy type control subscriber PORT-AUTH-POLICY-II
c9300-Sw(config-template)#end
Step 1 Login to ISE and navigate to Policy > Policy Elements: Results. Click Authorization > Authorization Profiles. Click
Add, and create a new authorization profile with Cisco AV Pair: role=<user-role>, as per below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 Authenticate / re-authenticate Employee user. You will now see a new session info on the switch titled User-Role
Local Policies:
Idle timeout: 65536 sec
Server Policies:
Security Policy: None
Security Status: Link Unsecured
SGT Value: 4
ACS ACL: xACSACLx-IP-EmployeeAccessACL-5aee9a60
----------------------------------------
MAC Address: 0050.56a7.fa8a
Device-type:
User-role: Employees
Protocol-map: 00000000
----------------------------------------
<Output truncated>
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Make sure the ISE servers are unreachable from the switch
Step 2 Connect the Employee PC again now when the server is unreachable. You will notice that the switch has applied the
same policies that ISE would apply, but locally this time, based on the cached user role
Local Policies:
Idle timeout: 65536 sec
Service Template: EMPLOYEE_CRITICAL_AUTH_ACCESS (priority 150)
Filter-ID: IPV4_EMPLOYEE_CRITICAL_ACL
SGT Value: 4
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note-1: Similar local policies can be configured for various other users and device-types.
Note-2: The access-session cache is cleared either when switch reloads or the endpoint does EAPOL-
Logoff. EAPOL-Logoff typically happens in most of the operating systems when user logs off the
system.
There are instances when from the same network device, AAA transactions must be done with distinct groups of RADIUS
servers. This is very typical in the wireless network, where the configurations can be done on a per SSID basis. However, on the
switch side, such differentiated authentication was not possible until the introduction of IBNS 2.0. There are couple of possible
use cases for differentiated authentication:
1. Separate MAB and 802.1X transactions – Though not a common or recommended practice, if there is a need for
separating MAB and 802.1X transactions from the same switch interface, differentiated authentication feature can be
used.
2. Separate RADIUS servers based on switchports – Specific switchports can be configured for IBNS 2.0 policy to talk to
separate ISE servers with differentiated authentication feature.
This example briefs you how to modify the switch configuration to perform differentiated authentication, so that specific set of
interfaces on the switch talk to specific ISE servers.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Before authoring the policy-map and applying it on the interface, we need to configure the global AAA and RADIUS
parameters to distinguish the two AAA server groups. Define two or more distinct RADIUS servers (in IOS global
configuration mode)
Step 2 Define two server groups and method-lists for AAA (in IOS global configuration mode)
Step 3 (Optional) The following commands makes the switch, simultaneously send accounting records to the first server in
each group.
aaa accounting Identity default start-stop broadcast group ISE-CUBE-1 group ISE-CUBE-2
aaa accounting network default start-stop broadcast group ISE-CUBE-1 group ISE-CUBE-2
aaa accounting system default start-stop broadcast group ISE-CUBE-1 group ISE-CUBE-2
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Configure two IBNS 2.0 policies similar to PORT-AUTH-POLICY and make the following changes
template PORT-AUTH-TEMPLATE-CUBE1
description ** Endpoints and Users on Cube-1 ISE **
spanning-tree portfast
dot1x pae authenticator
switchport access vlan 100
switchport mode access
switchport voice vlan 101
mab
access-session control-direction in
access-session closed
access-session port-control auto
authentication periodic
authentication timer reauthenticate server
service-policy type control subscriber PORT-AUTH-POLICY-CUBE1
!
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
template PORT-AUTH-TEMPLATE-CUBE2
description ** Endpoints and Users on Cube-2 ISE **
spanning-tree portfast
dot1x pae authenticator
switchport access vlan 100
switchport mode access
switchport voice vlan 101
mab
access-session control-direction in
access-session closed
access-session port-control auto
authentication periodic
authentication timer reauthenticate server
service-policy type control subscriber PORT-AUTH-POLICY-CUBE2
Step 7 Source the interface template along with the other interface specific commands for the desired ports
Step 8 Here is an example of how to configure an IBNS 2.0 policy for differentiated authentication for 802.1X and MAB on
the same switchport
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: The Method-List AVP (AAA_LIST1 in the example above) on ISE must match the AAA method list on
the switch and not the AAA server group.
IPv6 is an inevitable future and most of the ISE deployments that are on IPv4 needs to be migrated to IPv6 sometime. Cisco IOS
has the following IPv6 based identity features in contrast to IPv4
Yes
Network device configuration on ISE Yes
(Starting ISE 2.4)
Open Mode
Yes Yes
(No Authorization)
Closed Mode
Yes Yes
(With VLAN assignments)
* - Only Filter-ID and Per-User ACL supported on Catalyst 3650, 3850 and 9300 platforms
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 1 Login to the ISE console (via SSH if enabled) and configure the IPv6 address to the interface
<Output truncaked>
Note-1: In a distributed ISE deployment, each Policy Administration Node (PAN) and Policy Services
Node(s) (PSN) must be configured for an IPv6 address
Note-2: All the ISE services on the node restarts once a new IPv6 address is configured
Step 2 Login to the access switch and enable IPv6 unicast routing
c9300-Sw(config)#ipv6 unicast-routing
Step 3 Ensure there is an IPv6 address for the RADIUS source interface
Note: Ensure that end-to-end IPv6 routing is configured so that the access switch can talk to ISE node(s)
over IPv6 protocol.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 4 Ensure that the access switch can ping ISE node(s) over IPv6
Step 5 Just to recall, in IOS 16.X, device tracking is common for both IPv4 and IPv6. Ensure that the device tracking policy
is configured and is applied for the access ports
Note: On 3650 and 3850 switch platforms running IOS version prior to 16.1, the following commands
must be configured for IPv6 device tracking
In this section the global configuration defined under Switch Global Configuration Dump for AAA, RADIUS and More in IBNS 2.0
section will be modified for IPv6
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 Ensure that the servers are reachable and are marked ‘Up’
The policy is very similar to the IPv4 Pre-Authentication ACL configured earlier
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
c9300-Sw(config)#service-template CRITICAL_AUTH_ACCESS
c9300-Sw(config-service-template)#access-group IPV6_CRITICAL_ACL
c9300-Sw(config-service-template)#end
c9300-Sw#show running-config | begin service-template
...
service-template CRITICAL_AUTH_ACCESS
description ** Access Policy For IAB **
access-group IPV4_CRITICAL_ACL
access-group IPV6_CRITICAL_ACL
!
Step 5 Login to ISE and modify the Network Devices configuration for the Catalyst Switch, to whitelist on IPv6 address.
Go to Administration > Network Resources: Network Devices. Click on the specific switch name, then configure
the IPv6 address and save the configuration.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 6 Next, navigate to Policy > Policy Elements: Results > Authorization > Authorization Profiles and configure an
authorization profile for Per-User ACL as per below
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: Apart from Per-User-ACL, the other two ACL authorization options available for IPv6 today are
Filter-ID and Service-Templates:
Step 7 Reference this Authorization profile as one of the authorization results for Employee user group
Step 8 Re-authenticate the Employee workstation and notice the IPv6 ACL download and authorization for the network
access session
Server Policies:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
There is nothing unique about 802.1X on IP Phones. They use similar protocols and authenticate using same type of credentials
as other users and devices that perform 802.1X. However, there are some specific requirements for preparing the voice network
for authentication of IP Phones. The IP phones must present a password or X.509 digital certificate to authenticate successfully.
IP Phones use EAP-MD5 for password authentication, which is considered weak in contrast to other password based EAP
methods such as Protected EAP (PEAP) or EAP-Flexible Authentication via Secure Tunneling (EAP-FAST). Most Cisco IP phones
support authentication via X.509 certificates using the EAP-Transport Layer Security (EAP-TLS) or EAP-FAST methods of
authentication.
Cisco IP Phones support two types of X.509 certificates: The Manufacturing Installed Certificate (MIC) and the Locally Significant
Certificate (LSC).
MIC as the name indicates, are the certificates that are pre-installed on the IP Phones and cannot be deleted / modified by the
administrators. They are signed by one of the Cisco Manufacturing Certificate Authorities. When an IP phone authenticates using
MIC, it proves that it is a valid Cisco IP Phone, but it does not validate if it is a company owned asset. Anyone can connect a
personal device that has Cisco Manufacturing CA signed certificate on it and gain network access.
LSC on the other hand are administrator installed certificates that are signed by the Cisco Unified Call Manager. These
certificates serve the same purpose as MICs in terms of authentication but provides greater security due to its local significance
to a given environment.
The following section covers Cisco IP Phone authentication using digital certificates.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 3 Click Find, the CUCM server will load. Click on the CUCM server listing
Step 4 Ensure there are device and line templates, phone numbers configured and Auto-registration is enabled
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 The Cisco IP phones download the configurations from CUCM over TFTP. They discover the TFTP server (CUCM)
address via DHCP Option-150. Configure your DHCP server to send Option-150 with CUCM server IP address. Here
is an example of the configuration done in the Windows DHCP server
Follow cisco.com guide Configuring Windows 2000 DHCP Server for Cisco CallManager for more specific steps
Step 6 The CUCM wouldn't by default serve the TFTP requests, the services need to be enabled explicitly. On the right
hand top side of the CUCM admin page, select Cisco Unified Serviceability and Click Go
Step 7 Login with the CUCM admin credentials. Select Tools > Service Activation
Step 8 Check the Cisco CallManager and Cisco Tftp services and click Save
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 9 Ensure that the phone has open access to the network services or is authorized by ISE for access to DHCP, DNS,
and TFTP services. In the previous example the IP Phone(s) were MAB authenticated and a dACL was applied for
the session. Bounce the switchport where the IP Phone is connected
Step 10 Switch to CUCM admin page, by selecting Cisco Unified CM Administration option at the top right corner of the
Serviceability page and click Go
Step 11 Click Device > Phone and move to Find and List Phones page
Step 12 Click Find with default settings and when the phone communicates to the CUCM it shows up in this page
Note: The phone status must show ‘Registered with cucm’ for the administrator to manage the phone
from the Call Manager. If the status is something else, then try resetting the IP Phone with physical
access to it.
Now that the IP Phone is registered with the Call Manager, necessary changes can be done in the system to enable 802.1X
authentication. For MIC based 802.1X authentication, the relevant manufacturer CA certificates must be trusted in ISE and the IP
Phones must be configured via CUCM to do 802.1X authentication using MICs. This section shows how to configure the voice
network for MIC authentication and necessary changes required in ISE to support it.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 2 Login with admin credentials and navigate to Security > Certificate Management
Step 3 Click on each of the CA certificates listed as CallManager-trust and export it to your local disk in PEM format. Note,
that the last three certificates need not be exported because they are by default installed in Cisco ISE’s trusted CA
store. However, make sure that those certificates exist on ISE.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 5 Click on Trusted Certificates and you will see a list of Root CA public certificates installed on ISE. Notice the three
Cisco Manufacturing certificates that we saw in CUCM before
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 10 Upload the CA certificate, give it a name, description and Save it with default settings
Step 11 If the certificate has weaker key strength or an outdated algorithm, a warning message is shown. If it is permissible
in the given environment to use such certificates, then click Yes and proceed
Step 12 Repeat the certificate import procedure for all the CUCM exported certificates.
Step 13 Navigate to ISE authorization policy and create a new authorization rule for IP Phones with Certificates
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 14 Click on the + button for conditions and in the condition Editor, click on the field that says Click to add an attribute,
then click on the user icon and then select CERTIFICATE Subject – Common Name
Step 15 Define a condition to match on ‘CERTIFICATE Subject – Common Name’ Contains ‘SEP’
Step 16 Click the + New button to add another condition
Step 18 Define the second condition to match on ‘CERTIFICATE Issuer – Organization’ Contains ‘Cisco’
Step 19 Click Use once the conditions looks good
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 20 Add Voice permission that has Voice Domain Permission (dACL_Voice in this example) and Save the configuration
Step 22 Find the registered phones and click on the specific phone of interest
Step 23 Scroll down under Product Specific Configuration Layout, until you see 802.1X Authentication and then enable it
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 25 The IP Phone in the network should now start 802.1X. If you login to the switch, you will now see the session
information for phone changed to dot1x Method
c9300-Sw#show access-session
Interface MAC Address Method Domain Status Fg Session ID
--------------------------------------------------------------------------------------------
Gi1/0/1 0064.40b5.794e dot1x VOICE Auth 000000000000005A4656E5C5
Gi1/0/1 0050.56a7.fa8a dot1x DATA Auth 00000000000000594656E2C5
<Output trunckated>
Step 26 The session details will reveal additional information about the phone’s 802.1X session
Server Policies:
ACS ACL: xACSACLx-IP-VoiceACL-5af16326
Security Policy: None
Security Status: Link Unsecured
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 27 Back in ISE, under Operations > RADIUS: Live Logs, you will notice the new session
Step 28 Click on the session details, you will see that the IP Phone is 802.1X authenticated and is been authorized with a
dACL
Step 29 If you scroll further down that page, you will notice the certificate details
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Note: To enable 802.1X across all the IP Phones, specific models or locations, use the Bulk
Administration option in CUCM
Step 1 Login to the Cisco Unified Serviceability tool with the admin credentials
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 4 Once the CAPF service is enabled, restart the TFTP service, so that the IP Phones can download the LSCs. To do
that, click Tools > Control Center Feature Services
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 9 Export the CAPF Root CA certificate to your local system (The certificate title only has CAPF in it)
Step 10 Login to ISE, navigate to Administration > System: Certificates > Trusted Certificates and then click Import
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 13 The certificate will be locally signed by the CUCM and the organization name with your specific company name.
Make a note of the organization name and close the certificate view window.
Step 14 Modify the ISE authorization policy to authenticate IP Phones on LSC instead of MIC
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 17 After the page loads, click Find and then click on a specific phone where LSC must be installed
Step 18 Under CAPF Information section, set the Certificate Operation to Install/Upgrade. For Authentication Mode, you can
use one of the following option depending on the settings in your environment.
Option Description
By Authentication String Install LSC with a passcode, that needs to be keyed in locally at
the IP Phone
By Null String Install LSC without authentication
By Existing Certificate (precedence to LSC) This option is useful when a new LSC needs to be installed on an
IP Phone that already has pre-installed LSC
By Existing Certificate (precedence to MIC) Authenticate the IP phone with MIC to install a LSC
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 19 Click Save and then Apply Config for the changes to take effect
Step 20 Back to Device > Phone page, find the IP Phones and then click on the + button
Step 21 Define a new condition to list phone on LSC issued by option and then click Find. If the LSC installation is in
process, then you will notice the LSC status as ‘Operation Pending’
Step 22 After a while, you will see the status change to Upgrade Success. At this time the LSC installation is successful
Note: To deploy LSC at scale, use the Bulk Administration option in CUCM
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Operate
Operating ISE
We have seen how to use the RADIUS Live Log to see all the RADIUS authentication logs and also explored how to get to the
details of specific entries in the log table. This section covers some important operations that can be performed under RADIUS
live sessions.
Step 2 All active sessions on the network, that is controlled by ISE can be seen here:
Step 3 If you click on the target icon next to ‘Show CoA Actions’ entry, then you can see a list of Change of Authorization
actions that can be performed on a specific endpoint:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Step 4 To understand the license consumption of the live session, click on the gear icon, then check the ‘License Type’
and ‘License Details’ checkbox, and click Go
Step 5 You should be able to see the license consumption for the sessions when you scroll to the right-hand side of the live
sessions page
Note: Live sessions cannot be deleted from the ISE user interface. CoA terminate will release the
session, however the entry will still persist in the session table. In order to clear the session table, the
following REST API call can be made to ISE:
DELETE: https://<ISE_PAN_IP_Address>/admin/API/mnt/Session/Delete/All
Alternatively, you may perform a get function to gather the calling station IDs for all active sessions and
selectively delete them one-by-one using the following session API:
GET: https://<ISE_PAN_IP_Address>/admin/API/mnt/Session/AuthList/null/
DELETE:
https://<ISE_PAN_IP_Address>/admin/API/mnt/Session/Delete/MACAddress/<calling_station_id>
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
ISE operational reports are very handy to track endpoint and ISE deployment related activates over time.
Step 2 Click on Authentication Summary, you should notice the last 24-hour activity reports in terms of RADIUS
authentications. You can change the report period by clicking on the ‘Today’ drop-down
Step 3 On the same Authentication Summary report page, some interesting stats about ISE deployment’s performance can
be noticed:
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
Top N Authentication by Failure Reason reports the top authentication failures in the network:
The Top N Authentication by Network Device report, tells what network devices have what percent of failure rates.
Troubleshooting
IOS Troubleshooting
Some of the IOS show and debugging commands that are handy to understand and troubleshoot ISE operations are as follows:
• show running-config aaa
• show authentication sessions
• show dot1x all
• show epm statistics mac <MAC_Address>
• show aaa servers
• show device-sensor cache all
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
Cisco ISE Deployment Guide
Deploying ISE for Wired Network Access
• debug radius
• debug radius authentication
• debug dot1x all
• debug epm all
• debug mab all
• debug eap events
ISE Troubleshooting
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3