Brksec 2660
Brksec 2660
Brksec 2660
Deployment
Francesca Martucci
Technical Solutions Architect, Cybersecurity EMEA
BRKSEC-2660
“A goal without a plan
is just a wish”
Antoine de Saint-Exupéry
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Deploying any network access
control solution is crucial
but it isn’t easy….
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
What needs to be included in my planning?
Posture policies
Policy sets Custom profiles
CMDB
Password or Management NAD OS integration
Certificates support upgrade
AD groups
…
Business Other teams
802.1x objectives point of contacts Segmentation
configuration method
Test
Use cases Network Devices
environment capabilities
…
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Deploying any network access
control solution is crucial
but it isn’t easy….
Main interest on
• Policy and Access
• Segmentation
• Industrial Security
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Cisco ISE High Level Design
Business Objectives
Environment
(Network Device vendor, supplicants, PKI)
Policy Details
( External Identity Sources, what type of posture
what type of BYOD
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
What not to expect:
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
What are your business priorities?
Device Administration
What is the business trying
Secure Access to accomplish with ISE?
Guest Access
Profiling is critical with today
Asset Visibility
IoT proliferation
Compliance & Posture
From where do you want to
ISE Context Exchange
start?
Segmentation
BYOD
Which use cases could be
Threat Containment considered for the future?
© 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public
Defining your Security Policy
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Everyone Has Different Needs
Government Financials Healthcare Retail Education
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Example of your ISE policy planning
Endpoint Type Authentication Identity Store Network Access Enforcement Staging / Provisioning
Corp PC 802.1X – Cert ISE Cert Store Full Access VLAN CORP Physical Staging Port
Printers MAB ISE MAC Whitelist Print Servers-Only VLAN Printers ISE Profiling
Get
Implement Monitor
management Write policies
policies policies
support
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Understand Your Needs and Use cases
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
ISE Personas
Policy Administration Node (PAN) Monitoring & Troubleshooting Node
• Administrative GUI (MNT)
• Policy configuration • Receives logs from all nodes
• Policy replication • Handles remote logging targets
• Centralized Guest database • Generates summary Dashboard Views
• Centralized BYOD database • Performs scheduled reports
• Configuration REST APIs • Handles reporting and API queries
ISE
Policy Service Node (PSN)
• TACACS requests Platform Exchange Grid Node (PXG)
• RADIUS requests • Runs pxGrid controller
• Endpoint profiling probes • Authorizes pxGrid Pubs/Subs
• Identity store queries • Publishes pxGrid topics to subscribers
• Hosts Guest/BYOD portals • Handles ANC/EPS requests
• MDM/Posture queries • REST APIs
• TC-NAC & SXP services
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
ISE Node Personas… Explained Partner Eco System
SIEM, MDM, NBA, IPS, IPAM, etc.
ISE PSN IP address* =
Admin
AAA RADIUS server SIEM
Configure
Context (pxGrid)
RADIUS, TACACS+,
Profiling, etc.,
*PSNs can optionally be behind a load-balancer and can be accessed via Load Balancer Virtual IP address (VIPs)
ANC = Adaptive Network Control
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
ISE Architecture
Distributed ISE
Policy Administration Node (PAN)
Standalone ISE
• Max 2 in a deployment
Network
Policy Services Node (PSN)
• Max 50 in a deployment
pxGrid Controller
• Max 4 in deployment
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
3.0+
<=50: PSNs + <= 4 PXGs
ISE Distributed Deployment Scale
Same for physical and virtual deployments
Compatible with load balancers
http://cs.co/ise-scale
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
ISE Fully Distributed Architecture
Centralize in DCs…or Distribute PSNs across Geographies
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Maximum Concurrent Active Endpoints
• One endpoint is a unique MAC address
• ISE Licensing is counted by active endpoint
sessions
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
ISE Nodes – Mix and Match
Physical Appliances Virtual Machines Cloud Instances
SNS-3715
SNS-3755
SNS-3795
SNS-3615
SNS-3655
SNS-3695
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Reminders
ISE platforms
SNS 3515 EOL
SNS 3595
SNS 3615
SNS 3655 EOL
SNS 3695
SNS 3715
SNS 3755
SNS 3795
Traditional VM
AWS
Azure & OCI
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
TACACS+ Deployment Models
Separating RADIUS & TACACS+ ISE Cubes?
Separate ISE cubes Mixed ISE cube with Mixed ISE cube with
separate PSNs shared PSNs
• Scalability is transactions per second (TPS)
• Authentication or also Commands Authorization?
• Do you use scripts?
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
ISE Certificates ❑ System Certificates
• Identifies a cisco ISE node & services
• Specific to the node
• Can manage all node’s system certs from PPAN
❑ Trusted Certificates
List of CAs
• Trusts for the identities of entities interacting with ISE
• Replicated to all the nodes in deployment
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Different ISE System certificates
Endpoint Network Device AAA Server Identity and
(Supplicant/Client) (Authenticator) (Authentication Server) Security Services
802.1X ✅ pxGrid
RADIUS
VPN HTTPS / TLS
ISE
✅ EAP Authentication ✅ SCEP
✅ BYOD EAP Tunnel HTTPS / TLS
CA
✅ RADIUS DTLS TLS Tunnel
✅ Portals
<SAML>
HTTPS / TLS ✅ SAML HTTPS / TLS
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Systems and Trusted Certificates
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Systems and Trusted Certificates
To install certificate
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
ISE 3.3.0
Controlled Application Restart
Up to ISE 3.2 a new ISE admin certificate requires
reboot of all the nodes without any control.
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
PxGrid Certificate
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Network Device discovery/capabilities
• Hardware model
• IOS version
• Count
• OS Version and capabilities
• Hardware limitations
√ : Fully supported
X : Not supported
! : Limited support, some
functionalities are not
supported
cs.co/nad-capabilities
2
Refer to Cisco Compatibility Matrix
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Does ISE Support my third-party Network device?
Does my third-party Network Device Supports ISE?
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Default Network Device Groups (NDGs)
Type of Location
access
Use Organi
Case zation
Vendor
Maximum 6 Levels
Default NDGs
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Additional Tips
• Always Test before implementing!
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Endpoints: Native 802.1X Supplicants
wpa_supplicant
NAME
wpa_supplicant - Wi-Fi Protected Access client and IEEE
802.1X supplicant
SYNOPSIS
wpa_supplicant [ -BddfhKLqqsTtuvW ] [ -iifname ] [ -cconfig
file ] [ -Ddriver ] [ -PPID_file ] [ -foutput file ]
OVERVIEW
Wireless networks do not require physical access to the
network equipment in the same way as wired networks.
This makes it easier for unauthorized users to passively
monitor a network and capture all transmitted frames.
In addition, unauthorized use of the network is much
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Windows 7, 8/8.1, and 10 – Native Supplicant
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Endpoints: Everything Else
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Endpoint Profiling
Identifies dynamically the devices that connect to your network
ACIDex
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Effect of RADIUS Probe
OUI = Vendor ID, IP = xx.xx.xx.xx
vendor
OUI = Cisco, IP = xx.xx.xx.xx
Cisco Device
HP Device
OUI = Apple, IP = xx.xx.xx.xx
Apple Device
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Effect of SNMP Probe
OUI = Random, IP = xx.xx.xx.xx
Unknown
OUI = Cisco, IP = xx.xx.xx.xx, CDP:cdpCachePlatform = Cisco IP Phone 9971
Cisco
Cisco Device
IP Phone 9971
HP Device
OUI = Apple, IP = xx.xx.xx.xx
Apple Device
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Effect of DHCP Probe
OUI = Random, IP = xx.xx.xx.xx, dhcp-class-identifier CONTAINS MSFT
Unknown
Microsoft Workstation
Unknown
HP Printer
OUI = Apple, IP = xx.xx.xx.xx,
DHCP:dhcp-DHCP:dhcp-parameter-request-list EQUALS 1, 3, 6, 15, 119, 252
Apple iDevice
Device
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Effect of DHCP Probe
OUI = Random, IP = xx.xx.xx.xx, dhcp-class-identifier CONTAINS MSFT
Microsoft Workstation
HP Printer
OUI = Apple, IP = xx.xx.xx.xx,
DHCP:dhcp-DHCP:dhcp-parameter-request-list EQUALS 1, 3, 6, 15, 119, 252
Apple Device
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Effect of HTTP Probe
OUI = Random, IP = xx.xx.xx.xx, dhcp-class-identifier CONTAINS MSFT,
IP:User-Agent CONTAINS Windows NT 10.0
Windows10-Workstation
Microsoft Workstation
OUI = Cisco, IP = xx.xx.xx.xx, CDP:cdpCachePlatform = Cisco IP Phone 9971,
DHCP:dhcp-class-identifier CONTAINS CP-9971
HP Printer
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Effect of NMAP Probe
OUI = Random, IP = xx.xx.xx.xx, dhcp-class-identifier CONTAINS MSFT, IP:User-
Agent CONTAINS Windows NT 10.0, FQDN=test-laptop1.zero0k.org,
NMAP:SMB.operating-system CONTAINS Windows 10
Windows10-Workstation
Apple IPad
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Effect of AD Probe
OUI = Random, IP = xx.xx.xx.xx, dhcp-class-identifier CONTAINS MSFT, IP:User-
Agent CONTAINS Windows NT 10.0, FQDN=test-laptop1.zero0k.org,
NMAP:SMB.operating-system CONTAINS Windows 10, AD-OS = Windows 10
Windows10-Workstation
Apple IPad
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
PxGrid Probe Context-in
CyberVision
Cisco EA
CyberVision
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Device Sensor to scale attribute collection
Network devices send attributes via
RADIUS RADIUS to ISE to optimize collection:
accounting
CDP Attributes used:
LLDP
DHCP ISE • MAC OUI
MAC
• CDP/LLDP
CDP
LLDP
• DHCP
DHCP
• HTTP (WLC only)
ISE
MAC
• mDNS,
HTTP
• H323,
DHCP
MAC • MSI-Proxy (4k only)
Meraki MS390
From IOS From
15.0(2)SE MS Switches only AirOS 7.2
CDP+LLDP
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
ISE 3.3
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
ISE profiles definition
Certainty
Factor
DHCP Class-ID: MSFT
+10
HTTP User Agent: Windows
+10
ISE
Endpoint NMAP OS: Microsoft Windows
+10
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
ISE 3.3
• MFC-Manufacturer ISE
Feed Service
• MFC-Endpoint Type (Online/Offline)
• MFC-Model
• MFC-OS
MFC-Manufacturer MFC-EndpointType MFC-Model MFC-OS
Cisco Arlo IP-Phone Camera IP Phone 7980 Pro Wireless Cam IOS Linux
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
ISE 3.3
AI Proposed Profiling Policies
Data Forwarded to Cloud ML Groups Endpoints Labels Assigned
All data on endpoints ML groups endpoints into Users assign labels to
(profiled & unknown) clusters of identical of unknown clusters or
forwarded to ML engine based on attribute data accept recommendations
ML Cloud
•Must forward endpoint attributes to ML Bosch Coffee
cloud (available 3.2p1)
•Air gapped environments not supported
Machine ?
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
ISE Feed service Updates
• Be careful when applying profile updates, check they do not interfere with
the profiles you have been using and your policies
• You will still have unknowns For everything else: custom profiles
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Create custom profiles
• Gather more information
▪ Create more traffic from the device
▪ Run an NMAP scan
▪ Enable more probes
• Find attributes or combinations of
attributes unique to device type
• Focus on:
▪ Attributes found every time the endpoint
connects
▪ Attributes found very early after the
endpoint connects
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Profiles Precedence
Cisco Provided Custom
Profile Profile
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Using device profiles and logical profiles in ISE
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Turning Probes Into Profiles, Profiles Into Protection
Profiles ISE
AI Proposed Admin Integrations
Cisco provided Wifi edge analytics created
Segmentation
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Behavioral vs Organizational Endpoint Information
Organizational
Behavioral
Common Uses
• Endpoint Custom Attributes Attribute Name Type
• Probes and profiling • Context Visibility Input (GUI/CSV) Created Date
• Custom Attributes and endpoint Expires Date
REST API (JSON)
• Device Sensor Owner String
Department String
• External Databases (CMDBs) iPSK String
• pxGrid Context-In • Active Directory / LDAP
• pxGrid Direct (ServiceNow, etc.)
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Cisco ISE pxGrid Direct for CMDBs ISE 3.2
{
"result": [
External Database {
(E.g., ServiceNow CMDB) "sys_import_state_comment": "",
"template_import_log": "",
"sys_updated_on": "2022-05-17 10:53:53",
"sys_class_name": "EDDA_Demo",
"sys_target_sys_id": "",
"sys_id": "00021059db6b01101f0f174b13961900",
"sys_updated_by": "aacook",
"sys_created_on": "2022-05-17 10:53:53",
{ "sys_import_set": "ISET0011307",
GET "sys_transform_map": "",
"sys_created_by": "aacook",
"sys_import_row": "34,285",
} REST API Request "u_account_name": "Holly.Allen@example.org",
(Admin can specify APIs to "u_macaddress": "05:0e:33:f3:2b:03",
Server Response (JSON) any REST compatible "sys_row_error": "",
server) "group_tag": "cts:security-group-tag=2774-000",
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Make use of Policy Sets
Organizations
Type
Location
Vendor/Model
Medium
Wireless
RADIUS
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Conditions simplification
Pre-sets Dictionary
Condition are easy to
read and intuitive
Custom created
Conditions often are
not as intuitive
Use Compound
Conditions and
for custom ones
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Dynamic Variable Substitution
• Match conditions to unique values stored per- User/Endpoint in
internal or external ID stores (AD, LDAP, SQL, etc.)
• ISE supports custom User and Endpoint attributes
ID Store Attribute
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Speed Test
• Total stars = 10
• Total Green stars = 4
• Total red stars = 2
• Outer shape = Red triangle
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Auth Policy Optimization
1. AD Groups
Policy Logic:
o First Match, Top Down
o Skip Rule on first negative
2. AD Attributes
condition match
3. MDM
4. Certificate
5. ID Group
6. SQL Attributes
😩 7. Auth Method
8. Endpoint Profile
9. Location
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Auth Policy Optimization
Block 1 1. Location
😁 Block 4
6. ID Group
7. Certificate
8. SQL Attributes
9. MDM
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
AD Policy rule optimization example
AD1·ExternalGroups EQUALS
domain.com/users/IT AND
AD1·ExternalGroups EQUALS
domain.com/users/Domain Power Users AND
AD1·ExternalGroups EQUALS
domain.com/users/Leadership AND
Most Specific
AD1·ExternalGroups EQUALS
domain.com/users/ELT CxO
• Granular policies (most
AD1·ExternalGroups EQUALS restrictive and with higher level
domain.com/users/IT AND
AD1·ExternalGroups EQUALS
IT Staff of access) should go first.
domain.com/users/Domain Power Users
• Default/high-level policies go
Human bottom.
AD1·ExternalGroups EQUALS
domain.com/users/HR Resources
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Who Needs an ISE Lab? You do!
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
ISE Lifecycle Orchestration & Policy Management
#YAML
network_device:
- name: lab-mr46-1
description: ’’
profileName: Cisco
ISE 3.1 authenticationSettings:
dtlsRequired: false
github.com/CiscoISE
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
ISE Deployment and Operational Lifecycle
VPC
DNS
ISE
{⋯}
ISE
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
How to test your lab?
BUT…
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
• Where To Start: planning
• ISE Deployment Options
• Certificates
• Network Devices
• Supplicants
Agenda • Profiling
• Policies optimization
• Create your own lab
• 802.1x Deployment Modes
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Deployment Modes
Low-Impact Mode
Monitor Mode ( Visibility) (Visibility and Control) Closed Mode
File ISE DHCP DNS ISE File (Visibility and Control)
Servers Servers File
Servers ISE
Servers
Campus Network
Campus Network
Campus Network
PREAUTH ACL PERMIT ACL
Port Open permit eap dhcp dns permit ip any any
Unconditionally deny any Only EAP
Allowed
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Day 2
Operations
User involvement
User Communication before
and after ISE rollout
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Supporting ISE After Deployment
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Wrap up
Deploying any network access
control solution is crucial
but it isn’t easy….
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
ISE learning map
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Cisco ISE Resources
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Ask The Community
cs.co/ise-community
How to Ask the Community for Help
BRKSEC-2660 © 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Thank you