07 - Cisco Secure Network Access Solutions (Cisco ISE)
07 - Cisco Secure Network Access Solutions (Cisco ISE)
Ahmed Sultan
Senior Technical Instructor
ahmedsultan.me/about
1
Cisco Secure Network Access
• The Cisco secure network access solution promotes authentication to access the
network.
• Authentication serves as the basis for differentiating users and/or devices,
providing varying levels of access to networked resources based on corporate
access policy.
• The foundation for Cisco Secure Network Access is IEEE 802.1X, a port-based
authentication and access control protocol, which can be applied at a physical
switch port on the wired network or on a wireless LAN (WLAN) on Cisco WLC.
• In both wired and wireless domains, clients will require the installation of a Cisco
802.1X supplicant, the configuration of a native operating system supplicant or,
in the case of Linux clients, the installation of an open-source supplicant.
• Wireless users generally expect that they will need to authenticate before being
granted access to the corporate network.
• As a result, populations of wireless users are good candidates for initial Cisco
secure network access deployments.
▪ 802.1X client supplicant software: Each client that connects to a wired or wireless network
under 802.1X control requires supplicant software. The supplicant is responsible for initiating
an authentication session with the authenticator.
▪ 802.1X authenticator: The 802.1X authenticator, or also called network access device (NAD),
determines the pre-authorization traffic policy, forwards supplicant credentials to the
authentication server, and enforces network access policy as prescribed by the
authentication server.
▪ 802.1X authentication server: The 802.1X authentication server is responsible for validating
the access credentials forwarded by the authenticator and performs an identity-based policy
lookup. Access restrictions are then pushed to the authenticator, or the NAD. The credentials
that are supplied by the client can take the form of digital certificates, passwords, one-time
passwords (OTPs) supplied by a token, or a client MAC address.
The main components and functions of secure network access using 802.1X (cont.)
• Authentication can be compared to being stopped at the office lobby by a security guard,
After you provide a driver’s license to validate that you are on the guest list, you are
given an access badge.
• Authorization relates to which doors the access badge opens, Your access is restricted by
the badge policy.
• Accounting is the system that tracks your movements through the building and records
which doors you accessed with your badge and whether access was permitted or denied.
• Here, Cisco ISE acts as AAA server in Cisco Identity Based Networking Services
(IBNS) deployments and provides authentication, authorization, and accounting
services for controlled network access.
• The basic phases of Cisco secure network access wired port control are as
follows:
1. The supplicant on the end user machine announces itself to the authenticator
(switch).
2. The authenticator (switch) prompts the supplicant for authentication credentials.
3. The supplicant provides credentials to the authenticator (switch), The credentials
are provided by the supplicant to the authenticator (switch) via the Extensible
Authentication Protocol (EAP), EAP supports various authentication methods,
Some of the most commonly deployed EAP authentication types include EAP-MD5,
EAP-TLS, EAP-PEAP, EAP-TTLS, and EAP-FAST.
• The basic phases of Cisco secure network access wired port control
are as follows (cont.)
• Cisco ISE is a centralized network access control and policy enforcement platform.
With it you gain centralized policy management solution to control network
access and usage policies from a single location.
• Cisco ISE gathers key information about user and device access, and uses this
information to control end user network access and administrative network
device access, regardless of connection type.
• Wired, wireless, and remote users can connect directly or through VPNs.
• Whether connected remotely or directly to corporate resources, users can
receive the same unified access and control.
• Cisco ISE also delivers guest and enterprise mobility management capabilities
that regulate access to Internet, internal corporate network and resources.
• Cisco ISE can also use gathered information to ensure regulatory compliance to
various government and industry standards.
• This information can also be shared among Cisco Eco system partner devices over
pxGrid (Plaftorm Exchange Grid), to enhance the capabilities for services
including Security Information and Event Management (SIEM), Mobile Device
Management (MDM), Network Behavior Analysis (NBA), intrusion prevention
systems (IPS), and much more.
• pxGrid is an open, scalable, and IETF standards-driven API platform helps
automate security to get answers and contain threats faster.
• Integrated RADIUS services inside Cisco ISE, enable AAA, which is typically used
for end user network access.
• User identities can be validated against an internal Cisco ISE database, back-end
external Microsoft Active Directory, or LDAP servers.
• This feature helps to ensure that endpoints conform defined security standards.
1. Initial access: Profiling services enable Cisco ISE to determine the endpoint
device type and capabilities. After initial authentication, devices can be placed
in an "unknown" category.
3. Match device type to other context: Cisco ISE is now aware of the contextual
what, and matches it with who, how, where, and when.
4. Granular Policy: You can now use this context to create very granular policy.
When user "JoeD" logs in using his personal iPad from a public café, he may
have limited access. But when he logs in using his corporate laptop from his
desk at the office, he gains elevated levels of access.
• Cisco TrustSec access control is implemented using ingress tagging and egress
enforcement.
• At the ingress point to the Cisco TrustSec domain, traffic from the source is
tagged with an Security Group Tag (SGT) containing the security group number of
the source entity.
• At the egress point of the Cisco TrustSec domain, an egress device uses the
source SGT and the security group number of the destination entity (the
destination SG,or DGT) to determine which access policy to apply from the SGACL
policy matrix.
1. Cisco ISE informs the NAD to assign an SGT of 5 for all packets from
Employees and an SGT of 4 for all Managers.
2. Cisco ISE dynamically pushes these tags to the network access devices
(NADs) via SGT transport.
3. The central policy indicates that Employees (SGT=5) may access Applications
servers (SGT=10), but not financial servers (SGT=14), while Managers can
access all servers.
4. To enforce this policy, Cisco ISE pushes SGACLs down to the switches and
SGFW configuration to the firewalls.
1 Request
2 Response
3 Success
4 Failure
• 802.1X defines the encapsulation of EAP over IEEE 802, which is known as EAPOL.
• When a switch port is configured to require 802.1X authentication, it is called a
controlled port.
• A controlled port, by default, does not allow any input on that port except for
EAPOL.
• The supplicant can only access network services beyond the port after the
supplicant authenticates.
• The role of the authenticator is to enforce policies that are provided by the
authentication server, to serve as a translator between Layer 2 EAPOL messages
from the supplicant, and to encapsulate EAP in Layer 3 RADIUS messages to the
authentication server, Cisco ISE in this example.
• In the simple, Non-tunnel EAP architecture, a single EAP session exists between
the supplicant and the authentication server.
• In this architecture, the supplicant sends its identity (name) in the clear to the
authentication server.
• To overcome these limitations, you can use a tunneled EAP architecture, in which
an outer EAP encapsulates an inner EAP.
• The outer EAP provides server authentication, and a cryptographically secure
tunnel for the inner EAP method to run in.
• EAP-TLS and EAP-MSCHAPv2, tunneled inside PEAP or EAP-FAST are the most
widely used EAP methods to deploy secure network access.
• However, EAP functionality varies based on the EAP method selected and it is
important to consider the capabilities of each EAP method when making a
selection for a new implementation.
• For example, if there is a requirement to use digital certificates for client
authentication, EAP-TLS is the only non-tunnel method that satisfies the
requirement.
• RADIUS defines four packet types that are used to authenticate and authorize
user communications.
• In the context of 802.1X, these four packet types are used to carry EAP messages.
• EAP messages from the supplicant to the authenticator are exchanged as Layer 2
EAPOL packets.
• Because the authentication server speaks the RADIUS protocol and is likely Layer
3 adjacent to the authenticator, the authenticator encapsulates EAP messages in
RADIUS.
• The authenticator acts as a translating transit point for EAP and RADIUS.
• Any EAP methods that are used by the client must be also be configured in the
RADIUS authentication server.
• When the supplicant provides its identity, the authenticator begins its role as the
intermediary and passes EAP frames between the supplicant and the
authentication server until authentication succeeds or fails.
• If the authentication succeeds, the authenticator port is authorized.
• The RADIUS CoA feature provides a mechanism to change the attributes of a AAA
session after it is authenticated.
• When a policy changes for a user or user group on a AAA server, such as Cisco ISE,
the server can send unsolicited RADIUS CoA request to reinitialize authentication
and apply the new policy.
• Central web authentication: CoA is used to change authorization session of a user after the
user authenticates via a captive guest portal.
• Client posturing: CoA is used to change authorization session of a user after Cisco ISE
determines posture status of the client.
• Client profiling: CoA is used to change authorization session of a device after Cisco ISE
determines profile and classification of the device.
• Rapid threat containment: CoA is used to change authorization session of a user if another
Cisco devices, such as Cisco Stealthwatch, or Cisco FirePower Next-Generation Firewall,
detects malicious event involving the user.
• The following figure displays a sample flow of RADIUS CoA for the purposes of
client posturing with Cisco ISE.
• Monitor (open) mode: Allows you to enable authentication across the wired infrastructure, without
affecting wired users or devices. administrators use the monitor mode to help ensure that all devices
are authenticating correctly, either with 802.1X or MAB. If a device is misconfigured or is missing an
802.1X supplicant, access will be allowed and logged. However, if authentication succeeds,
authorization (for example, Dynamic VLAN, Downloadable access control list (DACL)) can still be
applied.
• Low-impact mode: It allows selective transition from an open (nonfiltering) preauthorization method to
selective preauthorization. This function is provided by static port ACLs (Pre-ACL as shown in the
previous figure) that allow necessary services such as Dynamic Host Configuration Protocol (DHCP) and
Domain Name System (DNS) while blocking all other network access. Users connected to controlled
ports will receive additional access (based on policy) after successful authentication, based on DACL
that will override the static ACL on the port.
• High-security (closed) mode: It provides the highest level of controls by configuring the closed pre-
authorization port control. No traffic will be permitted on a port except EAPOL before authentication
and authorization.
• Guest VLAN
▪ The guest VLAN feature is designed to support non-supplicant hosts that are attempting to
access a wired switch port that is configured for the 802.1X port control.
▪ After three EAP retries, the switch dynamically places that port on a guest VLAN that is
configured on the switchport.
▪ Guest VLAN is compatible with MAB.
▪ If MAB is configured and MAB fails after 802.1X failure, the port can be moved to the guest
VLAN.
▪ The guest VLAN traffic is typically restricted by using an ACL on the termination point of the
VLAN, for example, to allow access only to the Internet.
• The example that is shown in the figure allows secure guest access to the internet
through a Cisco Adaptive Security Appliance (ASA) firewall.
• Restricted VLAN
▪ Sometimes, a guest user will connect to the network of your organization
with a host with 802.1X supplicant software.
▪ When the host plugs in to the switch port, the supplicant will initiate an
EAPOL connection with the switch.
▪ However, because the user lacks local authentication credentials,
authentication will fail.
▪ By configuring a restricted VLAN, the user can be dynamically assigned to a
VLAN for restricted access.
• After 802.1X authentication failure, the switch can be configured either to deploy
restricted VLAN or proceed to the next authentication method, which is usually
MAB.
• The host mode of the 802.1X port determines whether more than one client can
be authenticated on the port and how authentication will be enforced.
• You can configure an 802.1X port to use any of four host modes.
• In addition, each mode may be modified to allow preauthentication open access.
▪ In the single host mode, only one client can be connected to the 802.1X-enabled port.
▪ When the port state changes to "up," the switch detects the client and sends an EAPOL
frame.
▪ Client access is granted after authentication.
▪ Packets from other hosts are dropped.
▪ If the client leaves, or is replaced with another client, the switch changes the port link state
to "down."
▪ The port is then returned to the unauthorized state.
▪ In the multiple host mode (often called multi-host mode), you can attach multiple hosts to a
single 802.1X-enabled port.
▪ In this mode, only the first client that attaches clients must be authorized.
▪ All subsequent clients are granted network access based on this authentication.
▪ If the port becomes unauthorized (reauthentication fails or an EAPOL logoff message is
received), the authenticator denies network access to all attached clients.
▪ Multidomain Authentication (MDA) mode allows an IP phone, and a single host behind the IP
phone, to authenticate independently via 802.1X, MAB, or (for the host only) web-based
authentication.
▪ In this application, multidomain refers to two domains (data and voice VLAN).
▪ Only one MAC address is allowed per domain.
▪ The switch can place the host in the data VLAN and the IP phone in the voice VLAN, but they
appear on the same switch port.
▪ The data and voice VLAN assignment can be obtained dynamically from the authentication,
authorization, and accounting (AAA) server such as Cisco ISE.
▪ Multiple Authentication mode (often called multi-auth mode) allows one 802.1X or MAB
client on the voice VLAN.
▪ It also allows multiple authenticated 802.1X, MAB, or web authorization clients on the data
VLAN.
▪ When a hub or access point is connected to an 802.1X port, multi-auth mode provides
enhanced security over the multi-hosts mode by requiring authentication of each connected
client.
▪ For non-802.1X devices, MAB, or web-based authentication, can be used as the fallback
method for individual host authentications, which allows different hosts to be authenticated
through different methods on a single port.
• On switch ports that are configured for 802.1X port control, Flexible
Authentication, or FlexAuth, sets the order of methods that the switch attempts
when trying to authenticate a new device that is connected to a port.
• If one method in the list is unsuccessful, the next method is attempted.
• This simplifies the identity configuration by providing a single set of configuration
commands to manage different types of endpoints connecting to the switch
ports.
• In addition, FlexAuth sequencing allows you to configure any authentication
method on a standalone basis.
• In other words, MAB can be configured without requiring 802.1X configuration.
• By default, the Cisco Catalyst switch will first perform 802.1X authentication.
• If it fails, and the switch is configured to proceed with the next method, such as
MAB, the switch will then perform MAB.
• In environments where the majority of hosts authenticate using MAB, you may
want a switch to perform MAB first and 802.1X second.
• This will prevent hosts being delayed when accessing the network and waiting for
802.1X to timeout.
• When the authentication order is set to initiate MAB first, the endpoint directory
on the authentication server will be queried.
• If the host has an 802.1X supplicant, the supplicant will also initiate 802.1X
authentication from its side.
• As a result, it may happen that both MAB and 802.1X authentication will succeed.
• In such case, you need to configure FlexAuth priority for 802.1X authentication to
have priority over MAB.
• In such case, if the supplicant on the port begins an EAPOL session, MAB will be
interrupted and normal authentication will proceed.
1. To configure 802.1X on a Cisco Catalyst switch you need to first configure global AAA settings,
These settings include enabling AAA new-model and configure AAA lists for 802.1X.
2. Next, you need to configure global RADIUS settings, which include configuration of individual
RADIUS servers (ISE), RADIUS server group, RADIUS attributes, and RADIUS Change of
Authorization (CoA), The RADIUS CoA feature provides a mechanism to change the attributes of
an authentication, authorization, and accounting (AAA) session after it is authenticated, When
there is a policy change for a user or user group in AAA, RADIUS CoA packets can be sent from
the AAA server such as ISE to reinitialize the authentication and apply the new policy.
3. Then, enable the IP device tracking functionality. The purpose of IP device tracking is for the switch
to obtain and maintain a list of devices that are connected to the switch via an IP address. This
functionality is critical whenever DACLs are used with 802.1X in order to replace the "any" keyword
as the source in the ACL with the IP address of the device connected to the switch.
4. Now you need to enable 802.1X authentication globally.
5. Finally, you enable 802.1X functionality and related features on every interface you would like
to enable for secure network access. These settings include enabling 802.1X and MAB,
configuring order of 802.1X and MAB using Flexible Authentication, tuning of 802.1X timers,
setting deployment mode, setting host mode, enabling reauthentication, configuring guest and
restricted VLAN, and enabling Inaccessible Authentication Bypass (IAB) or critical data VLAN
and critical voice VLAN. Some of these settings are discussed below.
• Configure the RADIUS server with a shared secret and automated test user:
radius server ISE
address ipv4 192.168.43.200 auth-port 1812 acct-port 1813
key cisco
• Optionally, create an access list to define permitted traffic before the port is
authenticated (used for low-impact mode):
• Once you are done configuring global settings, you need to apply interface-specific
802.1X commands on all interfaces that will run the 802.1X authentication.
• The example shows how to configure a switch port for basic operations, which is
required before you can apply an 802.1X configuration:
1. First, enter the interface configuration mode.
2. Set the port mode to access.
3. Configure the access VLAN.
4. Bind the preauthentication port ACL to the interface.
5. Enable PortFast.
interface GigabitEthernet1/0/1
description PC
switchport mode access
spanning-tree portfast
ip access-group PRE-AUTH in
• The next example shows the minimum commands that are necessary to configure
802.1X on an interface:
1. Optionally, allow hosts to access the network before the port is authorized (low-impact
mode)
2. Enable 802.1X support on the interface.
3. Enable periodic reauthentication of the supplicant.
4. Configure the reauthentication timeout.
interface GigabitEthernet1/0/1
authentication open
authentication port-control auto
authentication periodic
interface GigabitEthernet1/0/1
description IP Phone + PC
switchport voice vlan 40
authentication open
authentication host-mode multi-domain
mab
authentication order dot1x mab
authentication priority dot1x mab
authentication event fail action next-method
Cisco ISE configuration for 802.1X consists of the following overall tasks:
1. Configure identity sources, that are used to verify clients identity. This include
configuration of local user and device accounts, and integrations with external identity
sources, such as Microsoft Active Directory, or general Lightweight Directory Access
Protocol (LDAP) server.
2. Configure network devices, which act as RADIUS clients. The settings include device name,
IP address, and RADIUS settings.
3. Review authentication policy. Generally, no changes are needed in Cisco ISE default
authentication policy.
4. Configure authorization policy. Authorization policy on Cisco ISE usually needs to be
customized based on your requirements.
• User: User identity information can include a username, password, e-mail address, account
description, associated administrative group, user group, and role.
• LDAP: LDAP is a standards-based networking protocol that is used to query and modify
directory services. LDAP can be used to retrieve user identity from Active Directory servers,
Sun Directory servers, and the Novell eDirectory.
• Active Directory (Multi-Active Directory): Cisco ISE uses Microsoft Active Directory (AD) to
access information about users, machines, groups, and attributes. Cisco ISE supports Multi-
Active Directory: multiple joins to Active Directory domains, without need for specific trusts
between them. Cisco ISE supports up to 50 Active Directory joins.
• RADIUS: A RADIUS identity source is an external collection of subjects and their credentials
and uses the RADIUS protocol for communication. Cisco ISE supports any RADIUS RFC 2865-
compliant server.
• SAML: Supports Security Assertion Markup Language Version 2.0 (SAMLv2), which enables
the exchange of security authentication information between an Identity Provider (IdP) and a
service provider (Cisco ISE).
• ODBC: As of Cisco ISE v2.2, you can use an Open Database Connectivity (ODBC)-compliant
database as an external identity source to authenticate users and endpoints. ODBC identity
sources can be used in an identity store sequence and for guest and sponsor authentications,
as well as for Bring Your Own Device (BYOD) flow. The following database engines are
supported:
• MySQL
• Oracle
• PostgreSQL
• Microsoft SQL Server
• Sybase
• Social Login: as of Cisco ISE v2.3 you can use social login, such as Facebook ,as an exernal
identity source for guest users.