ISE-Architecture Fundamentals-Security
ISE-Architecture Fundamentals-Security
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
• Solution Overview
• Design
Solution • TrustSec
Overview • ISE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Our Users Have New Expectations
The Evolving Workplace Landscape
DEVICE
PROLIFERATION
On Average Every Person Has
3–4 Devices On Them
15 Billion Devices that Connects to the Network
by 2015 that Will Be Connecting to
Your Network
NEXT GENERATION
WORKFORCE
People Are Willing to Take a Pay Cut 70% percent of end users admit to
Work Is No Longer a Place
as Long as They Are Able to Work breaking IT policy to make their
You Go to Work
from Home lives easier
VIRTUALIZATION
“60% of server workloads will be
virtualized by 2013”
Who What
ISE Provides Visibility, Context, and Control Across the Entire Continuum
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cisco TrustSec Solution Portfolio
Policy
Administration
Policy Decision Identity Services Engine (ISE)
Identity Access Policy System
Policy
Enforcement
Cisco 2900/3560/3700/3800/4500/6500, Cisco ASA, ISR, ASR 1000
TrustSec Powered Nexus 5000/7000 switches, Wireless and Routing Infrastructure
Policy
Information NAC Agent Web Agent 802.1X Supplicant
No-Cost Persistent and Temporal Clients AnyConnect or
TrustSec Powered for Posture, and Remediation OS-Embedded Supplicant
CONTEXT
IDENTITY
802.1X
MAB
WebAuth CISCO SWITCHES, ROUTERS, WIRELESS ACCESS POINTS
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Comprehensive Visibility
Identity Awareness
Leveraging Your Infrastructure Network
IP Telephony Support
Authentication Features
POLICY
Access
Point
Integrated Profiling—
Visibility in Scale
Network Infrastructure Provides Local Sensing Function
Contextual data passed via RADIUS to ISE
Active Endpoint
Scanning
Active Scanning—
Enhanced Accuracy
ISE Augments Passive Network Telemetry With Active
Endpoint Telemetry Data
ISE
Device Feed
Device Feed—
Identity in Scale
Manufacturers and Ecosystem Provides Constant Device Sensor
Updates to New Devices (network-based)
Customers Pull Bundled Data Feed
Cisco Device Sensor
from Cisco
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Comprehensive Visibility
Wired, Wireless,
VPN User
Internet
Exceptional Control
Delivers Policy-Based Enforcement
Wireless Wired User Devices Thin Client
Remote VPN User User
MACsec Encryption *
*=
Cisco
Innovation
Data Center Intranet Internet Security Zones
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Exceptional Control
TrustSec Authorization and
Enforcement Cisco
Innovation
Employee
IP Any
Se
cu
rity
Remediation Ta Gro
g up
• Less disruptive to endpoint (no IP • Does not require switch port ACL • Simplifies ACL management
address change required) management
• Uniformly enforces policy
• Improved user experience • Preferred choice for path isolation independent of topology
• Fine-grained access control
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Exceptional Control
Doctor
Finance
Internet
Guest Cisco
Innovation
Decrypt On Encrypt On
Ingress Interface Egress Interface
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Effective Management
ISE
Contextual Policy MDM Mgr
Cisco Catalyst
Switches
Cisco WLAN
Controller FEATURES:
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Upgrades and Migrations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ISE Professional Services
1. Cisco Advanced Services – (Enterprise)
2. Cisco Collaborative Professional Services – (Commercial) http
://www.cisco.com/web/partners/services/programs/collaborative/index.html#~acc~strategy
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• Personas & Architecture
• Deployment Models
Design • Sizing / Design Guidance
• Tips & Caveats
ACS
• Centralized Policy
• RADIUS Server
NAC
Profiler
• Posture Assessment
• Guest Access Services
NAC Guest
• Device Profiling
NAC
Identity • Monitoring
Services
Manager Engine
• Troubleshooting
NAC • Reporting
Server
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Node Types
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Policy Service Node (PSN)
• Per policy decision, responsible for: • Directly communicates to external identity store
Network access (AAA RADIUS services) for user authentication
Posture
• Provides Portal for sponsors, agent download,
Guest access (web portals)
guests access, device registration, and device on-
Profiling
boarding
Client Provisioning
Posture/
WebAuth/ Client
Provisioning
AD/LDAP
/RADIUS
RADIUS/Profiling
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Standalone Deployment Model
3415
Max 5,000 endpoints per deployment Primary
Secondary
Monitoring Monitoring
3495
Max 10,000 endpoints per deployment
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Multi-Node Deployment Model
Dedicated Node for Each Persona, Admin, MnT, and
PSN
Each PAN/MnT
2x Dedicated Admin, 2x Dedicated MnT = 1 Node
Max 40 Dedicated Policy Service Nodes
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Dedicated PSN – Max Endpoints
Maximum endpoints for a dedicated PSN
http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/installation_guide/b_ise_InstallationGuide13/b_ise_InstallationGuide12_chapter_00.html#ID-1413
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
ISE 3400 Series Appliances
VMware Appliance Sizing Reference
Cisco UCS Based Appliances
• VM Design Guidance is to match or exceed the ISE physical appliance specifications upon which node
sizing is based
HA Inline AD/LDAP
Posture Nodes (External ID/Attribute
ASA VPN Store)
Data
Center A
WLC Switch
802.1X 802.1X
AP
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Deployment Types: Distributed
Distributed Deployment All ISE Persona’s Deployed Across Multiple Sites
Admin Monitor Policy Services Cluster
Distributed
Admin (S) Monitor (S) Policy Services
HA Inline AD/LDAP
Posture Nodes (External ID/Attribute
ASA VPN Store)
AD/LDAP
Data Data (External ID/Attribute
Center A Center B Store)
AP AP
Branch A Branch B
Switch Switch
AP 802.1X AP 802.1X
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Distributed Deployments Design Guidance
• Field Advisory and WAN Calculator
Download Here.
http://www.ciscosecurityatp.com/resourcelib.asp?id=108
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Tips & Caveats
• No TACACS support (Recommend ACS for functionality)
• Advanced functions like Central Web Authentication (CWA), Change of Authorization (CoA),
Security Group Access, and downloadable ACLs, are only supported on Cisco devices.
• See Compatibility guide for supported device software version, Identity Stores (AD, LDAP, AAA),
Browsers, and Client O/S, Supplicants, Agents
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Release
Review & ISE 1.3
Changes
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Why Change?
• ISE
o Line up licenses with enterprise specific use cases (e.g. profiling + BYOD)
o Break out 3rd Party MDM/EMM integration
o Ensure consistent selling motion with AC (same as all the other headends)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
1.3 License Changes – Use Case Focused
O
L Base (Perpetual Lic.) Plus
Plus(Term
(TermLic.)
Lic.) Advanced (Term Lic.)
D AAA BYOD BYOD Endpoint Protection Svcs.
802.1X Profiling & Feed Service Profiling MDM – 3rd Party
Guest TrustSec SGT Feed Service Endpoint Compliance &
Endpoint Protection Svcs TrustSec SGT Remediation
N Base (Perpetual Lic.) Plus (Term Lic.) Apex (Term Lic.) AC Apex (Term Lic.)
E
AAA BYOD Unified Endpoint
W MDM – 3 Party
rd
802.1X Internal CA Compliance &
Compliance
Enhanced Guest Profiling & Feed Service Remediation
TrustSec EPS
Multiple APIs pxGrid
Base License Plus License Remains The Advanced decomposed into Plus and Apex and
Remains The Same In ISE 1.3 then Apex into Headend (ISE Apex) and
Same In ISE 1.3
© 2010 Cisco and/or its affiliates. All rights reserved.
Endpoint (AC Apex) Cisco Confidential 39
Upgrade to 1.3 – What Happens With Licenses
Count A / Count B /Term C Count B /Term C
ISE 1.2 Perpetual
APEX
ATP ATP ATP
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Wireless -> Mobility
WIRELESS (Term)
WIRELESS UPGRADE (Term)
ISE 1.2 • All ISE Services
• Add Wired Services
>Wireless Devices ONLY
No ATP ATP
ADVANCED
+ AC APEX PLUS
$0 PO for
as many
BASE
BASE users as
required
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Selling Motion
Old New
Subset Subset
AC APEX
Compliance
ADVANCED APEX Verification of user-based compute
platforms
Everywhere
Context
Visibility and sharing throughout
PLUS network
Everywhere Everywhere
BASE BASE
Access
Core AAA services throughout the
network
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
What Does Stacked Mean
✖ APEX
AC APEX
✔ AC APEX
APEX
BASE
✖
PLUS
✖ PLUS
BASE
BASE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Examples - I Want Basic Access + Guest
BASE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Examples – I Want BYOD + Profiling
PLUS
BASE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Examples – I Want Profiling + 3rd Party MDM
APEX
PLUS
BASE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Examples – I Want It All (Profiling, Posture, etc)
AC APEX
APEX
PLUS
BASE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Historically, Securing Access Was Complicated
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Simplifying Guest Access for the Enterprise
Desktop
Corporate Branding and Themes & Mobile
Ready!
Create Accounts
Print Email SMS
Your credentials
Admin Friendly
Set up a Guest or BYOD
workflow in just a few clicks.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
ASA/ISE Integration
• Support VPN posture specifically between the ASA & ISE deployments
• Remove the requirements for IPN (Inline Posture Node) in ASA/VPN/ISE
deployments.
• IPN is a device that would sit behind the ASA and enforce ISE policy
CoA
Cisco.com
ISE
Policy Intranet
ASA Server
Limited
VPN Full Access
Access
Database
Posture
Agent
Non-Compliant
Compliant
AV Server
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Enterprise Mobility Management Integrations
Enforce True Device Compliance for All Mobile Devices
Sees unregistered devices on the network? Sees ALL devices on the network
Forces EMM Policy Compliance? Requires devices to comply with EMM policy
Keeps noncompliant devices off network? Provides guest access to non-EMM devices
SOLUTION
EMM Cisco ISE
Secures Actual Device Secures Network Access
ISE + EMM
Together
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Cisco Platform Exchange Grid (pxGrid) NEW
Accelerating Partner Technology Efficiencies via Context Sharing
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Cisco AnyConnect 4.0 and Cisco ISE 1.3
Delivering a Unified Agent for Posture Remediation and Secure VPN
• TrustSec - http://www.cisco.com/go/trustsec
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Thank you.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Tech Talks – Security Deep-Dives
https://communities.cisco.com/docs/DOC-30977
• AnyConnect • Content Security
• AnyConnect VPN • Email Security
• AnyConnect NAM • Web Security (WSA)
• AnyConnect Mobile • Web Security (CWS)
• AnyConnect Advanced • Web Security (ASA CX)
• AnyConnect TAC Tips • Content TAC Tips 1
• Content TAC Tips 2
• TrustSec & ISE Archives
• TrustSec & ISE Overview • Sourcefire
• AAA, 802.1X, MAB • Sourcefire System Overview: 5/28
• ISE Profiling • Threat Control: 6/11
• Web Auth, Guest & Device Registration • Application Control: 7/2
• Bring Your Own Device
• File Control: 7/16
• FireAMP Overview: 7/30
• Posture & Security Group Access
• FireAMP Outbreak Control 8/6
• Troubleshooting and Best Practices
• ISE TAC Tips 1
• ISE TAC Tips 2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Cisco Virtual Engineering
Scale & Augment Virtual
Engineering
Virtual Engineering serves as an extension of your team that allows you to accelerate
business, expand technical expertise and scale.
Virtualization
Participate in
Design
Routing &
Switching
Customer
Engagement Assistance
www
Competitive Cisco
Support Product
Information
Web Form
Validated www.cisco.com/go/ph
BoM Technology Architectures
Account • How to sell ISE/Cisco TrustSec solutions 15 min. VoD (five 3 min. VoDs)
Manager
Systems • How to sell ISE/Cisco TrustSec solutions 15 min. VoD
Engineer • Cisco Identity Services Engine for ISE 5 ½ hr. VoD
• Introducing Cisco Identity Services Engine for System Engineer Exam 45 min. Online PAISESE 650-474
Field • Implementing Cisco Identity Services Engine Secure Solutions 5 days Instructor-led Training
Engineer • Introduction to 802.1X Operations for Cisco Security Professionals 3 days ILT or Online
• Introduction to 802.1X Operations for Cisco Security Professionals Exam 1 hr. Online S802DT1X-650-472
• Implementing Cisco Identity Services Engine Secure Solutions Exam 1 hr. Online ISE-650-473
• www.globalknowledge.com
• www.skyline-ats.com
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63