Thursday 17 September 2015

My ISE Notes

ISE ISE BABY


NEW CAPABILITIES ON ISE 1.4


CENTRAL CAPABILITY TO MANAGE CERTIFICATES.- internal CA
MULTI DOMAIN AD INTEGRATION- EARLIER VERSIONS ONLY OPTION WAS TO CREATE TRUST BETWEEN DOMAINS OR USE LDAP IF TWP WAY TRUST IS NOT POSSIBLE.







CERTIFICATE SIGNING


generate a CSR and get it signed by MS CA server, you would also need to import root certificate to the trusted root certificates.
install the certificate on PAN (bind it to csr). Export the certificate and import it to secondary PAN.
once both nodes have wildcard certificate installed, registration can be initiated between them.

Once registration completes, need to look at profiling probes and select/deselect the ones deemed necessary.



AD INTEGRATION-

add a join point- for example, labminutes.com and sushil.local have a two way trust between them...adding labminutes.com in ISE as a join point will result in addition of both labminutes.com and
sushil.local

retrieve groups- can query both the domains between which two way trust exists.
test user authentication from ISE.

multiple users can be located in different domains.... ISE looks at password/successful authentication if account found in multiple domains.

MULTIPLE SCROPES are possible. - only run the query in certain domains

Identity source sequence -> define what identify sources ISE should look at.



WIRED 802.1 X -> USING EAP-TLS AND PEAP ( SELECTION IS DONE ON THE CLIENT WHETHER TO USE EAP-TLS OR PEAP, best if the settings are pushed through a GPO)

ISE would not co-relate machine auth and user auth - new version it works fine.

Non-domain computer - will use PEAP as no certificates installed - domain machines are expected to have machine and user certificates installed for dot1x to work correctly.


1. create NAD - NAD groups - for example - switch, wlc. switch configuration to use ISE for radius
2. ENABLE POLICY SETS - hierarchical policy - much better then previous versions. do not use default- create new policy set above default policy set


WIRED WIRED WIRED- 802.1x

conditions :  device type equals switch (not sufficient to guarantee wired as switches support wireless / switch acting as wlc)
              radius NAS-PORT-TYPE equals ETHERNET
cERTIFICATE AUTHENTICATION PROFILE  - define what certificate parameter is used to authenticate user

CERT_CN -> WE NEED TO LOOKUP USER IN AD - so need to define an identity store
 certificate attribute : subject-common name - this is where username is

 need to ensure certificate based authentication is used in identity source sequence

 AUTHENTICATION POLICY

 allowed protocols - default
 identity store

 AUTHORIZATION policy

  here is how it works
 
  1. first machine authentication happens - once it is determined machine is part of domain computers, an acl is downloaded which allows access to AD; second round of authen - when user logs in so that
  ise could authenticate user.
 
  2. downloadable acl which will be sent to switch - AD_ONLY ..downloaded when machine auth is successful. ( dhcp, dns and IP to AD)
  3. WIRED_PERMIT_ALL -> basic permit ip any any
 
  AUTHORIZATION POLICY
 
  FIRST POLICY
 
  WIRED MACHINE - CONDITION EXTERNAL GROUPS PART OF DOMAIN COMPUTER
                - Permissions -> the authorization profile with downloadable acl of wired_ad only.

 SECOND POLICY

    wired user -     CONDITION EXTERNAL GROUPS PART OF DOMAIN user
    second condition -> network access- wasmahcineauthenticated- true
    Permission -> wired permit allowed
   
wiredautoconfig service needed for 801.x to run on the client machine.

   
WIRELESS WIRELESS WIRELESS 802.1x

setup wireless lan controller first- follow best practices

allow aaa override - for ise to push acls
nac status - radius nac
dhcp profiling and http profiling 0 checked
support for rfc 3576 - support change of authorization.

auth call station id type : ap mac address:ssid -> ise authorization profile will use ssid sent by ap for making authorization decisions.
access control list -> need to be conifgured on wlc itself.

ADD WLC AS NAD
CREATE A NEW POLICY SET - WLAN

CONSIITON - DEVICE TYPE ->WLC
AUTHENTICATION POLICY - DEFAULT NETWORK ACCESS - USE SAME IDENTIITY SOURCE SEQUENCE


AUTHORIZATION

IN AUTHORIZATION PROFILE- NEED TO USE THE NAME OF ACCESS LIST CREATED ON THE CONTROLLER, NOT CREATE A DOWNLOADABLE ACL

AUTHORIZATION PROFILE


WLAN-AD-ONLY
AIRESPACE ACL NAME - SAME AS WLC AD-LOGIN

WLAN-PERMIT-ALL
AIRSPACE ACL NAME- PERMIT-ALL

AUTHORIZATION POLICY
MACHINE AUTHENTICATION
1ST CONDTION EXTERNAL GROUPS - DOMAIN COMPUTER
2ND CONDITION -> USE WLAN ID -> OR CALLED STATION ID  RADIUS ATTRIBUTE CONTAIN OR ENDS WITH ""INTERNAL""
USER AUTHENTICATION
1ST CONDTION EXTERNAL GROUPS - DOMAIN USER
2ND CONDITION -> USE WLAN ID -> OR CALLED STATION ID  RADIUS ATTRIBUTE CONTAIN OR ENDS WITH ""INTERNAL""
3RD CONDITION -> NETWORK ACCESS -> WASMACHINE AUTHENTICATED =TRUE


INTERNAL CA

option 1 -> ISE act as internal CA
option 2 -> AD act as CA- PAN act as intermediate CA -> PSN's act as subordinate CA.
1. for option 2, PAN needs to act as intermddiate CA . generate a csr and certificate usage will be for "ise internmediate ca", export it, use ad to sign it and use the template 'subordinat
certificate authority. Bind it to the csr.


export the certificate and import it on secondary node.-> setup a repository -> login to cli -> sh reporsitory -> application configyure ise

option -> export internal ca store

on node 2 -> import internal ca store

optoion 2 - scep ra profile





WIRED BYOD WIRED BYOD WIRED BYOD WIRED BYOD WIRED BYOD WIRED BYOD WIRED BYOD WIRED BYOD


GUEST PORTAL - WIRED MAB - DEVICE REGISTRATION - SUPPLICANT PROVISIONING ( WIRED 802.1X CONFIGURATION PROFILE PUSHED DOWN FROM ISE- WHAT PROTOCOL TO USE) - CERTIFICATE REQUEST - EAP-TLS

Let's create a guest login portal

Sponsored Guest Portal - login with username password for the guest - use the wildcard cert for portal.

let's do policy

MAB -

CONDITION - WIRED MAB - ALLOWED PROTOCOL - DEFAULT NETWORLK ACCESS - IDENTITY SOURCR : INTERNAL ENDPOINTS -> IF USER NOT FOUND - CONTINUE

AUTHORIZATION PROFILE

FIRST TIME USER CONNECTS, NEED TO GIVE LIMITED ACCESS -> NETWORK CONNECTIVITY TO ISE - CWA

permit udp any eq bootpc and eq bootps
permit udp any any eq 53
permit ip any <ise1>
permit ip any <ise2>
deny ip any any log


AUTHORIZATION PROFILE -


WIRED-CWA -> DOWNLOADED ACL -> WIRED-ISE-ONLY

CENTRALIZED WEB AUTH -> ACL ( THIS ACL DEFINES THE TRAFFIC WHICH TO WHEN THERE IS A MATCH RESULTS IN REDIRECTION TO ISE) -> ALREADY DEFINED ON SWITCH- USUALLY THE OPPOSITE OF
WIRED-ISE-ONLY -> value -> portal page CWA

deny udp any eq bootpc any eq bootps
deny udp any any eq domain
deny ip any host <ise1>
deny ip any host <ise2>

permit any any eq www
permit any any eq 443
deny ip any any

BLACKHOLING - NOT NOW


AUTHORIZATION RULE

WIRED-BYOD-REGISTERED  - CONDITION - EXTERNAL GROUPS - BYOD GROUP and
                                   - NETWORK ACCESS - EAP-TLS
                                   - ENDPOINT BYOD REGISTRATION - YES
                         RESULT - PERMIT-ALL
                                  
                                                  
WIRED-CWA  -> CONDITION WIRED-MAB - RESULT - GUEST LOGIN PAGE - WIRED-CWA

CLIENT PROVISIONING - NEEDED TO PUSH 801.X PROFILE DOWN TO THE ENDPOINT

CLIENT PROVISIONG - RESOURCES - NEW SUPPLICANT PROFILE

WIRED-PORVISIONING

SAME  AS AUTHORIZATION PRIFILE WHICH IS USED IN AUTHORIZATION RULE RESULTS.

ONCE NEW SUPPLICANT PROFILE IS CREATED- CREATE A NEW CLIENT PROVISIONING RULE

WIRED-BYOD-WIN -> OS -windows all -

 CONDITIONS - EXTERNAL GROUP -> BYOD USER
            - AV VALUE - RADIUS - NAS PORT TYPE - ETHERNET
 RESULT     - WINCONFIGWIZARD            -