04-13-2018 08:01 AM - edited 02-21-2020 10:02 PM
These checklists serve as guides to help you understand the various requirements, components, technologies, and organizational efforts required for a successful design and deployment of the Cisco Identity Services Engine (ISE). Answering the following organizational and operational questions will help you understand some of the security requirements, business processes, and group dynamics that will impact the integration and deployment of segmentation in your network.
Ultimately, all security policies directly reflect the business' need to minimize the risks and threats to daily business operations and brand. Many of these are preventative measures and some may required by regulations. Identifying these business-critical needs can help you to quickly establish your priorities and policies for Who, What, and Where your network is secured.
After establishing the your business objectives for network security, you will need to understand everyone involved for implementation. While the underlying protocols and mechanisms that ISE uses to control access to the network work at Layers 2 & 3, you would be surprised how many deployment difficulties occur at "Layer 8". This is due to how ISE unifies access across wired, wireless and VPN networks and performs asset visibility, compliance and threat control requiring the collaboration of many network and IT departments.
Please describe your existing and desired network access policies. Include the authorization and handling of:
It is best to clearly communicate a change in your network access policy so noncompliant users are not surprised by new security and software requirements, access restrictions, or URL redirections.
Based on your answers to the questions in the Planning Checklist above, complete the following Deployment Checklist forms. These tables will be valuable references to field engineers to expedite initial configurations in Cisco ISE and network devices.
Document all the basic network services and the hosts that provide them in your network. This will aid you in the creation of access control list (ACL) exceptions and ISE service configuration.
Role |
DNS Names |
Network Address(es) |
Protocol |
Details |
---|---|---|---|---|
CA Server(s) | ||||
DNS Server(s) | UDP:53 | |||
DHCP Server(s) | ||||
NTP Server(s) | UDP:123 | |||
FTP Servers | TCP:21 | username:password | ||
Proxy Servers (to Internet) | HTTP/S:# | username:password | ||
TFTP/PXE Boot Servers | UDP:69 | username:password | ||
Syslog Servers | UDP:514 | username:password | ||
Identity Store: Active Directory | username:password | |||
Identity Store: LDAP | ||||
Identity Store: OTP | ||||
ISE Admin Node | HTTP (TCP:80) HTTPS (TCP:443) |
CLI: admin: cisco Web: admin: cisco RADIUS Key: |
||
ISE Policy Service Node | HTTP (TCP:80) HTTPS (TCP:443) RADIUS (UDP:1812) RADIUS (UDP:1813) CoA: 1700 & 3799 |
CLI: admin: cisco Web: admin: cisco RADIUS Key: |
Create and use CA-signed certificates for your TrustSec infrastructure to minimize long-term problems due to untrusted, self-signed certificates.
Component |
FQDN |
Org Unit |
Org |
City |
State |
Country (2 letter) |
Key Size |
Cert |
---|---|---|---|---|---|---|---|---|
Certificate Authority | ||||||||
ISE Admin #1 | ||||||||
ISE Admin #2 | ||||||||
ISE PSN #1 | ||||||||
ISE PSN #2 |
Use the Network Devices List to document each type of network access device in your network by model, supervisor (if appropriate), and software version. It is highly recommended that you upgrade all switches to the latest validated software version in the ISE Compatibility Guides and TrustSec Platform Support Matrix to avoid feature and behavioral inconsistencies. Each network device IP address must be added to ISE unless you use wildcard entries.
Model |
Cisco IOS® Software Version |
Management IP Address |
Management DNS Name |
---|---|---|---|
Describe your major network access scenarios and how you will use contextual, network-based attributes to enforce secure access. Consider scenarios such as user versus endpoint authentication, managed endpoint posture, unmanaged endpoint identification, role-based identification and segmentation (employees, contractors, guests, and so on), or location-based differentiation. These unique authorization states will map directly to your final ISE authorization rules and policies. Below are some pseudo-policy examples.
Scenario Name |
Conditions (Who, What, When, Where, How) |
Authorization Result |
---|---|---|
Corporate Workstation |
Active Directory Domain Computers |
Workstation_Access |
Phones | Profiled IP Phones | Voice_Network |
Printers | Profiled Printers | Printer_Network |
Employee | AD Employees | Employee_Access |
BYOD | AD Employees & Registered Device | Internet_Only |
Guest | Guest SSID & Sponsored Guest | Internet_Only |
Default | - | Guest_Redirect |
Identify the specific RADIUS authorization attributes for each unique authorization states you identified in your Authorization Poliicy. This will help you understand the subtle differences between each enforcement state and identify the number of unique ACLs or Scaleable Group Tags that you must create.
RADIUS Attributes |
Authorization Profiles |
---|---|
Workstation_Access |
VLAN: Data dACL: ACL-WORKSTATIONS Session Timeout: 86400 (24 hours) |
Voice_Network |
Voice VLAN Permission: Yes Session Timeout: 86400 (24 hours) |
Printer_Network |
VLAN: Data dACL: ACL-PRINT-SERVERS Session Timeout: 86400 (24 hours) |
Employee_Access |
VLAN: Data dACL: ACL-EMPLOYEE-ACCESS Session Timeout: 28800 (8 hours) |
Internet_Only |
VLAN: Data dACL: ACL-INTERNET-ONLY Session Timeout: 28800 (8 hours) |
Guest_Redirect |
URL-Redirect: ACL-CENTRAL-WEBAUTH URL-Redirect-ACL: ACL-URL-GUEST-REDIRECT Session Timeout: 600 (10 minutes) |
In the Endpoint Details table, specify how all the various network endpoints will be authenticated when TrustSec is enabled. Possible authentication methods include 802.1X, MAB, and web authentication.
Endpoint |
Authentication Method |
Notes |
---|---|---|
Windows XP SP# (native supplicant) | ||
Windows Vista SP# (native supplicant) | ||
Windows 7 (native supplicant) | ||
Windows 7 (AnyConnect®) | ||
Windows XP SP3 | ||
Apple Mac OS X 10.7.x (native supplicant) | ||
Linux | ||
Apple iOS devices | ||
Android devices | ||
Cisco IP Phones | ||
Cisco Access Point | ||
Printers | ||
Guests | ||
PXE Boot |
Based on your desired security policy, anticipated endpoints, and enforcement states, create a list of scenarios to test in your lab or small proof of concept deployment before deploying at scale. Table 7 lists some suggested scenarios to get you started.
Scenario |
Result (Pass/ Fail) |
Comments |
---|---|---|
MAB | ||
Phone | ||
Printer | ||
Other | ||
IOT: Camera | ||
MAB+Profiling | ||
User Authentication to Active Directory Domain | ||
Single Sign-On (SSO): Username/Password | ||
Windows Machine Authentication (Wired) | ||
802.1X Windows Native Supplicant Machine Authentication using PEAP-MSCHAPv2 | ||
802.1X Windows Native Supplicant Machine Authentication using EAP-TLS | ||
802.1X Windows Native Supplicant Machine Authentication on Docking Station | ||
802.1X Windows Native Supplicant Machine Authentication behind IP Phone | ||
802.1X Windows Native Supplicant Machine Authentication in VM on PC in Docking Station behind IP Phone | ||
802.1X Windows Native Supplicant Machine Authentication after Sleep/Hibernation | ||
Windows User Authentication (Wired) | ||
802.1X Windows Native Supplicant Username+Password (PEAP-MSCHAPv2) | ||
802.1X Windows Native Supplicant User Certificate (EAP-TLS) | ||
802.1X Windows Native Supplicant User Authentication: Not domain-joined | ||
802.1X Windows Native Supplicant User Authentication: Domain-joined | ||
802.1X Windows Native Supplicant User Authentication on Docking Station | ||
802.1X Windows Native Supplicant User Authentication behind IP Phone | ||
802.1X Windows Native Supplicant User Authentication in VM on PC in Docking Station behind IP Phone | ||
802.1X Windows Native Machine Authentication after Sleep/Hibernation | ||
Remote Desktop Protocol (RDP) Login with Windows Native Supplicant | ||
Windows with AnyConnect (Wired and/or Wireless) | ||
802.1X AnyConnect NAM using PEAP-MSCHAPv2 | ||
802.1X AnyConnect NAM using EAP-TLS | ||
802.1X AnyConnect NAM EAP Chaining Machine (EAP-FAST: Certificate) | ||
802.1X AnyConnect NAM EAP Chaining User (EAP-FAST: Username) | ||
802.1X AnyConnect NAM EAP Chaining Both (EAP-FAST: Machine Certificate + Username) | ||
Easy Connect | ||
802.1X + Passive-ID - Post | ||
802.1X + Passive-ID - Post | ||
Easy Connect - Post | ||
Wireless | ||
802.1X iOS | ||
802.1X Android | ||
802.1X Other Mobile OS | ||
802.1X BYOD post-onboarding using EAP-TLS | ||
802.1X Anonymous | ||
Guest Access (Wired and/or Wireless) | ||
Guest: Hotspot (with/out Passcode, AUP, etc.) | ||
Guest: Registration & Login | ||
Guest: Sponsor User Creation | ||
Guest: Sponsored User Login | ||
WebAuth: Employee login with AD | ||
CWA Chaining (Cert) Initial WebAuth pending | ||
CWA Chaining (Cert) | ||
CWA Chaining (Username) WebAuth pending | ||
CWA Chaining (Username) | ||
Posture | ||
EAP Chaining Both (Machine cert + username) Posture pending | ||
EAP Chaining Both (Machine cert + username) Posture compliant | ||
VPN | ||
AnyConnect SSL VPN Username+Password | ||
AnyConnect SSL VPN Certificate | ||
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: