07-18-2018 06:31 AM
Hello
it's a bit of a long posting ... please stick with me on this one ... ...
It's a design question regarding the best practice when deploying Guest/Sponsor/BYOD portals in a 2 PSN deployment. It does not require load balancing, but rather, high availability. In most postings/trainings/docs I have seen, the theory is explained but either for a single PSN only or load balancer design (but not much info for a simple two node setup for HA)
Let's assume
My design goal is to have the ISE nodes on their own internal DNS domain, e.g. net.local - this might be the root of all my concerns. But let's continue ...
I also want to present a Guest URL that looks professional and doesn't expose the DNS domain that ISE PSN resides on.
e.g. I don't want to see in my URL's things like ise-01.net.local (not that it would work anyway because I cannot get a public cert for a domain called net.local)
However, I don't have a load balancer, and therefore (I believe) I won't be able to set a static FQDN on my URL redirect AuthZ Result.
Question: Is it possible to achieve ISE web redirection to use static FQDN guest.mycorp.com without a load balancer in place?
Question: If not, am I forced to create ISE ip domain-names that contain my registered DNS domain (e.g. mycorp.com) ?
ISE Portal certificate proposed
DNS Server config
I am aware that by default a PSN will craft a redirect URL https://<ISE_FQDN>:port
and whichever PSN is chosen in the MAB auth, will return the FQDN. So if I don't override with a static FQDN I will get either
https://ise01.net.local:8443....
https://ise02.net.local:8443....
But that won't match any SAN in my certificate. So I will get browser warnings.
Bottom line: is the idea of using a non-registered DNS domain like net.local on an ISE node more hassle than it's worth? It's a neat way of keeping the DNS design clean, but I am having a hard time figuring out my concerns mentioned above. Sorry for the long elaboration but I didn't want there to be any ambiguity in my questions.
Solved! Go to Solution.
07-18-2018 08:30 AM
Not following true motivation for two domains. Most customers have internal domain and choose to add second domain for public certs and avoid cert warning and wish to retain internal certs for management and EAP communications. I do not see how it makes design clean. If wishing to obfuscate internal domain, then use secondary interface with custom alias to alternate domain.
See BRKSEC-3697 and BRKSEC-3699 reference presentations from Orlando 2018 on CiscoLive.com for some additional details use of secondary interfaces and HA without LB. For Sponsor/MyDevices, need intelligent DNS as I would not rely on clients to properly fallback to secondary entry in DNS response.
It may be possible to add secondary domains to SAN field of certs, but cleaner option is to use second interface which has its own FQDN and public domain which is distinct from internal domain on GE0. Here is slide from BRKSEC-3699 which calls out use cases and caveats of static hostname redirect:
The example shows rule logic to select PSN based on RADIUS server.
/Craig
07-18-2018 06:55 AM
Would this work? I create two AuthZ profiles, each with their own static FQDN pointing to the appropriate PSN?
And then I apply these in AuthZ depending on which PSN received the request?
07-18-2018 08:30 AM
Not following true motivation for two domains. Most customers have internal domain and choose to add second domain for public certs and avoid cert warning and wish to retain internal certs for management and EAP communications. I do not see how it makes design clean. If wishing to obfuscate internal domain, then use secondary interface with custom alias to alternate domain.
See BRKSEC-3697 and BRKSEC-3699 reference presentations from Orlando 2018 on CiscoLive.com for some additional details use of secondary interfaces and HA without LB. For Sponsor/MyDevices, need intelligent DNS as I would not rely on clients to properly fallback to secondary entry in DNS response.
It may be possible to add secondary domains to SAN field of certs, but cleaner option is to use second interface which has its own FQDN and public domain which is distinct from internal domain on GE0. Here is slide from BRKSEC-3699 which calls out use cases and caveats of static hostname redirect:
The example shows rule logic to select PSN based on RADIUS server.
/Craig
07-18-2018 03:03 PM
Hi Craig
When you say "Most customers have internal domain and choose to add second domain for public certs..." then that is exactly what I am after.
My main constraint was the fact that I only have one GigE interface - thus, the ip hostname trick won't work here - in some cases customer cannot justify consuming an extra switch port per PSN (or two, if bonding)
Ok, so with one ISE interface, if you build your nodes with an internal domain like this
ip domain-name ise01.net.local
then you run into the issue where you MUST override the FQDN in the URL redirection - because the client will get a cert warning since ise01.net.local will never make it into a publically signed certificate. And then the only way out is the Network Access:ISE Host AuthZ rule to override the FQDN with the desired FQDN that is contained in the Portal cert.
OK I think I get it now. I was mostly after a sanity check from the field to see whether I was perhaps missing something obvious.
I'll go over the Cisco Live docs again.
02-13-2019 09:57 AM
Just out of curiosity - where did you end up on this? I'd like know exactly what you did to get this working...if you have the time to share :).
Thanks
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide