08-28-2013 10:13 AM - edited 03-10-2019 08:49 PM
In ISE v1.1.1, is it possible to create a whitelist of endpoints just for a specific WLAN SSID - i.e. a whitelist that can be associated wih only one SSID?
Many thanks.
Sankung
08-28-2013 10:18 AM
Sorry, I mean to say whether it is possible to enable MAB for Wireless endpoints?
many thanks
Sankung
08-28-2013 07:54 PM
Yes it possible to enable MAB for wireless endpoint. For configuration help you can see the below link.
http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_sw_cnfg.html
08-29-2013 09:27 PM
Hello Sankung
1. A guest user connects to the network using a wireless connection and has a MAC address that is not in the
endpoint identity store or is not marked with an AUP accepted attribute set to true, and receives a URL redirection authorization profile. The URL redirection presents the user with an AUP acceptance page when the guest user attempts to go to any URL.
2. If the guest user accepts the AUP, their MAC address is registered as a new endpoint in the endpoint identity store (assuming the endpoint does not already exist). The new endpoint is marked with an AUP accepted attribute set to true, to track the user’s acceptance of the AUP. An administrator can then assign an endpoint identity group to the endpoint, making a selection from the Guest Management Multi-Portal Configurations page.
3. If the guest’s endpoint already exists in the endpoint identity store, the AUP accepted attribute is set to true on the existing endpoint. The endpoint’s identity group is then automatically changed to the value selected in the Guest Management Multi-Portal Configurations page.
4. If the user does not accept the AUP or an error occurs in the creation of the endpoint, an error page appears.
5. After the endpoint is created or updated, a success page appears, followed by a CoA termination being sent to the NAD/WLC.
6. After the CoA, the NAD/WLC reauthenticates the user’s connection with a new MAB request. The new authentication finds the endpoint with its associated endpoint identity group, and returns the configured access to the NAD/WLC.
Enter the following commands to enable the various AAA functions between the switch and Cisco ISE, including 802.1X and MAB authentication functions:
aaa new-model
Creates an 802.1X port-based authentication method list
aaa authentication dot1x default group radius
Required for VLAN/ACL assignment
aaa authorization network default group radius
Authentication & authorization for webauth transactions
aaa authorization auth-proxy default group radius
Enables accounting for 802.1X and MAB authentications
aaa accounting dot1x default start-stop group radius
aaa session-id common
aaa accounting update periodic 5
Update AAA accounting information periodically every 5 minutes
For more detail configuration and commands, please see the below link:
http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_ug.pdf
at page no.807
Best Regards:
Muhammad Munir
08-30-2013 09:48 AM
WIRELESS:
Simply means brining a new device onto the network for the first time. On-boarding can be designed many ways however for this post we will use two SSIDs called Provisioning_Wireless for new devices and Employee_Wireless for existing approved devices. An accesslist limiting access to ISE, DHCP and DNS will be enabled to prevent devices from staying on the provisioning SSID.
Go to WLANs > Create New > Go and fill out the profile details. Use NONE for the layer 2 settings so it’s OPEN. For AAA, set the Radius server for ISE. Under advanced, enabled Allow AAA Override and change the NAC state to Radius NAC. Go to Controller > General > Fast SSID change and enabled Fast SSID to help speed up the SSID changing.
i- Join the ISE to an AD system. ii- Define the certificate authentication profile
iii- Define an Identity Source Sequence iv- Configure ISE to act as a Simple Certificate Enrollment proxy server
For this scenario, Configure ISE authentication to use MAB for on-boarding new devices.
In many cases, ISE will not know the MAC addresses in advance so it must be configured to continue the authentication process via redirection regardless.
This is done in ISE:
Note: Client provisioning is based on how ISE classifies the client machine. There are customized packages in ISE available that include a software-provisioning wizard, which configures 802.1x settings and ability to obtain digital certificates on the endpoint.
To download wizard packages in ISE
Policy Elements > Results > Client Provisioning > Resources > Add. Common mobile devices such as iOS typically have these settings enabled natively so a wizard is not needed.
To configure client provisioning in ISE:
For Complete Guide Please visit
http://www.thesecurityblogger.com/?tag=ise-advance-license
Video Link for Configuration of BYOD
http://www.labminutes.com/sec0054_ise_1_1_byod_wireless_onboarding_dual_ssid_testing
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide