cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
535
Views
2
Helpful
0
Replies

ISE as an Endpoint EAP-TLS certificate expiration audit tool

Arne Bier
VIP
VIP

Hi

I had an idea about using ISE as an endpoint certificate tracking tool, to check for the following:

  • What TLS version are my endpoints using? (e.g. can I disable TLS 1.0 etc)
  • When are my endpoint certificates expiring (e.g. I have deployed certs on devices that have poor, or no management systems to keep track of client cert expiration)

It turns out, that SYSLOG might be the answer to these questions. By filtering the SYSLOGs sent by ISE, we can see all this, and then create reports and an action plan to remediate.

Below is a redacted view of an ISE SYSLOG example event after a successful EAP-TLS authentication - ISE decodes the client cert and puts all the necessary data in comma-delimited SYSLOG:

EapAuthentication=EAP-TLS,
EndPointMACAddress=00-00-00-00-0B-FF,
TLSCipher=ECDHE-RSA-AES256-GCM-SHA384, 
TLSVersion=TLSv1.2, 
TLSSupportedGroups=secp521r1, 
TLSSignatureAlgorithms=rsa_pss_rsae_sha512, 
Days to Expiry=189

 The ISE Logging config only requires the SYSLOG target(s) to be added to the "Passed Authentications" Category :

ArneBier_0-1733968372645.png

Furthermore, for wired 802.1X, the Session re-auth should be enabled to regularly re-auth endpoints that might be permanently connected (e.g. cameras, printers, etc.) - every 18 hours (65535 seconds) seems reasonable to me.

And finally, the hard work still has to be done to write a filter/rule in your SIEM (e.g. Splunk) to trigger a report to be sent to an admin when there are endpoints that have "Days to Expiry" <= 30 or whatever the requirement may be.

 

0 Replies 0