08-29-2018 08:28 AM
Hi Guys,
Quick question.
At the moment I have only one ISE which I'm using it to do authentication and posture for AV over Wired, wireless and VPN.
I will need to deploy a distributed environment and I'm not sure how to configure the posture piece.
At the moment the posture XML file is poiting to the IP of ISE. I tried to change it to the FQDN but it didn't work.
Do you have any idea how to achieve this?
Albert
Solved! Go to Solution.
08-31-2018 05:33 AM
08-30-2018 06:26 AM
In case you are able to save the profile with FQDN as the DiscoveryHost, then please ensure the endpoints able to resolve the FQDN to a valid IP address during posture discovery. If deployed with Cisco Umbrella or WebSec, ensure the DNS lookup working for this query and not blocking the access to the site.
In case the editor not permitting you to save the field using FQDN, please open a TAC case to investigate.
08-30-2018 06:42 AM
08-30-2018 09:19 AM
Take a look at ISE Posture Style Comparison for Pre and Post 2.2 - Cisco.
Since you are seeing the endpoint trying to access FQDN, the one specified as DiscoveryHost in the agent profile, please follow how the attempt flows. It should go like this:
http://DiscoveryHost:80
-> Redirect to the ISE PSN that authenticates this endpoint session
-> Able to access ISE PSN and download the posture requirements, etc.
.
08-30-2018 09:22 AM
08-30-2018 09:27 AM
DiscoveryHost needs not be one of the PSNs at all. It needs only be a site that would trigger URL redirect based on the redirect ACL.
For example, I set it in my lab to point it to my AD web site.
08-30-2018 09:36 AM
08-30-2018 02:32 PM
You need to ensure that posture is reported to the correct PSN that authenticated the user. The best way to do this is get posture discovery working correctly. In this way, it doesn't matter if you have 2 PSNs or 20. I don't use the posture discovery host. I like posture discovery to work with a fresh install of the posture module no customization required. The two methods that are easy to intercept are:
My stock posture discover ACL for wired is:
ip access-list extended POSTURE-DISCOVERY
permit tcp any 10.0.0.1 0.255.255.0 eq 80
permit tcp any host 72.163.1.80 eq 80
deny ip any any
This assumes the client is a 10.x.x.x network and .1 is their typical default gateway. 72.163.1.80 is enroll.cisco.com. This will get you to the right PSN everytime even for a fresh installed posture module with no customization.
08-30-2018 02:37 PM
08-30-2018 02:44 PM
08-30-2018 03:20 PM
08-30-2018 04:07 PM
Please let me know if it sounds good to you.
i will configure an xml file adding the IPs of my two ISE in the entry of call home list. In theory this setup should work in case primary ISE fails and the secondary will take its place.
08-30-2018 05:02 PM
08-31-2018 01:36 AM
08-31-2018 01:49 AM
Also I would like to specify that the posture is working on Wired and VPN, but on wired I don't have any ACL for redirection configured on the switch and it is still working.
I've checked all configuration (ISE as well) and I've deleted the IP of ISE from any call home list entry.
I'm not sure why this is happening.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide