07-26-2019 12:34 AM
Hi Experts,
This is with reference to the question asked in the following link https://community.cisco.com/t5/identity-services-engine-ise/creation-of-secondary-ip-or-ip-loopback-with-32-on-ise/m-p/3523973#M8886
From what I understand we still cannot configure Loopback or secondary IP on ISE. I have had questions on why this is the case. From an exploitation perspective, I can think of reasons where if a server is actually exploited one could potentially use the Loopback IP which is always on and configure it with a routable IP and spoof packets for lateral movements or even use the loopback to do potential IPC comms. For secondary IPs I can think of traffic subnet segmentation and not wishing to have different subnets on the same physical interface but what is the actual reasoning for ISE not to have the option for loopback or secondary IP interfaces?
Additionally, I would just like to confirm that it is actually possible to configure a secondary IP on a second interface and this will respond to TACACS+ requests as per https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_0110.html#ID-1420-000000ee . I can then achieve symmetric responses by creating separate default routes per interface as per BRKSEC-3699.
Are there any gotchas I need to be aware of in this design. The reason I am asking is because a customer initially had a design with just one Interface. Now they do not want to rehome from ACS to ISE and would like to configure the ACS IP on the ISE as a secondary interface. From the looks of this configuration wise it looks doable but is this a recommended design or are there any gotchas to be aware of?
Any thoughts are welcome.
Thanks
Avinash
Solved! Go to Solution.
07-26-2019 01:22 AM
07-26-2019 12:53 AM
07-26-2019 01:11 AM - edited 07-26-2019 01:12 AM
Hey Suri,
Yeah I actually did go through the doc thats where Craig pointed to the Cisco Live doc 3699. Im concerned about any other repecussions or design loopholes to look out for of having a secondary IP configured on ISE to accept TACACS+ requests. For example from the documentation on the Cisco live docs it seems a default route per interface is mandatory to achieve symmetric replies.
I'm thinking the secondary IP question probably comes from folks working on Microsoft or some form of server installation where the OS allows you to configure a standby IP on the same NIC. I think IOS routers also allow this https://community.cisco.com/t5/switching/use-of-secondary-ip-on-vlan-interface/td-p/2038746 again its more of a workaround to avoid any routing complexities etc but it's allowed nonetheless. ip address a.b.c.d secondary.
If you see the following link https://unix.stackexchange.com/questions/127723/what-are-the-benefits-of-using-several-ip-addresses-on-a-server youd see quite a lot of reasons why a server itself could have a secondary IP configured and point 3 4 5 are similar to what we are facing now.
But the question still stands. In this scenario, if I could just configure the ACS IP on the ISE as a secondary it would have avoided adding that extra default route for the g1 interface. So why don't we have a loopback support on ISE or ability to configure a secondary IP? Are there security implications for this apart from its functional irrelevance?
Thanks
07-26-2019 01:22 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide