cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3080
Views
1
Helpful
0
Comments
pavagupt
Cisco Employee
Cisco Employee

 

Introduction

            Cisco Identity Services Engine (ISE) gives you intelligent Integrated protection through intent-based policy and compliance solution. Cisco ISE supports TC-NAC integration with in-house and third party vendors such as AMP for endpoint Security, CTA, Qualys, Nexpose and Tenable  Security Center to get the vulnerability assessment of endpoints and give access to endpoints based on vulnerability, compliance and threats  seen on endpoint.  

 

Components

Cisco Identity Services Engine (ISE)

Qualys Information Security and Compliance.

 

ISE Configuration

Considering you have already deployed a Qualys instance (vm or appliance) in your intranet environment to scan and provide vulnerability information to ISE, This section will give you an idea on how to integrate Cisco Identity Services Engine with Qualys Server.

 

  1. Login to ISE admin portal with super admin privileges
  2. In order to enable TC-NAC, you must have Apex license available. Ensure that your ISE deployment has Apex License available.
  3. Navigate to Administration > System > Deployment > <ISE PSN Node> and enable check box “Enable Threat Centric NAC Service”

    image001.png

  4. Wait for few minutes for the ISE to bring up the TC NAC adaptor instance. You can check the service status by login to CLI and executing command “show application status ise”.

    image002.png

  5. Navigate to Administration > Threat Centric NAC > Third Party Vendors and click on ADD. Select “Qualys : VA”  as the vendor and provide Instance Name for ISE reference.

    image003.png                   image004.png

  6. Save the configuration and wait for few seconds to show the status as Ready to Configure

    image005.png

  7. Fill in the details such as REST API based on the Qualys cloud server that you are using, port, username & password. If ISE in your organization could reach Qualys cloud server through proxy, then please provide proxy details too and click on Next.

    image006.png

  8. Select the scanner from the drop down, leave the rest of the settings as default and click on Next
    image007.png

  9. Leave the default configuration as is and click on Next to review and save the configuration. ISE will try to connect to Qualys server and if the connection is successful, ISE downloads Knowledge base from Qualys server. It will take few minutes for ISE to complete the process.

    image008.png


  10. Navigate to Administration > Identity Management > Identities > Users, click on Add to configure an internal user. Provide Details like username and password and submit the configuration.

    image009.png

  11. Navigate to Work Centers > Network Access > Network Resources > Network Devices, click on ADD to configure Network Access device. Provide details such as name, IP address of WLC (in this example) and shared secret.

    image010.png

  12. Navigate to Policy > Policy Elements > Results > Authorization > Authorization Profile and click on Add. Provide Name of the authorization profile, and enable Assess Vulnerabilities under common tasks by selecting Qualys (name of the Qualys server given earlier) as the adaptor instance.

    image011.png

  13. Navigate to Policy > Policy sets > Default policy set. Leave the authentication policies as is and configure one authorization policy for assessing vulnerabilities of successful dot1x users’ devices by Qualys and select authorization profile created above.

    image012.png

  14. Go to Global authorization policy and configure one authorization policy for dot1x users and having vulnerability greater than 4 (say) to give restricted/deny/ISE blackhole page.

    image013.png

NOTE: it is advised to create global exception policies as it is going to be common for all policy sets and better way to give restricted access if vulnerable endpoints coming onto your network without assessing any other authorization rules.

Troubleshooting

If ISE is unable to connect to Qualys server through the REST API..

  • Check for certificates whether Qualys server is trusted under Trusted Certificates store.
  • Check whether proxy details are proper or not.
  • Check the connectivity to Qualys whether Qualys server and port is allowed for ISE in your organization.

 

End user perspective and Validation

  1. Authenticate the device using the user credentials created in earlier section. (windows device used in this demonstration).
  2. Ensure you have a successful session authenticated and authorized against ISE by login into ISE and navigating to Operation > RADIUS > Live Logs

    image014.png

  3. Ensure ISE submitted the authenticated session of endpoint for vulnerability assessment to Qualys by going to Operation > Reports > Reports > Threat Centric NAC > Vulnerability Assessment

    image015.png

  4. Login to your Qualys Dashboard and look for the active scans. Based on your scanning selection in Qualys, it will take few minutes to complete the scanning and give back the results to ISE.

    image016.pngimage017.png

  5. Navigate to Operations > RADIUS > Live Logs and check whether endpoint received different authorization based on vulnerability report received from Qualys

    image018.png

  6. Once Qualys scanning is completed, ISE will give different authorization based on the global exception policy written earlier.

    image019.png

  7. Navigate to Context Visibility > Endpoints > Endpoints > <endpoint> , check for vulnerabilities that was learnt from Qualys

    image020.png

  8. Navigate to Context Visibility > Endpoints > Vulnerable Endpoints to check for vulnerabilities retrieved for the endpoint.

    image021.png

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: