11-19-2024 06:39 AM - edited 04-10-2025 11:46 PM
The Project Story for this Article can be found at: ISE Deployment and Operation: Lessons from Large, Complex Environment.
The Portuguese version of this Article can be found at: Navegando de Forma Segura num Ambiente Caótico - Parte II.
For an offline or printed copy of this document, simply choose ⋮ Options > Printer Friendly Page. You may then Print > Print to PDF or Copy & Paste to any other document format you like. |
This is a two-part Knowledge Base Article:
Discover how to tackle Chaotic Environments head-on and explore the role of AI in navigating this complexity !!!
Gain insights from Real-World Examples of Chaotic Environments, uncover Challenges, and equip yourself with Tips to "conquer this War".
Link:
Navigating Security in a Chaotic Environment - Part I
Thanks @Durval Vieira , @Ivan Tratz , @Renato Guardia , @Robson Ribeiro , @Adonay dos Anjos , @Daniel Volpato for the contribution !!!
A real-world scenario with many adversities generates many Lessons Learned and Success Stories.
The Challenges & Solutions faced by a huge Customer provide all Readers with a unique opportunity to learn from the daily experience of this constant "battlefield".
Caixa Econômica Federal is a huge Financial Institution, with a very large heterogeneous Network Environment that was looking to provide Zero Trust Access to their Employees, Contractors and Devices that need access to Company Applications and Internet Access.
The main Challenge was to find Technical and Operational Solutions that would provide Visibility and Control of Users and Devices, in an existing Diverse and in some cases Legacy Infrastructure with limited Security Capabilities.
Caixa Econômica Federal is a Public Bank founded in 1861 with 85K+ Employees, 115K+ Users, and 150M+ Customers serving the Brazilian territory of 8.5M km2 and 26 States via 53K+ Service Points (among these 13 Truck Agencies and 2 Boat Agencies), 15K+ Switches and 250K+ Endpoints.
As Caixa Econômica Federal is:
Cisco Secure Zero Trust is a comprehensive approach to securing all access across People, Applications and Environments. The three primary areas of Zero Trust are: WorkForce, WorkPlace and WorkLoads ...
WorkPlace is the heart of Cisco ISE !!!
Next up ... an overview of Cisco ISE in 4 images:
Use Cases & Outcomes that can enabled through Cisco ISE:
Cisco Secure Client is the rebranded version of Cisco AnyConnect.
Cisco Secure Client is a comprehensive Security Client that offers a suite of security services through its modular approach:
Our Real-World Example is based on Caixa Econômica Federal and Cisco ISE !!!
Security should never be an afterthought in the Development Process, otherwise it leads to vulnerabilities and increases risks.
In a time of great uncertainty (where the only certainty is: "When will the next crisis be ?"), we must be prepared for a quick and smooth shift from Wired to VPN, the 2019 Pandemic was a great example !!!
Challenges:
Tips:
Avoid different Release and Patch between VPN and Wired ISE Cluster.
Dedicated PAN & MnT in both Deployment to support the extra load when the shift from Wired to VPN is required.
Be prepared to create a new PSNs arrangement (De-Register PSNs from the Wired ISE Cluster and Register them to the VPN ISE Cluster)
Load Balancers between NADs (Switches / Firewalls) and PSNs (Wired / VPN Cluster) provide flexibility for a fast migration to the new PSNs arrangement !!!
Links:
Performance and Scalability Guide for Cisco ISE
The Sizing Guidelines for ISE Deployment (Table 3 of the Performance and Scalability Guide for Cisco ISE) are derived based on tests under the following conditions:
IMPORTANT: in case of Deployments where Endpoints generate repeated Authentication and Accounting Events, more number of PSNs are required in PSN Group to help in handling Heavy Traffic.
Challenges:
Tips:
Authentication Rates (Table 5: RADIUS, Table 6: TACACS+ and Table 7: Scenario-Specific) of the Performance and Scalability Guide for Cisco Identity Services Engine:
Avg TPS (Average Transactions per Second) (at Operations > Reports > Reports > Diagnostics > Key Performance Metrics) :
TPS Line Graph (at Operations > System 360 > Log Analytics > RADIUS Authentication Summary) :
Links:
ISE - What we need to know about SNS / VM
The Cisco Learning Nerwork has amazing Identity Services Engine Training Videos, one of the Lessons talked about Scaling ISE Deployments for Long Term Success.
This Lesson explains that different Mediums have different Resource Consumptions as opposed to the Units of the Policy Service Node Scale (Table 4 of the Performance and Scalability Guide for Cisco ISE).
It's extremely important to go from Unknowns, to Knowns, to Classified NOT ONLY to better scale your Deployment, BUT ALSO to better protect your Deployment from Threats !!!
Challenges:
Tips:
ISE Profiling: a feature that provides dynamic detection and classification of Endpoints connected to the Network.
Device Sensor: a feature used to gather raw Endpoint Data from Network Devices.
Links:
Configure Device Sensor for ISE Profiling
A Scheduled Backup and a Functional Restore are essential components of a Disaster Recovery strategy (or to recover from a Ransomware Attack), but they may not be enough when you have to constantly deal with Subpoena Requests and Deadlines.
Challenges:
Tips:
Link:
ISE - CSCwn63678 - Radius Accounting reports ISE 3.3
To manage Business Risks during a Cybersecurity Attack, you must first identify ALL Threats and then prioritize which one have the greatest impact on your Business ...
... to identitfy ALL Threats in a Chaotic Environment with multiple Vendors, Hardware and "Things", you MUST have multiple specialized Teams ...
The "1st rule" and best practice for any War Room is to involve as few people as possible !!!
Challenges:
Tips:
Authentication by Location
Authentication by Device Type
Authentication by Allowed Protocol
Authentication by Identity Store
Authentication by Failure Reason
Authentication by Identity Group
Understanding your Business Behaviors (specifics thresholds and patterns) is the 1st step to identify Anomalous Behaviors or Threats that you "cannot see" !!!
These Anomalous Behaviors can be Cybersecurity Attacks or Critical Issues that you MUST Reactive quickly, especially in a Huge Chaotic Environment !!!
Challenges:
Tips:
RADIUS Performance:
check the RADIUS All Traffic per Server:
Week till 12:30 PM - Normal behavior
Week till 01:00 PM - Anomalous behavior
Week - Anomalous behavior highlight
Day - Anomalous behavior highlight
Hour - Anomalous behavior highlight
Profiler Performance:
check the Profiler Events:
Without a Trusted System for Authentication, malicious actors can impersonate legitimate Devices.
Digital Certificates play a crucial role in securing sensitive data and preventing unauthorized access by verifying Identities and encrypting Information.
The Enrollment process of Digital Certificates ensures that a Device obtain Digital Certificates from a Trusted Authority, known as a CA (Certificate Authority).
Microsoft NDES (Network Device Enrollment Service) is one of the role services of AD CS (Active Directory Certificate Services) that acts as a Registration Authority to enable Devices to get Certificates based on SCEP (Simple Certificate Enrollment Protocol).
Challenges:
Tips:
Link:
Challenges:
Staying up to date (Software & Hardware) is highly recommended on any Environment, but in a Huge and Chaotic Environment with multiples Devices from multiples Vendors, it's a MUST to constantly check for New Features in New Releases.
Tips:
Link:
Cisco Secure Client 5.1 Release Notes
Cisco Secure Client 5 Download
From Cisco ISE Release 3.1+, the MnT APIs (port 9443) the ERS APIs (port 443 or 9060) and the Open APIs (port 9070) are routed through the API Gateway (an API management solution that acts as a single entry point to multiple Cisco ISE Service APIs).
In a Distributed Environment, the Read Requests are forwarded to either a PSN or a Primary PAN, but the Write Requests are forwarded ONLY to the Primary PAN. The Primary PAN is the ONLY Node that has the write authority in the Deployment Environment.
Challenges:
Tips:
Link:
CODE SNIPPET for API for Distributed Management NADs
Code Snippet
CODE SNIPPET for API for Distributed Management and Automation of Whitelists
Data Connect is a feature that provides Read-Only access to the ISE Database so that you can query Data and create your own Reports - DIY Reports (Do It Yourself).
TCP / 2484 is used to establish Database Connections with ISE through Oracle TCPS (TCP Secure) Protocol.
ISE 3.2+ supports Data Connect. |
Challenges:
Tips:
Link:
ISE - What we need to know about Data Connect
Security Knowledge Base Articles and Ideas & Enhancements are part of the process of Sharing Knowledge and improving Cisco ISE, some examples are:
In a Chaotic Environment, Slow Replication is one of the causes of issues in an ISE Deployment.
For an in-depth analysis of Cisco ISE - Slow Replication caused by "External Actors" (not ISE), what it means , how to deal with it, and its impact on your Cisco ISE Deployment, take a look at:
ISE Messaging Service is started on each ISE Node and used for exchanging information between Nodes (via TLS using a Certificate issued by ISE's Internal CA). Queue Link is the connection between these Nodes, and Queue Link Error means that something went wrong !!!
For an in-depth analysis of Cisco ISE - Queue Link, how to deal with it, and its impact on your Cisco ISE Deployment, take a look at:
The difficulties faced both on a daily basis and during a War Room become Lessons Learned and these, in turn, are translated into Ideas & Enhancements, most posted (more than 40x) in the:
Cisco Insider User Group Ideas - Security.
Like the:
others in:
This Knowledge Base Article took Readers on a journey from Theory (in Part I) to Experience (in Part II) to achieve the following important goals:
Now it's time to "get your hands dirty" and jump into Practice in your own Environment !!!
Remember that: Theory alone is not enough, Practice is just the beginning and a good Experience is made with Theory and lot of Practice !!!
We look forward to hearing from you ... feel free to share your thoughts and Lessons Learned here !!!
THANK YOU FOR YOUR TIME !!! ; )
Once this scenario is overcome, we will not be afraid of any future implementation worldwide. Congrats my Friend!
A importância da CEF, como instituição financeira pública brasileira número 1 em carteira de Poupança e Crédito Imobiliário, a torna muito visível, alvo, à cibercriminosos. As contribuições técnicas do @Marcelo Morais na @Cisco Community tem sido essenciais na promoção de um ambiente mais seguro contra às ameaças digitais e que teriam grande impacto na população.
@Renato Guardia ... thanks for all the contribution !!!
@Leonardo Almeida ... muito obrigado !!!
Acompanhei parte desses desafios contigo, extremamente importante sua colaboração em compartilhar lições e sugestões com os colegas Cisco e parceiros, parabéns!!
@Henrique Gonzaga ... você faz parte desta complexa e maravilhosa jornada !!!
Parabéns Marcelo, por mais um material de grande importância para nossa comunidade.
@andersonmpp ... muito obrigado !!! Espero que ajude !!!
O documento ficou muito interessante. Sem dúvida irá agregar muito valor aos especialistas da comunidade. Parabéns pela dedicação e comprometimento com a qualidade do projeto, pelo desenvolvimento deste documento e por compartilhar com a comunidade.
@Sandro Nolasco ... obrigado Mestre !!!
Once we understand this scenario, we will have no fear of any future implementation worldwide.
@Adonay dos Anjos , the idea is to share this knowledge to make everyone's day-to-day life easier !!!
PS: a little fear is always prudent : )
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: