08-17-2016 02:46 PM - edited 02-21-2020 08:56 PM
I have a new ISE 2.1 deployment that is only being used for device management at the moment. The intention is that it will be used as a radius server for our VPN authentications.
The 5525x is a brand new ASA running 9.4 code. I want to configure the VPN policy on the ASA so that each user is assigned a DAP based on their department.
I already have the department designation for the user accounts assigned in AD via group membership. I don't know how to get ISE to pass along the group membership to the ASA so that it can associate the user based on that group membership to the correct DAP.
I have been unsuccessful in determining how this is supposed to work. Thanks for any help.
Solved! Go to Solution.
08-18-2016 08:30 PM
Normally we Authenticate and Authorize users and then push dACLs or authorize connection profiles etc. from ISE based on conditions like Posture check results or details of the user identity (such as AD or other external identity store group membership).
There are a couple of good guides for doing so including detailed examples:
https://communities.cisco.com/docs/DOC-68158
http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html
http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118714-configure-ise-00.html#anc16
While these primarily focus on the Posture use case, they can be adapted to add other uses. For instance, the condition check in ISE can be the result of not only a Posture check also membership in a given AD group or another if you make it a compound condition.
I don't believe we can specify to the ASA to call out a given DAP policy as the Hostscan module cannot be used the same time as the ISE Posture module. However, you should be able to accomplish just about everything that you used to rely on DAP for with ISE Posture Module of AnyConnect (assuming you have AnyConnect 4.x Apex licenses).
If you want to stick with the ASA DAP model, you could forgo using ISE Posture module and policies and instead create an Authorization Profile (result) to send the ASA a RADIUS A-V pair based on a match (in ISE Authorization policy) with the AD group. There is a "Cisco-VPN-3000" A-V known as "PIX7x-Member-Of" that can be used in ASA dynamic access policies. You can see it (and all other A-V pairs supported buy ISE) here:
https://communities.cisco.com/docs/DOC-67894
08-18-2016 08:30 PM
Normally we Authenticate and Authorize users and then push dACLs or authorize connection profiles etc. from ISE based on conditions like Posture check results or details of the user identity (such as AD or other external identity store group membership).
There are a couple of good guides for doing so including detailed examples:
https://communities.cisco.com/docs/DOC-68158
http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/117693-configure-ASA-00.html
http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118714-configure-ise-00.html#anc16
While these primarily focus on the Posture use case, they can be adapted to add other uses. For instance, the condition check in ISE can be the result of not only a Posture check also membership in a given AD group or another if you make it a compound condition.
I don't believe we can specify to the ASA to call out a given DAP policy as the Hostscan module cannot be used the same time as the ISE Posture module. However, you should be able to accomplish just about everything that you used to rely on DAP for with ISE Posture Module of AnyConnect (assuming you have AnyConnect 4.x Apex licenses).
If you want to stick with the ASA DAP model, you could forgo using ISE Posture module and policies and instead create an Authorization Profile (result) to send the ASA a RADIUS A-V pair based on a match (in ISE Authorization policy) with the AD group. There is a "Cisco-VPN-3000" A-V known as "PIX7x-Member-Of" that can be used in ASA dynamic access policies. You can see it (and all other A-V pairs supported buy ISE) here:
https://communities.cisco.com/docs/DOC-67894
08-30-2016 03:33 PM
Marvin,
Thanks for your response. I had some of my acronyms mixed up. We would like to be able to authenticate users via ISE and then authorize users by pushing dACLs. I would also like to be able to auto-select the tunnel group (connection profile) for the user based on an AD group membership value.
Logically in my mind I have the process mapped as follows:
ASA passes authC to ISE
ISE authZ response passes class selection back to ASA
class selection matches a group policy which sets ACL
Another question I have is about the configuration procedure for setting the Authentication method for a tunnel-group to both AAA and Certificate. I can choose the Both radio button but can't figure out where I configure the certificate definition that the ASA and Anyconnect should use to determine that this machine is a corporate asset. This would restrict only connections from a corporate supplied machine to be associated to this tunnel-group. Could you provide any additional details on this? Thanks.
08-30-2016 04:28 PM
You can authenticate the machine or user (or both) using a certificate. there are some details on that here:
http://www.cisco.com/c/en/us/td/docs/security/ise/2-1/ise_active_directory_integration/b_ISE_AD_integration_2x.html#ID500
...including mention of choosing which attribute in the certificate to check.
You can choose an authorization profile to check a user's AD group membership and then push a dACL to the ASA (or alternatively assign a group policy, or both).
This is documented in the following article (talks about the posture use case but still applicable for the concept of asking ISE to check for something and then tell the ASA how to treat the connection based on what ISE finds out about the user - be it posture, group membership etc.):
https://communities.cisco.com/docs/DOC-68158
09-22-2020 09:10 AM
Is it possible to use the posture assessment to determine if the connecting device is using a Android OS?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide