08-26-2011 08:22 AM - edited 11-18-2020 02:54 AM
This document provides a sample configuration for Integration of ISE (Identity Services Engine) with Cisco Wireless LAN Controller.
NOTE:- This document is about posturing the client and based on 7.0.116.0. The same information is also mentioned in the VoD.
Cisco Identity Services Engine (ISE) is a security policy management and control platform. It automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. Cisco ISE is primarily used to provide secure access and guest access, support BYOD initiatives, and enforce usage policies in conjunction with Cisco TrustSec.
We have an AP and a WLC, connected to a switch. The traffic will be encapsulated using CAPWAP protocol between AP and WLC. An ISE is sitting somewhere in the network and have connectivity to the WLC for posturing, authentication etc. Clients are associated to the WLC.
Now, let’s discuss what are the things need to be configured on Cisco WLC –
WLAN is named as ISEnWLC. Keeping security with default Wpa2. Advance Tab --> Enable Radius NAC. When we enable Radius NAC, AAA-Override feature will be enabled automatically.
NOTE:- If we configure it through CLI, AAA override should be configured first before configuring Radius-NAC on the WLAN.
Creating ACLs:-
ISE differentiates client in to 3 categories and we need to configure 3 different ACLs in order to give specific access to clients. It’s not mandatory to have 3 ACLs. We can also use only 2 ACLs. Suppose an admin does not want to differentiate unknown and non-compliant users and do not want to give different access policy to them for him. In that case, he can use 2 ACL, One ACL for unknown and non-compliant clients and second ACL for compliant clients.
It all depends on how Admin wants to configure it. We have created only 2 ACLs. we are treating unknown and non-compliant client in the same way.
Go to Security -> click on Access control lists--> We have configured 2 ACLs -
Limited_Access and Full_Access
Limited_Access will allow only ISE traffic and Full_Access will not block anything.
Now we add the ISE as AAA server. On the Security Tab --> select Authentication –> give ip address, shared secret. Shared secret should be same on ISE as well.
As per Cisco recommendation, an admin should configure 3 ACLs. let’s discuss more on ACLs and Posture state of clients/users.
Basically ISE differentiates a client into three categories, in order to do Posture:-
So we need 3 different access profiles for unknown, non-compliant and compliant. Each profile will have an ACL. As per user/client’s state, ISE will send the profile to the controller. Then controller will apply the ACL and other attribute into the client database.
Let’s see what kind of traffic should be allowed:-
It’s recommended to configure 3 ACLs for posture but not mandatory
The main purpose of this Document is to discuss posture and integration of ISE NAC and WLC. There are so many options, combination, attributes on ISE to configure but it’s tough to cover all in this document, so we will discuss some of the basic configuration ISE for wireless clients in order to do posture:-
Administration –
Policy Elements
Condition -
Results -
Client Provisioning -
Authorization -
We have Two Video's from Hemant Sharma. Hemant is a software engineer in the Wireless Business Unit at Cisco.
Please Rate the Videos. PART 1 and PART 2.
Ask the Expert: Cisco BYOD Wireless Solution: ISE and WLC Integration
Are there any plans to intergrate HREAP local-switching with ISE
Regards
NikhiL
Hi Nikhil,
sorry can not disclose here about cisco's plan.
Thanks
Hi Hemant,
I work in the middle east and I have a customer who have multiple offices connected to a Data Centre location and is planning for HREAP. They are planning for ISE also.
Can you help me with the features that are supported on the HREAP + ISE in the current release
Thanks
NikhiL
Hi
It's not very clear about L2, i.e. VLAN. Where and how I need to place VLANs and trunks?
Hi Vinay,
Very good article, thanks! A couple of questions, it will be really nice to have a single Controller/General setting for ISE to get all types of information on WLC attached clients(via AP), as I understand it, even though all clients terminate on the WLC, it cannot do DHCP snooping, will need to specifically add SNMP trap destinations pointing to ISE, and there is no easy way to forward all client http traffic to ISE. It may be nice to be able to integrate the ISE for profiling purposes with the WLC at a central page on the WLC, where all or part of the above are turned on.
Also, the NAC state turn on on the Wlan is that all that is needed to turn on CoA (in addition to AAA override)?
Thanks,
Prakash
it is written :"
In ISE, client will be restricted by pushing ACL , vlan can also be pushed to the client but change of vlan not yet supported for wireless client after posture validation as per wlc 7.0.116.0"
Is that possible in wlc 7.2 ?
good one vinay.
thanks
swap
Its an Amazing Document!!!! Really Helpful!!!
This document is really old. Is it still relevant for ISE 2.X platforms?
RADIUS NAC is not an option in my WLC running code ver 8. The option is now ISE NAC. Also does this document assume you are already using ISE for your clients to authenticate?
Hello All,
recently I have instilled ISE version 2.3.
so far I have configured the ISE upto TACACS,
the questions are, what is next?
do I have to add the domain then client?
Or do I have add AAA?
can someone kindly advice me the process to take or send me the manual documentation please?
Appreciated with any help.
Regards,
Star
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: