3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
Networking Tutorials
Cisco ISE – Identity Services Engine Tutorial The 뇢rst question I am going to answer is “What is Cisco ISE and what does Cisco ISE do?
What is Cisco ISE?
2 Share
1
1
Cisco Identity Services Engine (ISE) is a server based product, either a Cisco ISE appliance or Virtual Machine that enables the creation and enforcement of access polices for endpoint devices connected to a companies network.
What does Cisco ISE do? In simple terms you can control who can access your network and when they do what they can get access to. It can authenticate wired, wireless and vpn users and can scale to millions of endpoints. Based on many factors including the validity of a certi뇢cate, mac address or device pro뇢ling you can identify a machine and determine which vlan that machine is placed into. Any http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
1/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
pro뇢ling you can identify a machine and determine which vlan that machine is placed into. Any devices that do not pass authorisation will be placed into a guest vlan or denied access to the network. All this information is logged and you can instantly get a view of what is connected to your network at any time.
ISE Nodes The ISE solution is made up of a deployment of nodes with three different personas: Policy Administration Node (PAN) Monitoring Node (MnT)
2 Share
Policy Services Node (PAN) pxGrid
1
1
Depending on the size of your deployment all three personas can be run on the same device or spread across multiple devices for redundancy and scalability. Lets go through each persona and explain their function.
Policy Administration Node (PAN)
The Policy Administration Node is where the administrator logs into to con뇢gure policies and make changes to the entire ISE system. Once con뇢gured on the PAN the changes are pushed
out to the policy services nodes. It handles all system related con뇢gurations and can be con뇢gured as standalone, primary or secondary.
Monitoring Node (MnT) http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
2/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
Monitoring Node (MnT)
The Monitoring Node is where all the logs are collected and where report generation occurs. Every event that occurs within the ISE topology is logged to the monitoring node you can then generate reports showing the current status of connected devices and unknown devices on 2 your network.
Share
Policy Services Node (PSN)
1
1
The Policy Services Node is the contact point into the network. Each switch is con뇢gured to query a radius server to get the policy decision to apply to the network port the radius server is the PSN. In larger deployments you use multiple PSN’s to spread the load of all the network requests. The PSN provides network access, posture, guest access, client provisioning, and pro뇢ling services. There must be at least one PSN in a distributed setup.
pxGrid Node
The pxGrid framework is used to exchange context-sensitive information from the CISCO ISE session directory. It allows the ISE system to pass data to other Cisco platforms and third party vendors. This information can then be used to invoke actions to quarantine users or block access in response to network security events. http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
3/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
block access in response to network security events.
ISE Hardware The Cisco Secure Network Server is based on the Cisco UCS C220 Rack Server and is con뇢gured speci뇢cally to support the Cisco Identity Services Engine. Note: The 3415 and 3495 secure network servers are now end of life (eol) and the last date for order for these appliances was October 7 2016. This post will be covering the latest hardware now available which is the 3515 and the 3595 – the 3595 appliance is shown below. 2 Share
1
1
Secure Network Server 3595 There are two versions of the hardware: Secure Network Server 3515 (For small and medium sized deployments) Secure Network Server 3595 (For large deployments – includes redundant hard disks and power supplies) Hardware details taken from cisco data sheet (http://www.cisco.com/c/en/us/products/collateral/security/identity-servicesengine/data_sheet_c78-726524.html)
Product Name
Secure Network Server 351 5
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
Secure Network Server 3595
4/16
3/30/2017
Processor
Cores per Proce ssor Memory
Hard Disk
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
1 – Intel Xeon 2.40 GHz E5-26 20
1 – Intel Xeon 2.60 GHz E5-2640
6
8
16 GB (2 x 8 GB)
64 GB (4 x 16 GB)
1 - 2.5-in. 600-GB 6Gb SAS 10 K RPM
4 - 2.5-in. 600-GB 6Gb SAS 10K RPM 2 Share
Hardware RAID
Network Interfa ces Power Supplies
No
Level 10 Cisco 12G SAS Modular RAID C ontroller
1
1
6 x 1GB
6 x 1GB
1 x 770W
2 x 770W
Endpoints supported for different platforms 3515
3595
Endpoints supported in a standalone con뇢guration
7,500
20,000
Endpoints supported per Policy Services Node
7,500
40,000
How Cisco ISE Works ISE has two different deployment options – Standalone and Distributed
Standalone Deployment http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
5/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
This consists of one node which runs all three personas. This is suitable for a small deployment or lab solution. If you ran a standalone solution on your production network you have no redundancy.
Distributed Deployment Small Network Deployments Medium Network Deployments Large Network Deployments
Small Network Deployment
2 Share
The smallest distributed ISE deployment consists of two Cisco ISE nodes with one node functioning as the primary.
1
The primary node provides all the con뇢guration, authentication and policy functions and the
1
secondary node functions as a backup. The secondary supports the primary in the event of a loss of connectivity between the network devices and the primary.
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
6/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
2 Share
Medium Network Deployment
1
As the size of your network grows or you want to expand your ISE topology you need to start adding more nodes and with a medium sized deployment start dedicating nodes to logging 1 and administration. The medium sized deployment consists of a primary and secondary administration node and a primary and secondary monitoring node, alongside separate policy service nodes.
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
7/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
2 Share
1
1
Large Network Deployment With a large network deployment you dedicate each node to a separate persona. So a separate node (secure network server) for administration, monitoring and policy service. You should also consider using load balancers in front of the PSN nodes. As the number of PSN nodes increases it becomes more of an administrative overhead to ensure even distribution of AAA client con뇢guration. i.e if you have 1000 switches each of them will be con뇢gured to point to a speci뇢c primary and secondary radius server. If all switches point to one radius server (a single PSN node then this single node will take all the load and the other nodes will not be used. Putting a load balancer in front of the PSNs and creating a Radius VIP will ensure all switches can be con뇢gured with a single Radius server
and the load balancer will balance the radius requests between all the PSN’s. This is also very bene뇢cial when performing software upgrades as a single PSN node can be removed from service without any fear of a switch being con뇢gured to have it as it’s primary radius server.
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
8/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
Having a single load balancer does introduce a potential single point of failure so it is highly recommended to deploy two load balancers. The large network deployment also uses a centralised dedicated logging server. One node setup speci뇢cally for logging. This would typically be an appliance with a lot of disk space. A secondary logging appliance would also be con뇢gured but in the 뇢rst instance all logging information will go to a central point.
2 Share
1
1
With the large network deployment you have a dedicated Primary PAN and dedicated secondary PAN. A Primary and Secondary MnT. All logging goes to the primary monitoring appliance. The number of PSN nodes is scaled out depending on the number of devices on the network. Typically allow 7,500 devices per PSN plus 2 more for redundancy. Due the standard con뇢guration on switches where most radius servers will be con뇢gured as primary / secondary there is a big potential for all devices to only talk to a single PSN loading it very heavily. To overcome this it is a best practice to introduce a load balancer and ideally a redundant pair which will provide a single virtual IP for the Radius Server. http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
9/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
redundant pair which will provide a single virtual IP for the Radius Server. The load balancers will load balance the requests to all the PSN nodes. This also is very bene뇢cial for software updates on the PSN nodes which do happen quite frequently. For a software update you just take a single PSN node out of the cluster and perform the upgrade. All administration is handled on the primary PAN and in the event of a failure would move over to the secondary which contains a replicated database. Cisco ISE 2.2 is the current version at the time of writing and will be used for all information below.
2 Share
Cisco ISE Licensing I will try to simplify the license model below but all the information from Cisco can be found here in the 2.1 admin guide license section
1
1
(http://www.cisco.com/c/en/us/td/docs/security/ise/21/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_0110.html)
The Cisco ISE licensing model allows you to purchase licenee based on your enterprise needs. There are two ways of consuming licenses. Traditional or Smart. Traditional licensing is where you import a license onto the appliance Smart licensing is where you manage a cisco account that holds all the information on the license purchased for your deployment. Licenses are counted against concurrent, active sessions. An active session is one for which a RADIUS Accounting Start is received but RADIUS Accounting Stop has not yet been received. The valid license options are:
ISE Base only ISE Base and Plus ISE Base and Apex ISE Base, Plus, and Apex http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
10/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
ISE Base, Plus, and Apex ISE Base, Plus, Apex and AnyConnect Apex
Base License The base license is a perpetual license and is the only requirement for AAA and IEEE802.1x and also covers guest services and Trustsec. A base license is consumed for every active device on the network.
Base and Plus A plus license is required for Bring Your Own Device (BYOD), Pro뇢ling, Adaptive Network 2 Control (ANC) and PxGrid. A base license is required to install the plus license and the plusShare
license is a subscription for 1,3 or 5 years. 1
Base and Apex 1
The Apex license is the same as the plus license in that it is a 1,3,5 year subscription, requires the base license but is used for Third Party Mobile Device Management & Posture Compliance.
Device Administration There is a device administration license required for TACACS which is a perpetual license, a base license is required to install the device administration license and you only require one license per deployment.
Evaluation An evaluation license covers 100 nodes and provide full Cisco ISE functionality for 90 days. All Cisco ISE appliances are supplied with an evaluation license.
Cisco ISE Questions WHAT IS TRUSTSEC? The ultimate goal in idea of Trustec is to assign a TAG or Security Group Tag SGT to the users or devices traf뇢c at the ingress point to the network. And then to apply restrictions or permit the traf뇢c at other parts of the network based on this tag. http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
11/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
the traf뇢c at other parts of the network based on this tag.
Simplify Network Segmentation with Cisco TrustSec
2 Share
1
1
DOES CISCO ISE SUPPORT TACACS? As of version 2.0 (http://www.cisco.com/c/en/us/td/docs/security/ise/20/release_notes/ise20_rn.html)Cisco ISE now supports TACACS+ Up until this point the defacto TACACs+ server was ACS, but with this feature now available in ISE the migration of TACACS+ services has enabled network engineers to centralise all network authentications within one framework. Device admin is not enabled by default, to enable it go to:
Administration / Deployment / Node Name / Enable Device Admin Service This service should be enabled on the PSNs
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
12/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
WHAT IS CISCO ISE PROFILING? The pro뇢ling service allows the identity services engine to pro뇢le devices connected to the network and give them an identity based on numerous factors. These devices can then be granted access or denied access to the network based on the security policies. A typical network deployment would start by putting ISE into monitor mode. In monitor mode no enforcement takes place but the ISE administrator can start to see what devices are connecting to the network and what identity it has been given. During this phase a lot of devices are normally discovered that the network administrator did not even know were connected to the network.
2 Share
That is though the whole point of NAC to have a complete picture of all devices that are connected to your network and to be in complete control of their access.
1
What is Mac Authentication Bypass?
1
MAC Authentication Bypass (MAB) is a way to give a whitelist to certain network devices. If you know the MAC address of a certain device you know should get access to your network you can grant it access purely by it’s MAC address. This is used for devices that cannot have certi뇢cates loaded on them or are hard to pro뇢le.
CISCO ISE VS ACS I get a lot of questions about the differences between ISE and ACS. In simple terms ISE is the next generation of network authentication and is so much more powerful than ACS. ACS is used to authenticate users to network devices and for VPN sessions but it is not a NAC solution. If you want to implement full network access control you need ISE. The of뇢cial Cisco ISE pages on cisco.com (http://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html) I hope this information has been a bene뇢t to starting to learn the concepts of the Cisco Identity Services Engine. For more in depth posts on con뇢guring and deploying ISE – Check out my Cisco ISE Training pages.
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
13/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
Cisco ISE Ordering Guide There is a very good PDF document entitled the Cisco ISE Ordering guide which can be downloaded here (http://www.cisco.com/c/dam/en/us/products/collateral/security/identityservices-engine/guide_c07-656177.pdf)this steps you through all the appliances, licenses and numbers required for placing an order for an ISE appliance. There is a also a lot of learning material on this .Learning resources on cisco.com (http://www.rogerperkin.co.uk/security/ise/cisco-ise-identity-services-engine-tutorial/)
2 Share
1
1
Roger Perkin - CCIE #50038 is based in the UK. Read about Rogers' CCIE Journey here "My CCIE Journey." (http://www.rogerperkin.co.uk/ccie/my-ccie-journey/) You can read more about who Roger is here About Roger. (http://www.rogerperkin.co.uk/about/) Feel free to Send Roger a message here (http://www.rogerperkin.co.uk/contact/) Follow Roger on Twitter (https://twitter.com/rogernperkin) -- Google Plus (https://plus.google.com/u/0/+RogerPerkin/posts) and on Linkedin (http://www.linkedin.com/in/rogerperkin)
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
14/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
Comments Ayele says March 29, 2017 at 7:54 am (http://www.rogerperkin.co.uk/security/ise/cisco-ise-identity-servicesengine-tutorial/#comment-39315) It is really interesting and helpful. Thank you for taking the time to publish this Reply (http://www.rogerperkin.co.uk/security/ise/cisco-ise-identity-services-engine-tutorial/? replytocom=39315#respond)
2 Share
1
1
(http://www.rogerperkin.co.uk/ccie/the-ccie-blueprint-ebook/)
(http://www.rogerperkin.co.uk/ccie/the-ccie-blueprint-ebook/) NETWORK ENGINEER RESOURCES Software Upgrade Guides (http://www.rogerperkin.c o.uk/software-upgradeguides/) Bluetooth Console Cable (http://www.rogerperkin.c
ANSIBLE
CCIE
Cisco Router Backup with
Are CCIE Bootcamps
Ansible
Worth it?
(http://www.rogerperkin.c
(http://www.rogerperkin.c
o.uk/network-
o.uk/ccie/are-ccie-
automation/ansible-
bootcamps-worth-it/)
tutorial-network-
Hi! My name is Roger and
engineers/)
I’m the guy behind rogerperkin.co.uk. I passed my CCIE in
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
15/16
3/30/2017
Cisco ISE > Identity Services Engine Tutorial > Starting with the Basics
o.uk/network-
Routing & Switching in
tools/airconsole-2-0-
August 2015 and this blog
bluetooth-console-cable/)
was setup to aid my study. It is now the home to my ramblings on all things networking. More About Roger (http://www.rogerperkin.c o.uk/about)
Disclaimer (http://www.rogerperkin.co.uk/disclaimer/) | Privacy Policy (http://www.rogerperkin.co.uk/privacy-policy/) | Copyright rogerperkin.co.uk 2015 2 Share
1
1
http://www.rogerperkin.co.uk/security/ise/ciscoiseidentityservicesenginetutorial/
16/16