How-To Firepower ISE PxGrid
How-To Firepower ISE PxGrid
How-To Firepower ISE PxGrid
Table of Contents
About this Document ...................................................................................................................................................... 4
Solution Introduction Cisco Management Center 6.0 with TrustSec using pxGrid with ISE .................................... 5
Cisco Firepower Management Center 6.0 .................................................................................................. 5
Cisco TrustSec ........................................................................................................................................... 5
Cisco Identity Service Engine (ISE) ........................................................................................................... 6
Cisco pxGrid............................................................................................................................................... 6
Technical Overview......................................................................................................................................................... 7
Cisco Identity Service Engine Dynamic Security Group Tags .................................................................................... 9
Self-Signed Certificate Operation ................................................................................................................................ 10
Configuring ISE 2.0 .................................................................................................................................. 10
Creating Firepower ISE Realm................................................................................................................. 11
Configuring Firepower Management Center 6.0 ...................................................................................... 13
Configuring Firepower ISE Identity Sources............................................................................................. 20
CA (Certificate Authority)- Signed Certificate Operation ........................................................................................... 22
Customized pxGrid template for CA-signed operation ............................................................................. 22
Configuring ISE 2.0 .................................................................................................................................. 27
Creating Firepower ISE Realm................................................................................................................. 34
Configuring Firepower Management Center 6.0 ...................................................................................... 36
ISE Identity Sources CA-Signed Certificate Configuration ....................................................................... 39
Firepower Management Center .................................................................................................................................... 42
Enabling Network Discovery .................................................................................................................... 42
ISE Identity Policy .................................................................................................................................... 42
Default Access Control Policy .................................................................................................................. 43
Adding ISE Identity Policy.................................................................................................................. 43
Transport/Network Layer Preprocessor Settings ............................................................................... 44
Adding Block Response Page ........................................................................................................... 45
Create Employee SGT tag Access Control rules ............................................................................... 46
Firepower pxGrid Intrusion Policy ............................................................................................................ 48
Testing User with Employee SGT via Firepower Virtual Sensor ............................................................................... 54
ASA with Firepower Services....................................................................................................................................... 60
Using centralized Firepower Management Center Policy ......................................................................... 60
ASA Firepower (sfr) Installation and registering to Firepower Management Center .......................... 60
Testing User with Employee SGT from managed Firepower Management Policy............................. 62
On-Box Firepower Policy Management .................................................................................................... 64
Delete the ASA from the Firepower Management Center 6.0 ............................................................ 64
ISE Realm Configuration ................................................................................................................... 64
ISE Identity Sources Configuration .................................................................................................... 66
ISE Identity Policy .............................................................................................................................. 67
Adding ISE Identity Policy.................................................................................................................. 68
Transport/Network Layer Preprocessor Settings...................................................................................... 68
Adding Block Response Page .................................................................................................................. 69
ASA Create Employee SGT tag Access Control rules ............................................................................. 69
ASA Firepower pxGrid Intrusion Policy .................................................................................................... 72
Testing User Employee SGT using On-box Firepower Management Policy ............................................................ 75
Troubleshooting ............................................................................................................................................................ 81
ISE pxGrid node ....................................................................................................................................... 81
pxGrid published nodes do not appear and there is no pxGrid connectivity ...................................... 81
Firepower Management Center 6.0.......................................................................................................... 81
System Integration ISE certificate test fails ........................................................................................ 81
Not Seeing Correlation Events from ISE ............................................................................................ 81
ASA with Firepower Services ................................................................................................................... 81
Cannot Modify registered ASA device parameters on Firepower Management Center ..................... 81
SFR is still in the recovery state......................................................................................................... 82
No traffic on ASA Firepower reports .................................................................................................. 82
Solution Caveats ........................................................................................................................................................... 85
pxGrid & Identity mapping service restart ................................................................................................ 85
Active pxGrid node is not reflected in the GUI; It is reflected in CLI ......................................................... 85
References 87
Cisco TrustSec
Security Group Tags (SGT) are part of the Cisco TrustSec solution. SGTs are defined in ISE and applied at ingress
(inbound to the network). SGTs can represent a grouping of users, endpoint devices, line of business, etc. SGTs can
then be applied to a network access policy and used by network devices to make forwarding decisions and share access
control policies across the network infrastructure. A SGT is a unique 16-bit security group number assigned to a
security group. Security groups can also have descriptive naming.
SGTs are defined and implemented as authorization profiles in an ISE authorization policy consisting of condition
rules defining an organizations security policy.
SGTs can make an organization’s security policy uniform or global across the network.
In this document, an ISE authorization policy will be created such that all successfully authenticated end-users
belonging to the /users/domain Windows group will receive an employee SGT. This employee SGT will be used in a
Cisco Firepower managed access control rule policy denying access to streaming media, peer-to-peer applications,
hacking, malware sites, and gambling categories.
Cisco pxGrid
Cisco (Platform Exchange Grid) pxGrid enables multivendor, cross platform network system collaboration among
parts of the IT infrastructure such as security monitoring and detection system, network policy platforms, asset and
virtually configuration management, identity and access management platforms, and virtually and other IT operations
platform.
When business or operational needs arise, Cisco’s Security Solutions such as Firepower Management Center 6.0 and
ecosystem partners can use pxGrid to exchange contextual information via a publish/subscribe method.
Technical Overview
Cisco Firepower Management Center 6.0 will register as a pxGrid client to the ISE pxGrid node and subscribe to ISE
published topics or capabilities to receive ISE session information. This session information includes: Security Group
Tags (SGT), endpoint profile device information, endpoint location to be used in Firepower Management Center’s 6.0
access control roles.
• TrustsecMetadata information which exposes the security group tag umber and description
• SessionDirectory exposes the authenticated use session attribute information such as the username and device
information
Active user sessions bulk downloads occur upon Cisco Firepower Management Center startup or reboots. Bulk
downloads of session information is downloaded from the ISE MNT node via the ISE RESTful API. This session
information includes: username, IP address, SGT, endpoint profile. If there are any updates such as recently
authenticated ISE users, or modifications of existing SGT, these changes will occur in real-time due to the Cisco
Firepower Management Center’s topic subscription:
The ISE session information from ISE can be seen under the Firepower Management Center’s user activity screen.
Please note that only IEEE 802.1X user authentication usernames from ISE can be applied to a FMC 6.0 policy and
must exist in the Firepower ISE realm. IEEE 802.1X machine authentication hostnames, or MAC address usernames
cannot by applied to the FMC 6.0 policy.
Step 2 Select OK
Step 3 Select Add Directory, enter the FQDN hostname or information
Step 4 Select Test, you should see that the: Test Connection has succeeded, select OK
Note: If you see a returned failed attempt, ensure that the directory username and directory password are correct in the Realm Configuration.
Step 5 Select OK
Step 6 Select Save
Step 5 Enter encryption password, select OK. In this example, cisco123 was used
Step 7 Rename the .p12 filename to make it easier to work with. In this example, fmc60.p12 was the renamed file.
Step 8 Use WinSCP or another method to upload the file to the Firepower Management Console
Step 10 Convert the .p12 file into CER and KEY files, by typing the following commands:
Note: the CER and KEY filenames are random. The original.p12 file was renamed to fmc60.p12. Initially you will be prompted for the sudo
password. The import password, PEM passphrase will be the encryption key password you typed in earlier.
Step 11 WinSCP was used to copy the fmc60.cer and fmc60.key files from the Firepower Management Center to
the local PC.
Step 12 The Firepower Management internal CA public certificate was exported into the ISE certificate trust store
Select->Administration->System->Certificates->Trusted Certificates->Browse and upload fmc60.cer
Note: The file will be saved as Defaultserversignedcerti.zip file. Unzip the file and export only the public certificate the PEM file to the FMC trusted
store. You can also rename the file to ISE2.0.pem to make it easier to work with.
Step 16 Import the ISE self-signed identity cert into the Firepower Management trusted CA store
Select Objects->Object Management->PKI->Trusted CAs->Add Trusted CA->enter the name. In this
example, ISE was used.
Enter the encryption key password for ISE ->OK
Step 17 Import the Firepower Management internal CA public/private key pair into the Firepower Management
Center’s Internal Certs store
Select Objects->PKI->Internal Certs->Add Internal Cert
Follow the same procedure for the private key
Note: Delete Bag Attributes until you get to ----Begin Certificates
Step 18 Delete the Bag attributes for the key file until you are just before “---Begin….”
Step 3 Select OK
Step 4 Select Save
Step 5 Select System->Monitoring->Syslog
Note the FMC has successfully connected to the ISE server
Step 9 Enter name of certificate template, uncheck “Publish certificate in Active Directory”, and provide validity
period and renewal period.
Step 2 Copy/paste the CSR information into Request a certificate->Advanced certificate request selecting the
customized pxGrid template, then Submit
Step 4 Upload the CA root into the ISE certificate trusted system store
Select->Administration->System->Certificates->Trusted Certificates->upload the CA root certificate
Step 6 Upload the ISE pxGrid node certificate into the ISE certificate system store
Select Administration->System-Certificate Signing Requests and Bind certificate to the CSR request
Step 9 Select DNS name for the Subject Alternative Name (SAN) and add the DNS name
Step 13 Paste into Request a Certificate->Advanced Certificate Request, select customized pxGrid template-
>Submit
Step 25 You will see that the system will be restarting and will take you back to the GUI
Note: This may take a few seconds to appear, verify that the pxGrid services are initializing by running “sh application status ise” on the ISE VM
Step 2 Select OK
Step 3 Select Add Directory, enter the FQDN hostname or information
Step 4 Select Test, you should see that the: Test Connection has succeeded, select OK
Note: If you see a returned failed attempt, ensure that the directory username and directory password are correct in the Realm Configuration.
Step 5 Select OK
Step 6 Select Save
Step 3 Use WinSCP to copy sourcefire.csr and sourcefire.key file from the Firepower Management Center (FMC)
locally to the PC
Step 4 Open the CSR request using editor copy the CSR request
Step 5 Paste FMC CSR request into Request a certificate->Advanced User request using the customized pxGrid
template, then submit. Download the certificate in base-64 encoded format
Step 9 Upload the CA root cert into the Firepower Management trusted CA store
Select Objects->PKI->Trusted CAs->Add Trusted CA-> provide a name and upload root CA cert,
then Save
Step 10 Upload the Firepower Management center public certificate and private key to the FMC internal cert store
Select Objects->PKI->Internal Certs->add the Sourcefire CER file and Sourcefire KEY files and
password, then Save
Step 4 You should see the following on the ISE pxGrid node
Select Administration->pxGrid Services
The FMC has successfully registered to the ISE pxGrid node and subscribed to the EndPointProfileMetada,
SessionDirectory and TrustsecMetaData capabilities.
Step 2 Click None -> Identity Policy select ISE from the drop-down menu
Step 1 Select HTTP Responses, and provide the following settings for the response pages
Step 2 Select->Add Rule, enter name: Deny Employee SGT Access->action->Block->IPS->pxGrid intrusion
policy->URLs->Category>Gambling, Peer-to-Peer, Streaming Video, Hacking->Add to Rule
Step 3 Select ISE Attributes->Available ISE session attributes->Security Group Tag->Available Metadata-
>Employees->Add to rule
Step 5 Select OK
You should see the following
Step 8 Click on , to see Task Status, and verify that the operation has succeeded.
Step 4 Click on Rules->filter: iis cmd exe and select the following
Step 6 Next filter on: win gen buffer overflow and select->OS-Windows Generic Hyperlink BufferOverflow
Attempt
Step 16 Under Default actions, from the dropdown select the pxGrid_Intrusion_Policy
You should see the following
Note: you may be prompted to add access control policies. These will be added later on based on the Employee SGT
Step 18 Edit the SGT Access control policy to include the pxGrid Intrusion Policy
Firepower Management Center 6.0 obtains the ISE session information and displays the information in the User
Activity Screen
Note the ISE session attributes: username, security group tag, endpoint profile and endpoint location. The security
group tag attribute was used to create a FMC access control policy.
The end-user opens their browser and accesses poker.com. Note the blocked transaction and the Firepower
Management Center displayed page.
The end-user inserts cmd.exe into the website to simulate a compromised web server and is denied access
Just to prove that all is well. The end-user can access a valid website
When the end-user attempts to join the hacking club he is denied access
On the Firepower Management Center Access Controlled User Statistics Dashboard, you can view the denied
connections from the user iskiber
If you click on denied connections by iskiber, note the denied URL categories. These denied categories represent the
URL categories as defined in the “Deny Employee SGT Access” Firepower Management Center’s access control rule
- On-Box managed Firepower pxGrid Intrusion policy and Employee SGT access control rile.
Step 3 Turn on debugging, this will make it easier if error messages occur
ciscoasa# sh debug
ciscoasa# debug module
Step 5 Wait approximately 5-15 minutes for the ASA Firepower to boot up, open a console session to the now-
running ASA Firepower boot image. You may press enter a couple of times and type the following
Step 6 Install the software system image using the system install command, ftp was used in the following
example:
The system will go down for a reboot when complete. This may take awhile for sfr to come up; it may take
longer than 30 minutes as was the case with my ASA 5506. Check by typing the following
sh module sfr
You should see the module as up, if it is still in the recover state, the module is still installing
Step 8 Read and accept the EULA and complete the system configuration
Step 9 Add the ASA Firepower services to the Firepower Management 6.0
> configure manager add (ip address of Cisco Firepower Management Console) password
Step 10 Ensure that you have the proper licenses installed for the ASA
Step 11 Add ASA Firepower device to the Firepower Management Center 6.0 and enter the device information and
enable the license
Select Devices->Device Management->Add->Add Device
Step 13 After the ASA Firepower has successfully registered you should see the following:
Testing User with Employee SGT from managed Firepower Management Policy
Here we test the FMC 6.0 policy we created for an end-user tagged as employee. The end-user is tagged as having an
Employee SGT after a successful 802.1X authentication based on the ISE authorization policy.
The end-user opens their browser and accesses www.youtube.com and is denied access
On the Firepower Management Center, s elect Analysis->Connection->Events to see the details of blocked
transactions
On Firepower Management center, select Overview->Dashboards->Access Controlled User Statistics and click on
Denied Connections by User for pxGrid
Step 6 Click User Download->enable Download users and groups->Download Now->Add to Include
Step 2 Select Identity Services Engine, and provide the ISE pxGrid configuration below:
Note: Please provide the proper certificate information for self-signed or CA-signed certificates
Step 3 Select Test, to verify connectivity to the ISE pxGrid node, you should see
Step 4 You should see that the ASA Firepower has successfully registered as a pxGrid client
Select Administration->pxGrid Services
Step 2 Select ASA Firepower->Add Rule->Identity Policy->None, select Default Identity Policy from the
drop-down
Step 3 Select OK
Step 4 Click Store ASA Firepower Changes
Step 2 Select OK
Step 2 Select Add Rule, enter name: Deny Employee SGT Access->action->Block with reset->IPS->pxGrid
intrusion policy->URLs->Category>Gambling, Peer-to-Peer, Streaming Video, Hacking->Save
Step 3 Select ISE Attributes->Available ISE session attributes->Security Group Tag->Available Metadata-
>Employees->Add to rule
Step 5 Click on Rules->filter: iis cmd exe and select the following
Step 7 Next filter on: win gen buffer overflow and select->OS-Windows Generic Hyperlink BufferOverflow
Attempt
Step 15 Click OK
Step 16 Click Store ASA Firepower Changes
Step 17 Click Deploy->Deploy Firepower Changes->Deploy->OK
Step 18 Click Monitoring->ASA Firepower Monitoring->Task to view the deployment status
We see that Firepower Management Center has obtained the user session
When the employee tries to join a hacking club www. hackersonlineclub.com he is denied
Also when he tries to insert www.msn.com/cmd.exe into his browser, he is denied access.
You can view the report on the ASA Firepower Reporting. Note the denied web category transactions and the server
IIS- Web signature that fired.
If you click under Threat reports note the signature for SERVER-IIS
You will see the top transactions, web categories, and applications
Troubleshooting
ISE pxGrid Node
pxGrid published nodes do not appear and there is no pxGrid connectivity
• If using self-signed certs with ISE 1.3/1.4, make sure that you have export the ISE self-signed Identity
certificate into the ISE system trusted store, before enabling pxGrid.
• If use CA-signed certs ensure that the customized pxGrid template has an EKU of both server authentication
an client authentication, before enabling pxGrid
• If deploying pxGrid in a productional environment and the dedicated ISE pxGrid node has its public/private
key pair imported into the PPAN and PMNT nodes. If pxGrid-Active Standby is implemented, the secondary
pxGrid nodes should have a public/private key imported into the secondary SPAN and secondary SMNT
nodes.
Only on pxGrid node can be active, run application status ise to ensure that the ISE pxGrid node is the active
one.
• power down/up ISE Run application stop ise/application start ise. You may also disable pxGrid from the
ISE node, before stopping the ISE service; Once ISE is back up enable for pxGrid.
• Downloaded certificates should be in base 64 encoded format
ciscoasa# conf t
ciscoasa(config)# sh run policy-map
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class class-default
ciscoasa(config-pmap-c)# sfr fail-open
ciscoasa(config-pmap-c)#
ciscoasa(config-pmap-c)# sh service-policy
Global policy:
Service-policy: global_policy
Class-map: inspection_default
Inspect: dns preset_dns_map, packet 5531, lock fail 0, drop 0, reset-drop 0, 5-min-
Global policy:
Service-policy: global_policy
Class-map: class-default
SFR: card status Up, mode fail-open
packet input 264, packet output 264, drop 0, reset-drop 0
ciscoasa(config-pmap-c)# sh service-policy sfr
Global policy:
Service-policy: global_policy
Class-map: class-default
SFR: card status Up, mode fail-open
packet input 290, packet output 290, drop 0, reset-drop 0
ciscoasa(config-pmap-c)#
Solution Caveats
pxGrid & Identity Mapping Service Restart
Description: pxGrid & Identity mapping service restart on ISE pxGrid node when ever a cert is imported/deleted from
the trust store of ISE deployment
Defect filed: CSCuv43145
Work around: None needed as the service will be automatically restarted but while the service is in the restart state
new quarantine events will not be processed.
Resolution plan: ISE Carlsbad release spring 2016
References
Configuring pxGrid in a Distributed ISE Environment:
http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-88-Configuring-pxGrid-in-an-ISE-Distributed-
Environment.pdf
How-To Deploying Certificates with Cisco pxGrid: Configuring CA-Signed ISE pxGrid Node and CA-Signed pxGrid
client: http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-89-
CA_signed_pxGridISEnode_CAsigned_pxGridclient.pdf
How-To Deploying Certificates with Cisco pxGrid: Self-Signed Certs with ISE pxGrid Node and pxGrid client:
http://www.cisco.com/c/dam/en/us/td/docs/security/ise/how_to/HowTo-90-
Self_signed_pxGridClient_selfsigned_pxGrid.pdf
Cisco Firepower Management Center 6.0 Configuration Guide
http://www.cisco.com/c/en/us/td/docs/security/Firepower/60/configuration/guide/fpmc-config-guide-v60.html