3P ISE Study Deployment
3P ISE Study Deployment
3P ISE Study Deployment
#CiscoLive BRKSEC-2091 2
Cisco Webex App
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this BRKSEC-2091 in the Cisco Live Mobile App
3 Install the Webex App or go directly to the Webex space Enter your personal notes here
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Webex Space for Q&A
https://ciscolive.ciscoevents.com
/ciscolivebot/#BRKSEC-2091
#CiscoLive BRKSEC-2091
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 4
Join at
slido.com
#BRKSEC-2091
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
A Word About Myself
Pavan Gupta
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
‣Never assume trust
Zero Trust
principles ‣Always verify
‣Enforce least privilege
BRKSEC-2091 7
Cisco Secure Zero Trust
A comprehensive approach to securing all access across your
people, applications, and environments.
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
ISE Releases at Glance Latest
Future
Latest Suggested
3.3
EOL/EOS
Suggested 3.2
Future Release 3.1
3.0
2.7
2.6
2.4
2.3
2.2
2.1
2.0
Jan May Jan Jul Mar Feb Nov Sep Aug Oct Jul
2015 2016 2017 2017 2018 2019 2019 2020 2021 2022 2023
Time
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Why ISE? ISE 3.X UI navigation and UX was revamped. The Navigation is aligned with other cisco products to give
Enhanced UX same kind of experience across all cisco products.
TACACS+ Migrating from Cisco Secure ACS or building a new Device Administration Policy Server, this
Device Administration allows for secure, identity-based access to the network devices
Allow wired, wireless, or VPN access to network resources based upon the identity of the
Secure Access user and/or endpoint. Use RADIUS with 802.1X, MAB, Easy Connect, or Passive ID
Differentiate between Corporate and Guest users and devices. Choose from Hotspot, Self-Registered
Guest Access Guest, and Sponsored Guest access options
Use the probes in ISE and Cisco network devices to classify endpoints and authorize them
Asset Visibility appropriately with Device Profiling. Automate access for many different IoT devices
pxGrid is an ecosystem that allows any application or vendor to integrate with ISE for endpoint identity and
Context Exchange context to increase Network Visibility and facilitate automated Enforcement.
ISE Segmentation
Group-based Policy allows for segmentation of the network through the use of Scalable Group Tags
(SGT) and Scalable Group ACLs (SGACL) instead of VLAN/ACL segmentation.
ISE integrates with DNA Center to automate the network fabric and enforces the policies throughout the
Cisco SDA/DNAC entire network infrastructure using Software-Defined Access (SDA)
Allow employees to use their own devices to access network resources by registering their device and
BYOD downloading certificates for authentication through a simple onboarding process
Using a Threat Analysis tool, such as Cisco Cognitive Threat Analytics, to grade an endpoints threat score
Threat Containment and allow network access based upon the results
Finally, ISE provides enhanced reporting capabilities inhouse for better operations and reporting purposes.
Enhanced Reporting Cisco ISE provides you log analytics and infrastructure monitoring and connecting to operational DB and
create your dashboards
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Deploying any Network Access Control
requires proper Design, Planning and
phased approach.
Cisco ISE Deployment
ISE Deployment
Supported Platforms
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
ISE 3.X Platforms – At Glance 3.0 3.1 3.2
Cisco SNS 3615 Cisco SNS 3615 Cisco SNS 3715 Cisco SNS 3615 Cisco SNS 3715
Cisco SNS 3655 Cisco SNS 3655 Cisco SNS 3755 Cisco SNS 3655 Cisco SNS 3755
Cisco SNS 3695 Cisco SNS 3695 Cisco SNS 3795 Cisco SNS 3695 Cisco SNS 3795
Virtual
Natively in AWS
Cloud
Natively in AWS
Natively in Azure
Natively in OCI
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Free, 90-day ISE Evaluation License
Premier
Advantage
100 x
Essentials
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Which ISE Version are
you using?
Join at slido.com
#BRKSEC-2091
ISE Deployment
Personas
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
ISE Personas Max 2 Max 2
Policy Administration Node (PAN) Monitoring & Troubleshooting Node (MNT)
• Administrative GUI • Receives logs from all nodes
• Policy configuration • Handles remote logging targets
• Policy replication • Generates summary Dashboard Views
• Deployment Management • Performs scheduled reports
• Configuration REST APIs • Handles reporting and operations
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
ISE Deployment Scale
No. of Endpoints Support - Deployment Wise Large
cs.co/ise-scale <=50: PSNs + <= 4 PXGs)
Medium
Lab and Small
Evaluation
1 x (PAN + MNT + PSN + PXG) 2 x (PAN+MNT+PSN) 2 x (PAN+MNT+PXG), <= 6 PSN 2 PAN, 2 MNT, <=50: PSNs + <= 4 PXGs
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
ISE Deployment
Standalone
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
ISE Deployment – Standalone
ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
ISE Deployment
Small
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
ISE Deployment - Small
ISE ISE
ISE
2 x (PAN+MNT+PSN+PXG) + 1 x PSN/PXG
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
ISE Small Deployment Scale
cs.co/ise-scale
ISE ISE
ISE
Deployment
Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
Scale
3615 3715 3595 3655 3755 3695 3795
(PAN/MnT)
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
ISE Deployment
Configuring ISE Small Deployment – Primary Node
ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
ISE Small Deployment
Configuring ISE Small Deployment
Primary Secondary
ISE ISE
PPAN SPAN
SMNT PMNT
ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
ISE Deployment
Medium
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
ISE Deployment: Medium
ISE ISE
ISE ISE
Deployment
Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
Scale
3615 3715 3595 3655 3755 3695 3795
(PAN/MnT)
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
ISE Medium Deployment
Small to Medium Deployment Transition
From Small to Medium
ISE ISE
ISE
Small
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
ISE Medium Deployment
Small to Medium Deployment Transition(Contd.)
ISE ISE
ISE
ISE ISE
ISE ISE
ISE ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
ISE Deployment: Large 2 PAN, 2 MNT, <=50: PSNs + <= 4 PXGs
ISE ISE ISE ISE ISE ISE ISE ISE ISE ISE
ISE ISE ISE ISE ISE ISE ISE ISE ISE ISE
ISE ISE ISE ISE ISE ISE ISE ISE ISE ISE
ISE ISE ISE ISE ISE ISE ISE ISE ISE ISE
ISE ISE ISE ISE ISE ISE ISE ISE ISE ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
ISE Large Deployment Scale 2 PAN, 2 MNT, <=50: PSNs + <= 4 PXGs
cs.co/ise-scale
Deployment
Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
Scale
3615 3715 3595 3655 3755 3695 3795
(PAN/MnT)
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
ISE Deployment Scale <=50: PSNs + <= 4 PXGs)
Deployment Cisco SNS 3615 Cisco SNS 3715 Cisco SNS 3595 Cisco SNS 3655 Cisco SNS 3755 Cisco SNS 3695 Cisco SNS 3795
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
ISE Deployment
Centralized or Distributed
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Large Deployment: Centralized or Distributed
DC1 DC2
Primary PAN & MNT Secondary PAN &
MNT
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
ISE Deployment
Services
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
ISE Node Services Partner Eco System
External ID Stores
SIEM, MDM, NBA, IPS, IPAM, etc.
Admin
SIEM
Configure
Context (pxGrid)
RADIUS, TACACS+,
Profiling, etc.,
*PSNs can optionally be behind a load-balancer and can be accessed via Load Balancer Virtual IP address (VIPs)
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
ISE Deployment
Automation
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
3.1
ISE Policy Management & Lifecycle Orchestration
P1 P1
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Which Cisco ISE Services
do you use?
Join at slido.com
#BRKSEC-2091
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
ISE Capabilities
Device Administration
Secure Access
Guest Access
Asset Visibility
Compliance & Posture
Context Exchange
ISE
Segmentation
Cisco SDA/DNAC
BYOD
Threat Containment
Enhanced Reporting
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Everyone Has Different Needs
Government Financials Healthcare Retail Education
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Cisco ISE High Level Design (HLD)
cs.co/ise-hld
Business Objectives
Environment
Scenarios
Policy Details
Operations & Management
Scale & High Availability
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
A Typical Customer Journey
No standard or required approach - each use case may be the end goal
Use Case
Visibility Visibility
Customer Corporate
Start with Secure Wired See Apps & Use SGTs for Integrate with
Wireless Access HW inventory segmentation eco-system
partners
Non-disruptive 802.1X / MAB Enforce system Enforce Group
due to SSIDs (with Profiling) compliance based policies Contain threats
BYOD
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Default Network Device Groups (NDGs)
Default NDGs
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Organizing Your Network Devices by Groups
Network Access Type Location
• Wired • Theaters
• Wireless • Country
• VPN • City
• Branch • Building / Floor /
Room
Organization
• Regions
ISE Vendor / Model
• Cisco
• Line of Business • Catalyst
• Departments • Meraki
• IT / OT • Aruba
• Juniper
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
CWA (Guest)
Azure
Directory
NSP (BYOD)
Feed Server
CPP (Posture)
MDM
Sponsor/Mydevices
802.1X
Log Server
pxGrid Clients
ISE Certificate architecture #CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
ISE Certificates
ISE
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
CWA (Guest)
Azure
Directory
NSP (BYOD)
Feed Server
CPP (Posture)
MDM
Sponsor/Mydevices
802.1X
Log Server
pxGrid Clients
ISE Certificate architecture #CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
CWA (Guest)
Azure
Directory
NSP (BYOD)
Feed Server
CPP (Posture)
MDM
Sponsor/Mydevices
802.1X
Log Server
pxGrid Clients
ISE Certificate architecture #CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Access Control Context
Who … is requesting access?
What … is their role, profile, compliance?
Where … are they attempting access from?
When … are they allowed access?
Why … are they allowed access?
How … much access are they allowed?
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Policy Sets Conditions
• HQ
• Regions • Branch
• Line of Business • Cisco Catalyst
• Departments • Cisco Meraki
• IT / OT • Aruba
• Vendor Specific Attributes
Type
• Flow-Type
• Theaters • SSID
• Country • Calling-Station-ID
• City Location RADIUS • NAS-IP-Address
• Building/Floor/Room • NAS-ID
• NAS-Port-ID
Medium
• NAS-Port-Type
• Service-Type
• SSID
• Access-hours • WLAN ID
• Tunnel-Group-name • NAS-Port-ID
• Client-type • Access point
• Wired • Interface
• Wireless
• VPN
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Example ISE Policy Sets
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
ISE Policy evaluation NAD Evaluation
Policy sets
Policy
Pass evaluation
set
based on
conditions match
RADIUS failed
Access-Request PSN
Request Drop
▿ RADIUS Protocol
Code: Access-Request (1)
Packet identifier: x0 (0)
Length: 153
▿RADIUS Protocol
Authenticator:29eb293b3a40ea740a8fd33bdb18f1d7
Code: Access-Accept (2)
▿Attribute Value Pairs
Packet identifier: Oxd (13)
› AVP: t=User-Name (1) 1=8 val=pavan Send RADIUS
Length: 428
› AVP: t=NAS-IP-Address(4) (=6 val=6.86.227.108 Access-Accept
Authenticator: 66403608336c3e77859116d46cd0d65f
› AVP: t=Calling-Station-Id(31) 1=19 val=02-00-00-00-00-01
[This is a response to a request in frame 34891 using authz profile
› AVP: t=Called-Station-Id(30) 1=27 val=2C-3F-0B-56-E3-6C: Employee
[Time from request: 0.011658000 seconds]
› AVP: t=Framed-MTU(12) (=6 val=1400
▿Attribute Value Pairs
› AVP: t=NAS-Port-Type(61) (=6 val=Wireless-802.11(19)
› AVP: t=User-Name (1) 1=8 val=pavan
› AVP: t=Service-Type(6) 1=6 val=Framed (2)
› AVP: =Class (25) 1=75 val=434143533a6336313238353162724344a2f7767443633147… Send RADIUS
› AVP: t=Connect-Info(77) (=24 val=CONNECT 11Mbps 802.11b Access-Reject
› AVP: t=Session-Timeout (27) l=6 val=1800
› AVP: t=EAP-Message (79) 1=13 Last Segment [1]
› AVP: t=Termination-Action(29) (=6 val=RADIUS-Request(1)
› AVP: t=Message-Authenticator(80) 1=18
› AVP: t=Tunnel-Type (64) (=6 Tag=0x01 val=VLAN(13)
val=26f047af6a9a82279dfd6d19b477c31b
› AVP: t=Tunnel-Medium-Type(65) 1=6 Tag=0x01 val=IEEE-802(6)
› AVP: t=EAP-Message (79) 1=6 Last Segment [1]
› AVP: t=Message-Authenticator (80) (=18 val=1cb417480820021d54882fcaea90308c
› AVP: t=Tunnel-Private-Group-Id(81)(=7 Tag=0x01 val=DATA
▿ AVP: t=Vendor-Specific (26) 1=36 vnd=ciscoSystems (9)
Type: 26
Length: 36
Vendor ID: ciscoSystems (9)
› VSA: t=Cisco-AVPair(1) (=30 val=linksec-policy=should-secure
▿ AVP: t=Vendor-Specific(26) 1=80 vnd=ciscoSystems(9) 11007 Could not locate Network Device or AAA Client
Type: 26 5405 RADIUS Request dropped
Length: 80 5413 RADIUS Accounting-Request dropped
Vendor ID: ciscoSystems (9)
› VSA: t=Cisco-AVPair(1) (=74 val=ACS: CiscoSecure-Defined-ACL=#ACSACL#-IP-PERMIT_ALL_
#CiscoLive IPV4 TRAFFIC-57f6b0d3
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Authentication and Authorization
PROTECTED SHARED PUBLIC
SERVERS SERVICES NETWORK
NETWORK ACCESS
Employee
Contractor alice
*****
AUTHENTICATION AUTHORIZATION
Who are you? What you can do?
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Enforce Trust-Based Access: Authorization
Beyond RADIUS Access-Accept / Access-Reject
Catalyst Meraki
Printers Printers
VLAN 5 VLAN 5
Guest Guest
Employee Employee VLAN 4
permit ip any any VLAN 4 16-bit SGT assignment and
SGT based Access Control
Per port / Per Domain /
Per MAC
cs.co/trustsec-compatibility
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
ISE Design
Other Factors
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
cs.co/ise-compatibility
ISE Compatibility
RFC2865 : RADIUS
RFC2866 : Accounting
RFC3579 : EAP Support
RFC5176 : CoA Support
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Guest Solution Overview
1
million API
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
ISE BYOD Solution
Public
Device Support EMM/MDM Integrations
Android
Resources
✕✓✕✓✓✓
Devices
macOS ✓✓✕✓✕✕
✕✓✓✕✕✕
Windows
Corporate
cisco.com/go/csta
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Endpoint Profiling
The profiling service in Cisco ISE identifies the devices that connect to your network
ACIDex
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Profiling Packages and Integrations
Medical Devices IOT Building & Automation
Library
XM
L
250+ Medical
Hospital device profiles
Factory
Cisco
Industrial Devices CyberVision Cisco AI Endpoint Analytics
Profiles IOT devices and sends endpoint labels via pxGrid to ISE for authorization
https://community.cisco.com/t5/tag/ise-endpoint-profile/tg-p/board-id/4561-docs-security
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco AI Endpoint Analytics and ISE
Cisco ISE
Web Interface Cisco DNAC+EA
Context
Classifications ISE
Policy
Endpoint Analytics shows
device classification results
associated with endpoints Distribution
SPAN
Layer
Wireless LAN
NBAR Telemetry Traffic Controller
(SD-AVC Agent) Appliance (TTA)
Catalyst 9000
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
• Considerations & Approach
• NDGs & NADs
• Certificates
• Network Access
• Guest
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Agent Types
Persistent Agent installed/running
Temporary agent
AnyConnect Temporal
Agentless
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
✅ Supported
Anti-Malware Checks ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Firewall Installation Checks ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
Application Inventory ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
Hardware Inventory ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
Process Checks ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Dictionary Conditions ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Application Checks ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
File Checks ✅ ✅ ❗ ✅ ✅ ✅ ✅ ❗ ✅
Service Checks ✅ ✅ ❌ ✅ ✅ ✅ ❗ ✅ ❗
Disk Encryption ✅ ✅ ❌ ✅ ✅ ❗ ❗ ❗ ❗
Patch Management ✅ ✅ ❗ ✅ ✅ ❗ ❗ ❗ ❗
Registry Checks ✅ N/A N/A ✅ N/A ✅ N/A ❗ N/A
USB Checks ✅ ❌ ❌ ✅ ❌ ✅ ❌ ✅ ❌
WSUS remediation (legacy) ✅ N/A N/A ✅ N/A ❌ ❌ ❌ ❌
Auto,
Remediation Manual
Partial Partial Part Auto Partial Text Text ❌ ❌
Reassessment ✅ ✅ ✅ ✅ ✅ ❌ ❌ ❌ ❌
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
✅ Supported
Anti-Malware Checks ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Firewall Installation Checks ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
Application Inventory ✅ ✅ ❌ ✅ Visibility
✅(Effort) ✅ ✅ ✅ ✅
Hardware Inventory ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
Process Checks ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Dictionary Conditions ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅ ✅
Application Checks ✅ ✅ ❌ ✅ ✅ ✅ ✅ ✅ ✅
File Checks ✅ ✅ ❗ ✅ ✅ ✅ ✅ ❗ ✅
Experience (Time)
Service Checks ✅ ✅ ❌ ✅ ✅ ✅ ❗ ✅ ❗
Disk Encryption ✅ ✅ ❌ ✅ ✅ ❗ ❗ ❗ ❗
Patch Management ✅ ✅ ❗ ✅ ✅ ❗ ❗ ❗ ❗
Registry Checks ✅ N/A N/A ✅ N/A ✅ N/A ❗ N/A
USB Checks ✅ ❌ ❌ ✅ ❌ ✅ ❌ ✅ ❌
WSUS remediation (legacy) ✅ N/A N/A ✅ N/A ❌ ❌ ❌ ❌
Auto,
Security (Protection)
Remediation Manual
Partial Partial Part Auto Partial Text Text ❌ ❌
Reassessment ✅ ✅ ✅ ✅ ✅ ❌ ❌ ❌ ❌
#CiscoLive © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
MDM Attributes
ActivityType
Posture/MDM Compliance
AdminAction
AdminActionUUID
AnyConnectVersion
DaysSinceLastCheckin
DetailedInfo
DeviceID
DeviceName
DeviceType
DiskEncryption
EndPointMatchedProfile
FailureReason
IdentityGroup
IMEI
Authorization IpAddress
Policy JailBroken
LastCheckInTimeStamp
IF JailBroken is No
ISE AND PinLock is Yes
MacAddress
Manufacturer
THEN Compliant MDMCompliantStatus
MDMFailureReason
MDMServerName
MEID
Model
OperatingSystem
PhoneNumber
PinLock
PolicyMatched
RegisterStatus
SerialNumber
cisco.com/go/csta
ServerType
SessionId
UDID
UserName
UserNotified
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Continuous Trust Verification:TC-NAC
Tenable
Rapid 7 Scans for Threat
and Vulnerability
AMP Qualys
ISE Evaluates
John Doe EMM/UEM integration endpoint
health and
ISE shares endpoint and Compliance
Segmentation data with pxGrid
partners
NGFW
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
ISE Design
Integrations
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Cisco Security Technical Alliance Partners
September 2020
https://cisco.com/go/csta
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Cisco ISE Best Practices
Cisco ISE Best Practices
Recommended Release & Patches
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
ISE Recommended Release
Patches
EOL Latest
3.0 3.1 3.2
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Shared vs Dedicated ISE Persona
Shared
Performance
Dedicated
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Shared vs Dedicated ISE PSN
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Steady State versus Peak Demand
• You have a mix of Static Endpoints and Mobile Endpoints
• Some Endpoints are always on with long (8+ hours) session
expirations
• Mobile endpoints hibernate & roam causing a 3-10X+ larger load
• Misconfigured devices can have 100-1000X larger than average
auth load
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Cisco ISE Best Practices
3rd Party NADs
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
cs.co/ise-compatibility
ISE Compatibility
RFC2865 : RADIUS
RFC2866 : Accounting
RFC3579 : EAP Support
RFC5176 : CoA Support
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Deny Access
• Provide
to unknown endpoints
in closed environment
• Provide highest
Policies privileges based on
Granular policies
• Provide least
privileges for general
access
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Cisco ISE Best Practices
Operations
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Optimization
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Optimization
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Schedule Your Backup Regularly
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Operational Data Purging
• By default, Data
Retention Period is
30 Days
• Adjust with caution
based on the Disk
Space availability
• Export to external
Repositories for your
old data before it
gets purged.
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
RADIUS Logs Data Retention
cs.co/ise-resources
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Cisco ISE Best Practices
Device Administration - RADIUS & TACACS
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
RADIUS & TACACS Deployment Options
RADIUS TACACS
RADIUS RADIUS/TACACS
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
When do we separate TACACS+ and RADIUS?
RADIUS TACACS
RADIUS RADIUS/TACACS
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
What features would you
like to see in ISE future
releases?
Join at slido.com
#BRKSEC-2091
Fill out your session surveys!
These points help you get on the leaderboard and increase your chances of winning daily and grand prizes
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
• Visit the Cisco Showcase
for related demos
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
• ISE YouTube Channel
cs.co/ise-videos
• ISE Resources
cs.co/ise-resources
• ISE Webinars
cs.co/ise-webinars
• ISE Community
cs.co/ise-community
References • ISE Integration Guides
cs.co/ise-guides
• Network Access Device Capabilities
cs.co/nad-capabilities
• ISE
• ISE Licensing & Evaluations
cs.co/ise-licensing
BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Thank you
#CiscoLive
Gamify your Cisco Live experience!
Get points for attending this session!
How:
1 Open the Cisco Events App.
4 Click the + at the bottom of the screen and scan the QR code:
#CiscoLive BRKSEC-2091 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
#CiscoLive