ISE High Level Design (HLD) - Cisco Community
ISE High Level Design (HLD) - Cisco Community
Community
English
FIND A COMMUNITY Cisco Register feedback
Login
Community
This board
Options
AAA and NAC AnyConnect Identity Services Engine… Policy and Access TrustSec VPN
10718 42 0
VIEWS HELPFUL COMMENTS
thomas
05-07-2018 09:40 AM
Edited On: 03-05-2019 08:09 AM
Instructions
Introduction
Business Objectives
Business Objectives
Environment
Physical Network Topology
Identity Sources
User Groups
Network Devices
Endpoints
ISE Cube
Device Administration (TACACS+)
Visibility
Secure Access
Wireless
Wired
VPN
Guest
HotSpot
Self-Registered
Sponsored
API
BYOD
Integration
Context Sharing
Threat Mitigation
APIs
Compliance
Segmentation
Containment
Operations & Management
Scale & High Availability
Policy Details
Resources
Instructions
1. Make a copy of this document
For an oine/printed copy of this document, simply choose Options > Printer Friendly Page. You may
then Print or Print to PDF or copy and paste to Word or any other document format you like.
Introduction
An ISE High Level Design (HLD) is recommended to assist you with the design and planning of your ISE deployment.
Having a clearly written security policy - whether aspirational or active - is the rst step in assessing, planning and
deploying network access security. Without this, it is hard to break down the deployment into phases by location or
capabilities. When seeking outside help, the HLD provides a huge time savings for education other teams, partners,
Cisco Sales representative, Technical Assistance Center (TAC) representative or even the ISE product and
engineering teams. Clearly state the desired solution capabilities, hardware and software environment and
integrations can quickly allow people to understand what you want and how to congure it or troubleshoot it.
Business Objectives
Identify the Customer Business Objectives that ISE must solve. Typically this involves regulations and compliance or
identied security threats and risks to smooth operation of the business or brand. But it also involves mitigating risks
with controlled network access for everyday IT processes. This is how you begin to craft your network access control
policy. The more specic you can be, the better.
Consider the following example business objectives that must translate into access control policy :
Business Objectives
1.
2.
3.
4.
5.
Environment
Identity Sources
List all of the products that ISE will need to integrate with or control. Please note any known issues or concerns with
their behavior or capabilities.
Note: Cisco strongly recommends server certicate, which is signed by in-house CA or other 3rd party Root CA
server, to be used for ISE. Self-signed server certicate should not be used for production deployment.
Identity Sources
Certicate Authorities (CA)
User Groups
Identify the specic user groups that will require dierentiated access and for which scenarios.
Network Devices
Provide the general switch/controller model numbers/platforms deployed and Cisco IOS and AireOS Software
versions to be deployed to support ISE design. Please use the ISE Compatibility Guides to see our latest list of
Validated products and protocols. If you still don't believe that ISE supports heterogeneous networks and can support
your network devices, please read Does ISE Support My Network Access Device?
Vendor Notes
Hardware Model Count
@ Software Version
Wired
Cisco 9300 @ 15.x.x #
Wireless
Cisco WLC xxxx @ 8.x #
Cisco Meraki xxxx
Aruba @ 7.x
VPN
Cisco ASA 55xx @ x.x #
Endpoints
List all of the unique endpoint types you expect to nd and apply policy to in your deployment.
Note: For domain joined Windows machines to function properly, machine authentication is recommended.
Performing user only authentication may break critical functions such as machine GPO and other background services
such as backup and software push.
Note: State whether the deployment is using machine or user authentication, or both. If both machine and user
authentication are planned, are Machine Access Restrictions (MAR) planned? If so, review the Appendix information
on MAR caveats. For machine / user authentication details, please refer to 802.1X Authenticated Wired and Wireless
Access
Workstations
Microsoft Windows XP #
Microsoft Windows 7.x #
Microsoft Windows 8.x #
Microsoft Windows 10 #
Microsoft Windows Embedded #
Apple MacOS 10.13 #
Chromebook
Linux Linux #
VDI
Mobile Devices
Apple iOS 11.x
Android Android 8.x
Android Android 7.x
Android Android 6.x
Oce
Cisco #
Access Points
Cisco 7xxx #
IP Phones
#
Printers
IOT
Cameras #
Lighting #
Badging #
HVAC #
Medical #
Manufacturing #
#
SCADA
#
Others
ISE Cube
List all of the nodes in your ISE deployment.
The VM host should be sized comparably with the ISE hardware appliance(s)
The resources need to be reserved for each ISE node and cannot be shared among dierent ISE nodes or other
guest VMs on the host.
Hard disks with 10K or higher RPM are required. Average IO Write performance for the disk should be higher than
300MB/sec and IO Write performance should be higher than 50MB/sec. Please make sure to reserve the RAM and
CPU cycles for the ISE node deployed as VM.
If disk size needs to be resized, the node will need to be re-imaged from the ISO
Visibility
See what, when, where and how users and endpoints are on your network.
In the table below, list the primary endpoint devices (one per row) that need to be proled.
Scenarios ✓ Note
Done s
Enable Proling Feed Service or retrieve oine update
Create Custom Endpoint Proles for _____ Devices
Create Endpoint Purge Policies
Move proled endpoints to static MAC-based endpoint lists and do not use endpoint proles in
authorization rules
if you want to minimize Plus License consumption
Secure Access
Control authenticated endpoint & user access
Scenarios ✓ Note
Done s
Wireless
Wireless 802.1X User Authentication & Authorization: Show Successful Login and Role-Based Access
Wireless Machine Authentication and Authorization: use digital certicate for Corporate device
Individual Pre-Shared Key (iPSK)
Static Endpoint MAC Whitelisting: allow non-authenticating (no 802.1X) endpoints with MAB
Wireless user with Passive Identity (No 802.1x)
eduroam
Wired
ISE Wired Access Deployment Guide
Static Endpoint MAC Whitelisting: allow non-authenticating (no 802.1X) endpoints with MAB
Static Endpoint MAC Blacklisting: block non-authenticating endpoints with MAB
Dynamic Endpoint Proling and Authorization: List each endpoint prole and the desired authorization
Easy Connect: Wired user with Passive Identity (No 802.1X supplicant)
Wired Web Authentication (No 802.1X Supplicant. For Guest or Employees)
EAP-Chaining: Wired machine+user authentication using EAP-FAST with AnyConnect
Wired Machine Authentication and Authorization: use digital certicate for Corporate device
Wired User 802.1X Authentication: Show Successful Login and Role-Based Access
Wired WebAuth Login: Show Login With No Supplicant
Wired Authentication (user or machine) & Authorization on a Docking Station
Wired Authentication for a user via an Windows Remote Desktop Protocol (RDP) Session
Wired Authentication for Multi-User devices (Nurses Station, Call Center, etc.)
Wired Authentication (user or machine) & Authorization on a Docking Station Behind IP-Phone
Wired Authentication with Two-Factor Authentication (2FA)
VPN
VPN Authentication and Authorization with Username:Password: Show Successful Login and Role-
Based Access
VPN Authentication and Authorization with Token/2FA: Show Successful Login and Role-Based Access
VPN Access Attempt, Revoked Certicate (Testing OCSP)
Guest
Internet access for visitors. Generally, you should only implement one type of Guest network.
Behavior: Acceptable Usage Policy (AUP), Password, Auto-Login, Success URL, etc.
Presentation: Logo, Colors, Fonts
Demonstrate Hotspot with desired ow:
Self-Registered
Create desired Guest Types
Demonstrate Self-Service Guest registration
Sponsored
Customize Sponsor Portal Flow and Presentation
Create Sponsor Groups
Demonstrate Sponsor Portal (sponsored Guest access)
Login with Sponsored Guest Credentials
Concurrent Guest Logins
API
Guest API integration with external application(s)
BYOD
Onboard & dierentiate personal & corporate devices. Consider the following topics when determining your
scenarios:
Single SSID: Unregistered devices are redirected to a WebAuth portal and respective users
Dual SSID: Unregistered devices are redirected to a WebAuth portal and respective users
Certicate Provisioning
Integration
Share contextual information with other products
Scenarios ✓ Note
Done s
Context Sharing
Demonstrate pxGrid integration with SIEM
Share identity context with StealthWatch via pxGrid
Cisco Industrial Network Director shares IOTAsset topic with ISE
ISE brokers pxGrid topic sharing among partners
...
Threat Mitigation
Rapid Threat Containment (RTC)
Integrate DNA Center with ISE for Access Control Policy and software-dened Segmentation with
TrustSec
Integrate network management tool for adding/updating/removing network devices, endpoints, etc.
...
Compliance
Ensure that endpoints meet security standards.
Review the list of currently supported packages for Windows and MacOSX.
Scenarios ✓ Note
Done s
Agent-less
Non-Compliant endpoints are quarantined and redirected to provision AnyConnect and the Posture
Module via ISE
Non-Compliant endpoints are quarantined and redirected until provisioned by [WSUS, etc.]
Compliant endpoints are properly authorized on the network
Enterprise Mobility Management (EMM) / Mobile Device Management (MDM)
Posture Policies
Describe posture policy requirements for endpoint compliance. This may include many areas such as asset checking,
application and services checking, and antivirus and antispyware checks, as well as customized checks for specic
use cases. Describe remediation plans and include remediation servers that need to be integrated into the design.
Describe Client Provisioning policy requirements for posture and native supplicant provisioning.
EAP-TLS, SSID
Native Supplicant:
PEAP-MSCHAPv2, SSID
EAP-TLS, SSID
Segmentation
Limit exposure with pre-dened access segmentation
Dynamically classify endpoints with SGTs via MAB (static or proled, e.g. IOT)
Dynamically classify endpoints with SGTs via 802.1X Machine Authentication
Dynamically classify users with SGTs via 802.1X Authentication
Dynamically classify users with SGTs via Easy Connect (MAB+Passive Identity)
Dynamically classify users with SGTs using WebAuth (e.g. Guests)
Statically classify trac by VLAN
Statically classify trac by Subnet
Statically classify trac by L2 Interface
Statically classify trac by L3 Port
Statically classify trac by VM (port prole)
East-West Segmentation
Use group-based policies to reduce rewall rules by eliminating need to specify IPv4/IPv6 addresses
User to Data Center
Containment
Reduce risk with rapid threat containment.
Scenarios ✓ Note
Done s
Monitoring
Scale & High Availability
List the scale and HA scenarios you want to test.
Multi-Forest AD Join
Multi-AD within Single Forest Joins
Policy Admin Node (PAN) Down
Policy Service Node (PSN) Down
Survivability & High Availability
Policy Details
List all security policies that are needed to implement the business requirements described above.
Authentication Policy
For each use case (wired, wireless, VPN), describe the authentication policies that will be implemented for all users
and endpoints whether managed or unmanaged.
Authorization Policy
For each use case (wired, wireless, VPN), describe the authorization policies that will be implemented for all users
and endpoints whether managed or unmanaged.
SAN = Calling-StationID
Resources
42 Helpful
Share
Latest Contents
using WSA generated CSR to get sign via Public CA (GoDaddy) ...
Created by hashimwajid1 on 05-30-2019 04:59 PM
0 0
Hi Team, can we use WSA own self generated CSR to get sign via Public CA (GoDaddy) and use it for all Users/Contractors/Mo
bile devices ?we dont have any Internal CA and want decryption for all Users Domain/Guest Thanks
0 0
I see this when doing "UDP PAT pool management, address X.X.X.X, range 1024-65535, allocated 5"show nat pool" on a Firep
ower but don't see any NAT statements for this under NAT.
Discussion Video
Blog
Document
Related Content
Discussions
Blogs
Events
Videos
Recommended
06-13-2017
ACS to ISE - High Level design question... kthiruve
04:13 PM
11-05-2018
ISE Proling Design Guide thomas
05:56 PM
03-16-2018
ISE Upgrades - Best Practices kthiruve
08:24 PM
11-13-2015
ISE Community Resources thomas
03:48 PM
06-30-2016
ISE Performance & Scale howon
01:16 PM
Top