Ise Lab Guide For 9-11th Workshop
Ise Lab Guide For 9-11th Workshop
ISE Workshop
Table of Contents
Discovery Guide
Pre-Lab Activity: Accessing the Remote Lab 2
Discovery 1: Initial Configuration of Cisco ISE 7
Discovery 2.1: Certificate Operations 18
Discovery 2.2: Cisco ISE Node Deployment 31
Discovery 2.3: Configure and Add Network Access Devices to Cisco ISE 37
Discovery 3: Integrate Cisco ISE with Active Directory 42
Discovery 4.1: Configuring Cisco ISE for MAC Authentication Bypass (MAB) 51
Discovery 4.2: Configuring Cisco ISE for Wired 802.1X Authentication 72
Discovery 4.3: Configuring Cisco ISE for Wireless 802.1X Authentication 87
Discovery 6: Configure Guest Access 104
Discovery 7: Guest Access Operations 108
Discovery 8: Guest Reports 145
Discovery 9: Configuring Profiling 148
Discovery 10: Customizing the Cisco ISE Profiling Configuration 157
Discovery 11: ISE Profiling Reports 162
Discovery 12: BYOD Configuration 165
Discovery 13: Blacklisting a Device 191
Discovery 14: Compliance 200
Discovery 15: Configuring Client Provisioning 214
Discovery 16: Configuring Posture Policies 220
Discovery 17: Testing Compliance Based Access 231
Discovery 18: Compliance Policy Monitoring 234
1
2
2
3
Job Aids
These job aids are available to help you complete the lab activity.
Internal IP Addresses
This table lists the internal IP addresses that are used in the labs.
Device Name or Hostname IP Address
Client PC -- DHCP
BYOD PC -- DHCP
3
4
4
5
demo.local/Users/Domain Computers — —
Note Dedicated VLANs have been preconfigured for optional access policy assignments that
are based on user identity, profiling, or compliance status. This lab will focus on the use
of downloadable ACLs (DACLs) rather than VLAN assignment for policy enforcement. By
default, all Client PC access will remain in the ACCESS VLAN 10, and IP phones will be
placed in the VOICE VLAN 40.
5
6
Note The login username is: admin and the password is: cisco123 (this information is listed in
the Accounts and Passwords table).
Note Click on the ‘three-button’ icon to send Ctrl-Alt-Del and the ‘X’ to
disconnect.
Step 2 To access the Client PC and BYOD via noVNC, do the following:
◼ From the Lab Diagram, click Client PC or BYOD.
◼ The page should open to the Desktop, if not please inform your
instructor.
Step 3 To access the consoles of the lab Switch and Cisco ISE appliance(s) using
SSH, do the following:
◼ From the Admin PC, double-click the desired PuTTY shortcut located
in the Shortcuts folder on the Windows desktop, the PuTTY shortcuts
are identified by the type of ‘Shortcut’ and have two computers
connected by a lightning bolt.
◼ Login using the credentials that are listed in the Accounts and
Passwords table found above.
6
7
Activity Objective
In this exercise, you will verify the installation of Cisco ISE and perform post
installation tasks. After completing this activity, you will be able to meet these
objectives:
◼ Verify initial Discovery setup and configuration
◼ Verify services, NTP, and DNS settings
◼ Gather Data
Command List
The table describes the commands that are used in this activity.
ISE CLI Commands
Command Description
7
8
If the screen appears too small or not the right color you can change the
settings in PuTTY using Change Settings… then Window > Appearance to
change the font and Window > Colors to change the colors.
Step 6 Enter show run to confirm the setup settings that are entered and to see
other settings and their default values.
Step 7 Use these commands to answer the following questions:
show version
show inventory
show application status ise
8
9
9
10
10
11
11
12
Tip If you are using an evaluation license, you may see a message “Licenses about expire”
at every login just click the OK button.
Step 7 Click on the gear icon in the top right corner and choose “About Identity
Services Engine”
Q4) What is the Cisco ISE version?
12
13
Hamburger Button
Note Context Visibility provides the administrator with a more holistic view of the network.
It allows for quick sorting and filtering of context information. Administrators can view
dashlets to get detailed informational data.
13
14
Step 10 Click on “Cisco ISE” to return to the Home tab, now you can add
additional dashboards in 2 ways. You can click the + symbol to the right
of the submenus or click the pull-down hamburger button on the far
right of the page. The + symbol will only allow you to create a new
dashboard and define its attributes. The pull-down hamburger button gives
you more option beyond this, such as adding additional dashlets to the
present view. You can also change the layout of the display and manage
dashboards as well.
14
15
Step 11 Add a new test dashboard by using either method mentioned above. Name
it “MY-TEST” and click Save when done. Then select 2 or 3 dashlet
parameters of your choice to be included with that dashboard. Then click
Save. You can then view this new dashboard once complete, and it will
appear as a sub-menu option.
Step 12 By clicking the large gear icon on the right, notice that you can rename
this dashboard, and add additional dashlets. If you click Add Dashlets, you
will see that you can configure the dashboard to display what is important
to you, for your environment. Click the ‘X’ to exit.
Step 13 Now, go ahead and delete this Dashboard by clicking the ‘X’ next to the
MY-TEST name and click OK on the pop-up warning window to remove
the dashboard. You will be adding dashboards in later labs that will be
more relevant to the task being performed.
15
16
Step 14 Similarly, by navigating to the Context Visibility > Endpoints page (hint:
use the hamburger button) and clicking on the pull-down hamburger drop
down button icon on the right, you are presented with options to create
new views, or directly jump to a pre-existing dashboard. Click Create
New. Again, you will be customizing these pages in later Discoveries
where appropriate.
Step 15 Next, navigate to the other menu options available just to familiarize
yourself with GUI navigation, click on the hamburger button in the upper
left. You will be accessing most of the configuration options available in
much more detail throughout the entire course.
The Operations tab will allow you to view live logs and live sessions for
things such as RADIUS and TACACS+ sessions.
The Policy tab is where you will perform authentication and authorization
configurations, as well as profiling, provisioning, and posture. Take the
time to view the default policies that come with ISE for authentication,
authorization, profiling, and provisioning. You will be modifying some of
these and adding new policy configurations in later labs.
The Administration tab is where you will perform system functions,
identity management, add network resources, device portals, and other
services available on Cisco ISE.
Step 16 There is a new menu option starting in ISE version 2.1 called Work
Centers. This provides a guided workflow process for configuring various
ISE services. Work Centers also offer direct links to specific configuration
pages. Take some time to click on the different sub-menu options and pay
particular notice to the overview pages. These pages will help guide you
through the ISE workflow process. For example, choose the “Overview”
option under the headings for Network Access. Look over the steps
needed to implement Network Access.
16
17
17
18
Visual Objective
18
19
For more information please see: How To: Implement ISE Server-Side Certificates.
Activity Procedure
Complete these steps:
Step 1 If not already open, from the Lab Diagram, login to the Admin PC.
Step 2 In the shortcuts folder open the site using the CertSrv icon this will take
you to http://ad.demo.local/certsrv.
Step 3 From the Select a task: section, click Download a CA certificate,
certificate chain, or CRL.
Step 4 In the CA certificate section, leave the Current certificate highlighted.
From the Encoding method: section, choose Base 64.
19
20
Step 5 Click Download CA certificate and choose Save File. Click Ok.
Step 6 This file will be saved as certnew.cer in the Downloads folder, change
the name of the file to demo-ca.cer.
Note Each time that a certificate is saved, the file number is incremented (for example,
certnew.cer, certnew2.cer, and certnew3.cer). In order to save the confusion this might
cause, rename the certificate to something meaningful.
Step 7 We will now install the Root CA into Firefox, from the browser window
select Install CA certificate.
Step 8 Select the Trust this CA to identify website checkbox and click OK.
Step 9 If not already open, from the shortcuts folder, double-click the ise-
1.demo.local shortcut. Login to ISE using username: admin and
password: default1A
Note A browser certificate error message appears which can be ignored. Add an exception for
this connection.
20
21
Step 10 From the Cisco ISE Admin Portal on ise-1, click on the hamburger icon
and navigate to Administration > System > Certificates
Step 12 Click Import to add the CA certificate as a Trust Certificate. Use the table
below to complete the form.
Attribute Value
Tip If the CA will also issue endpoint certificates, then select “Trust for client authentication
and syslog”. If the CA is a public trusted root, then do not check the client authentication
check-box.
Step 13 Click Submit. You should receive a message box in the lower right-hand
corner indicating the successful import. (Only visible for a few seconds)
21
22
Usage Multi-Use
Note Adding the IP address as both a DNS name and IP address solves a compatibility issue
with Microsoft clients.
22
23
Step 19 From the open .PEM file, highlight and copy the entire contents to the
clipboard. (CTRL-A followed by CTRL-C)
Step 20 Browse to http://ad.demo.local/certsrv/, if the site is already open select
the Home link in the upper right. If you try to use Firefox the request for
the certificate may produce an error; if it does use the IE web browser.
23
24
Step 29 Under the Certificate File section, click Browse… , and select the
certificate file is Download\ise-1.cer. Click Open.
Step 30 For the Friendly Name field enter: ISE-1-Multi-Use
Step 31 Under Usage choose Admin, EAP Authentication and Portal. Select OK
for each Popup. Under Portal, add a new Portal Group Tag by entering
ISE LAB CGT.
Note When a change is made on the Cisco ISE, you will see a brief pop-up on the bottom right
of the browser screen. This will show that the change was either successful or
unsuccessful. This process can take several minutes since the ISE appliance must
restart to apply the certificate
24
25
Note Note: If a browser certificate error message appears. You can ignore it and add an
exception for this connection. If no message appears an exception already existed.
Step 2 From the Cisco ISE Admin Portal on ise-2, navigate to Administration >
System > Certificates > Trusted Certificates. (hint: use the hamburger
icon)
Step 3 Click Import to add the CA certificate as a Trust Certificate.
Attribute Value
Step 4 Click Submit. You should receive a message box in the lower right-hand
corner indicating the successful import. (Only visible for a few seconds)
Step 5 Navigate to Administration > System > Certificates > Certificates
Signing Requests and click on the Generate Certificate Signing
Request (CSR) button to create a certificate-signing request (CSR).
25
26
Usage Multi-Use
Node(s)
Ise-2 [X]
Note Adding the IP address as both a DNS name and IP address solves a compatibility issue
with Microsoft clients.
Step 11 From the open .PEM file, highlight and copy the entire contents to the
clipboard.
Step 12 From the Firefox or IE web browser, browse to
http://ad.demo.local/certsrv/.
Step 13 Select Request a certificate.
Step 14 Select advanced certificate request.
26
27
Base-64-encoded certificate request <Paste contents of .PEM file here> Make sure
there are no white spaces after “END
CERTIFICATE REQUEST”
Note When a change is made on the Cisco ISE, you will see a brief pop-up on the bottom right
of the browser screen. This will show that the change was either successful or
unsuccessful. This process can take several minutes since the ISE appliance must
restart to apply the certificate. Use the CLI to view the status of the system.
27
28
Step 6 This file will be saved as certnew.cer in the Downloads folder, change
the name of the file to demo-ca.cer.
Note Each time that a certificate is saved, the file number is incremented (for example,
certnew.cer, certnew2.cer, and certnew3.cer). In order to save the confusion this might
cause, rename the certificate to something meaningful.
28
29
Step 7 We will now install the Root CA into Firefox, from the browser window
select Install CA certificate.
Step 8 Select the Trust this CA to identify website checkbox and click OK.
29
30
30
31
Activity Objective
In this activity, you will convert the ise-1 node from standalone to primary, register
a secondary node, configure roles for the nodes, and verify connectivity. After
completing this activity, you will be able to meet these objectives:
◼ Convert the ise-1 node from standalone to primary
◼ Register the ise-2 node to the ise-1 node and configure roles for each node
◼ Verify connectivity and proper communication within the distributed
deployment
Visual Objective
31
32
Step 4 You may see the screen go dark and will see a pop-up window in the top
middle of the page with this message, “This node is in Standalone mode.
To register other nodes, you must first edit this note and change
Administration Role to Primary.” Click OK.
Step 5 In the Deployment section, select Deployment then ise-1 by clicking the
checkbox to the left. Click Edit
32
33
Step 6 In the General Settings under Personas in the Administration Role area,
you will see the following. Click the Make Primary button as shown
here:
Note You will immediately see the role change to Primary. However, the configuration has not
been sent to the Cisco ISE.
Step 7 In the Personas section, deselect the Enable Profiling Service checkbox.
This will disable Profiling Service.
33
34
Step 8 Click Save. The screen will go dark while the Cisco ISE node is
processing this configuration change. When the update is completed, you
will see a success pop-up window open on the screen. Click Ok and the
ISE interface will be redirected to the login page.
Note If you log in before the processing on ise-1 is complete, you may see this message:
“Unable to communicate with the Monitoring node. Please check if the application server
on ise-1.demo.local is running and is accessible from your browser.”
Note You can use the PuTTY shortcut to ise-1 and run a show application status ise
command to follow the Application Service status.
34
35
Username admin
Password default1A
Step 3 In Step 2 of the Register ISE Node section, configure the following
details and click Submit.
Attribute Value
Administration Secondary
35
36
Step 5 Verify the Deployment Nodes details with the following information. It
could take a while for ise-2 Node Status to turn green. (Proceed with the
next lab and come back to these validation steps.)
Hostname Node Personas Role(s) Services Replication
Type Status
Policy Service
Note If you log in before the processing on ISE-2 is complete, you may see this message:
“Unable to communicate with the Monitoring node. Please check if the application server
on ise-2.demo.local is running and is accessible from your browser.”
Note You can use the PuTTY shortcut to ISE-2 and run a show application status ise
command to follow the application service statuses.
36
37
Activity Objective
In this activity, you will configure Cisco ISE for utilization of the NADs in this
topology. You will add two of the NADs manually and a third NAD (NTRadPing)
as a test device. You will then verify the configuration of the Switch and WLC.
After completing this activity, you will be able to meet these objectives:
◼ Create network device groups (NDGs) & Add Network Access Devices (NADs)
to Cisco ISE
Visual Objective
37
38
Step 5 From the right pane, click the +Add to create the following NDGs, use All
Locations as the Parent Group:
◼ HQ
◼ RnD Lab
38
39
Step 6 From the Cisco ISE Admin Portal on ise-1, from the side menu bar
navigate to Network Devices. In the right pane, click +Add to configure
a new network device.
Attribute Value
Name NTRadPing
IP Address 10.1.100.100/32
Name 3k-access
IP Address 10.1.100.1/32
Name WLC
IP Address 10.1.100.61/32
39
40
Step 11 Click Submit. Does your table look like the one below?
Step 14 Confirm that the authentication request received by the Cisco ISE:
Operations > RADIUS Live Logs. You should see a failure with current
time stamp. This is because ISE is not yet configured to pass
authentication requests to Active Directory, which is where this user
account exists.
Step 15 Click the page icon under the Details column.
40
41
Note Review the information in the authentication summary. Notice that an authentication
failure has occurred.
41
42
Activity Objective
In this activity, you will integrate the Cisco ISE into Microsoft Active Directory.
After completing this activity, you will be able to meet these objectives:
◼ Join Cisco ISE to Microsoft Active Directory
◼ Confirm that authentication and authorization functionality is working
Visual Objective
42
43
43
44
Note The Cisco ISE does not require elevated Microsoft Active Directory credentials to join
Microsoft Active Directory; it just requires a regular user account that has permissions to
join a workstation. (Default Microsoft Active Directory permissions allow a user to join up
to 10 workstations to Microsoft Active Directory.)
44
45
Step 10 If the operation was successful, you should see the following popup
display the Join status. If the window does not close automatically click
Close when complete.
Note For Microsoft Active Directory debugging information, debugging may be turned on from
Administration > System > Logging > Debug Log Configuration. Click the node
name and then enable Microsoft Active Directory debugging from the Active Directory
Debug tab.
Note To view the Microsoft Active Directory debug log, go to Operations > Troubleshoot >
Download Logs. Click the node and then choose the ad_agent.log file from the Debug
Logs tab.
45
46
demo.local/Users/contractors GLOBAL
demo.local/Users/employees GLOBAL
demo.local/Users/staff GLOBAL
demo.local/Users/students GLOBAL
46
47
47
48
Step 3 Select the Actions gear icon at the right end of the MAB rule and click
Insert new row above, so your new rule is above the MAB rule.
48
49
Step 6 In the drop-down menu to the right of the Equals, select: All Device
Types#Test. Compare your screen to the screenshot below:
Step 7 Scroll down and click on the Use button at the bottom right to exit the
Conditions Studio. (Do not click on the Save button unless you want to
save the condition to the library.)
Step 8 Choose the identity store by clicking the link internal users then selecting
demo.local from the dropdown.
Step 9 At the bottom or top right side of the screen, click Save.
Step 10 From the Admin PC desktop, use NTRadPing to send an authentication
request for the username user2 and for the password cisco123. Response
should be Access-Accept.
49
50
Step 11 From the Cisco ISE Admin Portal on ise-1, navigate to Operations >
RADIUS Live Logs and confirm that the authentication is successful.
You can click the icon under Details to view more information.
50
51
Activity Objective
The need for secure network access has never been greater. In today's diverse
workplaces, consultants, contractors, and even guests require access to network
resources over the same LAN connections as regular employees, who may
themselves bring unmanaged devices into the workplace. As data networks become
increasingly indispensable in day-to-day business operations, the possibility that
unauthorized people or devices will gain access to controlled or confidential
information also increases.
The best and most secure solution to vulnerability at the access edge is to use the
intelligence of the network. One access control technique that Cisco provides is
called MAC Authentication Bypass (MAB). MAB uses the MAC address of a
device to determine what kind of network access to provide.
In this activity, you will learn about the default behavior of the Cisco IOS IEEE
802.1X state machine and how it relates MAC Authentication Bypass (MAB) of
device authentication, specifically when authenticating against the Cisco ISE. After
completing this activity, you will be able to meet these objectives:
◼ Review the Cisco ISE default access policy
◼ Verify the default authorization policies for the endpoints
◼ Understand the default authentication behavior of the Cisco ISE
◼ Understand the behavior of MAC Authentication Bypass (MAB) on the switch
◼ Authenticate an IP phone, and wireless access point using MAC Authentication
Bypass (MAB) and static MAC authorization
◼ Assign an endpoint a specific authorization policy that is based on a static group
mapping
51
52
Visual Objective
52
53
Q10) What is the Cisco IP phone MAC address listed in the command
line output?
53
54
Note MAC addresses that are sent from the switch using any of the Default Network Access
protocols will be evaluated against existing addresses in the Internal Hosts database. If
they are not found, a RADIUS Access-Reject response will be returned.
Authentication Rules
Test Authentications Device:Device Type EQUALS Device Type#All Device Types#Test demo.local
54
55
Note Web Authentication is not RADIUS-based and is automatically managed by the Session
Service, so there is no need to create a separate authentication method for WebAuth.
Authorization Policies
Wireless Black List Default Wireless Access AND Blacklist Blackhole_Wireless Access
55
56
Default DenyAccess
56
57
Activity Procedure
Complete these steps:
Step 1 From the Cisco ISE Admin Portal on ise-1, navigate to Context Visibility
> Endpoints. Scroll down and verify that there are no endpoints listed. If
there are endpoints that are listed, delete them by checking each one and
clicking the Trash Can button, select Selected, then click yes to confirm.
Step 2 From the Admin PC, double-click the 3k-access PuTTY shortcut locate in
the Shortcuts folder on the Windows desktop and login to the switch using
username: admin and password: cisco123
Step 3 Validate the AAA servers on the switch.
3k-access#show aaa servers
RADIUS: id 1, priority 1, host 10.1.100.21, auth-port 1812,
acct-port 1813
State: current UP, duration 38301s, previous
duration 0s
Dead: total time 0s, count 0
Platform State from SMD: current UP, duration
38301s, previous duration 0s
!<Output truncated>
Step 4 Execute the following test command on the switch to validate if the switch
and ISE can communicate over RADIUS or if the credentials result in a
passed or failed authentication. The test-user and test-password are not a
real username and password; these are variables used to test RADIUS
communication between Switch and ISE.
3k-access#test aaa group radius test-user test-password
new-code
We expect this command result in User Rejected, but is show us that the
switch and ISE are communicating.
Step 5 Validate the RADIUS settings on the switch.
3k-access#show running-config | include radius
57
58
Step 6 Show the interface GigabitEthernet 0/6 configuration (show run int Gi0/6).
Confirm the following information matches, add any missing entries.
3k-access#show running-config interface GigabitEthernet0/6
interface GigabitEthernet0/6
description IP Phone
switchport access vlan 10
switchport mode access
switchport voice vlan 40
ip access-group ACL-ALLOW in
shutdown
authentication event fail action next-method
authentication host-mode multi-auth
authentication open
authentication order mab dot1x
authentication priority dot1x mab
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity 30
mab
dot1x pae authenticator
spanning-tree portfast
end
Note Notice that the bolded items are related to 802.1X & MAC Authentication Bypass (MAB)
58
59
Note After the hold period expires, the Cisco IOS authentication manager will restart the
authentication process with MAB.
Note If the authentication is successful, the MAC address may have been previously seen by
ISE and authenticated. In the GUI navigate to Context Visibility > Endpoints. Check
the box next to the IP Phone MAC Address then click delete (Trash Canister). Say yes
to the pop-up message.
Step 9 From the Cisco ISE Admin Portal on ise-1, navigate to Operations >
RADIUS Live Logs. Choose a failed event for your endpoint mac
address.
Step 10 Click the Details link next to the log entry for additional information.
What is the MAC address of the Cisco IP Phone?
59
60
Note Use the MAC Address was verified/documented in the task above.
Note If you are unable to save the MAC address, verify that it does not already exist in the
table. If it does exist in the table, you can either edit the one that already exists or delete
it and create a new one.
Note You may need to wait 30-60 Seconds for the authenticator state machine to reset on the
switch to restart the MAC Authentication Bypass (MAB) process or you can force the
issue by performing a shut/no shut on the switchport.
60
61
Step 5 Return to the Overview > RADIUS Live Logs, has the phone
successfully authenticated? If not, return to the switch and bounce
(perform shutdown/no shutdown) the GigabitEthernet 0/6 interface. The
phone will reboot, this device is PoE so wait a few minutes.
Step 6 Click the Details link next to the log entry for additional information.
Verify the correct authentication results.
Step 7 From the 3k-access SSH session, do you will see log messages in the
switch console showing a successful authentication?
View the authorization status within the Cisco IOS. Use the command
show authentication sessions interface g0/6 detail. Your MAC address
will be different from the screenshot.
Step 8 Shutdown interface GigabitEthernet 0/6. The phone has no Call Center to
connect to and will keep rebooting if this is not done.
61
62
Local Policies:
Idle timeout: 30 sec
Service Template:
DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
Security Policy: Should Secure
Security Status: Link Unsecure
62
63
Note If the authentication is successful, the MAC address may have been previously seen by
ISE and authenticated. In the GUI navigate to Context Visibility > Endpoints. Check
the box next to the Access Point MAC Address then click delete (Trash Canister). Say
yes to the pop-up message.
Step 3 From the Cisco ISE Admin Portal on ise-1, navigate to Work Centers >
Network Access > Policy Elements and then select Results >
Authorization Profiles in the left menu.
Step 4 Click +Add to create a new Access-Point authorization profile that will
permit the Access Point and allow all traffic from it.
Attribute Value
Name Access-Point
Access-Type ACCESS_ACCEPT
Note You may optionally define and apply a new, downloadable ACL that only permits DHCP,
DNS and the CAPWAP protocol.
Name Access-Point
Parent
63
64
Step 9 Navigate to Policy Sets then select the Default Policy Set click on the
gear icon at the end of the line. Select Insert New row above and create
a new Policy Set.
Highlight the words on the new line that was created, New Policy Set 1.
You will be modifying the following fields:
• Name: Wired Access
• Description: Wired access policy set
• Conditions: See step 10.
• Allowed Protocols: See step 12.
Step 10 Create a New Condition with the following condition, by clicking on the
plus icon:
DEVICE:Device Type EQUALS All Device Types#Wired:
• Under the Editor section click on the line that reads Click to add an
attribute.
• Select the Computer (Network Device) icon, forth from left.
• Select the line that reads DEVICE: Device Type.
• Leave the default Equals.
• Click on the down arrow to open a drop-down menu, select All Device
Types#Wired
• Validate with the screenshot below:
64
65
Step 13 Validate that your Policy Set looks like the screenshot below:
65
66
Step 17 Scroll down the page and expand the Authorization Policy (1) section.
Step 18 Click on the plus ( + ) icon next to the word Status to create a new
authorization rule.
66
67
Step 29 Observe the processing order rule placement and then click the Save
button located at bottom right.
67
68
Step 30 From the Cisco ISE Admin Portal on ise-1, navigate to Work Centers >
Network Access > Identities > Endpoints.
Step 31 Select the check box next to Access Point MAC address and select the
pencil icon to edit the AP’s Endpoint record. Add the AP to the Access-
Point Identity Group. If it is not in the list bounce (shut and no shut) the
switcport Gi0/3.
68
69
Step 34 From the 3k-access SSH session, view the authorization status within the
Cisco IOS.
Step 35 From the Cisco ISE Admin Portal on ise-1, navigate to Work Centers >
Network Access > Overview > RADIUS Livelog.
Step 36 Click the Details link next to the log entry for additional information.
69
70
Step 7 In the Results | Profiles column assign the rule the Cisco_IP_Phones
authorization profile.
Enabled Name Conditions Results | Profiles
70
71
Step 8 Observe the processing order rule placement in the example above and
then click the Save button located at bottom right.
71
72
Activity Objective
In this activity, you will complete an IEEE 802.1X user authentication using a Client
PC endpoint against the Active Directory identity source. After completing this
activity, you will be able to meet these objectives:
◼ Install AnyConnect
◼ Join Client PC to Active Directory
◼ Configure Client PC 802.1X supplicant
◼ Configure Cisco switch port for 802.1X support
◼ Create an Identity Store Sequence
◼ Update the 802.1X Authentication Rule
◼ Verify Microsoft Windows machine authentication & user authentication
◼ Create and apply authorization permissions
Visual Objective
72
73
73
74
Manage Networks
Button
74
75
75
76
Note The authentication display new-style command converts an existing IBNS 1.0
configuration to IBNS 2.0. The new style configurations can be reverted to the old style
with the authentication display legacy privileged EXEC mode command. However, note
that in the new style, if any changes are made to the policy map or any IBNS 2.0-specific
commands, or if the system is reloaded with new style configurations written to the
startup configuration, you will not be able to revert to the IBNS 1.0 style configurations
from IBNS 2.0.
Note Use the authentication display config-mode command in EXEC mode to display the
current configuration mode; legacy if it is legacy mode and new-style if it is Identity-
Based Networking Services configuration mode.
76
77
Step 3 Exit to the privilege mode and notice the new class-map and policy-map
configurations, use the ‘show run command’ and view the changes.
77
78
Note In IBNS 2.0, the default port mode is open mode. To move the port to closed mode,
configure the access-session closed interface command explicitly either within the
interface template or on the physical port
78
79
79
80
Name: AD_Users
Description: AD Users
Selected: demo.local
Selected: Do not …
80
81
81
82
Name: ACL-Domain-Computer
Note The Cisco ISE does not validate the spelling for ACLs. It is highly recommended to test
each ACL by using the Check Syntax link below the DACL Content form.
82
83
Step 6 From the right pane, click +Add and create the following authorization
profile for machine-authenticated domain computers:
Attribute Value
Name Domain-Computer
Access-Type ACCESS_ACCEPT
Name Domain-User
Access-Type ACCESS_ACCEPT
83
84
Step 11 Under the Authorization Policy, create new authorization rules for both
the Domain-Computer and Domain-User see the table below. Use the
Identity Group (three heads icon) for the condition.
Enabled Name Conditions Authorization
Note If you logged off the Client PC. You will need to login to the Client PC using: admin and
password cisco123 to restart.
84
85
85
86
Step 17 From the 3k-access SSH session, view the authorization status within the
Cisco IOS.
3k-access#show access-session interface GigabitEthernet0/1
detail
Interface: GigabitEthernet0/1
MAC Address: 000c.29bc.6068
IPv6 Address: Unknown
IPv4 Address: 10.1.10.100
User-Name: employee1
Status: Authorized
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Session timeout: 3600s (server), Remaining: 3230s
Timeout action: Reauthenticate
Common Session ID: 0A0164010000003C1D767820
Acct Session ID: 0x00000038
Handle: 0x4700002D
Current Policy: POLICY_Gi0/1
Local Policies:
Idle timeout: 30 sec
Service Template:
DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
86
87
Activity Objective
In this activity, you will configure the Cisco ISE for wireless 802.1X authentication.
After completing this activity, you will be able to meet these objectives:
◼ Verify switch configuration
◼ Configure the Cisco ISE for wireless authentication
◼ Verify the wireless LAN controller (WLC) configuration
◼ Synchronize an access point (AP) to the WLC for connectivity and operation
◼ Associate to the WLC via an authenticated SSID as an employee
Visual Objective
87
88
Wireless Access Wireless Access Policy Set DEVICE:Device Type EQUALS Default Network Access
All Device Types#Wireless
88
89
Conditions Select the plus icon (+) to create the condition. From the Conditions
Library on the left, locate the Wireless_MAB predefined condition from
the list then drag and drop the condition to the shaded area in the Editor
on the right. Click Use.
Use (Identity Source) Internal Endpoints
Options:
If Auth Fail: REJECT
If User not found: CONTINUE
If Process fail: DROP
Step 7 Click on the gear icon at the end of the Wireless MAB rule to create a new
rule below. Use the table below to create the Wireless 802.1X
authentication rule:
Attribute Value
89
90
Conditions Select the plus icon (+) and create the condition > Attributes =
demo.local:ExternalGroups; equals; demo.local/Users/employees
Permissions To create the permissions for this rule, we will click on the plus (+) on the Profiles
column. Select Create a New Authorization Profile.
Name: Wireless Employee Access
Common Tasks: Airespace ACL Name: Allow-All
Click Save at the bottom of the form.
Use the drop-down to select this new Authorization Profile.
90
91
91
92
Step 2 Login to the WLC with the credential cisco for username and cisco for
password. You will see the Monitor page giving a status overview of the
WLC. Click on the Advanced link in the upper right corner of the screen.
Step 3 From the Cisco WLC Admin Portal menu, navigate to Commands. In the
Download file to Controller window verify the file options that follow (#
= Pod Number):
Attribute Value
IP Address 10.1.100.10
File Path /
92
93
Step 4 Click Download to install the configuration file. Follow the prompts to
complete the process. You will most likely see an error message. This is
normal, click OK.
Step 5 Once the process is complete (takes about 5 minutes), you will be
prompted to login to the WLC again. Login to the WLC with the
credential cisco for username and cisco for password. You will see the
Monitor page giving a status overview of the WLC.
Step 6 From the Cisco WLC Admin Portal menu, navigate to Controller >
General. Verify the global controller options that follow. If you make any
changes, click Apply.
Attribute Value
Name WLC
Step 7 From the Cisco WLC Admin Portal menu, navigate to Controller >
Interfaces. Verify the configuration of the interfaces.
Interface Name Port VLAN IP Address Gateway DHCP Interface
ID Type
Step 8 From the Cisco WLC Admin Portal menu, navigate to Controller >
Ports. Verify that you are using Port 1, and it is Link Up.
Step 9 From the Cisco WLC Admin Portal menu, navigate to Controller > NTP
> Server. Verify the NTP server configuration.
Server Index Server Address Key Index NTP Msg Auth Status
1 10.1.100.10 0 AUTH_DISABLE
Step 10 From the Cisco WLC Admin Portal menu, navigate to Wireless. Verify
that there are no APs listed. The interface is shutdown on the switch port
where the Access Point (AP) is connected.
93
94
Step 11 From the Cisco WLC Admin Portal menu, navigate to Security >
RADIUS > Authentication. Verify the RADIUS settings. If changes are
made, click Apply.
Attribute Value
Call Station ID Type for both Acct and Auth System MAC Address
Step 12 Click the 1 under the Server Index, verify the RADIUS Authentication
Server entry for the Cisco ISE. The Shared Secret is not shown, but it is
cisco123.
Attribute Value
Management unchecked
IPSec unchecked
Step 13 Repeat the above step for 10.1.100.22 using 2 for the Server Index.
Step 14 From the Cisco WLC Admin Portal menu, navigate to Select Security >
RADIUS > Accounting. Verify the Global accounting settings.
Attribute Value
Step 15 Click the 1 under the Server Index, verify the RADIUS Accounting
Server entry for the Cisco ISE. The Shared Secret is not shown, but it is
cisco123.
94
95
Attribute Value
IPSec unchecked
Step 16 Repeat the above step for 10.1.100.22 using Server Index 2.
Step 17 From the Cisco WLC Admin Portal menu, navigate to Security > Access
Control Lists > Access Control Lists. Verify the following access
control lists by clicking each one:
Name Action Sequence Source Destination Protocol Source Dest. DSCP Direction
IP IP Port
Port
Allow-All Permit 1 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 Any Any Any Any Any
Internet-Only Permit 1 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 UDP Any DNS Any Any
Deny 2 0.0.0.0 0.0.0.0 10.1.0.0 Any Any Any Any Any
255.255.0.0
Permit 3 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 Any Any Any Any Any
Note Internet-Only ACL is missing first entry that permits DNS. Be sure to add the rule and
save the changes by clicking the apply button.
Step 18 From the Cisco WLC Admin Portal menu, navigate to Management >
Logs > Config. Verify that the Cisco ISE is set as the syslog server to
correlate log messages in the authentication log details.
Attribute Value
95
96
Step 19 From the Cisco WLC Admin Portal menu, navigate to WLANs. Verify
the configured WLANs. (# = Pod Number)
WLAN ID Type Profile Name WLAN SSID Admin Status Security Policies
Step 20 From the Cisco WLC Admin Portal menu, navigate to WLANs. Verify
the WLAN p#-wpa2e profile by clicking the 1 under WLAN ID. (#=Pod
Number) Click Apply if changes are needed.
Attribute Value
General
Type WLAN
SSID p#-wpa2e
Status Enabled
Security—Layer 2
WPA Policy [ ]
Security—Layer 3
Security—AAA Servers
Advanced
96
97
Note Enabling Allow AAA Override is critical because attributes from the AAA server (or Cisco
ISE) will take precedence over the local WLC configuration.
Note The WLAN p#-test is an open system WLAN with no security applied. This WLAN can be
used if troubleshooting is required.
97
98
Step 2 From the 3k-access SSH session, enable the switch port GigabitEthernet
0/3 using the no shutdown command. This will power up and connect the
access point.
3k-access#configure terminal
Enter configuration commands, one per line. End with
CNTL/Z.
3k-access(config)#interface GigabitEthernet0/3
3k-access(config-if)#no shutdown
3k-access(config-if)#end
Note It will take a few minutes for the Access Point (AP) to power up and the switch to
authenticate the Access Point (AP) using MAC Authentication Bypass (MAB).
Step 3 From the 3k-access SSH session, verify the authentication session on
interface GigabitEthernet0/3.
3k-access#show access-sessions interface GigabitEthernet0/3
detail
Interface: GigabitEthernet0/3
MAC Address: 0007.7da3.b129
IPv6 Address: Unknown
IPv4 Address: 10.1.100.250
User-Name: 00-07-7D-A3-B1-29
Status: Authorized
Domain: DATA
Oper host mode: multi-auth
Oper control dir: both
Session timeout: N/A
Common Session ID: 0A01640100000C4D0EF47570
98
99
Local Policies:
Idle timeout: 30 sec
Service Template:
DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
ACS ACL: xACSACLx-IP-PERMIT_ALL_TRAFFIC-
57f6b0d3
Note If you do not see this successful authorization, you will need to troubleshoot your
authorization policy on the Cisco ISE.
Step 4 From the Cisco WLC Admin Portal menu, navigate to Wireless and edit
the Access Point (AP) configuration by clicking the MAC address under
the AP Name column. Under the General tab, configure AP Mode to local.
If you don’t see your AP, give it a few minutes and refresh the screen.
Note The AP needs to be in local mode to function properly as a standard AP and not wireless
bridge or any other special feature mode.
99
100
Note It is critical to make sure that you only associate to your pod’s SSID’s.
Activity Procedure
Complete these steps:
Step 1 Login to the Client PC using the username:
◼ .\admin and password cisco123
Note To send the Windows Ctrl-Alt-Del sequence when using VNC, access the VNC menu by
clicking the VNC icon at the top left of the screen. Select Send Ctrl-Alt-Del.
Step 2 From the Client PC Desktop, go to Control Panel > Network and
Internet > Network and Sharing Center.
Step 3 Select Change adapter settings, disable the Inside NIC. If prompted for
a username and password use admin / cisco123
Step 4 Right click and Enable the Wireless Network Connection, choose
Connect / Disconnect. Verify that you see the following SSID, p#-
wpa2e. (#=Pod Number) in the AnyConnect client. You may need to
enable the wireless in the AnyConnect client.
Step 5 Return to the desktop, from the notification tray, click the AnyConnect
icon.
Step 6 Choose Network Details > Managed Networks
100
101
Step 7 Click Add and fill out the profile with the information shown below. (# =
your assigned pod number)
Media Wireless
SSID p#-wpa2e
101
102
Step 10 You should get a popup asking for your username and password. Sign in
with the username demo\employee1 and password cisco123.
Step 11 From the Client PC, open a web browser. Verify that the authenticated
user can reach the internal site www-int.demo.local and external site
www-ext.demo.local.
Step 12 Return to the Admin Portal of Cisco ISE
Step 13 Navigate to Work Centers > Network Access > Overview > RADIUS
Livelogs.
Step 14 Identify the employee1 access record from the WLC in the list.
102
103
Step 16 Identify the following fields to indicate that you matched the correct
policy.
103
104
Activity Objective
In this activity, you will configure the settings in Cisco ISE that are the core
components of Guest Access. After completing this activity, you will be able to
meet these objectives:
◼ Configure Guest Settings for Guest Access in Cisco ISE 3.0
◼ Configure the Guest Locations and SSID feature in Cisco ISE 3.0
Visual Objective
104
105
Person Visiting String Enter the name of the person you are visiting.
105
106
106
107
Guest Locations
Chicago America/Chicago
Step 3 In the Guest SSID’s field enter your guest SSID (p#-guest) from your
WLC WLAN (# = pod number).
This feature is helpful if for instance your organizational guest network
has different SSIDs based on location. For example, Guest-US, Guest-EU,
Guest-APAC, etc.
Note Do not navigate away to your ISE guest locations/SSID page without saving first, as you
will lose your Guest Location form data.
107
108
Activity Objective
In this activity, you will explore multiple Cisco ISE guest access configurations and
operations. After completing this activity, you will be able to meet these objectives:
◼ Configure Cisco ISE guest access using a hotspot portal
◼ Configure Cisco ISE guest access for self-registration
◼ Configure Cisco ISE guest access for sponsored guest access
108
109
Visual Objective
109
110
110
111
Step 6 From the Cisco WLC Admin Portal menu, navigate to WLANs, select the
WLAN ID next to the hotspot SSID. Click on the Security tab, and then
the AAA Servers tab. Select the ISE-1 and ISE-2 IP Addresses for Server
1 and 2 respectively in both the Authentication Servers and Accounting
Servers dropdowns.
Step 7 On the General tab for the WLAN click the Enabled checkbox to activate
the WLAN, then click Apply in the upper right-hand corner.
Step 8 Navigate to Security > Access Control Lists > Access Control Lists.
Step 9 Click the New button in the upper right. Type the name of the ACL to be
created, ACL-WEBAUTH-REDIRECT. Click Apply
Step 10 Select the ACL name link and select the Add New Rule button in the
upper right to create the rules in the table below:
Seq Source IP Destination IP Protocol Source Port Dest. Port DSCP Direction Action
1 Any Any UDP Any DNS Any Any Permit
2 Any 10.1.100.21 Any Any Any Any Inbound Permit
255.255.255.255
3 10.1.100.21 Any Any Any Any Any Outbound Permit
255.255.255.255
Portal Configuration
Step 11 Return to the Cisco ISE admin portal and navigate to Work Center >
Guest Access > Portal & Components.
Step 12 Select the Guest Portals link.
Step 13 Click the Create button.
Step 14 In the pop-up select Hotspot Guest Portal and then click Continue…
111
112
Step 15 In the Portals Settings and Customization window configure the following
items in bold:
Hotspot Portal Settings and Customization
Attribute Value
Portal Settings
112
113
Step 19 Before making any modifications, observe the Preview on the right side of
the page.
Step 20 This is the Mobile preview page. Below this preview is the Desktop
Preview link. Clicking on it will open up a new browser window.
Step 21 Scroll back up to the top and to the right of the Portal Theme select the
Step 22 Tweaks…button.
Step 23 Observe the color options that you can modify. Click the color square at
the end of the Banner Color line. Play around with the color tool as you
see fit. Pick a custom color or enter #8a099b in the hex box.
Step 24 Click OK.
Step 25 Leave all other colors the default and click OK.
Step 26 Scroll down to the AUP text box. Wherever you see Cisco Systems in the
AUP change it to The Demo Shop.
113
114
Step 27 Select or highlight one of the “The Demo Shop” names and bold it using
the toolbar for the AUP text section. Make any other text modifications
you desire
Step 28 In the Access Code text box type in, Enter Access Code .
Step 30 Edit both Browser Page Title and the Content Title and modify them to
Access Granted.
Step 31 Scroll down to Optional Content 2 and add the following text: Use coupon
code 130 at checkout for extra savings!
114
115
Step 32 Using the toolbar, bold and underline 130 then change the font color of
130 to red. Then select the text and change the font size to large.
Step 33 Scroll to the up and click Refresh Preview to review your work.
115
116
Tip You might want to change the ui_invalid_license_error from “No valid system license
exists.” to something generic since this will be seen by customers.
116
117
Common Tasks
Common Tasks
Note Make sure to verify your WLAN ID for your p##_hotspot WLAN is correct and the WLAN
is enabled.
117
118
Attribute Value
Step 50 Add another rule above the Hotspot rule you just created with the
following parameters.
Guest Access Authorization Policy
Attribute Value
118
119
Step 54 Observe that the Demo – Hotspot portal is now authorized compared to
the other default portals. If you don’t see that, navigate away from that
page and then back again.
Step 55 Click Demo – Hotspot to enter the configuration for that portal.
In the right side, examine the Guest Flow. This diagram is based on the
settings you configured on the left. In this simple hotspot flow, the user
will need to accept the AUP (1) and then they will have successfully
logged on the network (2). You have enabled Support Information and that
is represented in the block on the right.
When you test access in the next section, you will observe this flow.
119
120
Test Access
Step 1 Access your Client PC according to your lab specific instructions.
Note Click Continue if you are prompted to verify the Server Identity.
120
121
Step 8 Observe the modifications that you made. For example, the Banner and
“The Demo Shop” and its initial name bolding.
Step 9 Click in the Access code box and enter an incorrect access code of 1234
and click Accept and observe the result, which should match the error
message you configured.
Step 10 Click the Contact Support link at the bottom. Observe the Support
Information page opens in a new tab (This may take 30-60 seconds).
Observe the modification of the help desk phone number
121
122
122
123
Activity Procedure
Complete these steps:
Configure Guest Type
In this section, you will configure a custom guest type that will restrict access to
business days and hours.
Step 1 In the Cisco ISE Admin portal, navigate to Work Centers > Guest
Access > Portals & Components and then select Guest Types from the
left navigation panel.
Step 2 Observe the default guest types.
Step 3 Click the Create button.
Step 4 Configure a guest type according to the following table, change the bold
items:
Guest Type
Attribute Value
Required [ ]
From 9:00 AM
To 5:00 PM
123
124
Email [X]
Attribute Value
Portal Settings
[ X ] User name [ ]
[ X ] First name [X]
[ X ] Last name [X]
[ X ] Email address [X]
[ X ] Phone number [ ]
[ X ] Company [ ]
[ X ] Location [X]
124
125
Guest can choose from these locations to set their San Jose
time zone <SELECT YOUR LOCATION FROM THE LIST>
(remove others)
125
126
126
127
Step 12 Examine the Guest Flow and when you are comfortable in your
understanding of the flow continue to the next step.
Tip Remember if adding support information to the guest flow is an option; modify the
Support information text phone number from all x’s to an actualnumber.
Note You will not be modifying the AUP to change the company name from Cisco Systems to
The Demo Shop due to time constraints.
Step 15 Scroll down on the right side to view the preview screen, click Refresh
Preview.
127
128
Step 17 Change to a different page by clicking on the boxes to the left and observe
the footer is consistent.
Step 18 In the selection menu in the lower left, expand Notifications and then
select Print.
Step 19 Observe the variables that are used in the text.
Step 20 Create a new line at the bottom of the text box. Add the text Location:
Step 21 In the toolbar, click the Insert Variable icon and observe the variables that
are available. Select Location name to insert that variable. (You might
need to scroll down and then scroll over to find the variable.
128
129
Step 25 Click +Add and create an authorization profile according to the table
below.
Self-Registration Authorization Profile
Common Tasks
129
130
Attribute Value
130
131
Navigate to Client Visibility, find the MAC address of the Client PC and
delete the entry.
Note You also may have to manually clear the client from the WLC. As the WLC holds or
caches association sessions to handle Wi-Fi signal disruptions and roams.
Step 41 Return to your Client PC; From the Notification tray click on the
AnyConnect icon, in the Network section choose your SSID p#-guest.
Step 42 Open IE go to www-ext.demo.local.. You should be redirected to the Self-
Registration Portal. (this may take a minute to appear in the browser).
Step 43 Use your mouse to scroll down to the bottom and click Or register for
guest access.
Attribute Value
Username
131
132
Step 49 Navigate back to the first tab and click I agree to the terms and then Sign
On.
Step 50 Click that you Accept the AUP.
Step 51 In the Device Registration window Click No, skip registration.
Step 52 You should see a success page showing that you are now online.
Step 53 Now navigate to www-ext.demo.local. This should succeed.
Step 54 Return to the Cisco ISE Admin Portal on the Admin PC.
Step 55 Navigate to Operations > RADIUS Live Logs and observe the
authentication records. Notice the first Self-Registration Portal access was
based on the MAC address and then the records switch to using the
username identity with the Guest Access Authorization Profile match.
132
133
Step 58 Observe the following fields, which now provide more meaningful
information about the endpoint instead of just a MAC address.
133
134
Activity Procedure
Complete these steps:
Remove Endpoint from Cisco ISE
Step 1 Access your Client PC according to your lab specific instructions.
Step 2 Make sure you are logged on as CLIENT/admin.
Step 3 In the notification tray click the AnyConnect icon. In the Network section
click on the icon to manage your networks. Choose Disable Wireless.
Step 4 Return to ise-1 admin page, you now need to delete your client computer
out of the GuestEndpoints Group. Navigate to Context Visibility>
Endpoints > Authentication and delete the entry for your Client
Computer.
Note You may have to manually clear the client from the WLC. As the WLC holds or caches
association sessions to handle Wi-Fi signal disruptions and roams.
134
135
Attribute Value
Portal Settings
Employees using this portal as guest inherent Weekly (default)
login options from
135
136
Step 8 Examine the Guest Flow and when you are comfortable in your
understanding of the flow continue to the next step.
Step 11 Click the check box, Self-Registration-Portal and then click Duplicate in
the tool bar.
Step 12 Modify the authorization profile according to the table below.
Sponsored Portal Authorization Profile
Common Tasks
136
137
Attribute Value
137
138
Attribute Value
This sponsor group can create accounts using these Business Daily
guest types Contractor (default)
Daily (default)
Weekly (default)
Sponsor Permissions
Limit to batch of 25
138
139
Tip If you are having trouble selecting the Guest Types and/or the Locations, Save and
Close your work and open IE and edit this page in IE. When done, save your work and
return to Firefox.
Attribute Value
Portal Settings
139
140
Step 5 Open IE, then load www-ext.demo.local. Wait for the web-redirection to
complete.
Step 6 On the Sponsored Guest Portal Page use your mouse to scroll down to the
bottom and notice there is no link to click for self-registration.
Step 7 Return to ISE Admin on the Admin PC.
Step 8 Navigate to Work Centers > Guest Access > Portals and Components
> Sponsor Portals
Step 9 Click Sponsor Portal (default). In the portal page at the top, Click
Portal test URL, this link is at the end of the Description box.
Notice that the Sponsor Portal is shown, and that Cisco ISE automatically
redirected to URL to port 8445. You will need to create an exception for
the step to proceed.
140
141
Step 11 Under Create Accounts in the Guest Information section click Random
and observe the Username prefix is pre-populated with d-guest- as per
the policy you created earlier.
Attribute Value
Number of accounts 2
Duration 2
To Time 19:00
141
142
Username Password
d-guest-
d-guest-
Step 16 Connect to your Client PC and login with one of the “d-guest-“ accounts
that were created by the employee sponsor.
Step 17 Accept the AUP.
Step 18 Return to the Cisco ISE Admin Portal on the Admin PC.
Step 19 Navigate to Work Centers > Guest Access > Reports >Reports> Guest
Access Reports and view the Guest Accounting and Sponsor Login and
Audit sections. Observe the authentication records for both the Sponsor
Login and Audit and the Guest Accounting.
142
143
Activity Procedure
Complete these steps:
Step 1 On the Admin PC access your Sponsor Portal.
Step 2 Click the Manage Accounts tab.
Step 3 Observe the accounts that you have created during this Discovery. Notice
that one of the random accounts which was sponsored by the employee1 is
in the state Created
Step 5 Notice in the pop-up window, you are prompted, “Are you sure you want
to suspend the selected accounts?” and then you are prompted for a reason
for suspension.
Step 6 Enter the following reason, “No-show for meeting.” and click OK.
143
144
144
145
Activity Objective
In this activity, you will run guest reports that are directly available from the
Cisco ISE dashboard. After completing this activity, you will be able to meet
these objectives:
◼ Run guest reports from the Authenticated Guests dashlet
◼ Run guest reports from the Authenticated Guests dashlet sparklines
Visual Objective
145
146
Activity Procedure
Complete these steps:
Step 20 On the Admin PC navigate to the Cisco ISE dashboard by clicking Home.
Step 21 Observe Authenticated Guests in the metrics dashlet area (top of the
screen).
Step 22 Click the Authenticated Guest dashlet tab to run the guest report for that
specific time window.
Step 23 You should see that 100% of your guests have a status of “Connected”.
Click on the circular graphic in the Guest Status area.
146
147
Step 24 You should see something similar to the example shown below. You can
see graphics for GUESTS STATUS, GUESTS TYPE, FAILER REASON,
AND MORE. Below that you see the list of devices, along with their
MAC addresses. Clicking on the MAC address here would bring you to
the same informational screen you just looked at.
147
148
Activity Objective
In this activity, you will configure the Cisco ISE Profiler service and service
settings. After completing this activity, you will be able to meet these objectives:
◼ Enable the Profiler Service
◼ Configure the Cisco ISE NAD definitions for SNMP Profiling
◼ Configure global SNMP profiler settings
◼ Verify NAD configurations for profiling operations
Visual Objective
148
149
Activity Procedure
Complete these steps:
Clean Endpoint data from ISE before Enabling Profiling
Step 1 Return to the Cisco ISE Admin Portal on the Admin PC
Step 2 From the Admin PC, navigate to Work Centers > Profiler > Overview to
view the required configuration steps needed to enable and configure the
profiler service.
Enable Profiling Service
Step 3 Navigate back to Work Centers > Profiler > Overview. Under the
Prepare column and under the Profiling Configuration section, click the
Deployment link to enable the profiling service. This can also be
reached via to Administration > System > Deployment.
149
150
Step 4 In the right pane select your ISE-1 node to edit it, follow these steps on
ISE-2 as well.
Step 5 At the bottom under Policy Service, select the Enable Profiling Service.
Step 6 In the right pane at the top, observe that the Profiling Configuration tab
became available after selecting the Enable Profiling Service feature.
Select the Profiling Configuration tab.
Step 7 Observe the specific probes that are enabled by default:
▪ DHCP
▪ RADIUS
▪ Network Scan (NMAP)
▪ SNMPQUERY
▪ Active Directory
Step 8 Enable the HTTP probe.
Step 9 Scroll down and click Save.
Step 10 Click OK on the pop-up window notifying you of the Policy Service
persona change. You will get a notice that the system will restart.
Step 11 Check the status from the ISE CLI with the command show application
status ise and noticing the Application Server status. Wait for the service
to be running.
150
151
Activity Procedure
Complete these steps:
Step 1 In the ISE admin portal, navigate to Work Centers > Profiler > Feeds.
Step 2 Verify the checkbox is ticked for Enable Online Subscription Update.
Step 3 Check Notify administrator when a download occurs and use the email
address [email protected].
Note When initially configuring the feed service, it is a good idea to test the feed service
connection. This will result in an unsuccessful test because our lab is not
connected to the Internet.
Note Email notification requires that a SMTP server is configured on Cisco ISE. This can be
done via the Administration>Settings>SMTP Server page.
Note The update process will take some time. At least 30-45 minutes.
You can verify the operation of the Feed Service operations by scrolling to the bottom of
the page and viewing the Latest Update section.
151
152
Activity Procedure
Complete these steps:
Configure Cisco ISE NAD configuration for Profiling
Step 1 Navigate to Work Center > Profiler > Network Devices.
Step 2 Click the 3k-access switch to edit the NAD profile.
Step 3 Configure the following settings:
Attribute Value
SNMP Version 2c
152
153
Tip While not a mandatory step in the lab topology, the practice of setting the Originating
Policy Service Node for SNMP profiling operations to the node closest to the NAD is a
best practice and tuning configuration. Especially in a larger or geographically dispersed
ISE deployment.
Attribute Value
153
154
Step 9 Click Save. Verify that the SMNP community strings are correct by
clicking Show.
Verify Profiler Exception Action
Step 10 Navigate to Work Centers > Profiler > Policy Elements. In the left
pane, select Exception Actions. This can also be reached via Policy >
Policy Elements > Results.
Step 11 Click FirstTimeProfile to view the action details.
Observe that the COA Action is to Force COA. This occurs, when an
endpoint profile which is “Unknown” is profile for the first time.
Note This is the default action for all the Cisco provided exception actions.
Activity Procedure
Complete these steps:
Step 1 On your Admin PC, open the shortcuts folder.
Step 2 Click the Firefox link for wlc.demo.local.
Step 3 Login with cisco / cisco.
Step 4 Navigate to the WLANs tab.
Step 5 Click on WLAN ID 3 and disable the p#-guest WLAN.
Step 6 Click WLAN ID 1.
Step 7 Re-enable this WLAN.
Step 8 Click the Advanced tab.
154
155
Step 9 Verify that the Allow AAA Override, DHCP Addr. Assignment: Required,
and NAC State: ISE NAC settings are enabled.
Step 10 Scroll down to the right-hand side section Radius Client Profiling.
Step 11 If not already enabled, click both DHCP Profiling and HTTP Profiling
under the Radius Client Profiling
Step 12 Click Apply at the top and click OK to the pop-up message.
Step 13 Click the < Back button.
Step 14 Complete the same configuration on your other WLANs (2 & 3) but leave
these WLAN’s disabled.
Step 15 Access your 3k-access switch using the username admin and password
cisco123.
Step 16 Run the following command to see the preconfigured SNMP
configuration.
show run | section snmp-server
155
156
Note You may notice that the switch is configured for SNMP trap functionality. The switch
configuration is used for multiple classes. Some of which use the SNMP trap functionality.
Since the switch is preconfigured, if you desire to explore this functionality after your
Discovery is complete, all you would need to do is enable the SNMP trap probe and
enable the trap query functionality in your Cisco ISE NAD SNMP definition. If you do not
see the expected output, notify your instructor.
156
157
Activity Objective
In this activity, you will configure the Cisco ISE profiler service to use profiling
data to make policy determinations. After completing this activity, you will be
able to meet these objectives:
◼ Examine EndPoint profiled data
◼ Create a Logical Profile
◼ Utilize a Logical Profile as an Identity condition for authorization policy
selection
◼ Create a custom profiler policy based on observed endpoint data.
Visual Objective
157
158
Activity Procedure
Complete these steps:
Step 1 On your Admin PC in the Cisco ISE Admin portal navigate to Work
Centers > Endpoint Classification.
Step 2 Observe the list of endpoints that have been learned since the enabling
profiling.
158
159
Step 13 Return to your Admin PC and on your list of endpoints click the refresh
button.
Step 14 You should have at least one Microsoft-Workstation endpoint profile
added to your list.
Step 15 You should also see the Hostname and IP Address for this record in the
list. If you don’t, enter employee1 in search box under Username. (Use
the quick filter if you don’t easily see your MAC address)
Step 16 Select this endpoint profile to observe the endpoint attribute data.
Step 17 Observe that the attribute list contains much more data than seen before
for other endpoints. Pay particular attention to the following list of
attributes:
◼ EndPointSource
◼ Framed-IP-Address
◼ IdentityGroup
◼ MatchedPolicy
◼ NAS-Port-Type
◼ OUI
◼ Total Certainty Factor
Step 18 Return to the Endpoint List.
159
160
Activity Procedure
Complete these steps:
Step 1 In the ISE Admin portal, navigate to Work Centers > Profiler >
Profiling Policies and then in the left pane under Profiling, select Logical
Profiles. Examine some of the existing Profiles.
Step 2 Examine the Mobile Devices Logical Profile record.
160
161
Attribute Value
161
162
Activity Objective
In this activity, you will run reports that focus on profiling data. After
completing this activity, you will be able to meet these objectives:
◼ Run Endpoint Profile Changes Reports
◼ Run Profiled Endpoints Summary Report
◼ Run profiling-based reports from the Cisco ISE Dashboard
Visual Objective
162
163
Step 5 In the Raw Log report page and observe the additional level of detail
available.
163
164
section.
164
165
Activity Objective
In this activity, you will configure Cisco ISE for BYOD on boarding. After
completing this activity, you will be able to meet these objectives:
◼ Create a customized My Device portal
◼ Configure Cisco ISE to provision certificates via the internal CA and
deploy those certificates via a Native Supplicant Provisioning profile
◼ Configure a certificate authentication profile that utilizes the attributes
from the internally deployed CA certificates
◼ Configure Cisco ISE authentication and authorization policies for BYOD
access
◼ Onboard a BYOD device
165
166
Visual Objective
166
167
167
168
Step 3 Edit the My Devices Portal (default) following the table below:
My Devices Portal Settings and Customization
Attribute Value
Portal Settings
Idle timeout 10
168
169
Note Enabling the Support Information feature is an easy way to provide the end user with a
place to go to see their MAC address. Consider using some of the instructional or
optional fields on the My Devices and Add Devices page or others to provide this
information to the end user.
169
170
Step 10 In Firefox go to the next tab in the browser. Add and exception to the
certificate warning. You should see the customize My Devices Portal but
you previously configured.
170
171
Step 12 Agree to the AUP and Sign On, on the next page click the Continue.
Step 13 You have successfully logged into the My Devices Portal using Active
Directory credentials. Your page should look like the figure below.
171
172
Note It is important that any time a default template is used, it is modified to fit the specific
installation environment.
Activity Procedure
Complete these steps:
Certificate Provisioning
Step 21 Under the BYOD tab, click the Portals & Components tab. In the left
pane, expand Certificates and then select Certificate Templates.
Step 22 Duplicate the EAP_Authentication_Certificate_Template (select the tick
box and then Duplicate).
Step 23 Modify the template according to the following table. Verify configuration
with the subsequent screenshot.
Note In this configuration, you will be configuring the OU to be the distinguishing attribute that
will store the functional purpose of the certificate inside each certificate that is issued. By
performing this step, an Authorization Policy rule could be configured with a condition to
match this attribute and then apply the appropriate authorization profile.
Parameter Description
Name BYOD_EAP_AUTH_365
State (ST) CA
Country (C) US
172
173
173
174
Attribute Value
1. Expand Results.
5. Create a Native Supplicant Profile using the followingdata. It is important that your pod
▪ Name Win_WPA2_TLS_BYOD SSID (p#-wpa2e) match
what is exactly configured
▪ Description Pod ## BYOD NSP for your pod. Having your
▪ Operating System Windows All WLC portal open in a
separate tab and
performing a copy/paste
Click +Add to Add a Profile
from there is the most
▪ SSID p#-wpa2e reliable method.
▪ Security WPA2 Enterprise
# = your pod number
▪ Allowed Protocol TLS
▪ Certificate Template BYOD_EAP_AUTH_365
174
175
175
176
176
177
Name CN_USERNAME
Step 3 Verify your configuration with the following screenshot then click
Submit.
177
178
Step 1 Still under the BYOD Work Center, choose Identities tab. In the left
pane, choose Identity Source Sequences.
Step 2 Click +Add to create an Identity Source Sequence according to the
following information. When finished click Submit.
Attribute Value
Identity Source Sequence
Name DOT1X_X509_Username
Description ISS to get username from certificate
Certificate Based Authentication
Select Certificate Authentication [X] CN_USERNAME
Authentication Search List
Selected All_AD_Join_Points
Internal Ussers
Guest Users
Advanced Search List Settings
Selected Treat as if the user was not found and proceed to the
next store in the sequence.
178
179
Tip Take note of the option below both “Allow EAP-TLS” and the “Allow EAP-TLS” under
“Allow PEAP”. The option to “Allow Authentication of expired certificates to allow
certificate renewal in the Authorization Policy”. Using this feature allows for some
flexibility. Enabling this feature by itself weakens the security that is inherent in the
expiration process of X.509 v3 certificates. However, Cisco ISE has a dictionary
condition, CertRenewRequired, which could be used in an Authorization Policy near the
top or as a Global Exception policy, which evaluates the expiration of the certificate and if
it is expired, can be used to apply an Authorization Profile that redirects to the CWA
portal. Hovering your mouse over the (i) icon at the end of the line will pop-up a message
indicating this as shown in the following screenshot.
Attribute Value
Name Wireless_802.1X
Condition Wireless_802.1X
Options
179
180
Step 12 Return to the ISE Admin Portal and click the Policy Elements tab in the
BYOD Work Center. In the left pane, choose Results > Authorization
Profiles.
Step 13 Create the two following Authorization Profiles:
WLC Native Supplicant Provisioning Authorization Profile
Attribute Name Value
Name WLC_NSP
Common Tasks
180
181
Name WLC_User_Access
Common Tasks
Attribute Value
181
182
182
183
183
184
Step 9 Uncheck the Validate server certificate and click on the Configure…
button next to the Select Authentication Method: drop-down box.
184
185
Step 10 Uncheck the tick-box for automatically using login. Click OK, then OK
again.
Step 11 Click on the Advanced settings verify the User or computer authentication
mode is selected.
PC Onboarding
Step 13 Open IE and navigate to www-ext.demo.local.
Step 14 Process through the portal process by clicking Start.
185
186
Note If the security scan fails, view the Downloads folder and right-click on the program.
Select Run anyway.
186
187
Step 19 When prompted click Yes to install the root-CA certificate profile.
Step 20 Continue with the install acknowledging all prompts when presented.
Step 21 Your final screen will be that the profile is installed message. Click Exit.
187
188
Step 22 Open the Network and Sharing Center. Double click on the pXX-wpa2e
profile you created earlier. Click on the Security tab.
188
189
Step 29 Observe the Overview section and notice the indicated sections below.
Step 30 Examine the Steps section and towards the bottom observe the 15048
messages indicating the EAP authentication and the querying of the
Subject Alternative Name and the MAC address as the Radius.Calling-
Station-ID.
Step 31 Close this tab and return to the Cisco ISE admin portal.
Step 32 Navigate to Work Centers > BYOD >Identities > Endpoints.
Step 33 Find the Client PC’s MAC address and open the profile. Observe the
record in this list.
Step 34 Click the attributes tab and find the Device Registration and BYOD
Registration fields indicating the Client PC status is an endpoint.
Step 35 Click on the Authentication tab and then scroll down to the page to see
similar information:
189
190
Tip If you scroll to the bottom you will see a SAH-1 and MD5 hash fingerprints. This could be
useful for helpdesk operator to be able to verify a certificate with the user over the phone,
for example.
190
191
In the previous Discovery, you learned how to configure a BYOD solution. In this activity, you
will learn how to manage that solution. The focus is on how to mark a device lost, and then
stolen.
You will examine Cisco ISE to see how the endpoint is processed for each of these situations.
You will then reinstate a lost or stolen device. You will also process an endpoint for
reenrollment after a certificate has been revoked.
Activity Objective
In this activity, you will configure Cisco ISE settings and polices for
compliance-based access. After completing this activity, you will be able to meet
these objectives:
◼ Configure Cisco ISE Blacklist Portal.
◼ Configure Authorization Profile components for blacklisting.
◼ Configure Authorization Policy rules for blacklisting.
Visual Objective
191
192
Activity Procedure
Complete these steps:
Updating the Blacklist Portal to Use Configured Certificate Group Tag
Step 1 Navigate to Work Centers > BYOD > Portals & Components. In the
left pane, choose Blacklist Portal.
Step 2 Click on Blocked List Portal, and then click Edit.
Step 3 Under Portal Behavior and Flow Settings expand Portal Settings and
change the certificate of the group tag from Default Portal Certificate
Group to ISE Lab CGT.
Step 4 Scroll up and click Save.
Update the Blacklist Authorization Profile
Step 5 Under the BYOD tab, click the Policy Elements tab. Then choose Results
> Authorization Profiles in the left pane.
Step 6 Edit the Blackhole_Wireless_Access profile.
Step 7 Scroll down to Advanced Attribute Settings and change the URL
redirect ACL from BLACKHOLE to BLACKLIST.
192
193
Result Blackhole_Wireless_Access
193
194
Activity Procedure
Complete these steps:
Step 1 In the Cisco ISE admin portal, navigate to Operations > Live Logs.
Step 2 You should already observe an authentication success record for the
employee1 BYOD device that has the resulting Blackhole_Wireless
Access authorization profile result. Cisco ISE issued a CoA when the
device was marked lost. The device automatically re-authenticated as it
normally would and matched the Wireless Black List Default
authorization policy rule.
Step 3 Return to your BYOD device and in the browser navigate to the www-
ext.demo.local. You should be redirected to the blacklist portal
automatically, if the device connects at all.
If the device doesn’t connect verify that it was blacklisted in the Radius
Live Log.
194
195
Activity Procedure
Complete these steps:
Setting Update Information
Step 31 Return to the Cisco ISE admin portal.
Step 4 Navigate to Work Centers > BYOD > Identities. Choose Endpoints in
the left pane.
Step 5 Find the BYOD MAC address and observe the record in this list.
Step 6 Scroll over and observe that the Device Registration field indicating the
endpoint is Lost, you may have to add this column from the Gear icon on
the left. (If the Device Registration column is missing use the gear in the
upper right corner of the table to add the column to the table)
Step 7 If you like, you can also navigate to Context Visibility > Endpoints, and
view a dashlet that reports the device status as “lost”
Step 8 In the upper right-hand corner of your screen, click the search icon, and,
type [email protected] and press Enter
Step 9 Select [email protected] from the suggestions box.
195
196
Step 10 In the search results window, notice Blackhole_Wireless in the text. Click
the record to view the details.
Step 11 Observe that the status is Authenticated & Authorized and assigned
Blackhole_Wireless Access.
196
197
Step 14 Close the result box by simply click outside the box area.
197
198
198
199
199
200
Activity Objective
In this activity, you will configure Cisco ISE settings and polices for
compliance-based access. After completing this activity, you will be able to meet
these objectives:
◼ Configure Cisco ISE Posture Settings
◼ Configure Authorization Profile components for compliance-based access
◼ Configure Authorization Policy rules for compliance-based access.
Visual Objective
200
201
Note The Update Information should be empty since no updates have been downloaded yet.
Step 4 To download and install the Posture Updates, perform the following steps:
◼ Select the Offline radio button.
◼ Beside File to update, click Browse.
◼ Select Desktop in the left pane of the Windows Explorer, select
Posturing file folder from the right pane, then posture-offline.zip and
click Open.
◼ Click Update Now.
Note This file was downloaded from Cisco using this link:
(https://www.cisco.com/web/secure/pmbu/posture-offline.html)
201
202
Note Leaving the value at 0 would configure the client to not display login success screen.
This may be optimal in some organizations.
Step 8 Validate that the ‘Perform posture assessment every time a user
connect to the network’ is selected.
Step 9 Uncheck ‘Cache Last Known Posture Compliant Status’ tick box.
Step 10 Click Save.
202
203
Attribute Value
Step 18 Click Done at the end of the Policy and then Save.
Step 19 Verify your configuration with the following screenshot
Portal Modification
Step 20 Navigate to Work Centers > Guest Access > Portals & Components,
then Guest Portals and edit the Self-Registered Guest Portal.
Step 21 Scroll down to the Guest Device Compliance Settings section and enable
‘Require guest device compliance’.
203
204
Step 23 Navigate to Work Centers > BYOD > Settings, then Retry URL on the
left.
Step 24 Configure the Retry URL as www-int.demo.local
204
205
Attribute Value
Name ACL_POSTURE_REMEDIATION
205
206
Attribute Value
Name ACL_AD_LOGIN
206
207
Attribute Value
Name ACL_INTERNET_ONLY
Note If you desire, you may open a connection to the 3k-access switch and verify by issuing a
show ip access-list ISE-URL-REDIRECT.
Note You will be referencing the name of the URL in authorization profiles. Spelling must
match exactly.
Common Tasks
207
208
Common Tasks
Common Tasks
Step 7 Modify the Domain Computer authorization profile to use the newer port
restrictive dACL for AD Login, ACL_AD_LOGIN and then click Save.
208
209
Note Policy sets are evaluated like Access control lists, top down. Like ACLs, the order of
your rules can determine if your policy functions as expected.
Wired MAB Access Wired MAB Device Wired_MAB Default Network Access
Access
Step 3 Click Save and verify your policy set with the following screenshot.
209
210
Step 4 Modify the Wired Access policy set according to the table below (add the
bolded items)
Policy Set – Wired 802.1X Access
Wired 802.1X Access Wired 802.1X DEVICE:Device Type EQUALS All Device Types#Wired
Device Access AND [add condition from studio library]
Wired_802.1X
Note While in this specific lab environment and configuration, it is not necessary to build a
compound condition of device type wired and Wired_802.1X, the purpose for doing so is
to illustrate the flexibility and capability of the policy set condition aspect of Cisco ISE.
Tip Applying this logic, it would be possible to create a condition matching a specific device
location and access method, wired or wireless, etc. and access type, MAB or 802.1X, to
create and maintain organized policy sets.
Step 9 In the authorization policy, add the following Authorization policy rule
above the Default rule.
210
211
Attribute Value
Step 10 Modify the Default rule to use the authorization profile CWA Posture
Remediation. Also remove the DenyAccess default profile.
Step 11 Verify your policy with the following screenshot.
Caution In a production environment it would be important to copy and create policy rules to
facilitate profiled devices which would access the network by way of MAB. For the sake
of time and due to the simplicity of this lab environment you will not be creating or
configuring such rules. Examples of this would be to copy the Access Point and Profiled
Cisco IP Phones rules over from the Wired_8021X_Access policy.
211
212
Tip Saving the posture status condition to the library for reuse with a simplified name would
make reading policy conditions in their final state easier than reading and attribute value
statement.
Step 19 Add the following authorization policy rule above the Default rule.
212
213
Attribute Value
213
214
Activity Objective
In this activity, you will configure Cisco ISE to provision Cisco posture
agents. After completing this activity, you will be able to meet these
objectives:
◼ Configure Client Provisioning settings for updates from Cisco online.
◼ Configure Client Resources for utilization in compliance-based access.
◼ Configure Client Provisioning policies for the utilization of posture agents
Visual Objective
214
215
215
216
Attribute Value
Name acNAMProfile
216
217
AnyConnect
*Name acWinPostureProfile
Agent behavior
Attribute Value
IP Address Change
Posture Protocol
◼
Note The discovery host needs to be something that will resolve via DNS to generate
traffic (packets) to hit the url-redirect. That traffic will then be redirected to the supporting ISE node
◼ running the Policy Services persona.
217
218
Attribute Value
ISE Posture [X ]
VPN [ ]
Profile Selection
VPN
Step 10 Leave the rest of the form as default, scroll down and click Submit.
218
219
Attribute Value
Step 12 Verify your configuration with the following screenshot then click Done,
then Save.
219
220
Activity Objective
In this activity, you will configure some simple Cisco ISE posture policies to
provide for a functional orientation to posture policies. After completing this
activity, you will be able to meet these objectives:
◼ Configure posture conditions
◼ Configure posture remediation
◼ Configure posture requirements
◼ Configure posture policies
Visual Objective
220
221
Caution Be aware of the case of the file name putty.exe. The Cisco NAC Agent file evaluation is
case sensitive.
Caution The operator is Later than, not Later than or Equal to. This is a common error in
configuration.
Attribute Value
Name PuTTY_Version
Attribute Value
Name Bad_File
221
222
Attribute Value
Name Good_File
Attribute Value
Name ClamWin_AV_Installed
222
223
Attribute Value
Name ClamWin_AV_Current
Vendor ClamWin
223
224
Attribute Value
Name PuTTY_62
Version 0.62
Step 3 Click +Add again and create the following File Remediation.
File Remediation – Good_File
Attribute Value
Name Good_File
Version 1.0
224
225
Step 5 In the right pane, click +Add and create the following Link Remediation.
Link Remediation – Install_ClamWin_AV
Attribute Value
Name Install_ClamWin_AV
Interval 0
Retry Count 0
URL http://www-int.demo.local
Attribute Value
Name Update_ClamWin_AV
Interval 0
Retry Count 0
225
226
Attribute Value
Posture AnyConnect
226
227
Attribute Value
Posture AnyConnect
Attribute Value
Name PuTTY 62
Posture AnyConnect
Attribute Value
Posture AnyConnect
227
228
Attribute Value
Posture AnyConnect
Note You should have the following requirements in your list (the screenshot below is for
information only. Your screen will not look exactly the same).
228
229
Note Posture Policy Status is configured by changing the icon at the beginning of the rule.
Note Requirement Status is configured by changing the icon in front of the Requirement
Name
Attribute Value
Status Enabled
Other Conditions -
Mandatory PuTTY 62
229
230
Attribute Value
Status Enabled
230
231
Activity Objective
In this activity, you will perform client-based access utilizing the previously
configured posture compliance configuration. After completing this activity, you
will be able to meet these objectives:
◼ Perform client access utilizing Cisco AnyConnect for compliance checking.
Visual Objective
231
232
232
233
Step 7 Make sure the required update (Good File) is highlighted and click Start.
Navigate to C:\ise\ and Save the good.txt file. You will now see the
status of that update change to Done.
Step 8 Since the ClamWin is optional you can click Skip to bypass those
updates. AnyConnect System Scan will then show your system as
compliant.
Step 9 Return to your admin PC, open the shortcut folder, and access your 3k-
acccess switch. Validate that the user has been authorized. (Hint: show
access-session)
233
234
Activity Objective
In this activity, you will examine the effects of a faulty policy and review methods
of identifying and troubleshooting such a policy. After completing this activity,
you will be able to meet these objectives:
◼ Use Posture Reports for troubleshooting
◼ Use the Posture Troubleshooter tool
Visual Objective
234
235
235
236
236
237
237