ISE Lab Guide Part 01
ISE Lab Guide Part 01
0 Lab Guide
Part 01
❑ ISE Install
❑ Console into ISE-3.0 and Start Setup
❑ RADIUS – Implementing Secure Wired Differentiated
Access
❑ Configure the Switch for Radius
❑ Configure NAD (Network Access Device) in ISE –
[From the wkst1 device]
❑ Configure AD External Identity Store
❑ Create the ISE policy set
❑ Authorize the Switch for TrustSec Enforcement
❑ Configure New Security Group and Assign IP Security
Group Tag (SGT) Static Mapping
❑ Configure and apply security group ACLs (SGACL)
❑ TACACS+ - Restricting Switch Commands and
Differentiated Access
❑ Create a second TACACS profile for a non-admin
account
❑ Build the TACACS Command Sets for both
Network_Admin and Network-Viewer accounts
❑ Build your TACACS+ policy set
ISE Install
Console into ISE-3.0 and Start Setup
Let this run as you move on to the next scenario. The initial set up process and database build takes about
20-40 minutes.
Step 2 Select the 9300-1 Switch, log in with C1sco12345, and begin configuring the switch with the following
commands.
Note A base configuration is applied to the switch to ensure connectivity for the ISE install in Lab 1.
• Initial config already applied:
• hostname c9300-1
• ip routing
• interface GigabitEthernet1/0/48
• description Connection 4331 – Gi0/0/1
• no switchport
• ip address 198.19.1.2 255.255.255.252
• ip ospf 1 area 0
Configuring Trustsec
c9300-1 (config)# aaa authorization Specifies the CTS authorization list name for all network-related
network CTS group ISE_RADIUS service requests from RADIUS servers. Needed for Trustsec
(ALSO, DO NOT USE 'aaa authorization network default group
ISE_RADIUS ', it will not act right)
c9300-1 (config)# cts authorization list Specifies a list of authentication, authorization, and accounting
CTS (AAA) servers to use by the TrustSec seed device. Needed for
Trustsec (ALSO, DO NOT USE 'cts authorization list default', it
will not act right)
c9300-1 (config)# cts role-based Enables Cisco TrustSec SGACL policy enforcement on routed
enforcement interfaces.
c9300-1 (config)# cts role-based Enforces on your Vlan10
enforcement vlan-list 10
c9300-1 (config)# no cts server test all This is enabled by default and only shows up in the "show run all"
enable The server test being enabled sends heartbeat messages to ISE
and does not pass a username so ISE sees these radius messages
flooding the Radius Live Logs and keeps dropping these messages.
c9300-1 (config)# exit Exit back to enable mode
c9300-1 # cts credentials id c9300-1 Sets the switch up for use when communication with other Cisco
password 12345678 TrustSec devices (ISE)
Step1 Open or re-open your Remote Desktop session your JUMPHOST (wkst1)
Step2 Open Firefox and go to https://198.18.133.28.
Step3 Log in with username admin password C1sco12345.
Step 4 Select Provide later and click Next.
Example:
Step 7 For Name and Description, enter Switches. For Parent Group, select All Device Types. Click Save.
Example:
Step 8 In the top left navigation bar, click Network Devices, and click + Add.
Example:
Step 9 Enter the required information.
Name c9300-1
The name must exactly match the switch hostname.
Step 10 Select the check box next to RADIUS Authentication Settings. For Shared Secret, enter C1sco12345.
Example:
Step 11 Select the check box next to the Advanced TrustSec Setting.
a) Select Use Device ID for TrustSec Identification.
b) For Password, enter 12345678.
c) Select Send Configuration Changes to Device, and then select Using CoA.
d) For Send From, select ISE.
e) Select Device Configuration Deployment.
f) For EXEC Mode Username, enter admin.
g) For EXEC Mode Password, enter C1sco12345.
h) For Enable Mode Password, enter C1sco12345.
Example:
Step 1 Click the menu icon and select Administration > Identity Management > External Identity Sources. Click
Active Directory, and then click + Add.
Example:
Step 2 For both Join Point Name and Active Directory Name, enter dcloud.cisco.com. Click Submit.
Example:
Step 3 When asked, Would you like to join all ISE nodes to this Active Directory
Domain?, click Yes.
Step 4 Use join credentials admin/C1sco12345 and the join should succeed.
Example:
Step 5 Click Close. Click the Groups tab, click + Add, and then select Select Groups from Directory.
Example:
Step 6 Click Retrieve Groups, add the following SIDs, and then click Save.
Example:
Create the ISE policy set
Create theISE policy set
Procedure
Step 1 Click the menu icon and select Policy > Policy Sets.
Step 2 Under Policy Sets, click the + next to Status. Change New Policy Set 1 so both Policy Set Name and
Description are Wired-802.1x.
Example:
Step 3 Under Conditions, click the +. Under Editor click Click to add an attribute.
Step 4 In the attribute pane, select the network device icon and device type.
Example:
Step 5 Set the comparator to Equals and the condition to All Device Types#Switches.
Example:
Step 12 Click the > next to Authorization Policy (not -Local Exceptions or -Global Exceptions).
Note Time for some fun! We are going to make 3 authorization polices for Government, Contractor,
and Guest. The authorization polices are based off stipulations from secdemo.net access policy.
This is advanced and includes how they connect, implements a dACL, applies a security group and
enforces security group ACL.
Step 13 After the pane expands, click the + and the first rule policy elements as such:
Example:
Step Click USE.
14 Under Results Profiles, click the + and select Create a New Authorization Profile.
Step 15 Example:
Name Government_Access
Description Government Access
Access Type ACCESS_ACCEPT
DACL Name PERMIT_ALL_IPV4_TRAFFIC
VLAN Tag ID: 10 ID/Name: 10
Note Click Edit Tag to change Tag ID.
Example:
Step 17 After saving the Government Authorization Profile, be sure to select it under Results Profiles.
Example:
Step Under Results Security Groups click the + and select Create a New Security Groups.
18 Give this security group the following values and then click Submit.
Step 19
Name Government_Employees
Icon (Person)
Description Government Employees
Example:
Step 20 After saving the Government Authorization Profile, be sure to select it under Results Security Groups, and
then click Save.
Example:
Step 21 Now we will create the Contractor policy. Click the + and create new rule policy elements:
Example:
Name Contractor_Access
Description Contractor Access
Access Type ACCESS_ACCEPT
DACL Name PERMIT_ALL_IPV4_TRAFFIC
VLAN Tag ID: 10 ID/Name: 10
Note Click Edit Tag to change Tag ID.
Step After saving the Contractor Authorization Profile be sure to select it under Results Profiles.
25 Under Results Security Groups, click Select from list and select the built-in Contractors group. Click Save.
Step 26 Note This is what your final rule should look like.
Step 27 Now we will create the Guest policy. Click the + and create new rule policy elements as such:
Example:
Step Click Use.
28 Under Results Profiles, click the + and select Create a New Authorization Profile.
Step 29 Example:
Step After saving the Guest Authorization Profile, be sure to select it under Results Profiles.
31 Under Results Security Groups, click Select from list, and then select the built-in Guests group.
Step 32 Example:
Step 33 Click and drag on the left side to organize your rules in the following order:
Example:
The Authorization and Authentication rules are now complete. Next let's dive into building and implementing
Security Group Access Control Lists (SGACL).
Authorize the Switch for TrustSec
Enforcement
Step 3 Name the new rule and select the other fields as follows:
Example:
Step 4 Click Done to the right of the row and then click Save.
Configure NewSecurity GroupandAssign IPSecurity GroupTag(SGT)Static
Mapping
Procedure
Step 1 Click the Components tab at the top, and then select Work Centers > TrustSec > Components > Security
Group.
Step 2 Click + Add and name the new security group TopSecret_and_ClassifiedDocs_Svr.
Example:
Step3 Select database and then click Submit at the bottom of the page
Step4 Click IP SGT Static Mapping on the left.
Step 5 Click + Add and fill in the following:
Example:
Procedure
Name Block_TopSecret_Docs
IP Version IPv4
Security Group ACL content deny tcp dst eq 8080
permit ip
Example:
Step 3 Click Submit.
Step 4 Click + Add to add another SGACL.
Name Block_TS_and_ClassifiedDocs
IP Version IPv4
Security Group ACL content deny tcp dst eq 8080
deny tcp dst eq 8081
permit ip
Example:
Step 5 Click Submit.
Step 6 Select the check boxes for both SCACLs, click Push, and then click OK.
Example:
Step 7 At the top, select TrustSec Policy > Matrix.
The default rule (shown at the bottom of the page) tells us, by default, the applied SGACL is Permit IP. We
want to prohibit Contractors from reaching Top_Secret information and Guests from reaching Top_Secret
and Classified_Docs.
Step 15 You may see a notification in the top-right corner. If so, click Push to the devices.
Example:
Let's see it in action!
Procedure
Step 1 Log into the switch so we can run some commands to verify and see the enforcement. RDP to the Jump Host
(wkst1) if not already in there. Then click mRemoteNG on the taskbar.
Example:
Step 2 Select the 9300 Switch and login with C1sco12345.
Step 3 Type Enable, then enter the password C1sco12345 again. Run the following commands:
a) cts refresh environment-data
b) show cts environment-data
This shows the SGTs that have been pushed down to the switch.
Example:
Feel free to click on the hour glass to dig into each event to see what was going on.
Step 5 Connect to the Client1 machine using VM Console. Select Other User and log in using the credentials below.
Username government1
Password C1sco12345
Example:
Step 6 Open the SX Virtual Link and connect to the USB NIC going to the c9300 switch.
Example:
Step 7 After you connect the NIC, open control panel and go to Network and Internet > Network and Sharing
Center > Change adapter settings.
Example:
Step 8 Right-click on the newly added NIC and select Properties.
Example:
Step 15 Click the top three bars in the top left corner and select Clear browsing data.
Example:
Step 16 Set Time range to All time and then click Clear data.
Example:
Step 17 Now visit each site shown below. You should have access to all three when signed in as Government1.
a) www.topsecretdocs.com:8080 Top Secret Documents/Files
b) www.classifieddocs.com:8081 Classified Documents/Files
c) www.internetonly.com:8082 Internet access only
Step 18 Sign out and sign back in as contractor1/C1sco12345. Repeat this task starting with step 6, adding
authentication credentials and clearing cache and try these sites again.
Notice how the enforcement is taking place to where the Government user had access to everything, the
Contractor should only be able to access the Classified and Internet sites.
Step 19 Sign out and sign back in as guest1/C1sco12345. Repeat this task starting with step 6, adding authentication
credentials and clearing cache and try these sites again.
You should only have internet access.
TACACS+ - Restricting Switch Commands
and Differentiated Access
TACACS+- Restricting Switch CommandsandDifferentiated
Access
Recall Cisco made TACACS+ and it’s widely used in the industry to separate the various networking personas
(admin, guest, contractor etc.) and their respective CLI commands they can issue on specific network-nodes.
TACACS+ separates authentication and authorization.
Procedure
Step2 Go back into the ISE UI and navigate to Administration > System > Deployment.
Step3 Select ISE, and then click Edit.
Step 4 Under Policy Service, select Enable Device Admin Service.
Example:
Name Network_Admin
Default Privilege 15
Maximum Privilege 15
Step 1 Click + Add and create your second TACACS profile with the following elements:
Name Network_Viewer
Default Privilege 1
Maximum Privilege 15
Step 1 Select TACACS Command Sets on the left and click + Add. For Name, enter Allow All Commands.
Select Permit any command that is not listed below.
Step 2 Click Submit.
Step 3 Click + Add to create the Network_Viewer command set.
a) For Name, enter Allow Show Commands Only.
b) Under the Commands pane click + Add.
c) For Grant, select Permit.
d) For Command, enter show*.
e) Click the check mark icon at the right of the row and then click Submit.
Build your TACACS+policy set
Procedure
Step 1 Click the Device Admin Policy Sets tab at the top
Step 2 Click
to create a policy.
a) for Policy Set Name, enter IOS Devices.
b) Under Conditions, click the plus sign and create a condition that matches DEVICE Device Type
EQUALS All Device Types#Switches. Click Save.
Example:
Step 3 Click Use.
Step 4 For Allowed Protocols/Server Sequence, select Default Device Admin.
Example:
.
b) Create a condition that matches dcloud.cisco.com:ExternalGroups EQUALS
dcloud.cisco.com/Builtin/Network Configuration Operators.
Example:
c) Click Save.
Step Click Use.
10 Under Results, for Commands Sets select Allow All Commands, and for Shell Profiles select
Step 11 Network_Admin.
Example:
Step 12 While still under Authorization Policy Local Exceptions, click the plus sign to create your non-admin user
catch all rule.
a) For Rule Name, enter Network_Viewer.
b) Under Conditions, click the plus sign.
c) For Editor, select
.
d) Create a condition that matches dcloud.cisco.com:ExternalGroups EQUALS
dcloud.cisco.com/users/Contractors
e) Select OR on the left pane.
f) Create a second condition that matches dcloud.cisco.com:ExternalGroups EQUALS
dcloud.cisco.com/users/Government Employees
Example:
administrator C1sco12345
government1 C1sco12345
contractor1 C1sco12345
Try these commands for each user and see what is and is not allowed.
• Enable (Remember that the enable password is now the same as the password for that user.)
• Show run or Show ip int br
• Configure Terminal and try different commands
Step 17 Return to ISE and go to Operations > TACACS > Live Logs and you will see each user login and associated
commands performed.
Thanks ☺