Ie Epss Security LLD v1.0
Ie Epss Security LLD v1.0
Type of Document:
Version:
2.0
Date:
August, 2023
Table of Contents
1 Introduction 10
2 FortiGate 13
3 FortiManager 23
4 FortiAnalyzer 1
5 FortiAP 6
Confidential© 2023 P a g e | ii
EPSS Security LLD
7.2.1 Overview................................................................................................. 7
7.5.1 How to install Kaspersky Total Security from the installation file ........... 41
Confidential© 2023 P a g e | iv
EPSS Security LLD
7.5.3.2 Check the protection status in the application main window. ..... 44
8 DUO 2FA 47
9.2 Hardware and Virtual Appliance Requirements for Cisco ISE ...................... 71
Confidential© 2023 P a g e | vi
EPSS Security LLD
9.18.3 Procedure 2 Enable Profiling Services on the Policy Service Node .........113
9.18.4 Procedure 3 Access and View the Profiling Configuration Page ..............113
9.18.9 Procedure 6 Verify That Access Devices Are Configured to Send RADIUS
to ISE PSN ...............................................................................................................116
List of Figures
Figure 57 HA .............................................................................................. 12
Figure 119 Enabling Profiling Services on the Policy Service Node 113
Figure 120 Access and View the Profiling Configuration Page ......... 114
1 Introduction
Confidential© 2023 P a g e | 10
EPSS Security LLD
1.3 Scope
The scope of this document is limited to providing low level design information related to
the following product as listed in the Bill of Materials (BOM) for the new infrastructure:
Confidential© 2023 P a g e | 11
EPSS Security LLD
The database servers will be connected to the SAN and server farm switches with a
10G/25G redundant link. The application servers will be connected to the DMZ switch
with 10G redundant link and server farm switch with 10G/25G redundant link. Storage
will be connected with the SAN switch with 10G/25G redundant link. Backup server
will be connected to the server farm switch a 10G/25G redundant link. With a double
link to the server farm switches and to SAN switches the servers will have an extra
path to the network if one of the links fails to operate. As this will be making the system
run at the maximum level and time.
On the same note the DR site is a replica of the HQ site. On the DR site design we
have we have one core switches, one DMZ switches, one SAN switches, one server
farm switches, one management switches and one firewall. The connection is the
same as HQ design except for the DR there is no redundant link.
The proposed network topology is described in the following section. Prior to beginning
the detailed description, it is beneficial to define the main characteristics of the proposed
design:
➢ Connectivity between the collapsed Cores switches (C9500) and access switches
(C9300L-24P-4X-E) will be 10G fiber uplinks.
➢ Connectivity between the collapsed Core switch and the Server farm switch
(C9300X-24Y-E) will be 10G fiber link.
Confidential© 2023 P a g e | 12
EPSS Security LLD
The architecture of the new infrastructure deployed for EPSS’s project comprises of the
Two-tier switching architecture design to be deployed.
1.5 Requirements
Based on our site survey we prepared and submitted a Site Preparation Guide (SPG).
On the SPG we listed some requirement than need to be fulfilled by EPSS in order to
implement the project. We like to remind you that those requirements should be fulfilled
before we start the implementation.
2 FortiGate
In order to connect to the GUI using a web browser, an interface must be configured to
allow administrative access over HTTPS or over both HTTPS and HTTP. By default, an
interface has already been set up that allows HTTPS access with the IP address
192.168.1.99.
Browse to https://192.168.1.99 and enter your username and password. If you have not
changed the admin account’s password, use the default user name, admin, and leave the
password field blank.
Confidential© 2023 P a g e | 13
EPSS Security LLD
The GUI will now display in your browser, and you will be required to provide a password
for the administrator account.
1. Go to Network > Interfaces and edit the interface you wish to use for access.
Take note of its assigned IP address.
2. In Administrative Access, select HTTPS, and any other protocol you require.
You can also select HTTP, although this is not recommended as the
connection will be less secure.
3. Click OK.
Confidential© 2023 P a g e | 14
EPSS Security LLD
At the prompt type Username(admin) & Password (no password at initial) and press the
enter tab:
FortiGate password>
FortiGate#
Confidential© 2023 P a g e | 15
EPSS Security LLD
Setting the FortiGate’s hostname assists with identifying the device, and it is especially
useful when managing multiple FortiGates. Choose a meaningful hostname as it is used
in the CLI console, SNMP system name, device name for FortiGate Cloud, and to identify
a member of an HA cluster.
3. Click Apply.
end
Confidential© 2023 P a g e | 16
EPSS Security LLD
Registering your FortiGate allows you to receive FortiGuard updates and is required for
firmware upgrades and access to https://support.fortinet.com/welcome/#/ . Before
registering your FortiGate unit, it must have Internet connectivity.
Confidential© 2023 P a g e | 17
EPSS Security LLD
firmware installed. Cluster members must also have the same hardware configuration
(such as the same number of hard disks). All cluster members share the same
configurations except for their host name and priority in the HA settings. The cluster works
like a device but always has a hot backup device.
The system selects the primary node based on the following criteria:
Link health (if monitor ports links are down, the node is considered down)
Confidential© 2023 P a g e | 19
EPSS Security LLD
cluster, only the management IP address for the primary node is active.
In an active-passive cluster, you can log into a node only when it has primary node
status and its IP address is active. To access the user interface of an appliance in
standby status (the active-passive slave), you must use a console port connection.
Mode Active-Passive
Except for the device priority, these settings must be the same on all FortiGates in the
cluster.
2. Leave the remaining settings as their default values. They can be changed after
the cluster is in operation.
Confidential© 2023 P a g e | 21
EPSS Security LLD
3. Click OK.
4. Factory reset the other FortiGate that will be in the cluster, configure GUI access,
then repeat steps 1 to 3, omitting setting the device priority, to join the cluster.
The Devices will negotiate based on Device priority and the Device with higher priority
becomes master and the device with lower priority becomes a slave.
The HA synchronization status can be viewed in the GUI through either a widget on
the Dashboard or on the System > HA page. go to System > HA to see the
synchronization statuses of the members. A member that is out of synchronization will
have a red icon next to its name. Hover the cursor over the unsynchronized device to see
the tables that are out of synchronization and the checksum values.
Synchronized:
Confidential© 2023 P a g e | 22
EPSS Security LLD
In the CLI, run the get system ha status command to see if the cluster is in
synchronization. The synchronization status is reported under Configuration Status.
3 FortiManager
2. Configure the management computer to be on the same subnet as the internal interface
of the FortiManager unit:
• IP address: 192.168.1.X
• Netmask: 255.255.255.0
4. Type admin in the Name field, leave the Password field blank, and click Login. The
FortiManager Setup wizard is displayed.
5. Click Begin to start the setup process The FortiManager unit can be configured and
managed using the GUI or the CLI. This section will step you through connecting to the
unit via the GUI. FortiCare step cannot be skipped and must be completed before you
can access the FortiManager appliance or VM
Confidential© 2023 P a g e | 23
EPSS Security LLD
6. If ADOMs are enabled, the Select an ADOM pane is displayed. Click an ADOM to
select it. The FortiManager home page is displayed.
The FortiManager Setup wizard requires that you complete the Register with FortiCare
step before you can access the FortiManager appliance or VM.
Confidential© 2023 P a g e | 24
EPSS Security LLD
1. Log in to FortiManager.
3. When prompted, register with FortiCare and enable FortiCare single sign-on. You must
complete the Register with FortiCare step before you can access the FortiManager
appliance or VM.
Confidential© 2023 P a g e | 25
EPSS Security LLD
Figure 12 Hostname
.5. In the Hostname box, type a hostname.
6. Click Next.
Confidential© 2023 P a g e | 26
EPSS Security LLD
Figure 13 Password
a. In the New Password box, type the new password.
c. Click Next
8. When a new firmware version is available for your device on FortiGuard, the Upgrade
Firmware option in the wizard indicates that a new version is available, and you can click
Next to upgrade to the new firmware, or Later to upgrade later
1. On the management computer, start a supported web browser and browse to https://<ip
address> for the FortiManager VM.
Confidential© 2023 P a g e | 27
EPSS Security LLD
2. Activate License
Confidential© 2023 P a g e | 28
SI- IE-EPSS-LLD Network and Security
Use the navigation menu on the left to open another pane. The available panes vary
depending on the privileges of the current user.
Device Manager Add and manage devices and VDOMs. Create and assign scripts and
provisioning templates. You can also access the SD-WAN monitor and VPN monitor.
VPN Manager Configure and manage VPN connections. You can create VPN topologies
and managed/external gateways.
AP Manager Configure and manage FortiAP access points. For more information.
Log View View logs for managed devices. You can display, download, import, and delete
logs on this page. You can also define custom views and create log groups. This pane is
only available when FortiAnalyzer features are enabled.
Fabric View Configure fabric connectors and view Security Fabric Ratings.
Incidents & Events Configure and view events for logging devices. This pane is only
available when FortiAnalyzer features are enabled.
Reports Generate reports. You can also configure report templates, schedules, and
output profiles, and manage charts and datasets. This pane is only available when
FortiAnalyzer features are enabled.
FortiGuard Manage communication between devices and the FortiManager using the
FortiGuard protocol
Management Extensions Enable and use management extension applications that are
released and signed by Fortinet.
Menu Click to toggle the visibility of the navigation menu on the left.
ADOM If ADOMs are enabled, the required ADOM can be selected from the dropdown
list.If enabled, ADOMs can also be locked or unlocked. The ADOMs available from the
ADOM menu will vary depending on the privileges of the current user.
CLI Console Open the CLI console to configure the FortiManager unit using CLI
commands directly from the GUI, without making a separate SSH, or local console
connection to access the CLI.
b. In the box, type the management port IP address for the device, and click Next.
Security policies are instructions that units use to decide connection acceptance and
packet processing for traffic attempting to pass through. When the firewall receives a
connection packet, it analyzes the packet’s source address, destination address, and
service (by port number), and attempts to locate a security policy matching the packet.
Security policies can contain many instructions for the unit to follow when it receives
matching packets. Some instructions are required, such as whether to drop or accept and
process the packets, while other instructions, such as logging and authentication, are
optional.
Policy instructions may include Network Address Translation (NAT), or Port Address
Translation (PAT), or they can use virtual IPs or IP pools to translate source and
destination IP addresses and port numbers.
Policy instructions may also include Security Profiles, which can specify application-layer
inspection and other protocol specific protection and logging, as well as IPS inspection at
the transport layer.
You configure security policies to define which sessions will match the policy and what
actions the device will perform with packets from matching sessions.
Sessions are matched to a security policy by considering these features of both the packet
and policy:
• Incoming Interface
• Source Address
• Outgoing Interface
• Destination Address
If the initial packet matches the security policy, the device performs the configured action
and any other configured options on all packets in the session.
• DENY policy actions block communication sessions, and you can optionally log
the denied traffic. If no security policy matches the traffic, the packets are dropped,
therefore it is not required to configure a DENY security policy in the last position
3.10 AP Manager
The AP Manager pane allows you to manage FortiAP access points that are controlled
by FortiGate devices and are managed by FortiManager. You can use AP Manager for
the following modes of management:
FortiAP devices are grouped based on the controller that they are connected to. The
devices can also be further divided into groups within a controller.
Confidential© 2023 P a g e | 10
EPSS Security LLD
We can quickly view the status of devices on the Managed FortiAPs pane with the quick
status bar, which contains the following charts:
• Status
We can click each status in the legend to display in the content pane only the devices
referenced in the quick status.
Use the Show Charts dropdown and toggle to show or hide charts. From the dropdown,
select or de-select checkboxes to show or hide the respective chart.
Confidential© 2023 P a g e | 11
EPSS Security LLD
4. Mouse over the charts to see more information about the data in a tooltip.
5. Click items in the legend to filter the devices displayed on the content pane. For
example, if Offline is available in the legend, click Offline to display only devices that are
currently offline.
You can click multiple items in the legend to apply multiple filters. A filter icon appears
next to the chart title when it is being used to filter the devices on the Managed FortiGate
pane.
6. To remove the filters, click the chart title with the filter icon.
7. Click More > View Rogue APs to open the rogue AP list in a pop-up window.
Confidential© 2023 P a g e | 12
EPSS Security LLD
FortiGate Select the FortiGate that the AP will be added to from the dropdown list. If you
have already selected a FortiGate in the tree menu, this field will contain that FortiGate.
FortiAP Profile Select an AP profile to apply to the device from the dropdown list.
Enforce Firmware Version Toggle ON to enforce a firmware version and select the
firmware version from the drop-down menu. Toggle OFF to disable this feature.
2. Select the FortiGate that contains the unauthorized FortiAP devices. Alternatively, you
can select a device in a group,
Confidential© 2023 P a g e | 13
EPSS Security LLD
3. In the Status chart legend, click Unauthorized. The unauthorized FortiAP devices are
displayed in the content pane.
4. Select the FortiAP devices and click More > Authorize from the toolbar, or right-click
and select Authorize. The Authorize AP dialog opens.
2. Select the FortiAP devices and either click More > Deauthorize from the toolbar, or
right-click and select Deauthorize. The Deauthorize AP dialog opens.
3.13 SSIDs
3.13.1 Creating SSIDs
When creating a new SSID, the available options will change depending on the selected
traffic mode: Tunnel, Bridge, or Mesh. When you create SSID profiles, you can select a
QoS profile and/or an Access Control List profile.
2. In the toolbar, click Create New > SSID. The Create New SSID Profile windows opens.
Confidential© 2023 P a g e | 14
EPSS Security LLD
3. Enter the following information, then click OK to create the new tunnel to
wireless controller SSID:
Confidential© 2023 P a g e | 15
EPSS Security LLD
Confidential© 2023 P a g e | 16
EPSS Security LLD
Confidential© 2023 P a g e | 17
SI- IE-EPSS-LLD Network and Security
4 FortiAnalyzer
The FortiAnalyzer unit can be configured and managed using the GUI or the CLI. This
section will step you through connecting to the unit via the GUI.
4. Type admin in the Name field, leave the Password field blank, and click Login. The
FortiAnalyzer Setup wizard is displayed.
5. Perform one of the following actions: a. Click Begin to start the setup process now. See
FortiAnalyzer Setup wizard on Click Later to exit the FortiAnalyzer Setup wizard and
continue connecting to the GUI.
6. If ADOMs are enabled, the Select an ADOM pane is displayed. Click an ADOM to
select it. The FortiAnalyzer home page is displayed.
7. Click a tile to go to that pane. For example, click the Device Manager tile to go to the
Device Manager pane
When you log in to FortiAnalyzer, the FortiAnalyzer Setup wizard is displayed to help you
set up FortiAnalyzer by performing the following actions:
• Specifying a hostname
You can choose whether to complete the wizard now or later. When actions are complete,
a green checkmark displays beside them in the wizard, and the wizard no longer displays
after you log in to FortiAnalyzer.
FortiAnalyzer Setup wizard when you log in to FortiAnalyzer, the FortiAnalyzer Setup
wizard is displayed to help you set up FortiAnalyzer by performing the following actions:
• Specifying a hostname
You can choose whether to complete the wizard now or later. When actions are complete,
a green checkmark displays beside them in the wizard, and the wizard no longer displays
after you log in to FortiAnalyzer.
2. Click Begin to start the setup process now. Alternately, click Later to postpone the
setup tasks.
3. When prompted, register with FortiCare and enable FortiCare single sign-on.
b. In the Password box, type your FortiCare password. If you have forgotten your
FortiCare password, click forgot your password to proceed through the password
recovery process.
c. Set the FortiCloud Single Sign-On toggle to the ON or OFF position to enable or disable
Fort iCloud SSO sign on. When enabled, you must also enter the SP Server Address
d. Click Next.
d. Click Next.
c. Click Next
b. Click Next.
Management Extensions Enable and use management extension applications that are
released and signed by Fortinet.
Log View View logs for managed devices. You can display, download, import, and delete
logs on this page. You can also define custom views and create log groups.
Reports Generate reports. You can also configure report templates, schedules, and
output profiles, and manage charts and datasets. This pane is not available when the unit
is in Collector mode.
FortiRecorder Manage FortiCamera devices and view camera streams and recordings
through the Monitors dashboard. This pane is only available in physical appliances and
is disabled by default. This pane is not available when the unit is in Collector mode.
Incidents & Events Configure and view events for logging devices. This pane is only
visible when the FortiSoC pane is disabled. This pane is not available when the unit is in
Collector mode.
5 FortiAP
The most common form of access at the LAN edge for users these days is WiFi. Wireless
access points can be added to any network to provide WiFi access to employees and
guests alike. The challenges of adding wireless to a deployment go far beyond the
physical installation of the hardware.
LAN edge equipment from Fortinet converges networking and security into a secure,
simple-to-manage architecture with a single focal point for management and
configuration. By leveraging Security-Driven Networking, Fortinet allows you to secure
the LAN edge without the need for costly and complex licensing schemes while benefiting
from all the current cutting-edge WiFi enhancements, depending on the models. From the
same dashboard used to manage the NextGeneration Firewall and Policies, you also
have complete visibility over the wireless client details:
• Username
• With which device (name, MAC address, IP address) using which operating
system type
• On which Fortinet wireless access point (which is also displayed on the WiFi
Maps)
• At what quality (signal strength, data rate, WiFi band, TX/RX bandwidth, spatial
streams)
Configuring and managing access points from the same known dashboard as the security
parameters also allows immediate visibility and troubleshooting advantages. One can
very quickly understand:
• The WiFi channels used, the TX power, and at what utilization percentage of the
channel they operate
• The SSIDs being advertised and in which mode (tunneled, bridged, mesh)
• FortiAP is the hardware used to aggregate the wireless connections on the LAN
edge, providing different access modes, radio configuration capabilities, and all the
current cutting-edge WiFi enhancements (depending on the model.)
• FortiAP firmware is the operating system, CLI, and control system of FortiAP.
• Tunnel mode is the default mode for a FortiAP. A FortiAP in tunnel mode uses a
wireless-only subnet for wireless traffic and transports the traffic from the AP to the
FortiGate in an encapsulated way.
• Bridge mode When a FortiAP is in Bridge mode, the Ethernet and WiFi interfaces
are connected (or bridged), allowing wired and wireless networks to be on the
same subnet. In essence, the WiFi traffic will be mapped with one or multiple
VLANs on the FortiSwitches.
• Fortinet ZTNA Access Proxy, which runs natively in FortiOS, starting in FortiOS
7.0
Confidential© 2023 P a g e | 10
EPSS Security LLD
EPSS Fortinet Secure SD-WAN solution can be extended to Secure SD-Branch. SD-
Branch consists of the following components:
FortiGate also:
• Brings WAN optimization by means of protocol optimization and byte and object
caching
Confidential© 2023 P a g e | 11
EPSS Security LLD
can grow exponentially with the number of edge devices (full mesh), making the efficiency
of tunnel management a critical part of the solution.
Confidential© 2023 P a g e | 12
EPSS Security LLD
FortiManager reduces administration and workload costs with smart features, such as
device discovery, device group creation by administration domain, audit, and
management of complex SD-WAN architecture.
Confidential© 2023 P a g e | 13
EPSS Security LLD
Confidential© 2023 P a g e | 14
EPSS Security LLD
• Bytes sent/received
Confidential© 2023 P a g e | 15
EPSS Security LLD
Confidential© 2023 P a g e | 16
EPSS Security LLD
6.4 FortiAnalyzer
FortiAnalyzer collects information, such as traffic and security events, and reduces the
effort required to monitor the information system.
The FortiAnalyzer solution is responsible for the collection and the valuation of logs
generated by FortiGate, FortiMail, FortiClient solutions, FortiWeb, FortiManager,
FortiSandbox, FortiDDoS, and FortiCache. It receives logs, stores them, produces
predefined and customized reports, and supports configuration of advanced alerting.
FortiAnalyzer provides two operation modes: Analyzer and Collector. Analyzer mode is
the default mode that supports the full FortiAnalyzer features. The HQ task of a Collector
is to receive logs from connected devices and upload the logs to an Analyzer. Instead of
writing logs to the database, the Collector retains them in their original (binary) format and
sends them to the Analyzer.
• Security Fabric analytics: event correlation across all logs and real-time anomaly
detection, with Indicator of Compromise (IOC) service and threat detection,
reducing time-to-detect.
Confidential© 2023 P a g e | 17
EPSS Security LLD
• Security automation: Reduce complexity and leverage automation via REST API,
scripts, connectors, and automation stitches to expedite security response.
Confidential© 2023 P a g e | 18
EPSS Security LLD
When standardizing on a multitenant platform, the MSP should ensure the parameters
detailed above are then written into the overall service level agreement between MSP
and end-customer.
This standardization ensures platform sizing and scalability are tested and documented,
and avoids situations where non-standard target customers could impact others on the
shared platform.
FortiAnalyzer requires logs from the branch FortiGate with latency, jitter, and packet loss
information to create and display SD-WAN graphs. It is mandatory to specify the sending
interval, which is configured in the FortiManager SDWAN template. The sending interval
is configured using set-fail-log-period (seconds) and set-pass-logperiod (seconds).
Confidential© 2023 P a g e | 19
EPSS Security LLD
1. SD-WAN interface members define your SD-WAN bundle. They are the
interfaces that will be controlled by SDWAN and where traffic can potentially flow.
Almost any interface supported by FortiGate devices can become an SD-WAN
member (including physical ports, VLAN interfaces, LAGs, IPsec/GRE/IPIP
Confidential© 2023 P a g e | 20
EPSS Security LLD
tunnels, and even FortiExtender interfaces). Often it will include both your
underlays and overlays, but this is not a requirement. For EPSS we will configure
the overlays to be your SD-WAN members while keeping the underlay outside.
2. Performance SLA are the health-check probes used by the edge devices to
actively measure the health of each available path. You can define what server to
probe and what protocol to use (including Ping, HTTP, TCP/UDP Echo, TWAMP,
or DNS). Each probe will measure latency, jitter, and packet loss percentage over
the configured subset of the SD-WAN members.
Confidential© 2023 P a g e | 21
EPSS Security LLD
3. SD-WAN rules combine all the elements. These are the actual set of business
rules used to steer a particular application to a specific SD-WAN member while
considering its current health and SLA status. Each rule has the following logical
parts:
Matching Criteria defines what applications or what kind of traffic will match this
rule. We can match based on a large variety of inputs, including:
• IP Address
• Applications
• User Identity
• DSCP/ToS fields
Confidential© 2023 P a g e | 22
EPSS Security LLD
• Route Tags
SD-WAN Strategy defines the logic applied to select one of the SD-WAN members to
steer this traffic. The following strategies will be configured:
• Lowest Cost (SLA)—select the cheapest SD-WAN member that meets a given
SLA target.
Confidential© 2023 P a g e | 23
EPSS Security LLD
• Firewall rules define how to secure a particular application, should a particular path
be selected.
• SD-WAN rules define how to select a particular path for a particular application.
Having both rulesets rely on the same inputs (such as Application Control Database,
Internet Service Database [ISDB], same User Identity providers, and so on) significantly
improves integration between different pillars and the consistency of the overall solution.
1. SD-WAN rules are matched only if the best route to the destination points to SD-WAN.
The best route to the destination must point to any SD-WAN Member—not necessarily
the one selected to forward the traffic. This check allows you to easily fit SD-WAN
functionality into your existing network topology without disrupting services that are not
supposed to be handled by SD-WAN. For example, you may have an out-of-band
management network or a group of sites that have not (yet) migrated to SD-WAN. If the
best route to the destination does not point to your SD-WAN bundle, the traffic will be
handled by conventional routing.
Confidential© 2023 P a g e | 24
EPSS Security LLD
This check happens at a later stage when an SD-WAN rule is already matched and
evaluated. Based on the configured strategy, one of the listed SD-WAN members will be
preferred. But the traffic will only be forwarded via that member if there is a route to the
destination through that path. Otherwise, the member will be skipped, and the next
optimal member will be checked.
available paths and destinations in the network can change dynamically due to network
failures, planned migrations, or even changes in traffic patterns. The Zero-Touch nature
of the first four pillars is achieved using two dynamic technologies that, once configured,
do not require further operator intervention.
6.8.1 Underlay
First, you must decide what underlay links you will use to connect all participating sites
and the public internet. Do you have multiple internet connections? Or an internet
connection and an MPLS link? Or will it be a broadband internet connection and an LTE
modem? In our Case we will use two internet connection from HQ.
Since all edge devices are full-featured FortiGate devices, the range of possibilities is
extensive. While each site can, in principle, be designed and configured differently from
the others, we will define a limited number of groups of sites with identical configurations
within each group. This will simplify provisioning and the operation of your SD-WAN
solution.
6.8.2 Overlay
Second, you must decide on the topology to interconnect your sites. In most cases, you
will build IPsec overlays over all the underlay transports to most likely form a set of hub-
and-spoke topologies. This way, you can secure your corporate (site-to-site) traffic, and
provide confidentiality, integrity, and mutual site authentication, as expected from an
industry standard IPsec suite. Hub-and-spoke topologies are highly scalable, and they
have a crucial zero-touch property: When adding or removing a spoke, the configuration
of all other devices remains untouched. Hub-and-spoke topologies can also be enhanced
with redundancy options (such as dual-hub). They can be extended to multiple regions
(multi-regional hub-and-spoke topologies interconnected together) for large-scale
deployments.
Confidential© 2023 P a g e | 26
EPSS Security LLD
For our multi-regional deployments, we will allow cross-regional ADVPN shortcuts, makes
our topology even more dynamic.
Figure 43 Overlay
We will use ADVPN as the most generic, dynamically adjustable topology for your
overlays.
6.8.3 Routing
The overlays provide us with multiple paths between the sites (over different underlay
transports). Still, we must also ensure that all edge devices have the correct routing
information needed to use these paths. We will use BGP to exchange routes between all
sites over the overlays.
BGP fits well into hub-and-spoke overlay topologies, and it is also the recommended
routing protocol to use with ADVPN. As we will show in design examples, the hubs will
act as BGP route reflectors (RR) so that the spokes will not have to peer directly with
each other—not even over ADVPN shortcuts! This design is in-line with the zero touch
strategy: once again, when adding or removing a spoke, the BGP configuration of all other
devices remains untouched.
Confidential© 2023 P a g e | 27
EPSS Security LLD
A crucial difference between a traditional design and our SD-WAN solution is in the role
of the routing pillar. In a conventional design, routing oversees the steering of traffic. It is,
therefore, the responsibility of routing to select the best path out of all available options.
Multiple route policy techniques can be used to achieve this—some are protocol agnostic
(for example, weight), and others are protocol-specific (for example, BGP local-
preference, MED, AS_PATH prepending, and so on). While all these techniques remain
available on a full-featured FortiGate edge device, we must recall that our goal is only to
learn about all available paths to all possible destinations.
6.8.4 Security
Quite often, different security features must be applied to different paths. The most
common example is the difference between direct and remote internet access. In the
former case, the traffic breaks out directly from the edge device (through one or more
underlay links), making it crucial to apply the necessary level of security before it leaves
the site boundaries. In the latter case, the traffic might undergo additional security
inspection in the central location or use a cloud-based security solution before breaking
out to the public internet. As a result, the edge device has to apply a different set of
security features, depending on which of the two internet access methods was selected
for a particular session.
We achieve this granular security in our solution by grouping different interfaces into SD-
WAN zones and defining firewall rules on a per-zone basis. In EPSS, we would define
SD-WAN zone, and we would define separate firewall rules for the internet traffic exiting
through each one of them.
6.8.5 SD-WAN
We will consider all the available paths to the requested destination, compare their
measured health, and then apply a business strategy configured for a particular
application to make the optimal choice. Health measurement continues in real time. If the
conditions change, both new and existing sessions can quickly switch over to another
path. As we have covered earlier, SD-WAN configuration typically consists of the
following elements:
Confidential© 2023 P a g e | 28
EPSS Security LLD
• Performance SLAs
• SD-WAN rules
For the optimal configuration of your SD-WAN solution, we must understand and use the
following recommended principles:
The originating site should take the steering decision—that is, by the SD-WAN rules of
the edge device located at the site originating the session. If the decision is to break out
locally, the traffic will leave the boundaries of the SDWAN solution. Otherwise, the traffic
will flow via one of the active overlays. Hence it will pass through one or more additional
FortiGate devices that are part of your solution. All those devices are expected to
“respect” the SD-WAN choice made by the originating site. For example, in a hub-and-
spoke topology, if the originating site has selected an overlay over MPLS transport as its
next hop to the hub, the hub should prefer using the overlay over MPLS transport to
forward the traffic further toward the destination site. We also call this property the overlay
stickiness.
Confidential© 2023 P a g e | 29
SI- IE-EPSS-LLD Network and Security
In this design, branch SD-WAN devices now have two (or more) gateways at separate
geo-redundant locations from which to steer traffic. A HQ gateway is usually HQ in the
preferred datacenter location while the DR gateway is at the DR location. Traffic will flow
through the HQ gateway under normal conditions and utilize the DR gateway as a backup.
In this design, each hub acts precisely as in the base design, and the hubs are
independent of each other. The spokes connect to the dial-up IPsec endpoints of both
hubs, over all available underlay transports. Effectively, each of the hubs defines its own
set of point-to-multipoint overlays. Each SD-WAN Gateway may provide one or multiple
services:
• Protect the datacenter resources and private workloads by utilizing FortiGate Next-
Generation Firewall services
FortiGate HA offers several solutions for adding redundancy in the case where a failure
occurs on the FortiGate, or is detected by the FortiGate through monitored links, routes,
and other health checks. These solutions support fast failover to avoid lengthy network
outages and disruptions to your traffic.
FortiGate HA options:
Active/passive
Active/active
6.9.7 ADVPN
For the correct operation of ADVPN, it is required to preserve all sites’ prefixes
unchanged, including their original BGP next-hop values. Hence, it is impossible to
replace the specific routes with summaries (unlike in a static hub-and-spoke topology).
Hence, the BGP RR function is mandatory: the gateway must reflect the original routes
between the spokes without altering them.
• Direct internet access (DIA): used when local internet breakout at a location is
required. In this scenario, the business application(s), such as a SaaS application
or website, is located on the internet, and the SD-WAN appliance is needed to
decide the best path between multiple WAN links. Traffic is routed directly to the
internet by using the preferred method in the SD-WAN rule.
Figure 46 DIA
Figure 48 Branch to DR
7 Kaspersky Installation and Configuration
7.1 Introduction
In an increasingly interconnected digital landscape, ensuring the security of your systems,
data, and network infrastructure is of paramount importance. This guide has been
meticulously crafted to assist us in the seamless installation, configuration, and
optimization of Kaspersky's advanced cybersecurity solutions.
In this era of evolving cyber threats, organizations are confronted with sophisticated
attacks that target vulnerabilities across various endpoints. Kaspersky offers a suite of
cutting-edge cybersecurity tools, including Kaspersky Secure Center for centralized
management and Endpoint Detection and Response (EDR) for rapid threat detection and
mitigation. Leveraging these tools in conjunction with a MySQL database for data
management and storage, organizations can fortify their defenses and proactively
safeguard against a multitude of cyber risks.
Throughout this guide, we will delve into the step-by-step process of installing and
configuring Kaspersky security solutions. From setting up the MySQL database to serve
as a reliable repository of critical security data, to deploying Kaspersky Secure Center for
Prerequisites
The following requirements should be available in your system to work with MySQL:
• RAM 4 GB (6 GB recommended)
Step 2: Next, there are two options available to download the setup. Choose the version
number for the MySQL community server, which you want. If you have good internet
connectivity, then choose the mysql-installer-web-community. Otherwise, choose the
other one.
Step 3: Once we click on the Next button, it may give information about some features
that may fail to install on your system due to a lack of requirements. We can resolve them
by clicking on the Execute button that will install all requirements automatically or can
skip them. Now, click on the Next button.
Step 4: In the next wizard, we will see a dialog box that asks for our confirmation of a few
products not getting installed. Here, we have to click on the Yes button.
Confidential© 2023 P a g e | 10
EPSS Security LLD
Confidential© 2023 P a g e | 11
EPSS Security LLD
Step 7: As soon as you will click on the Next button, you can see the screen below. Here,
we have to configure the MySQL Server. Now, choose the Standalone MySQL
Server/Classic MySQL Replication option and click on Next. Here, we can also choose
the InnoDB Cluster based on your needs.
Figure 57 HA
Step 8: In the next screen, the system will ask you to choose the Config Type and other
connectivity options. Here, we are going to select the Config Type as 'Development
Machine' and Connectivity as TCP/IP, and Port Number is 3306, then click on Next.
Confidential© 2023 P a g e | 12
EPSS Security LLD
Confidential© 2023 P a g e | 13
EPSS Security LLD
Step 11: The next screen will ask you to configure the Windows Service to start the
server. Keep the default setup and click on the Next button.
Confidential© 2023 P a g e | 14
EPSS Security LLD
Confidential© 2023 P a g e | 15
EPSS Security LLD
Step 16: In the next wizard, we will see the Connect to Server option. Here, we have to
mention the root password, which we had set in the previous steps.
Confidential© 2023 P a g e | 17
EPSS Security LLD
Step 18: After completing the above step, we will get the following screen. Here, click on
the Finish button.
Confidential© 2023 P a g e | 19
EPSS Security LLD
Once MySQL has been successfully installed, the base tables have been initialized, and
the server has been started, you can verify its working via some simple tests.
7.3 Kaspersky Security Centre
Kaspersky Security Centre is designed for centralized execution of basic administration
and maintenance tasks on an organization's network. The application provides the
administrator access to detailed information about the organization's network security
level; it allows configuring all the components of protection built using Kaspersky
applications.
Kaspersky Security Center is an application aimed at corporate network administrators
and employees responsible for protection of devices in a wide range of organizations.
Using Kaspersky Security Center, you can do the following:
• Create a hierarchy of Administration Servers to manage the organization's
network, as well as networks at remote offices or client organizations.
• The client organization is an organization whose anti-virus protection is ensured
by the service provider.
• Create a hierarchy of administration groups to manage a selection of client devices
as a whole.
• Manage an anti-virus protection system built based on Kaspersky applications.
• Create images of operating systems and deploy them on client devices over the
network, as well as perform remote installation of applications by Kaspersky and
other software vendors.
• Remotely manage applications by Kaspersky and other vendors installed on client
devices. Install updates, find and fix vulnerabilities.
• Perform centralized deployment of license keys for Kaspersky applications to client
devices, monitor their use, and renew licenses.
• Receive statistics and reports about the operation of applications and devices.
• Receive notifications about critical events during the operation of Kaspersky
applications.
• Manage mobile devices.
• Manage encryption of information stored on the hard drives of devices and
removable drives and users' access to encrypted data.
Confidential© 2023 P a g e | 20
EPSS Security LLD
Since the .NET framework is installed before, we continue by clicking the “Next” button.
Confidential© 2023 P a g e | 21
EPSS Security LLD
We proceed with the “Custom” option for installation, you can choose the “Standard”
installation, and this will give us the advantage of making a more detailed installation.
Let’s continue with the next option.
Confidential© 2023 P a g e | 22
EPSS Security LLD
Confidential© 2023 P a g e | 23
EPSS Security LLD
Confidential© 2023 P a g e | 24
EPSS Security LLD
In the “Administration Server address” window, we will show the devices that have
Endpoint installed who the Security Center is. There are also three methods for this. If
you are going to transmit via DNS, you can choose one of the first two options. I am
proceeding on the IP address. Since the IPs of the server do not change easily, you can
continue over the IP address.
Confidential© 2023 P a g e | 25
EPSS Security LLD
Since we continue with the Standard setup in the “Ready to install Kaspersky Security
Center 14 Administration Server” window, Kaspersky Security Center 14 will
automatically create its own connection ports on the Windows Firewall for us. We can
start the installation. You can start the installation by clicking the “Install” button.
In the “Installing Kaspersky Security Center Administrator Server” window, the required
installations are made in order.
If the installation is completed successfully, you can open the Console screen with the
“Finish” option. After the management console is opened, you can start using the
software with your license information.
The first step we should take after setting up your Security Center is organizing your
managed computers. In most cases, the best way is to break machines up into
Workstations and Servers. This way we can have separate policies and tasks for your
servers and workstations.
In this way, we manage all sites under a single workstation or server policy, and we can
have separate policies and tasks for your servers and workstations.
In the License Agreement window, read and accept the terms of the End User License
Agreement. The installation continues after you accept the EULA, otherwise, the Next
button is unavailable.
Figure 80 EULA
In the Kaspersky Security Center 14 Web Console connection settings window,
specify the following information:
• The address of Kaspersky Security Center 14 Web Console (by default, 127.0.0.1).
Confidential© 2023 P a g e | 27
EPSS Security LLD
• The port that Kaspersky Security Center 14 Web Console will use for incoming
connections, that is, the port that gives access to Kaspersky Security Center 14
Web Console from a browser (by default, 8080).
Confidential© 2023 P a g e | 28
EPSS Security LLD
Confidential© 2023 P a g e | 29
EPSS Security LLD
In the Trusted Administration Servers window, make sure that the Administration
Server is on the list and click Next to proceed to the last window of the installer.
If we need to add a new Administration Server to the list, click the Add button. In the
opened window, specify the properties of a new trusted Administration Server:
• Facade administrator port. By default, port 2444 is used for the configuration of
Identity and Access Manager.
• Facade interaction port. By default, port 2445 is used for the connection of
Kaspersky OSMP KAS Service to Kaspersky OSMP Facade Service.
Confidential© 2023 P a g e | 30
EPSS Security LLD
Figure 85 IAM
If we want, we can change the default port numbers. we will not be able to change them
in the future via Kaspersky Security Center 14 Web Console.
In the last window of the installer, click Install to begin the installation.
Confidential© 2023 P a g e | 31
EPSS Security LLD
After the installation successfully completes, a shortcut appears on the desktop, and we
can log in to Kaspersky Security Center 14 Web Console.
Kaspersky EDR adds protection power to an existing EPP solution. EPP specializes on
simpler mass attacks (viruses, Trojans etc), while the EDR concentrates on advanced
attacks. With this solution, analytics view malware activity as well as events with legit
software in the context of an attack, uncovering the whole kill chain.
Kaspersky EDR is fully integrated with Kaspersky Enterprise Security EPP, and it can
work with EPP solutions of other vendors. The EDR adds the following:
• Expert tools for incident investigation, proactive threat hunting and attack response
o Avoid getting stuck in the black box – get vital information on automatic
detects and find lurking threats with Indicators of Compromise (IoC)
Kaspersky Endpoint Agent has the following hardware and software requirements:
Minimum hardware requirements:
Confidential© 2023 P a g e | 33
EPSS Security LLD
For Kaspersky Endpoint Agent operation as a part of Kaspersky Endpoint Detection and
Response Optimum solution:
o The application must be managed using Kaspersky Security Center 12.1 Web
Console or using the Cloud Administration Console, respectively.
Confidential© 2023 P a g e | 34
EPSS Security LLD
The first step we should take after setting up your Security Center is organizing your
managed computers. In most cases, the best way is to break machines up into
Workstations and Servers. This way we can have separate policies and tasks for your
servers and workstations.
In this way, we manage all sites under a single workstation or server policy, and we can
have separate policies and tasks for your servers and workstations.
Installing Application
This section describes how to install Kaspersky Endpoint Security on your computer and
complete the Initial Configuration of Application.
Confidential© 2023 P a g e | 35
EPSS Security LLD
By default, all application components are selected for installation except the following
components
• Endpoint Sensor
Note: In our Case We make this Feature Enable to make The Endpoint
Environment more secure.
5. Selecting the destination folder
• During this step, we can specify the path to the destination folder where
the application will be installed. To select the destination folder for the
application, click the Browse button.
7. Application installation
Confidential© 2023 P a g e | 36
EPSS Security LLD
To make use of the features of the application and its additional services, we must activate
the application.
This section provides information about application activation and other instructions
related to licensing.
3. In the Licensing window, click the Activate the application under a new
license button. The Application Activation Wizard starts.
Confidential© 2023 P a g e | 37
EPSS Security LLD
• Behavior Detection
• Exploit Prevention
• Remediation Engine
2. In the left part of the window, in the Essential Threat Protection section, select
Firewall
• Allow
• Block
11. In the Direction drop-down list, select the direction of the monitored network
activity.
• Inbound
• Inbound / Outbound
• Outbound
The following new features and improvements are introduced in Kaspersky Total Security:
Confidential© 2023 P a g e | 39
EPSS Security LLD
• Improved interaction between the user and Technical Support. The application
now contains a link to Technical Support chat (not available in some application
versions).
• Fixed vulnerability issue that used to appear when creating Mozilla Firefox browser
files.
• Updated the installer icon consistent with the new brand style.
• Fixed vulnerability issue of arbitrary file deletion when saving the application
operation report for Technical Support.
• Fixed vulnerability issue of arbitrary file deletion when deleting service data and
application operation reports.
General requirements
• Internet access (for the application installation and activation, for the use of
Kaspersky Security Network, and for updating databases and application modules)
Confidential© 2023 P a g e | 40
EPSS Security LLD
Before installation:
7.5.1 How to install Kaspersky Total Security from the installation file
1. Download the Kaspersky Total Security installation package from the Kaspersky
website, or via the link in the email you received from the online store.
2. Run the downloaded installer.
3. Wait until the wizard finds the latest version of the application or click Skip to
install the current version.
4. Click the link to review the License Agreement. If you agree to its terms, click
Continue.
Confidential© 2023 P a g e | 41
EPSS Security LLD
Figure 90 EULA
0. Click the link to review the KSN Statement. If you want to participate in Kaspersky
Security Network, leave the corresponding checkbox selected.
1. Click Install.
2. Wait for the installation to complete. Make sure settings you want to apply are
selected and click Apply.
Confidential© 2023 P a g e | 42
EPSS Security LLD
Figure 92 Recommendation
3. Click Done.
Confidential© 2023 P a g e | 43
EPSS Security LLD
1. Open the main application window and click the Database update
button.
Confidential© 2023 P a g e | 44
EPSS Security LLD
there are protection problems and red indicates that your computer's security is at serious
risk. You are advised to fix problems and security threats immediately.
You can open the Notification Center window by clicking the Details button in the main
application window. This window provides detailed information about the protection status
of the computer and suggests possible actions for rectifying problems and threats.
Problems with protection are grouped by categories. For each problem, a list is displayed
of actions that you can take to solve the problem.
The Show N ignored notifications section displays notifications to which the Ignore
action has been applied. Problems listed in this section do not affect the color of the
protection indicator in the main application window.
• System memory
Confidential© 2023 P a g e | 45
EPSS Security LLD
Confidential© 2023 P a g e | 46
EPSS Security LLD
8 DUO 2FA
8.1 Introduction
Duo is a two-factor authentication solution that helps organizations boost security by
verifying user identity, establishing device trust, and providing a secure connection to
company networks and applications.
What is two-factor authentication?
Two-factor authentication enhances security by requiring the use of a secondary device
at log in to verify your identity. This ensures that others cannot access your account by
obtaining your password.
When a user logs in—whether from their home office, the corporate office, or another
remote location—Duo uses two-factor authentication and a zero-trust approach to
security. Before granting access, Duo will:
• Verify user trust. Duo uses a second form of validation, such as a smartphone, to
verify that a user is who they say they are before granting them access.
• Establish device trust. Once access is granted, Duo enables your organization to
see every device that is connected to your network and applications and easily
monitor device health and compliance.
• Enforce adaptive policies. You can set access levels based on role, device,
can provide, and verify the identities of users from wherever they choose to log
in.
• Grant secure access to apps. Provide users with single sign-on (SSO) for a
Confidential© 2023 P a g e | 47
EPSS Security LLD
And now, you can enroll multiple devices – cell phones, tablets, or landlines - to ensure
that you can log in when you need to on the device you have at hand.
Instead of enrolling when you log in to an application, you might receive an email from
your organization's Duo administrator with an enrollment link instead. This emailed link
takes you directly to the Duo enrollment portal. You'll see either the Universal Prompt
experience shown on this page or enrollment in the traditional Duo prompt depending on
your organization's email enrollment configuration.
Logging into a Duo-protected application enabled for self-enrollment takes you to the
device management page to enroll. Click Next to learn why protecting your identity with
two-step verification is important and begin the setup process.
Figure 94 Welcome
Click the device type in the list that matches your desired authentication experience:
Confidential© 2023 P a g e | 48
EPSS Security LLD
• Touch ID: Use the fingerprint sensor on Apple MacBooks and Magic
Keyboards. Requires Chrome 70 or later.
Only your organization's Duo administrator or help desk can add hardware tokens and
Yubikey OTP tokens for you. These verification options do not show up in the list of
available options. Neither do any methods that your organization blocks from use; if your
Duo administrator applied a policy that doesn't allow authentication with text messages
or phone calls, the "Phone number" option will be missing when you enroll.
Duo recommends the most secure option of the methods available to you, so it's a good
idea to set up that method first if you have a device that supports it.
Confidential© 2023 P a g e | 49
EPSS Security LLD
Once you choose how to verify your identity, you will next complete the setup steps for
that method.
Touch ID
In order to use Touch ID with Duo, make sure you have the following:
• A fingerprint enrolled in Touch ID (see how to do this at the Apple Support site).
• Chrome 70 or later. Safari and other browsers on macOS are not supported.
Confidential© 2023 P a g e | 50
EPSS Security LLD
2. Continue.
1.
2. Place your finger on the Touch ID button in the Touch Bar to complete Touch
ID enrollment.
Confidential© 2023 P a g e | 51
EPSS Security LLD
You can now log in to Duo-protected applications that show the Duo prompt in a web
browser using your fingerprint sensor.
If you have more than one MacBook with which you'd like to approve Duo login requests
using Touch ID, you'll need to add each of them separately as a new Touch ID device in
Duo. To do this, your organization must have enabled self-service device management.
Duo Mobile
Duo Mobile is an app that runs on iOS and Android phones and tablets. It's fast and easy
to use, and doesn't require cell services. Duo pushes login requests to Duo Mobile when
you have mobile data or wifi connectivity to the internet. When you have no data service,
you can generate passcodes with Duo Mobile for logging in to applications.
The current version of Duo Mobile supports iOS 13.0 or greater and Android 8 or greater.
Confidential© 2023 P a g e | 52
EPSS Security LLD
1. Select your country from the drop-down list and type your mobile phone
number, and then click Add phone number.
1. If you're going to use Duo Mobile on a tablet (like an iPad) with no phone
service, don't enter a phone number and click I have a tablet instead.
2. If you entered a phone number, double-check that you entered it correctly and
click Yes, it's correct to continue (or No, I need to change it to go back and
enter the number again).
Confidential© 2023 P a g e | 53
EPSS Security LLD
If the phone number you entered already exists in Duo as the authentication device for
another user then you'll need to enter a code sent to that number by phone call or text
message to confirm that you own it. Choose how you want to receive the code and enter
it to complete verification and continue.
3. Download and install Duo Mobile on your phone or tablet from the Google Play
Store or Apple App Store. Once you have Duo Mobile installed click Next.
Confidential© 2023 P a g e | 54
EPSS Security LLD
4. Open the Duo Mobile app on your phone or tablet and add this account by
scanning the QR code shown on-screen.
If you aren't able to scan the QR code, tap Get an activation link instead and then enter
your email address to send the activation link to yourself. Follow the instructions in the
email to activate the new account in Duo Mobile.
5. When you receive confirmation that Duo Mobile was added click Continue.
Confidential© 2023 P a g e | 55
EPSS Security LLD
You can now log in to Duo-protected applications with Duo Push or with a Duo Mobile
passcode.
Security Key
A security key is an external device that when tapped or when the button is pressed sends
a signed response back to Duo to validate your login. Duo uses
the WebAuthn authentication standard to interact with your security keys. You may also
see WebAuthn referred to as "FIDO2".
To use a security key with Duo, make sure you have the following:
Confidential© 2023 P a g e | 56
EPSS Security LLD
2. Your browser prompts you to tap your security key to use it with Duo (Chrome
example shown).
3. When you receive confirmation that you added your security key as a verification
method click Continue.
Confidential© 2023 P a g e | 57
EPSS Security LLD
You can now log in to Duo-protected applications that show the Duo prompt in a web
browser using your security key.
This option is suitable for mobile phones that can't run Duo Mobile, or office phones and
landlines.
1. Select your country from the drop-down list and type your phone number, and
then click Add phone number.
Confidential© 2023 P a g e | 58
EPSS Security LLD
If this phone number is a landline and can't receive text messages, select the This is a
landline phone option before continuing.
2. If you opted to add a landline, you can enter the landline's extension on the next
screen and click Add extension or click Skip this step if you do not need to enter
an extension for your landline.
Confidential© 2023 P a g e | 59
EPSS Security LLD
3. Verify that the phone number shown (and landline extension, if you entered one)
is accurate and click Yes, it's correct to continue (or No, I need to change it to
go back and enter the number again).
If the phone number you entered already exists in Duo as the authentication device for
another user then you'll need to enter a code sent to that number by phone call or text
Confidential© 2023 P a g e | 60
EPSS Security LLD
message to confirm that you own it. Choose how you want to receive the code and enter
it to complete verification and continue.
4. When you receive confirmation of adding the new mobile phone number for texts
or calls, click Continue to login to log in to the application with a passcode
received via text message or a phone call from Duo.
5. When you receive confirmation of adding the new phone number for text
messaging, click Continue to log in to the application with a passcode received
via text message or a phone call from Duo.
Confidential© 2023 P a g e | 61
EPSS Security LLD
If you added a landline phone number, click Continue to log in to the application with a
phone call from Duo.
Confidential© 2023 P a g e | 62
EPSS Security LLD
When logging in to an application with the Universal Prompt, click the Other options link on the
authentication page to view your list of available methods. If your organization enabled self-
service device management then you'll see a Manage devices choice at the end of the list. Click
that to enter the device management portal.
To access the device management you'll first need to verify your identity, just as you do when
logging in to a service or application protected by Duo. Click on an available option to verify your
identity. If you're visiting device management to delete or update a device you don't have anymore
Confidential© 2023 P a g e | 63
EPSS Security LLD
(such as a phone you lost or replaced), be sure to pick a verification option that you still have with
you. If you don't have any devices you can use to authenticate to device management, contact
your organization's Duo administrator or help desk.
After approving a Duo authentication request, you can see all your registered devices in the device
management portal.
Confidential© 2023 P a g e | 64
EPSS Security LLD
Confidential© 2023 P a g e | 65
EPSS Security LLD
Duo takes you through the steps of adding the new device, just like first-time enrollment.
The difference between adding a new device from device management and during first-
time enrollment is that when you have finished enrolling the new device you return to the
device management page to view all your registered devices, including the new one,
instead of continuing to log into an application.
Confidential© 2023 P a g e | 66
EPSS Security LLD
Confidential© 2023 P a g e | 67
EPSS Security LLD
To delete a device, click Edit and then Remove. You'll be able to confirm that you want
to remove this device before deleting it. Once deleted, a verification device can't be
restored, but if you still have the device available you can add it again. You can't delete
your only identity verification device.
Confidential© 2023 P a g e | 68
EPSS Security LLD
Confidential© 2023 P a g e | 69
EPSS Security LLD
Cisco Identity Services Engine (ISE) is, identity-based network access control and policy
enforcement system. It’s a common policy engine for controlling endpoint access and
network device administration for your enterprise. ISE allows an administrator to centrally
control access policies for wired wireless and VPN endpoints in the network.
ISE builds context about the endpoints that include users and groups (Who), device-type
(What), access-time (When), access-location (Where), access-type
(Wired/Wireless/VPN) (how), threats and vulnerabilities. Through the sharing of vital
contextual data with technology partner integrations and the implementation of Cisco
TrustSec® policy for software-defined segmentation, Cisco ISE transforms the network
from simply a conduit for data into a security enforcer that accelerates the time to
detection and time to resolution of network threats.
Cisco Identity Services Engine (ISE) can be installed on Cisco SNS hardware or virtual
appliances. To achieve performance and scalability comparable to the Cisco ISE
Confidential© 2023 P a g e | 70
EPSS Security LLD
hardware appliance, the virtual machine should be allocated system resources equivalent
to the Cisco SNS 3500 or 3600 series appliances.
Cisco ISE offers the following OVA templates that you can use to install and deploy Cisco
ISE on virtual machines (VMs)
Number of cores:
▪ Small: 12
▪ Medium: 16
▪ Large: 16
Memory Small: 16 GB
Medium: 64 GB
Large: 256
Confidential© 2023 P a g e | 71
EPSS Security LLD
Storage and File The storage system for the Cisco ISE virtual appliance requires
System a minimum write performance of 50 MB per second and a read
performance of 300 MB per second. Deploy a storage system
that meets these performance criteria and is supported by
VMware server.
You can use the show tech-support command to view the read
and write performance metrics.
Step 3 Choose File > Deploy OVF Template from the VMware vSphere Client.
Step 4 Click Browse to select the OVA template and click Next.
Confidential© 2023 P a g e | 72
EPSS Security LLD
Step 5 Confirm the details in the OVF Template Details page and click Next.
Step 6 Enter a name for the virtual machine in the Name and Location page to uniquely
identify it and click Next.
Step 8 Click the Thick Provision radio button in the Disk Format page, and click Next.
Cisco ISE supports both thick and thin provisioning. However, we recommend that
you choose thick provisioning for better performance, especially for Monitoring
nodes. If you choose thin provisioning, operations such as upgrade, backup and
restore, and debug logging that require more disk space might be impacted during
initial disk expansion.
Step 9 Verify the information in the Ready to Complete page. Check the Power on after
deployment check box.
After the booting up completed, we will select available boot options. We will select option
one Cisco ISE Installation (Keyboard/Monitor) and press enter.
Confidential© 2023 P a g e | 73
EPSS Security LLD
Type setup to start the initial ISE configuration. Then enter the username (default is
admin) and password, this password will be used for CLI and WebGUI access.
When prompted enter the appropriate IP address, netmask, default gateway, DNS, NTP,
Time zone information
Once the configuration of ISE is completed, you should have access to the login prompt
Confidential© 2023 P a g e | 74
EPSS Security LLD
Confidential© 2023 P a g e | 75
EPSS Security LLD
There are different ways to onboard endpoints to the network. One way is to simply let
users connect their personal devices to the existing guest or internal network, where
endpoint simply gets Internet only access or in the case of internal network, the endpoint
will gain same level access as managed devices. The other end of the spectrum is where
endpoint is onboarded via ISE BYOD flow. When ISE BYOD onboards the endpoint, ISE
can issue Certificate Authority (CA) signed certificate as well as automatically configure
endpoint network settings to use the endpoint certificate that has been signed to gain
network access. At the same time, ISE can mark the device as BYOD endpoint and also
tie the endpoint with the user. Furthermore, the end user can logon to the ISE my devices
portal to manage the endpoint that he/she owns without the need of involvement from IT
team.
When it comes to ISE BYOD, there are two distinct ways to design the user experience
flows; Single SSID BYOD and Dual SSID BYOD flow.
Confidential© 2023 P a g e | 76
EPSS Security LLD
Confidential© 2023 P a g e | 77
EPSS Security LLD
Confidential© 2023 P a g e | 78
EPSS Security LLD
One of the main benefit of ISE BYOD is that ISE can provide signed certificate for the
endpoints as part of the BYOD flow. For endpoint certificates, ISE can utilize internal CA
to issue signed certificates. ISE is already enabled with internal PKI which can be
integrated with customer’s existing PKI infrastructure and also provide web portal to
manage endpoint certificates. Here are characteristics of ISE Internal CA:
- Can also be used for other purposes such as to secure pxGrid communication
Confidential© 2023 P a g e | 79
EPSS Security LLD
optionally can get a signed endpoint certificate issued to the endpoint which is used to
reconnect to the same SSID and gets elevated access.
Note that when guest portal is used for BYOD flow, all employee users will go through the
same BYOD portal as the BYOD portal is tied to the guest portal. Instead of using the
BYOD portal that is tied to the guest portal as seen above, multiple BYOD portal can be
used based on authorization condition. This flow allows, for instance, different user
groups to have different BYOD portal and also allows each groups to register the devices
into different endpoint groups.
2. Click on Add
3. Provide Name, IP
4. Check RADIUS Authentication Settings and the section will expand for more
options
Confidential© 2023 P a g e | 80
EPSS Security LLD
6. Click Save
Attribute Value
The Retry URL allows administrator to configure URL that ISE will try to force a new URL-
Redirect when the initial onboarding flow failed for any reasons. For instance, if the user
abandoned the onboarding flow in the middle and came back, the existing session may
have been torn down and the user will need to re-initiate the flow. ISE re-initiates this by
forcing the browser to try the retry URL specified in the setting. By default, if the Retry
URL is not specified, ISE will try 1.1.1.1 to force a redirect.
By default, devices without NSA support follows the main authorization policy for network
access, but to allow network access unconditionally for unsupported devices, select
‘Allow Network Access’ for the ‘Native Supplicant Provisioning Policy Unavailable’ option.
Confidential© 2023 P a g e | 81
EPSS Security LLD
1. Go to Administration > System > Certificates > Certificate Authority > Certificate
Templates
3. Enter Site specific information in the Subject fields. CN field is auto populated by
ISE with the user ID of the user going through the BYOD process
4. ISE also auto populates endpoint MAC address in to the certificate SAN field. The
endpoint MAC address is collected during initial authentication of the endpoint
either via MAB or 802.1X and embedded in to the certificate for security purpose.
By doing so, ISE policy can be crafted to match the actual endpoint MAC address
and the certificate MAC address to prevent BYOD issued certificates from being
used for other endpoint other than the one that was issued for.
5. The template also allows settings to change Key Types (RSA & ECC), Key Size,
and Valid Period. Valid period for the certificates can be changed from default of 2
years to maximum of 10 years. Note that newer client OS requires key size of 2048
or bigger
Confidential© 2023 P a g e | 82
EPSS Security LLD
Attribute Value
Name Name of the Certificate Template. Provide descriptive name as this field can
be used as AuthC/Z condition
Subject CN is auto populated with the username that is going through the BYOD flow.
Other attributes can be entered here to reflect the site. If differentiating different
endpoint or users based on certificate is needed, then any of the attributes here
can be changed and can be used during AuthZ to provide differentiated access.
For instance if OU=HR, the endpoint can have access to HR resources, while
other endpoints cannot access HR resources
Subject Currently, only value available is the MAC Address. The MAC Address is pulled
Alternative from the RADIUS session from the endpoint that initiated the BYOD flow. This
Name (SAN) is one way ISE allows admin user to tie the certificate to the actual endpoint
that it was signed for.
Key Type RSA or ECC. ECC is currently supported by Windows and Android devices
only.
Key Size 1024, 2048, 4096. For compatibility, recommended minimum value is 2048.
SCEP RA ISE Internal CA. If using SCEP to 3rd party CA, then this setting can be changed
Profile to send certificate signing request to 3rd party CA
Extended For the BYOD use, only Client Authentication option needs to be checked
Key Usage
Confidential© 2023 P a g e | 83
EPSS Security LLD
Native Supplicant Profile (NSP) controls certificate signing template, Wireless settings,
proxy settings, EAP type, and Wired network settings. At minimum, existing Native
Supplicant Profile (NSP) needs to be modified to reflect the SSID name of the secured
WLAN that is used. Follow the steps below to make changes to the existing NSP or create
a new NSP. If creating new NSP, then the Client provisioning policy needs to be modified
to use the newly created NSP.
Confidential© 2023 P a g e | 84
EPSS Security LLD
1. Go to Policy > Policy Elements > Results > Client Provisioning > Resources
3. If editing default NSP, there is existing SSID ‘ISE’, which can be edited for the
secure SSID used on site. Edit the default SSID by checking it and clicking on Edit
7. For Allowed Protocol, select among TLS (For digital certificate), PEAP (For
username & Password), or EAP-FAST (For macOS and iOS). Note that if TLS is
used, certificate template needs to be selected as well.
1. For Windows endpoints, use of machine or user store for certificate settings
SSID broadcast settings can be set here
9. Click Submit
10. If Wired interface is to be used, then ‘Wired Profile’ check box can be enabled for
Windows and macOS
Within the the Client Provisioning Resources page, updated version of NSA for Windows
and macOS can be downloaded. To download latest NSA, follow the directions here:
2. After screen refreshes there will be list of available agents that can be downloaded
from Cisco site. This includes NSA as well as posture agents (If the ISE node does
not have access to the Internet, this page will not be able to download the NSA, in
that case, download the NSA manually from cisco.com and add them manually by
using Add > Agent Resources from local disk). Select latest version of
MacOsXSPWizard x.x.x.x and WinSPWizard x.x.x.x.
3. Click Save
Confidential© 2023 P a g e | 85
EPSS Security LLD
4. Once downloaded, the newly downloaded NSA can be used in Client Provisioning
Policy
Confidential© 2023 P a g e | 86
EPSS Security LLD
2. All of the OS policies are already predefined, however, if new policy is needed click
on the down arrow on the right of any rule and select ‘Insert new policy …’ (Note
that the policy works top down, so if there are more specific rule that needs to be
matched, ensure that the new rule is on top of other rules)
4. If specific rule should match on certain internal user or endpoint group, it can be
specified here
7. Result section dictates version of NSA and NSP. Note that version is only available
if Windows and macOS is selected for the Operating Systems as these two OS
Confidential© 2023 P a g e | 87
EPSS Security LLD
downloads NSP directly from PSN, while other OS relies on native capability or
from cloud resources.
When the user connects to the secured SSID using username and password, the user’s
endpoint does not have digital certificate, so the session will match
‘Employee_Onboarding’ policy rule which forces the endpoint to be onboarded. As the
endpoint goes through onboarding flow, the endpoint MAC address is registered to ISE
and the signed certificate is provisioned to the endpoint, at that point the endpoint will be
forced to reauthenticate to the same SSID where the session will match ‘Employee_EAP-
TLS’ policy rule and the endpoint gets PermitAccess permission.
Although pre-configured policy rules work for simple deployments, when setting up ISE
Authentication and Authorization policies, it is recommended to create separate policy set
for each SSIDs. By doing so the policies are much easier to view and predictable. HeJre
we are going to create a policy set for Secured SSID used for single-SSID BYOD flow.
Initially the endpoints associate to the SSID using username & password using PEAP-
MSCHAPv2. When user opens up a web browser, instead of getting to the user’s browser
Confidential© 2023 P a g e | 88
EPSS Security LLD
destination or home page, the user will get redirected to BYOD portal where the user is
guided to follow steps to get the endpoint onboarded.
2. Click on ‘+’
5. Click on Use
7. Click Save
8. Click on ‘>’
utilizes different ACL on the WLC. The policy for Blacklisted devices is already created
and active, but following steps can be used to change the content that users are
presented when their devices are blacklisted:
5. Click Save
Note that the policy for blacklist is already setup and enabled on ISE, It still requires the
‘BLACKHOLE’ ACL to be present on the NAD to work.
1. Go to Work Centers > BYOD > Portals & Components > My Devices Portals
5. Fully qualified domain (FQDN) and host names (If FQDN is configured here, the
DNS server needs to be updated to point to PSNs as well in order to direct users
to the MDP using FQDN. Also, if the portal certificate used is not a wildcard
certificate, it should also contain the FQDN as SAN to avoid security popup on the
web browser trying to access the portal)
Confidential© 2023 P a g e | 90
EPSS Security LLD
11. You can select which options are available to end users
5. Authentication method
7. Fully qualified domain (FQDN) and host names (If FQDN is configured here, the
DNS server needs to be updated to point to PSNs as well in order to direct users
to the Certificate Provisioning Portal using FQDN. Also, if the portal certificate used
is not a wildcard certificate, it should also contain the FQDN as SAN to avoid
security popup on the web browser trying to access the portal)
Confidential© 2023 P a g e | 91
EPSS Security LLD
anti-malware, hotfixes, disk encryption and more. Once posture conditions are defined,
posture remediations (if required) can be configured.
Posture remediations are the methods AnyConnect will handle endpoints that are out
of compliance. Some remediations can be automatically resolved through AnyConnect
while others might be resolved manually by the end user.
Posture requirements are the immediate actions steps taken by AnyConnect when an
endpoint is out of compliance. An endpoint is deemed compliant if it satisfies all the
posture conditions. Once configured, posture requirements can then be reference by
posture policy for compliance enforcement.
Client provisioning is the policy used to determine the version of AnyConnect used as
well as the compliance module that will be installed on the endpoint during the
provisioning process. The compliance module is a library that the posture agent uses to
determine if the endpoint is in compliance with defined posture conditions.
Access policy will enable our posture policy and define what form of policy the endpoint
will be subjected to if it is compliant, non-compliant or requires provisioning of
AnyConnect.
Confidential© 2023 P a g e | 92
EPSS Security LLD
Confidential© 2023 P a g e | 93
EPSS Security LLD
provides default Firewall conditions for Windows and macOS. These conditions are
disabled by default however we are going to configure the firewall condition from scratch.
Navigate to Work Centers > Posture > Policy Elements > Conditions > Firewall
Condition.
Navigate to Work Centers > Posture > Policy Elements > Conditions > Firewall
Step 1 Condition
Step 2 Click the "+ Add" icon to configure a new Firewall Condition
Step 4 Select "4.x or later" for the Compliance module drop down
Step 8 Select "ANY / ANY" for the firewall name and version
Confidential© 2023 P a g e | 94
EPSS Security LLD
3. Anti-malware Condition
The anti-malware condition is a combination of the anti-spyware and antivirus conditions
and is supported by OESIS version 4.x or later compliance module. The intelligent
defaults in ISE have pre-configured anti-malware conditions for ease of use. Follow the
steps below to review the pre-configured anti-malware condition.
Confidential© 2023 P a g e | 95
EPSS Security LLD
Step 1 Work Centers > Posture > Posture Elements > Conditions > Antimalware
Step 1 Work Centers > Posture > Posture Elements > Conditions > File
Step 2 Click the hopper icon on the far right to expose the search menu
Confidential© 2023 P a g e | 96
EPSS Security LLD
Step 4 Check the box and click the view button at the top
5. Application Condition
The last condition required in our security policy is to check for the installation of a specific
application. There are two forms of application checks when doing ISE posture. one to
check is application is installed and other to check if application is running. Scenarios to
ensure a necessary application is installed and scenarios where any mischievous
applications are not installed can both be configured. In both scenarios the installation
check however remains the same. For the case of an unwanted application the required
remediation action needs to be tied to the condition to take actions to terminate/uninstall
the unwanted application. This security policy will check for the required installation of a
VPN client. We will cover the steps necessary to create application compliance for an
application that should not be installed on the endpoint later in this guide. To configure a
condition for an appliance installation, follow the steps below
Confidential© 2023 P a g e | 97
EPSS Security LLD
Navigate to Work Centers > Posture > Policy Elements > Conditions >
Step 1 Application
Step 2 Click the "+ Add" icon to configure a new application condition
Step 8 Select "ANY / ANY" for the firewall name and version
Step 9 Select "Cisco System, Inc" from the vendor drop down
Confidential© 2023 P a g e | 98
EPSS Security LLD
Confidential© 2023 P a g e | 99
EPSS Security LLD
Step 2 Click the "+ Add" icon to configure a new application condition
Step 6 Enter values (in seconds) for interval and retry count field
Navigate to Work Centers > Posture > Policy Elements > Remediations >
Step 1 USB
Step 3 If required, you can modify the interval and retry count values
Step 2 Click the "down arrow" icon to the right of the "Edit" hyperlink
Step 2 Click the "down arrow" icon to the right of the "Edit" hyperlink
Step 2 Click the "down arrow" icon to the right of the "Edit" hyperlink
conditions in conjunction with the identity groups and the operating systems that allow
you to define different policies for the clients. Cisco ISE provides an option to configure a
grace period for devices that become noncompliant. ISE caches the results of posture
assessment for a configurable amount of time. If a device is found to be noncompliant,
Cisco ISE looks for the previously known good state in its cache and provides grace for
the device, during which the device is granted access to the network. You can configure
the grace period in minutes, hours, or days (up to a maximum of 30 days). An endpoint
is eligible to utilize this grace period only if it has previously been in a good/compliant
state.
To configure posture policy, follow the steps below.
Step 1 Navigate to Work Centers > Posture > Posture Policy
Step 2 Click the "down arrow" icon to the right of the "Edit" hyperlink
Step 8 In the requirements field, select all 5 requirement by using the "+" sign
Step 1 Navigate to Work Centers > Posture > Client Provisioning > Resources
Step 2 Click the "Add" button and select AnyConnect Posture profile
Step 3 Enter the configuration parameters for how AnyConnect will operate
Note: For a detailed explanation of the posture profile configuration parameters, please
reference the ISE Administration guide or by "launching page level help" from the menu
Now that that a posture profile has been configured, you can upload AnyConnect to ISE:
Step 1 Navigate to Work Centers > Posture > Client Provisioning > Resources
Step 4 Select "Cisco provided packages" from the Category drop down
Select the AnyConnect software from the local disk by using the "browse"
Step 5 button
Finally, we can create the required AnyConnect configuration for use in client
provisioning policy:
Step 1 Navigate to Work Centers > Posture > Client Provisioning > Resources
Lastly, create client provisioning policy using the newly created AnyConnect
configuration:
Step 1 Navigate to Work Centers > Posture > Client Provisioning
Step 2 Click the "Edit" hyperlink for the preconfigured Windows rule
Step 4 Select the AnyConnect Configuration from the Agent drop down
Step 9
Step
10 Click "Use"
Step
11 Click the gear icon of the newly modified rule and select "duplicate below"
Step
12 Repeat steps 5 through 9 but select "noncompliant" instead of "compliant"
Step
13 Click "Use"
Step Change the "Results Profiles" to deny access and rename the authorization
14 rule
Step
15 Save the authorization policy
Cisco ISE Profiling Services provides dynamic detection and classification of endpoints
connected to the network. Using MAC addresses as the unique identifier, ISE collects
various attributes for each network endpoint to build an internal endpoint database. The
classification process matches the collected attributes to prebuilt or user-defined
conditions, which are then correlated to an extensive library of profiles.
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date