Isa Deployment
Isa Deployment
Based on your answers to the questions in the Planning Checklist above, complete the following
Deployment Checklist forms. These tables will be valuable references to field engineers to expedite
initial configurations in Cisco ISE and network devices.
Network Services
Document all the basic network services and the hosts that provide them in your network. This will
aid you in the creation of access control list (ACL) exceptions and ISE service configuration.
Role
DNS Names
Network Address(es)
Protocol
Details
CA Server(s)
DNS Server(s) UDP:53
DHCP Server(s)
NTP Server(s) UDP:123
FTP Servers TCP:21 username:password
Proxy Servers (to Internet) HTTP/S:# username:password
TFTP/PXE Boot Servers UDP:69 username:password
Syslog Servers UDP:514 username:password
Identity Store: Active Directory username:password
Identity Store: LDAP
Identity Store: OTP
ISE Admin Node HTTP (TCP:80)
HTTPS (TCP:443)
CLI: admin: cisco
RADIUS Key:
Digital Certificates
Create and use CA-signed certificates for your TrustSec infrastructure to minimize long-term
problems due to untrusted, self-signed certificates.
Component
FQDN
Org Unit
Org
City
State
Country
(2 letter)
Key Size
(max)
Cert
Format
Certificate Authority
ISE Admin #1
ISE Admin #2
ISE PSN #1
ISE PSN #2
Network Devices
Use the Network Devices List to document each type of network access device in your network by
model, supervisor (if appropriate), and software version. It is highly recommended that you upgrade
all switches to the latest validated software version in the ISE Compatibility Guides and TrustSec
Platform Support Matrix to avoid feature and behavioral inconsistencies. Each network device IP
address must be added to ISE unless you use wildcard entries.
Model
Management IP Address
Security Policy
Describe your major network access scenarios and how you will use contextual, network-based
attributes to enforce secure access. Consider scenarios such as user versus endpoint authentication,
managed endpoint posture, unmanaged endpoint identification, role-based identification and
segmentation (employees, contractors, guests, and so on), or location-based differentiation. These
unique authorization states will map directly to your final ISE authorization rules and policies.
Below are some pseudo-policy examples.
Scenario Name
Authorization
Result
Corporate Workstation
Workstation_Access
Enforcement States
Identify the specific RADIUS authorization attributes for each unique authorization states you
identified in your Authorization Poliicy. This will help you understand the subtle differences
between each enforcement state and identify the number of unique ACLs or Scaleable Group Tags
that you must create.
RADIUS Attributes
Authorization Profiles
Workstation_Access
VLAN: Data
dACL: ACL-WORKSTATIONS
Voice_Network
Voice VLAN Permission: Yes
Printer_Network
VLAN: Data
dACL: ACL-PRINT-SERVERS
Employee_Access
VLAN: Data
dACL: ACL-EMPLOYEE-ACCESS
Internet_Only
VLAN: Data
dACL: ACL-INTERNET-ONLY
URL-Redirect-ACL: ACL-URL-GUEST-REDIRECT
Endpoints
In the Endpoint Details table, specify how all the various network endpoints will be authenticated
when TrustSec is enabled. Possible authentication methods include 802.1X, MAB, and web
authentication.
Endpoint
Authentication Method
Notes
Test Scenarios
Based on your desired security policy, anticipated endpoints, and enforcement states, create a list of
scenarios to test in your lab or small proof of concept deployment before deploying at scale. Table 7
lists some suggested scenarios to get you started.
Scenario
Comments
MAB
Phone
Printer
Other
IOT: Camera
MAB+Profiling
User Authentication to Active Directory Domain
Single Sign-On (SSO): Username/Password
Easy Connect
802.1X + Passive-ID - Post
802.1X + Passive-ID - Post
Easy Connect - Post
Wireless
802.1X iOS
802.1X Android
802.1X Other Mobile OS
802.1X BYOD post-onboarding using EAP-TLS
802.1X Anonymous
Posture
EAP Chaining Both (Machine cert + username) Posture pending
EAP Chaining Both (Machine cert + username) Posture compliant
VPN
AnyConnect SSL VPN Username+Password
AnyConnect SSL VPN Certificate
AAA AnyConnect Identity Services Engine (ISE) Policy and Access TrustSec VPN