Cisco+300 715 ISE - 002
Cisco+300 715 ISE - 002
300-715 SISE
Certification
Increased performance
of certified employees
99%
of organizations use
certifications to make
hiring decisions
+59% +42% +41%
higher quality of better selection more efficient
service of technology operations
solutions
Today’s certification portfolio
Entry Associate Professional Expert
Architect CCAr Architect
Data Center CCNA Data Center CCNP Data Center CCIE Data Center
Routing & Switching CCENT CCNA Routing & Switching CCNP Routing & Switching CCIE Routing & Switching
AppDynamics ACIP
Tomorrow’s certification portfolio
Enterprise
Enterprise concentration exam options Enterprise lab options
Security
Service Provider C C C C C C L L
Collabora
tion Data
Advanced Implementing Implementing CCIE
Center
Routing and Wireless Cisco SD-WAN Enterprise
Services Networks Solutions Wireless Lab
Exam
Designing
Wireless Designing Automating and CCIE Enterprise
Networks Cisco Enterprise Programming Infrastructure
Networks Cisco Enterprise Lab Exam
Solutions
CCNP R&S, Wireless,CCDP - Today vs 2.0
Five technology tracks: Enterprise, Service Provider, Data Center, Collaboration, Security
Two exams and you’re certified, one core and one concentration exam
Core exams also apply to CCIE and cover implementation of key technologies
Enterprise
Skills
300-370 WITSHOOT
300-430 Wireless Implement Badge
300-375 WISECURE
300-365 WIDEPLOY
CCNP Enterprise (current certification holders)
1.1.Configuring Personas
1.2 Describe deployment options
Before getting into insights of Configuration and deployment options, lets get
familiar with ISE as a appliance, its purpose and associated terminologies; we
will discussing and referencing all these throughout the course …..
ISE (Identity Service Engine)
It’s a necessary security platform in IT infra for any growing organizations or
industry; irrespective of any sector e.g. it could be Healthcare, Banking,
Manufacturing, IT, etc.
Almost every organization deeply rely-on and inclined towards Digitalization,
IoT, BYODs and what not. And with evolvement there is exponential expansion
of end-points devices that want to integrate with network. This explosion of new
additions are adding agility and flexibility and producing significant values to
customers
HOWEVER it has raised the challenges and complexities to IT team; because
you need to have framework which can track and identify the end-points and
accordingly authenticate, authorize and profile them correctly in network; to
delivery secure platform.
ISE (Identity Service Engine)
Before ISE, Cisco has developed few engines as per new and growing demands,
for e.g. well known ACS, Cisco clean access, NAC for Guest and Profiles, They
all served well but deploying and managing them separately is not scalable and
tedious job.
ISE is a platform which has merged there functionalities along with many new
features. Also increasing complexity requires a different approach to both
manage and secure the evolving enterprise network.
Cisco ISE is context aware policy service, to control access and threats across
wired, wireless and VPN networks.
ISE Roles and Duties
SIEM, MDM, NBA, IPS, IPAM, etc.
CISCO ISE
WHO WHEN
THREATS CVSS
Partner Eco System
ACCESS POLICY
Few well known features and services that ISE delivers in Infrastructure services
are as follows :-
Why customers buy ISE?
Cisco ISE can reach deep into the network to deliver superior visibility into who
Asset Visibility and what is accessing resources.
Fully customizable branded mobile and desktop guest portals, with dynamic
Guest Access visual workflows to easily manage guest user experience.
Simplified BYOD management with built-in CA and 3rd party MDM integration
BYOD Access for on boarding and self-service of personal mobile devices
Context sharing with partner eco-system to improve their overall efficacy and
Threat Control accelerate time to containment of network threats.
User-Groups Device-type
Cloud
Cloud App A
Cloud App B
Server B
Server A
Partners
Location Posture
Trusted Asset ✓ ✕ ✓ ✓ ✓ ✓
On Prem
Trusted User ✕ ✓ ✓ ✓ ✓ ✕
Time Threats Partners ✕ ✕ ✓ ✓ ✕ ✕
Behavior Vulnerability
Node
Personas
Node Type
PSN, PAN, MnT, PXG
Service
Network Resources
Endpoints
Roles
ISE Terminologies
pXGrid Controller
- Facilitates sharing of context
Policy Service Node (PSN)
RADIUS/TACACS+ Server for the Network Devices
PSN
Policy Sync
PSN
35
Network Access Device (NAD)
Also Known as the ‘RADIUS Client’ (or ‘TACACS+ Client’)
• MnT node receives logging from PAN, PSN, NAD (RADIUS & TACACS)
• Each ISE deployment must have at least one MnT
• Max 1x Primary and 1x Secondary (Backup) MnT possible
PAN
Syslog
Syslog from access devices are
correlated with user/device session
MnT
PSN
Syslog from firewall is correlated Syslog from other ISE nodes are
with guest access session sent to monitoring node for reporting
Monitoring and Troubleshooting Node
Smart Dashboard
PAN
MnT
ISE Node Personas Functional Roles and chronology
Policy Administration Node Policy Service Node Monitoring and Network Access Device
All Management UI Activities RADIUS, Profiling, Web Auth, Troubleshooting Access-Layer Devices
Synchronizing all ISE Nodes Posture, Sponsor Portal, Client Logging and Enforcement Point for all
Provisioning Reporting Data Policy
Admin
User All Policy is Synchronized
from PAN to PSNs User
RADIUS from NAD to Policy Service Node
RADIUS Accounting
Logging
Logging
Service :- A service is a specific feature that a persona provides
such as network access, profiler, posture, security group access,
monitoring and troubleshooting etc.
Network Access Device Monitoring and Policy Service Node Policy Administration
Access-Layer Devices Troubleshooting Admin
The “Work-Horse”: RADIUS, Node: All Management UI
Enforcement Point for all Logging and Profiling, WebAuth, Posture, Activities & synchronizing
Policy Reporting Data Sponsor Portal Client all ISE Nodes
Provisioning
Policy Sync
RADIUS from NAD to PSN
Platform
eXchange Grid
RADIUS response from Node: Share
PSN to NAD PSN queries context in/out
User external database
RADIUS Accounting
directly
Publish
Syslog
Config
Publish Sessions
1.2 Describe deployment options
Standalone Deployment :- All personas resides on single
appliance, it has 2 variants
Standalone ISE Node Deployment
Standalone ISE Node (Redundant) Deployment
Distributed Deployment :- One or more Personas are distributed
to different ISE Nodes
Hybrid-Distributed Deployment
Dedicated-Distributed Persona Deployment
Fully Dedicated-Distributed Deployment
Example :-
Suppose you have a Global Operations Center and Network Infra has 20
switches of 48 ports to accommodate wired connections like PC, thin
clients etc. Assume 1000 users and 50 Guest users everyday.
Based on this number and future hiring strategy, Network Admin and
solution architect can take call on ISE model selections, In coming slides
we will discussing ISE deployment and its models in details.
Standalone Deployment
All Personas on a Single Node: PAN, PSN, MnT, pxGrid
PXG
#CLUS
41 BRKSEC-3699 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
ISE Standalone (Redundant)
PSN
Prima dary
ry
PXG Secon
42
ISE Standalone (Redundant) continue….
Maximum Sessions = 50,000 (Platform dependent)
Admin (S)
Admin (P) PXG PXG MnT (RO) All Services run on both ISE Nodes
MnT (P)
PSN
PSN Set one for Primary Admin / Primary MnT
AD/LDAP Set other for Secondary Admin / Primary MnT
(External ID/
Attribute Store)
(RO)
Campus
A Max Sessions is platform dependent:
ASA VPN 3415 = Max 5k sessions (EOL/EOS)
w / CoA
AP
802.1X Switch
802.1X
3615 = Max 10k sessions
3595 = Max 20k sessions
Branch A
Branch B 3655 = Max 25k sessions
3695 = Max 50k sessions
Switch Switch
AP 802.1X AP 802.1X
Hybrid-Distributed Deployment
( Admin | MnT ) on same appliance; PSN on dedicated appliance
44
Basic Hybrid-Distributed Deployment Distributed
Policy Services
Maximum Sessions = 50,000 | Maximum 5 PSNs PSN PSN
WLC
AD/LDAP 802.1X
(External ID/
Attribute Store)
DC-A
• Dedicated Management Appliances
ASA VPN
w / CoA
• Primary Admin / Primary MnT
• Secondary MnT / Secondary Admin
WLC
802.1X Switch
• Dedicated Policy Service Nodes—Up to 5 PSNs
AP 802.1X
• No more than 50,000 Sessions Supported
3615 = Max 10k sessions
Branch A
Branch B 3595 = Max 20k sessions
3655 = Max 25k sessions
Switch Switch
802.1X 802.1X 3695 = Max 50k sessions
AP AP
Dedicated-Distributed Persona Deployment
Dedicated Appliance for Each Persona: Admin, Monitoring, pxGrid, Policy
PSNs
46
Fully Dedicated-Distributed Deployment
Maximum Sessions = 500,000 | Maximum 50 PSNs
Distributed
Admin (P) Monitor (P) Policy Services Cluster Policy Services pxGrid (S)
Admin (S) Monitor (S)
PSN PXG
PAN MnT PSN PSN PSN PSN PAN
PSN
MnT
AD/LDAP AD/LDAP
pxGrid (P) PXG (External ID/ (External ID/
DC B Attribute Store)
Attribute Store)
Data
Center A WLC
802.1X
ASA VPN
Switch
w / CoA
802.1X AP
WLC
802.1X Switch
• Redundant, dedicated PAN and MnT split across DCs
802.1X
AP
• Policy Service cluster for Wired/Wireless services at main campus
• Distributed Policy Service clusters for DR sites or larger campuses
Branch B with higher-bandwidth, lower-latency interconnects.
Branch A
• Centralized PSN clusters for remote Wired/Wireless branch devices
• VPN/Wireless (non-CoA) at main campus via HA Inline Posture nodes
Switch Switch
AP 802.1X AP
802.1X
#CLUS
47 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Scaling RADIUS, Web, Profiling, and TACACS with Load-Balancing
• Policy Service nodes can be configured in a cluster behind a load balancer (LB).
• Access Devices send RADIUS and TACACS+ AAA requests to LB virtual IP.
PSNs
NAD
Sizing and Specification Guideline.
ISE node sizing selection is very significant, generally once
deployed successfully you don’t have to touch it.
Secondly, its role is critical and has lot of dependency and if you
want to re-size and re-image things then you need to have
redundant nodes.
• By PSN
Max Active Sessions per Max Active Sessions = Max
Scaling per PSN Platform PSN
Dedicated Policy nodes SNS-3615 10,000 End-points; ISE 2.6+ supports
(Max Sessions Gated by Total SNS-3655 50,000 2M End-points
Deployment Size) SNS-3695 100,000
What are sessions ? And its significance in ISE world.
Sessions we will refer throughout the course are Radius session. They are
significant because sessions count plays deciding factor; in finalizing
size of nodes and deployment type.
Formula which is referred and well known in industry is
54
Sizing Production VMs to Physical Appliances
Summary
Intel Xeon CPU 4410 Intel Xeon CPU 4416 Intel Xeon CPU 4416
Processor @ 2.10 GHz @ 2.10 GHz @ 2.10 GHz
(8 total cores) (12 total cores) (12 total cores)
Memory 32 GB 96 GB 256 GB
8 x 600-GB, 6Gb 10k SAS
HDDs
1 x 600-GB, 6Gb 10k SAS HDD 4 x 600-GB, 6Gb 10k SAS HDDs
Hard disk
(600 GB total disk space) (1200 GB total disk space) (2400G total disk space)
Memory 16 GB 32 GB 16 GB 64 GB
1 x 600-GB 10k SAS HDD 2 x 600-GB 10k SAS HDDs 1 x 600-GB 10k SAS HDD 4 x 600-GB 10k SAS HDDs
Hard disk
(600 GB total disk space) (600 GB total disk space) (600 GB total disk space) (1.2 TB total disk space)
No (1GB FBWC Yes (RAID 10)
RAID No Yes (RAID 1)
Controller Cache) (1GB FBWC Cache)
2 x Integrated GE Ports 2 x Integrated GE Ports
Ethernet
4x Integrated Gigabit NICs 4 x Integrated Gigabit NICs 4x mLOM GE Ports 4x mLOM GE Ports
NICs
(6 total LAN ports) (6 total LAN ports)
Redundant
PSU optional) Yes PSU optional)
Power?
57
ISE VM Disk Storage Requirements
Minimum Disk Sizes by Persona
• Upper range sets #days MnT log retention Persona Disk (GB)
• Min recommended disk for MnT = 600GB Standalone 200+*
• Max hardware appliance disk size = 1.2TB PAN 200-300**
MnT 200+*
• Max virtual appliance disk size = 2TB
PSN 200
CSCvb75235 - DOC ISE VM installation can't be done if disk
PAN + MnT 200+*
is greater than or equals to 2048 GB or 2 TB
PAN + MnT + PSN 200+*
58
Introducing “Super” MnT
High Speedy Performance
• ISE 2.4 Virtual Appliance Only option
• Requires Large VM License MnT
• 3595 specs + 256 GB (3695 appliance/VM 2.6)
• 8 cores @ 2GHz min (16000+ MHz)
= 16 logical processors
• 256GB RAM
• Up to 2TB* disk w/ fast I/O
• Fast I/O Recommendations:
• Disk Drives (10k/15k RPM or SSD)
• Fast RAID w/Caching (ex: RAID 10)
* CSCvb75235 - DOC ISE VM installation can't be
• More disks (ex: 8 vs 4) done if disk is greater than or equals to 2048 GB
or 2 TB, fixed in 2.6
ISE 2.4 MnT Vertical Scaling Scaling Enhancements
Benefits MnT
Faster Live Log Access on ALL ISE
• Run session directory tables from pinned memory platforms
• Tables optimized for faster queries
Reports
ISE 2.4 MnT+ Fast Access to Logs and Reports
Firstly Fast-Scanning
Secondly Instant-Result
Finally :- Reduced waiting time
Reports during troubleshooting and Instant
logs
ISE 2.4 Super MnT
Scale Test Results/Observations
Scenarios Results Results Performance
Live Log : show 100 records within Last 3 hours 20 Sec 5 Sec 75%
Live Log with Filters: (Network device name) 40 Sec 15 Sec 63%
Set Reservation to
Minimum VM appliance Optionally set CPU allocation limit Similar settings apply to Max
specs to ensure required >= Min ISE VM specs to prevent Allocation and Min Reservations for
CPU resources available over-allocation when actual CPU Memory.
and not shared with other assigned exceeds ISE VM
VMs. requirements.
Setting CPU and Memory Allocations in VMware
Guest VM Resource Reservations and Limits
4
Set Reservation to Minimum VM
appliance specs to ensure required
CPU resources available and not
shared with other VMs.
Correct sizing plays very pivotable role here . If sizing standards are not followed, then ISE
services and functions will behave erratic and unstable. For example ; sudden purging of
MAC address from active sessions, Alarm of insufficient resources on dashboards etc. So
please refer the previous slides for details, also go-through Cisco recommendation for any
new updates.
ISE Hypervisor Support
Check for latest updates from
Cisco before selection and
• ISE 1.0+ VMware ESXi 5.x / 6.x deployment for e.g.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/install_guide/b_ise_InstallationGuide2
6/b_ise_InstallationGuide_26_chapter_01.html
Once ISE version, model, patch, sizing and scaling is finalised and we
are determined to install ISE on VM; next steps is to gather details for
configuration and have them ready before ISE node installation.
Hostname
IP address and subnet mask
Default gateway
DNS suffix
Name server (Up to 3)
System time zone
NTP server (Up to 3)
SSH
Admin username/password
For our example ;we are going to cover ISE VMware Virtual machine installation on for
reference.
Cisco has packaged the recommended virtual machine compute/storage combinations into
unique OVA files to make things easy for us and to avoid unsupported virtual machine
configurations.
https://software.cisco.com/download/home/283801620/type/283802505/release/2.4.0
You can select the package as per the deployment plan and persona, latest patches are
recommended -- and download the OVA file.
Login to VMware vSphere -> Select host -> Deploy OVF Template
ISE Setup Wizard
After the virtual machine image is deployed, we have some initial configuration to
perform in the setup wizard. This setup is done in the Vmware console.
The first time the ISE nodes are powered ON after installation, they will prompt you to
run ‘setup’.
Initial Wizard Setup
Checking
Congrats
ISE installation generally take 30-40 minutes on average; as many processes need to be
come-up. You need to keep an eye on ISE application status and it should turn to running.
Once this is accomplished , ISE Is ready for GUI access; credentials are username and
password used in initial wizard config.
Configuring Personas :-
This is straight forward and few- clicks task and not et-all tedious or
complex. We have discussed various personas in previous slides; hence
not getting into it again.
• ISE Personas:
• PAN
• MNT
• PSN
• pxGrid
• PSN Services
• Session
• Profiling
• TC-NAC
• ISE SXP
• Device Admin
(TACACS+)
• Passive Identity
(Easy Connect)
ISE registration for Cluster/Cube in distributed design
ISE nodes must be added to DNS and they should resolve each
other; forward and reverse. This is a easy task.
ISE Admin node must have certificate trust to all other nodes. We
will cover this from ISE perspective
Certificate is a signed document, issue by a trusted source to prove
identity, for e.g. we have Passports ,UPI, ID cards in real world.
username
organization
location
What is the purpose of an X.509 Certificate?
Provides an
Identity
Key Usages
Extended Key Usages (EKUs)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Certificates are used for all HTTPS communication and the Extensible
Authentication Protocol (EAP) communication
Certificates are needed for all types of EAP (EAP-TLS, PEAP, EAP-FAST)
communication . EAP is the framework followed by wired/wireless end-
points talks to servers (PSN) for AAA/Radius.
Certificate Usage
In a world of mobile devices, bring your own device IT models and
networks without borders, certificates are fast becoming a common
form of identification.
The most difficult concept for many to understand is the concept of a
public certificate vs. a private certificate. Certificates are part of Public-
Key cryptography or asymmetric encryption.
Asymmetric means that the two communicating devices will each
encrypt and decrypt the data with different encryption keys. The term
“key” may sometimes be thrown around and interchanged with the term
“certificate”.
87
Public Key: The public key is contained in the public certificate,
and may be given to anyone in the world with whom you will
communicate. In most cases.
Private Key: The private key should rarely leave the end-system.
They represent the identity of that particular system, and if they
are exposed and used by another entity – that other entity is now
impersonating your identity.
89
Items that are encrypted using your public key may only be
decrypted with your private key.
Similarly, if B uses C’s public key to encrypt data, that data may
only be decrypted with C’s private key.
Certificate is meant to represent you, and prove you are who you
say you are
90
Examples of different certificates and what services they may secure
Here are examples of what certificates are being used for in the above diagram:-
Both PSN’s admin certificates are being used to secure not only its communication with
the PAN, but also the Guest portal for CWA.
The sponsor portal is being protected with a certificate with sponsor.securitydemo.net in
the certificate subject. The same certificate is being used for the sponsor portal on both
PSN1 and PSN2.
PSN1 and PSN2 are using their own EAP certificate for the securing of EAP
communications.
The PAN is using its admin certificate to protect both administrative communication to
the PSNs as well as to secure the administrative GUI.
This is just a few example to try & solidify your understanding of where certificates are
being used.
92
More about Certificate…
Certificate Hierarchy
From the Admin portal, you can view the certificate hierarchy or the certificate trust chain of
all endpoint, system, and trusted certificates. The certificate hierarchy includes the certificate,
all intermediate Certificate Authority (CA) certificates, and the root certificate.
The certificate hierarchy appears at the top of the certificate. Click any of the certificates in
the hierarchy to view its details. The self-signed certificate does not have any hierarchy or
trust chain.
In the certificate listing pages, you will see one of the following icons in the Status column:
Green icon—Indicates a valid certificate (valid trust chain)
Red icon—Indicates an error (for example, trust certificate missing or expired)
Yellow icon—Warns that a certificate is about to expire and prompts renewal
Cisco ISE provides the Admin Portal to manage the following two categories of X.509
certificates:
System certificates—These are server certificates that identify a Cisco ISE node to client
applications. Every Cisco ISE node has its own system certificates, each of which are
stored on the node along with the corresponding private key.
Trusted certificates—These are certificate authority (CA) certificates used to establish trust
for the public keys received from users and devices. The Trusted Certificates Store also
contains certificates that are distributed by the Simple Certificate Enrolment Protocol
(SCEP), which enables registration of mobile devices into the enterprise network.
Certificates in the Trusted Certificates Store are managed on the Primary Administration
Node (PAN), and are automatically replicated to all other nodes in an Cisco ISE
deployment.
In a distributed deployment, you must import the certificate only in to the certificate trust
list (CTL) of the PAN. The certificate gets replicated to the secondary nodes
Managing Local Certificates
ISE 1.0-1.2 EOL/EOS
PSN #1
• Generate CSR for PSN #1
• Bind CA-signed cert for PSN #1
PAN’s
• Generate CSR PSN #20
for PAN/MnT MnT’s • Generate CSR for PSN #20
• Bind CA-signed cert • Bind CA-signed cert for PSN #20
for PAN/MnT
Primary
PSN #20
• PAN
Generate CSRs for ALL NODES
at Primary PAN
• Bind CA-signed certs for ALL NODES
Primary PAN
• Manage System (Local) certs for ALL NODES
at primary PAN PSN #40
Certificates your ISE Cube will “Trust”
• Trust for EAP, MDM, etc.
• These are copies of their Public Certs. I.e.: They Identify Other Systems
3
Trusted Certificates
Subordinate
CA
34
ISE for Root CA
Subordinate CA
signs the Actual
Endpoint Certs
Secondary PAN is
another Root CA!
Ensure you export
Primary PAN and
import on
Secondary
ISE as an Intermediate/Subordinate CA
73
Certificate Revocation
Certificates are normally comes with Validity. And sometimes you have to revoke the certs before
expiry, could be many reason like