Integrate the Cisco Identity Services Engine

Similar documents
Network Deployments in Cisco ISE

Set Up Cisco ISE in a Distributed Environment

Network Deployments in Cisco ISE

Set Up Cisco ISE in a Distributed Environment

User Identity Sources

User Identity Sources

Managing Certificates

Introduction to ISE-PIC

Connect the Appliance to a Cisco Cloud Web Security Proxy

File Reputation Filtering and File Analysis

Create Decryption Policies to Control HTTPS Traffic

Certificate Renewal on Cisco Identity Services Engine Configuration Guide

Backup and Restore Operations

Manage Administrators and Admin Access Policies

Using ISE 2.2 Internal Certificate Authority (CA) to Deploy Certificates to Cisco Platform Exchange Grid (pxgrid) Clients

Reports. Cisco ISE Reports

Using SSL to Secure Client/Server Connections

There are two ways for a sensor device to detect the Security Group Tag (SGT) assigned to the traffic:

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies

Migrate Data from Cisco Secure ACS to Cisco ISE

Managing External Identity Sources

Access Control Rules: Realms and Users

Exam Questions Demo Cisco. Exam Questions

Cisco ISE Features Cisco ISE Features

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Security Certificate Configuration for XMPP Federation

Backup and Restore Operations

SAML-Based SSO Configuration

Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

Polycom RealPresence Resource Manager System

Cisco pxgrid: A New Architecture for Security Platform Integration

Manage Certificates. Certificate Management in Cisco ISE. Certificates Enable Cisco ISE to Provide Secure Access

Certificates for Live Data

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

System Setup. Accessing the Administration Interface CHAPTER

Configure WSA to Upload Log Files to CTA System

Best Practices for Security Certificates w/ Connect

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation

How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology

Manage Certificates. Certificates Overview

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

Configure WSA to Upload Log Files to CTA System

Managing Security Certificates in Cisco Unified Operating System

Realms and Identity Policies

Cisco ISE Licenses. Your license has expired. If endpoint consumption exceeds your licensing agreement.

PAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0

LDAP Directory Integration

Cisco ISE pxgrid App 1.0 for IBM QRadar SIEM. Author: John Eppich

Resource Manager System Upgrade Guide

Cisco ISE Ports Reference

Cisco ISE CLI Commands in EXEC Mode

F5 BIG-IQ Centralized Management: Device. Version 5.2

Certificates for Live Data Standalone

Workspace ONE UEM Integration with OpenTrust CMS Mobile 2. VMware Workspace ONE UEM 1811

SAML-Based SSO Solution

Installing and Configuring vcloud Connector

Cisco ISE CLI Commands in EXEC Mode

Configure Mobile and Remote Access

Realms and Identity Policies

F5 BIG-IQ Centralized Management: Device. Version 5.3

ForeScout CounterACT. Configuration Guide. Version 4.3

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

This Tech Note provides instructions on how to upgrade to ClearPass 6.7 from versions 6.5 and later.

Realms and Identity Policies

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Deploying Cisco ASA VPN Solutions v2.0 (VPN)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Certificate Management in Cisco ISE-PIC

Cisco Identity Services Engine

Cisco Cloud Web Security

Sophos Mobile as a Service

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0

Troubleshoot and Enable Debugs on ISE

F5 SSL Orchestrator: Setup. Version

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

Cisco Unified Communications Manager Phone Setup

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

ZENworks 2017 Audit Management Reference. December 2016

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Infoblox Authenticated DHCP

Unified CCX Administration Web Interface

Using the Certificate Authority Proxy Function

Implementing Infoblox Data Connector 2.0

Live Data Gadget Failover

Cisco TrustSec How-To Guide: Central Web Authentication

McAfee Web Gateway Administration

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Configuring High Availability (HA)

Polycom RealPresence Resource Manager System

IBM Security Access Manager Version December Release information

ForeScout CounterACT. Configuration Guide. Version 1.8

ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND

Cisco Identity Services Engine Installation Guide, Release 2.2

Identity Services Engine Passive Identity Connector (ISE-PIC) Administrator Guide, Release 2.4

Cisco ISE Licenses. You cannot upgrade the Evaluation license to an Plus and/or Apex license without first installing the Base license.

Transcription:

This chapter contains the following sections: Overview of the Identity Services Engine Service, on page 1 Identity Services Engine Certificates, on page 2 Tasks for Certifying and Integrating the ISE Service, on page 3 Connect to the ISE Services, on page 6 Troubleshooting Identity Services Engine Problems, on page 8 Overview of the Identity Services Engine Service Cisco s Identity Services Engine (ISE) is an application that runs on separate servers in your network to provide enhanced identity management. AsyncOS can access user-identity information from an ISE server. If configured, user names and associated Secure Group Tags will be obtained from the Identity Services Engine for appropriately configured Identification Profiles, to allow transparent user identification in policies configured to use those profiles. The ISE service is not available in Connector mode. About pxgrid Related Topics About pxgrid, on page 1 About the ISE Server Deployment and Failover, on page 2 Cisco s Platform Exchange Grid (pxgrid) enables collaboration between components of the network infrastructure, including security-monitoring and network-detection systems, identity and access management platforms, and so on. These components can use pxgrid to exchange information via a publish/subscribe method. There are essentially three pxgrid components: the pxgrid publisher, the pxgrid client, and the pxgrid controller. pxgrid publisher Provides information for the pxgrid client(s). 1

About the ISE Server Deployment and Failover pxgrid client Any system, such as the Web Security appliance, that subscribes to published information; in this case, Security Group Tag (SGT) and user-group and profiling information. pxgrid controller In this case, the ISE pxgrid node that controls the client registration/management and topic/subscription processes. Trusted certificates are required for each component, and these must be installed on each host platform. About the ISE Server Deployment and Failover A single ISE node set-up is called a standalone deployment, and this single node runs the Administration, Policy Service, and Monitoring personae. To support failover and to improve performance, you must set up multiple ISE nodes in a distributed deployment. The minimum required distributed ISE configuration to support ISE failover on your Web Security appliance is: Two pxgrid nodes Two Monitoring nodes Two Administration nodes One Policy Service node This configuration is referred to in the Cisco Identity Services Engine Hardware Installation Guide as a Medium-Sized Network Deployment. Refer to that network deployments section in the Installation Guide for additional information. Related Topics Identity Services Engine Certificates, on page 2 Tasks for Certifying and Integrating the ISE Service, on page 3 Connect to the ISE Services, on page 6 Troubleshooting Identity Services Engine Problems, on page 8 Identity Services Engine Certificates This section describes the certificates necessary for ISE connection. Tasks for Certifying and Integrating the ISE Service, on page 3 provides detailed information about these certificates. Certificate Management, provides general certificate-management information for AsyncOS. A set of three certificates is required for mutual authentication and secure communication between the Web Security appliance and each ISE server: WSA Client Certificate Used by the ISE server to authenticate the Web Security appliance. ISE Admin Certificate Used by the Web Security appliance to authenticate an ISE server on port 443 for bulk download of ISE user-profile data. ISE pxgrid Certificate Used by the Web Security appliance to authenticate an ISE server on port 5222 for WSA-ISE data subscription (on-going publish/subscribe queries to the ISE server). These three certificates can be Certificate Authority (CA)-signed or self-signed. AsyncOS provides the option to generate a self-signed WSA Client certificate, or a Certificate Signing Request (CSR) instead, if a CA-signed certificate is needed. Similarly, the ISE server provides the option to generate self-signed ISE Admin and pxgrid certificates, or CSRs instead if CA-signed certificates are needed. 2

Using Self-signed Certificates Related Topics Using Self-signed Certificates Using Self-signed Certificates, on page 3 Using CA-signed Certificates, on page 3 Overview of the Identity Services Engine Service, on page 1 Tasks for Certifying and Integrating the ISE Service, on page 3 Connect to the ISE Services, on page 6 When self-signed certificates are used on the ISE server, all three certificates the ISE pxgrid and Admin certificates, developed on the ISE server, as well as the WSA Client certificate, developed on the WSA must be added to the Trusted Certificates store on the ISE server (Administration > Certificates > Trusted Certificates > Import). Using CA-signed Certificates In the case of CA-signed certificates: On the ISE server, ensure the appropriate CA root certificate for the WSA Client certificate is present in the Trusted Certificates store (Administration > Certificates > Trusted Certificates). On the WSA, ensure the appropriate CA root certificates are present in the Trusted Certificates list (Network > Certificate Management > Manage Trusted Root Certificates). On the Identity Services Engine page (Network > Identity Services Engine), be sure to upload the CA root certificate(s) for the ISE Admin and pxgrid certificates. Tasks for Certifying and Integrating the ISE Service Step 1a 1b 2 Task On the WSA, add a WSA Client certificate. On the WSA, download this WSA Client certificate for upload to the ISE server. If the WSA Client Certificate is self-signed, upload it and its signing certificate to the ISE server. Links to Related Topics and Procedures Create or upload a CA-signed or self-signed WSA Client certificate on the WSA. See Connect to the ISE Services, on page 6, and Certificate Management. Download the WSA Client certificate, save it, and then transfer it to the ISE server. See Connect to the ISE Services, on page 6. Import the WSA Client certificate downloaded from the WSA in the previous step, adding it to the ISE server s Trusted Certificate store. (Administration > Certificates > Trusted Certificates > Import.) Be sure to also add the appropriate signing certificate for this WSA Client certificate to the Trusted Certificates store on the ISE server, as discussed in Using Self-signed Certificates, on page 3. 3

Tasks for Certifying and Integrating the ISE Service Step 3 Task On the ISE server, add ISE Admin and pxgrid certificates. Links to Related Topics and Procedures Navigate to the Administration > Certificates page, and generate or upload ISE Admin and pxgrid certificates: For CA-signed certificates, generate two Certificate Signing Requests, one each for Admin and pxgrid Usage, and then have the certificates signed. Upon receipt of the signed certificates, upload both to the ISE server. Perform the Bind the CA Signed Certificate operation for both. Be sure to add the CA root certificate to the ISE server s Trusted Certificates store. Restart the ISE server. For self-signed certificates, navigate to Administration > Certificates > System Certificates, and generate two Self Signed Certificates, one each for Admin and pxgrid. (You can also elect to generate one common certificate for both.) Add both to the Trusted Certificates store. Export the self-signed certificate(s) for import onto the WSA. Ensure the appropriate self-signed or CA root certificates for these ISE Admin and pxgrid certificates are added to the Trusted Certificates store, as discussed in Identity Services Engine Certificates, on page 2. 4

Tasks for Certifying and Integrating the ISE Service Step 4 5 Task Ensure the ISE server is configured appropriately for WSA access. On the WSA, add the exported ISE Admin and pxgrid certificates. Links to Related Topics and Procedures Each ISE server must be configured to allow identity topic subscribers (such as WSA) to obtain session context in real-time. The basic steps are: Ensure Enable Auto Registration is turned ON (Administration > pxgrid Services > Top Right). Delete all existing WSA clients from the ISE server (Administration > pxgrid Services > Clients). Be sure the ISE server footer (Administration > pxgrid Services) says Connected to pxgrid. Configure SGT groups on ISE server (Policy > Results > TrustSec > Security Groups). Configure policies that associate the SGT groups with users. Refer to Cisco Identity Services Engine documentation for more information. Upload the ISE Admin and pxgrid certificates for each ISE server you are configuring on this WSA. See Connect to the ISE Services, on page 6. If using a single self-signed certificate for both ISE Admin and pxgrid, upload the file twice, once each in the ISE Admin Certificate and ISE pxgrid Certificate fields. See Connect to the ISE Services, on page 6. If using CA-signed certificates, be sure the Certificate Authority that signed each pair of ISE certificates is listed in the Trusted Root Certificates list on the WSA. If not, import the CA root certificate. See Managing Trusted Root Certificates. If the ISE Admin and pxgrid certificates are signed by your Root CA certificate, be sure to upload Root CA certificate itself to the ISE Admin Certificate and ISE pxgrid Certificate fields on the WSA (Network > Identity Services Engine). 5

Connect to the ISE Services Step 6 Task Complete configuration of the WSA for ISE access and logging. Links to Related Topics and Procedures Connect to the ISE Services, on page 6 Add the custom field %m to the Access Logs to log the Authentication mechanism Customizing Access Logs. Verify that the ISE Service Log was created; if it was not, create it Adding and Editing Log Subscriptions. Ensure the ISE Service Log was created; if not, add it Adding and Editing Log Subscriptions. Define Identification Profiles that access ISE for user identification and authentication Classifying Users and Client Software. Configure access policies that utilize ISE identification to define criteria and actions for user requests Policy Configuration. Whenever you upload or change certificates on the ISE server, you must restart the ISE service. Also, a few minutes may be required before the services and connections are restored. Related Topics Overview of the Identity Services Engine Service, on page 1 Identity Services Engine Certificates, on page 2 Troubleshooting Identity Services Engine Problems, on page 8 Connect to the ISE Services Before you begin Be sure each ISE server is configured appropriately for WSA access; see Tasks for Certifying and Integrating the ISE Service, on page 3. Obtain ISE server connection information. Obtain valid ISE-related certificates (client, Portal and pxgrid) and keys. See also Identity Services Engine Certificates, on page 2for related information. Step 1 Step 2 Step 3 Step 4 Choose Network > Identification Service Engine. Click Edit Settings. Check Enable ISE Service. Identify the Primary ISE pxgrid Node using its host name or IPv4 address. a) Provide an ISE pxgrid Node Certificate for WSA-ISE data subscription (on-going queries to the ISE server). Browse to and select the certificate file, and then click Upload File. See Uploading a Certificate and Key for additional information. Step 5 If using a second ISE server for failover, identify the Secondary ISE pxgrid Node using its host name or IPv4 address. 6

Connect to the ISE Services a) Provide the secondary ISE pxgrid Node Certificate. Browse to and select the certificate file, and then click Upload File. See Uploading a Certificate and Key for additional information. During failover from primary to secondary ISE servers, any user not in the existing ISE SGT cache will be required to authenticate, or will be assigned Guest authorization, depending on your WSA configuration. After ISE failover is complete, normal ISE authentication resumes. Step 6 Upload the ISE Monitoring Node Admin Certificates: a) Provide the Primary ISE Monitoring Node Admin Certificate for use in bulk download of ISE user-profile data to the WSA. Browse to and select the certificate file, and then click Upload File. See Uploading a Certificate and Key for additional information. b) If using a second ISE server for failover, provide the Secondary ISE Monitoring Node Admin Certificate. Step 7 Provide a WSA Client Certificate for WSA-ISE server mutual authentication: This must be a CA trusted-root certificate. See Identity Services Engine Certificates, on page 2 for related information. Use Uploaded Certificate and Key For both the certificate and the key, click Choose and browse to the respective file. If the Key is Encrypted, check this box. Click Upload Files. (See Uploading a Certificate and Key for additional information about this option.) Use Generated Certificate and Key Click Generate New Certificate and Key. (See Generating a Certificate and Key for additional information about this option.) Step 8 Step 9 Step 10 Download the WSA Client Certificate, save it, and then upload it to the ISE server host (Administration > Certificates > Trusted Certificates > Import on the specified server). (Optional) Click Start Test to test the connection with the ISE pxgrid node(s). Click Submit. What to do next Classifying Users and Client Software Create Policies to Control Internet Requests Related Information http://www.cisco.com/c/en/us/support/security/identity-services-engine/ products-implementation-design-guides-list.html, particularly How To Integrate Cisco WSA using ISE and TrustSec through pxgrid.. 7

Troubleshooting Identity Services Engine Problems Troubleshooting Identity Services Engine Problems Identity Services Engine Problems Tools for Troubleshooting ISE Issues ISE Server Connection Issues ISE-related Critical Log Messages 8