معرفی لایسنس سیسکو ISE
از جدیدترین و قدرتمند ترین محصولات شرکت سیسکو Identity Services Engine یا همان لایسنس سیسکو ISE می باشد، این محصول با سیستم شناسایی و کنترل دسترسی، شبکه را قادر می سازد سرویس دهی را ساده تر انجام دهد و وضعیت امنیت زیرساخت را بهبود ببخشد. محصول Cisco ISE جهت احراز هویت کاربران در لایه ها و دستگاه های مختلف شبکه ایجاد گردید. این سرویس، ترکیبی از Server NAC ,Cisco ACS ,NAC Guest Portal می باشد. مدیریت متمرکز و تعیین سطوح دسترسی کاربران سازمان به سرویس های مختلف مهم ترین وظیفه Cisco ISE می باشد. معماری منحصر به فرد محصول مورد بررسی این قابلیت را داراست که به صورت Real time اطلاعات شبکه، کاربران و دستگاه ها را بتوان جمع آوری کرد، سپس مدیر می تواند با استفاده از این اطلاعات برای شناسایی دسترسی به عناصر مختلف شبکه مانند سوئیچ ها، WLAN ، VPN و … اقدام کند. Cisco ISE محصولی جدید است که راه حل ها و سرویس های مختلف امنیتی را در یک محصول به صورت یکجا برای ما فراهم می کند. پلتفرم Cisco ISE عموما یک استقرارِ توزیع شده از نودها است که از سه بخش مختلف ایجاد می شود که هر سه نقش در کارکردِ سیسکو ISE ضروری می باشند.
Policy Administration Node (PAN)
PAN رابطی است که مدیر شبکه به منظور کانفیگ سیاست ها (Policy) وارد آن می شود. این نود، مرکز کنترل استقرار است. PAN به مدیر شبکه اجازه می دهد که در کل توپولوژی سیسکو ISE تغییراتی را ایجاد کند و این تغییرات از نود Admin به سمت نودهای سرویس های PSN (Policy) خارج می شود.
Policy Service Node (PSN)
نود PSN جایی است که تصمیمات Policy اتخاذ می شود. این ها نودهایی هستند که دستگاه های شبکه همه پیام های شبکه را به آن ارسال می کنند؛ پیام های RADIUS نمونه ای از آنچه هستند که به PSN فرستاده می شود. پیام ها پردازش می شوند و سپس PSN مجوز یا عدم مجوز دسترسی به شبکه را صادر می کند.
Monitoring (MNT)
نود MNT جایی است که ورود به سیستم (login) انجام و گزارش ها تولید می شود. همه log ها به این نود ارسال می شوند و MNT همه آنها را مرتب می کند بنابراین می تواند آنها را در فرمتی خوانا جمع آوری کند. همچنین از آن برای تولید گزارش های مختلف استفاده می شود.
مزایای استفاده از Cisco ISE
کسبوکار ایمن و دسترسی مبتنی بر ساختار
این محصول شرکت سیسکو امکان کسبوکار ایمن و دسترسی مبتنی بر ساختار را مطابق با Policyهای هر سازمان فراهم می آورد. همچنین مدیران IT با بهره گیری از آن می توانند کنترل دقیقی را نسبت به افراد یا تجهیزات مجاز در شبکه اعمال نمایند؛ ضمن اینکه از چندین مکانیسم برای اجرای Policy استفاده میکنند.
افزایش قابلیت دید شبکه
این امکان با استفاده از یک Interface ساده و انعطافپذیر حاصل میشود. در حال حاضر این راهکار میتواند سابقهای از تمام Endpointهای روی شبکه با قابلیت دید مرتبط را ذخیره نماید.
اجرای Policyها در سطح گسترده
با اجرای Policyها در سطحی وسیع میتوان قواعد دسترسی را به شکلی ساده و با انعطافپذیری زیاد تعریف نمود تا در نهایت زمینهای برای تامین نیازهای همواره در حال تغییر کسبوکار فراهم گردد.
قابلیت Onboarding تجهیزات به صورت Self-Service
از این ویژگی سیسکو ISE جهت اجرای Guest Policy در سازمانها استفاده میشود. بنابراین کاربران میتوانند تجهیزات را مطابق با سیاست های تعریف شده توسط مدیران IT، مدیریت نمایند. در ضمن، کارکنان IT میتوانند به قابلیت آمادهسازی، پروفایلبندی و تعیین وضعیت به صورت خودکار دست یابند که مستلزم مطابقت با Policy های امنیتی میباشد.
کنسول واحد مدیریت
از این کنسول برای ارائه سادهتر Policy، قابلیت دید و گزارشگیری در سراسر شبکههای سازمان استفاده میگردد.
بررسی خودکار تطبیقپذیری تجهیزات
از این قابلیت برای بررسی وضعیت استفاده میشود. به علاوه اینکه AnyConnect Agent به ارائهی سرویسهای پیشرفته VPN برای بررسی لپتاپ و دسکتاپ میپردازد.
What is Cisco ISE used for?
Page Contents [show]
Cisco Identity Services Engine (ISE) is a server based product, either a Cisco ISE appliance or Virtual Machine that enables the creation and enforcement of access polices for endpoint devices connected to a companies network.
In this Cisco ISE overview we are going to cover all the basic concepts so by the end of the post you will be able to explain all the basic concepts.
Some people think it is Cisco ICE, this is how it’s pronounced, but the correct acronym is ISE – Identity Services Engine.
What can you do with Cisco ISE?
In simple terms you can control who can access your network and when they do what they can get access to. It can authenticate wired, wireless and vpn users and can scale to millions of endpoints. Based on many factors including the validity of a certificate, mac address or device profiling you can identify a machine and determine which vlan that machine is placed into. Any devices that do not pass authorisation will be placed into a guest vlan or denied access to the network.
All this information is logged and you can instantly get a view of what is connected to your network at any time.
ISE Nodes
The ISE solution is made up of a deployment of nodes with three different ISE personas:
- Policy Administration Node (PAN)
- Monitoring Node (MnT)
- Policy Services Node (PSN)
- pxGrid
Depending on the size of your deployment all three personas can be run on the same device or spread across multiple devices for redundancy and scalability. Lets go through each persona and explain their function.
Policy Administration Node (PAN)
The Policy Administration Node is where the administrator logs into to configure policies and make changes to the entire ISE system. Once configured on the PAN the changes are pushed out to the policy services nodes. It handles all system related configurations and can be configured as standalone, primary or secondary.
Monitoring Node (MnT)
The Monitoring Node is where all the logs are collected and where report generation occurs. Every event that occurs within the ISE topology is logged to the monitoring node you can then generate reports showing the current status of connected devices and unknown devices on your network.
Policy Services Node (PSN)
The Policy Services Node is the contact point into the network. Each switch is configured to query a radius server to get the policy decision to apply to the network port the radius server is the PSN. In larger deployments you use multiple PSN’s to spread the load of all the network requests. The PSN provides network access, posture, guest access, client provisioning, and profiling services. There must be at least one PSN in a distributed setup.
pxGrid Node
The pxGrid framework is used to exchange context-sensitive information from the CISCO ISE session directory. It allows the ISE system to pass data to other Cisco platforms and third party vendors. This information can then be used to invoke actions to quarantine users or block access in response to network security events.
ISE Hardware
The Cisco Secure Network Server is based on the Cisco UCS C220 Rack Server and is configured specifically to support the Cisco Identity Services Engine.
Cisco ISE End of Life
Note: The 3415 and 3495 secure network servers are now end of life (eol) and the last date for order for these appliances was October 7 2016. This post will be covering the latest hardware now available which is the 3515 and the 3595 – the 3595 appliance is shown below.
Secure Network Server 3595
There are two versions of the hardware:
- Secure Network Server 3515 (For small and medium sized deployments)
- Secure Network Server 3595 (For large deployments – includes redundant hard disks and power supplies)
Hardware details taken from cisco data sheet
[ultimatetables 3 /]
Endpoints supported for different platforms
[ultimatetables 5 /]
How Cisco ISE Works – Cisco ISE Deployment options
ISE has two different deployment options – Standalone and Distributed
Standalone Deployment
This consists of one node which runs all three personas. This is suitable for a small deployment or lab solution.
If you ran a standalone solution on your production network you have no redundancy.
Distributed Deployment
- Small Network Deployments
- Medium Network Deployments
- Large Network Deployments
Small Network Deployment
The smallest distributed ISE deployment consists of two Cisco ISE nodes with one node functioning as the primary.
The primary node provides all the configuration, authentication and policy functions and the secondary node functions as a backup. The secondary supports the primary in the event of a loss of connectivity between the network devices and the primary.
Medium Network Deployment
As the size of your network grows or you want to expand your ISE topology you need to start adding more nodes and with a medium sized deployment start dedicating nodes to logging and administration. The medium sized deployment consists of a primary and secondary administration node and a primary and secondary monitoring node, alongside separate policy service nodes.
Large Network Deployment
With a large network deployment you dedicate each node to a separate persona. So a separate node (secure network server) for administration, monitoring and policy service. You should also consider using load balancers in front of the PSN nodes.
As the number of PSN nodes increases it becomes more of an administrative overhead to ensure even distribution of AAA client configuration. i.e if you have 1000 switches each of them will be configured to point to a specific primary and secondary radius server. If all switches point to one radius server (a single PSN node then this single node will take all the load and the other nodes will not be used. Putting a load balancer in front of the PSNs and creating a Radius VIP will ensure all switches can be configured with a single Radius server and the load balancer will balance the radius requests between all the PSN’s. This is also very beneficial when performing software upgrades as a single PSN node can be removed from service without any fear of a switch being configured to have it as it’s primary radius server.
Having a single load balancer does introduce a potential single point of failure so it is highly recommended to deploy two load balancers.
The large network deployment also uses a centralised dedicated logging server. One node setup specifically for logging. This would typically be an appliance with a lot of disk space. A secondary logging appliance would also be configured but in the first instance all logging information will go to a central point.
With the large network deployment you have a dedicated Primary PAN and dedicated secondary PAN. A Primary and Secondary MnT. All logging goes to the primary monitoring appliance. The number of PSN nodes is scaled out depending on the number of devices on the network. Typically allow 7,500 devices per PSN plus 2 more for redundancy.
Due the standard configuration on switches where most radius servers will be configured as primary / secondary there is a big potential for all devices to only talk to a single PSN loading it very heavily. To overcome this it is a best practice to introduce a load balancer and ideally a redundant pair which will provide a single virtual IP for the Radius Server.
The load balancers will load balance the requests to all the PSN nodes. This also is very beneficial for software updates on the PSN nodes which do happen quite frequently. For a software update you just take a single PSN node out of the cluster and perform the upgrade.
All administration is handled on the primary PAN and in the event of a failure would move over to the secondary which contains a replicated database.
Cisco ISE 2.2 is the current version at the time of writing and will be used for all information below.
Cisco ISE Licensing
I will try to simplify the license model below but all the information from Cisco can be found here in the 2.1 admin guide license section
The Cisco ISE licensing model allows you to purchase licenee based on your enterprise needs. There are two ways of consuming licenses. Traditional or Smart.
- Traditional licensing is where you import a license onto the appliance
- Smart licensing is where you manage a cisco account that holds all the information on the license purchased for your deployment.
Licenses are counted against concurrent, active sessions. An active session is one for which a RADIUS Accounting Start is received but RADIUS Accounting Stop has not yet been received.
The valid license options are:
-
ISE Base only
-
ISE Base and Plus
-
ISE Base and Apex
-
ISE Base, Plus, and Apex
-
ISE Base, Plus, Apex and AnyConnect Apex
Base License
The base license is a perpetual license and is the only requirement for AAA and IEEE802.1x and also covers guest services and Trustsec. A base license is consumed for every active device on the network.
Base and Plus
A plus license is required for Bring Your Own Device (BYOD), Profiling, Adaptive Network Control (ANC) and PxGrid. A base license is required to install the plus license and the plus license is a subscription for 1,3 or 5 years.
Base and Apex
The Apex license is the same as the plus license in that it is a 1,3,5 year subscription, requires the base license but is used for Third Party Mobile Device Management & Posture Compliance.
Device Administration
There is a device administration license required for TACACS which is a perpetual license, a base license is required to install the device administration license and you only require one license per deployment.
Evaluation
An evaluation license covers 100 nodes and provide full Cisco ISE functionality for 90 days. All Cisco ISE appliances are supplied with an evaluation license.
ISE upgrade
At some point in time when you run Cisco ISE you will have to perform a software upgrade. Check out my comprehensive guide here to walk you through this process.
How to upgrade Cisco ISE from 2.4 to 2.6
Cisco ISE Questions
What is Trustsec?
The ultimate goal in idea of Trustec is to assign a TAG or Security Group Tag SGT to the users or devices traffic at the ingress point to the network. And then to apply restrictions or permit the traffic at other parts of the network based on this tag.
Does Cisco ISE support Tacacs?
As of version 2.0 Cisco ISE now supports TACACS+
Up until this point the defacto TACACs+ server was ACS, but with this feature now available in ISE the migration of TACACS+ services has enabled network engineers to centralise all network authentications within one framework.
Device admin is not enabled by default, to enable it go to:
Administration / Deployment / Node Name / Enable Device Admin Service
This service should be enabled on the PSNs
What is Cisco ISE Profiling?
The profiling service allows the identity services engine to profile devices connected to the network and give them an identity based on numerous factors. These devices can then be granted access or denied access to the network based on the security policies. A typical network deployment would start by putting ISE into monitor mode. In monitor mode no enforcement takes place but the ISE administrator can start to see what devices are connecting to the network and what identity it has been given.
During this phase a lot of devices are normally discovered that the network administrator did not even know were connected to the network.
That is though the whole point of NAC to have a complete picture of all devices that are connected to your network and to be in complete control of their access.
What is Mac Authentication Bypass?
MAC Authentication Bypass (MAB) is a way to give a whitelist to certain network devices. If you know the MAC address of a certain device you know should get access to your network you can grant it access purely by it’s MAC address. This is used for devices that cannot have certificates loaded on them or are hard to profile.
How to change the IP address on ISE after installation
application stop ise
configure
interface GigabitEthernet 0
ip add <new ip address>
ISE will then restart all the services
Verify all the services are running with – show application status ise
To save the ISE config enter the command
write mem
Cisco ISE vs ACS
I get a lot of questions about the differences between ISE and ACS. In simple terms ISE is the next generation of network authentication and is so much more powerful than ACS. ACS is used to authenticate users to network devices and for VPN sessions but it is not a NAC solution. If you want to implement full network access control you need ISE.
The official Cisco ISE pages on cisco.com
I hope this information has been a benefit to starting to learn the concepts of the Cisco Identity Services Engine. For more in depth posts on configuring and deploying ISE – Check out my Cisco ISE Training pages.
If you are looking for ISE training videos I can highly recommend Katherine Mcnamara’s site
https://www.network-node.com/video-training
Cisco ISE Ordering Guide
There is a very good PDF document entitled the Cisco ISE Ordering guide which can be downloaded here this steps you through all the appliances, licenses and numbers required for placing an order for an ISE appliance.
What is Cisco ISE?
Cisco Identity Services Engine (ISE) is a server based product, either a Cisco ISE appliance or Virtual Machine that enables the creation and enforcement of access polices for endpoint devices connected to a companies network.
What is ISE?
ISE stands for Identity Services Engine and is Cisco’s flagship security product for network access control
How does Cisco ISE work?
Every time a user or device wants to connect to the network either wired or wireless, the device or user is validated to check if it’s permitted on the network. ISE can also posture devices and based on a profile allow or deny them access to the network
There is a also a lot of learning material on this .Learning resources on cisco.com
Other Reference Material