Cisco ISE Design and Architecture
Cisco ISE Design and Architecture
Cisco ISE Design and Architecture
ISE
Wired
Wireless
VPN
Business-Relevant
Policies
Replaces AAA and RADIUS, NAC, guest management, and device identity servers
Security Policy Attributes
Identity
Context
Cisco Identity Services Engine (ISE)
All-in-One Enterprise Policy Control
2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 5
NAC Profiler
ACS5.x
Catalyst
Switch
802.1X
MAB
Directory Server
NAC Guest Server
Web Auth
RADIUS
Various Authorization Methods (VLAN,
Downloadable ACL, URL Redirect, etc)
Scalable / Flexible Policy & Authentication
Server supporting RBAC
Guest Service to provide full guest
access management with Web
Authentication
Profiling System to perform automatic
device profiling for unattended device or
any type of network attached device
Cisco IOS intelligence to provide phased deployment
mode for 802.1X (Monitor Mode, Low Impact Mode,
High Security Mode)
Flexible Authentication Methods
(802.1X, MAB, Web Auth in any order)
Guest
Employee
Printer
ISE
Cisco Identity Solution Specifics
Agents
AnyConnect 3.1
! Unified access interface for
! 802.1X for LAN / WLAN
! VPN (SSL-VPN and IPSec)
! Mobile User Security (WSA / ScanSafe)
! Supports MACSec / MKA (802.1X-REV) for data encryption in
software; Performance based on endpoint CPU
! MACSec-capable hardware (network cards) enhance
performance w/ AC 3.0
NAC Agent currently used
for posture. Will be merged
into AnyConnect in AC3.2
ISE Web Authentication
need SomeLhlng Lo lnLercepL
browser requesLs Lo provlde
capuve porLal and /or
redlrecuon Lo local or remoLe
web auLh porLal
Centralized and customizable Web authentication portal
Both employee and guest auth supported
Tunable username and password policies
Support print, email, SMS guest notifications
Who?
swlLch
ConLroller
Used to identify users without supplicants
Misconfigured, missing altogether, etc.
2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 8
Providing Network Access to Guests and Employees
On wireless:
! Using multiple SSIDs
! Open SSID for Guest
On wired:
! No notion of SSID
! Unified port: Need to use different auth
methods on single port " Enter Flex Auth
SWITCHPORT
Employee
Desktop
Printer
Guest
Contractor
IP Phone
C
orporate
Guest
SSID
Corp
SSID
Guest
Unifying network access for guest
users and employees
2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 9
Provisioning: Guest
accounts via sponsor portal
Notify: Guests of account
details by print, email, or SMS
Manage: Sponsor privileges,
guest accounts and policies,
guest portal
Report: On all aspects of
guest accounts
Guests
Components of a Full Guest Lifecycle Solution
Authenticate/Authorize guest
via a guest portal on ISE
Cisco Secure Access and TrustSec Technology Review:
Network Identity & Enforcement
Authentication -
(802.1x, MAB, Web, NAC)
Authorization -
(VLAN, DACL, SXP or SGT)
Enforcement
(SGACL and Identity Firewall)
I want to allow guests into
the network
I need to allow/deny iPADs
in my network
I need to ensure data
integrity and confidentiality
for my users
I need a scalable way of
authorizing users or
devices in the network
I need to ensure my
endpoints dont become a
threat vector
How can I set my firewall
policies based on identity
instead of IP addresses?
Guest Access
Profiler
Posture
MACSec
Encryption
Security Group
Access
Identity-Based
Firewall
I need to securely allow
personal devices on the
network
BYOD/MDM
Administration Process & Explanation
NAD PAN
Admin
User
Policy Administration
Node
All Management UI Activities
Synchronizing all ISE Nodes
PSN
All Policy is Synchronized from PAN to PSNs
Policy Service Node
The Work-Horse
RADIUS, Profiling, WebAuth
Posture, Sponsor Portal
Client Provisioning
SWITCHPORT
MnT
User
Network Access
Device
Access-Layer Devices
Enforcement Point for
all Policy
RADIUS From NAD to Policy Service Node
RADIUS From PSN to NAD w/ Enforcement Result
Logging
Monitoring and
Troubleshooting
Logging and
Reporting Data
Logging
AD
PSN Queries AD Directly
RADIUS Accounting
How ISE is Used Today
lL's easy Lo provlde
guesLs llmlLed ume and resource access
ConLrol wlLh one pollcy across wlred, wlreless &
remoLe lnfrasLrucLure
users geL safely on Lhe lnLerneL fasL and easy
8ules wrluen ln buslness Lerms conLrols access
Wireless Upgrade License (ATP)
Extend Policy for Wired and VPN Endpoints
Platforms
Small: Cisco