CISCO ISE Secure Access-1
CISCO ISE Secure Access-1
A network device, such as a switch or a router, is an authentication, authorization, and accounting (AAA)
client that sends AAA service requests to Cisco ISE. Defining network devices in Cisco ISE enables interactions
between Cisco ISE and network devices.
Configure network devices for RADIUS or TACACS AAA, and Simple Network Management Protocol
(SNMP) for the Profiling service to collect Cisco Discovery Protocol and Link Layer Discovery Protocol
(LLDP) attributes for profiling endpoints, and TrustSec attributes for Cisco TrustSec devices. A network
device that is not defined in Cisco ISE cannot receive AAA services from Cisco ISE.
From the Cisco ISE main menu, choose Administration > Network Resources > Network Devices, and
click Add. In the New Network Device window that is displayed, enter the following details to define a
network device:
• Select the vendor profile that fits the network device. The profile includes predefined configurations
for the device, such as settings for URL redirect and change of authorization.
• Configure the RADIUS protocol for RADIUS authentications. When Cisco ISE receives a RADIUS
request from a network device, it looks for the corresponding device definition to retrieve the
configured shared secret. If Cisco ISE finds the device definition, it obtains the configured shared
secret on the device and matches it against the shared secret in the request to authenticate access. If the
shared secrets match, the RADIUS server processes the request further based on the policy and
configuration. If the shared secrets do not match, a reject response is sent to the network device. A
failed authentication report is generated, which provides the failure reason.
• Configure the TACACS+ protocol for TACACS+ authentications. When Cisco ISE receives a
TACACS+ request from a network device, it looks for the corresponding device definition to retrieve
the shared secret that is configured. If it finds the device definition, it obtains the shared secret that is
configured on the device and matches it against the shared secret in the request to authenticate access.
If the shared secrets match, the TACACS+ server processes the request further based on the policy and
configuration. If they do not match, a reject response is sent to the network device. A failed
authentication report is generated, which provides the failure reason.
• You can configure the Simple Network Management Protocol (SNMP) in the network device
definition for the Profiling service to communicate with the network devices and profile endpoints that
are connected to the network devices.
• You must define Cisco TrustSec-enabled devices in Cisco ISE to process requests from TrustSec-
enabled devices that can be part of the Cisco TrustSec solution. Any switch that supports the Cisco
TrustSec solution is a Cisco TrustSec-enabled device.
Cisco TrustSec devices do not use IP addresses. Instead, you must define other settings so that Cisco
TrustSec devices can communicate with Cisco ISE.
Cisco TrustSec-enabled devices use the TrustSec attributes to communicate with Cisco ISE. Cisco
TrustSec-enabled devices, such as the Cisco Nexus 7000 Series Switches, Cisco Catalyst 6000 Series
Switches, Cisco Catalyst 4000 Series Switches, and Cisco Catalyst 3000 Series Switches are authenticated
using the Cisco TrustSec attributes that you define while adding Cisco TrustSec devices.
Cisco ISE looks for the corresponding device definition to retrieve the shared secret that is configured in the
network device definition when it receives a RADIUS or TACACS request from a network device.
Cisco ISE performs the following procedure when a RADIUS or TACACS request is received:
1. Looks for a specific IP address that matches the one in the request.
2. Looks up the ranges to see if the IP address in the request falls within the range that is specified.
3. If both step 1 and 2 fail, it uses the default device definition (if defined) to process the request.
Cisco ISE obtains the shared secret that is configured in the device definition for that device and matches it
against the shared secret in the RADIUS or TACACS request to authenticate access. If no device definitions
are found, Cisco ISE obtains the shared secret from the default network device definition and processes the
RADIUS or TACACS request.
Network Devices
The windows described in the following sections enable you to add and manage network devices in Cisco
ISE.
The following are the guidelines for defining the IP addresses and subnet masks, or IP address ranges:
• You can define a specific IP address, or an IP range with a subnet mask. If device A has an IP address
range defined, you can configure another device, B, with an individual address from the range that is
defined in device A.
• You can define IP address ranges in all the octets. You can use a hyphen (-) or an asterisk (*) as
wildcard to specify a range of IP addresses. For example, *.*.*.*, 1-10.1-10.1-10.1-10, or 10-11.*.5.10-
15.
• You can exclude a subset of IP address range from the configured range in a scenario where that
subset has already been added, for example, 10.197.65.*/10.197.65.1, or 10.197.65.* exclude
10.197.65.1.
• You can configure up to 40 IP addresses or IP ranges for each network device.
• You cannot define two devices with the same specific IP addresses.
• You cannot define two devices with the same IP range. The IP ranges must not overlap either
partially or completely.
• When you exclude IP addresses, do not use overlapping IP ranges. Instead, exclude separate IP ranges.
Device Profile Choose the vendor of the network device from the drop-down list.
Use the tooltip next to the drop-down list to see the flows and services that the selected vendor's network
devices support. The tooltip also displays the RADIUS Change of Authorization (CoA) port and type of
URL redirect that is used by the device. These attributes are defined in the device type's network device
profile.
Model Name Choose the device model from the drop-down list.
Use the model name as one of the parameters while checking for conditions in rule-based policies.
This attribute is present in the device dictionary.
Software Version Choose the version of the software running on the network device from the drop-down list.
You can use the software version as one of the parameters while checking for conditions in rule-based
policies. This attribute is present in the device dictionary.
Network Device In the Network Device Group area, choose the required values from the Location, IPsec, and Device
Group Type drop-down lists.
If you do not specifically assign a device to a group, it becomes a part of the default device groups (root
network device groups), which is All Locations by location and All Device Types by device type.
RADIUS Authentication Settings
The following table describes the fields in the RADIUS Authentication Settings area.
Use Device ID for Check the Use Device ID for TrustSec Identification check box if you want the device name to be
TrustSec listed as the device identifier in the Device ID field.
Identification
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec Identification
check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to authenticate the
Cisco TrustSec device.
Click Show to display the password.
HTTP REST API Settings
Enable HTTP Check the Enable HTTP REST API check box to use the HTTP REST API to provide the required
REST API Cisco TrustSec information to the network devices. This enhances the efficiency and ability to
download large configurations in a short time as compared to the RADIUS protocol. It also
improves reliability by using TCP over UDP.
Username Enter the username that you have configured in the Cisco TrustSec device's CLI to authenticate the
Cisco TrustSec device. The username cannot contain special characters such as space ! % ^ : ; , [ { | }
]`"=<>?
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to authenticate the
Cisco TrustSec device.
TrustSec Device Notification and Updates
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec Identification
check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to authenticate the
Cisco TrustSec device.
Click Show to display the password.
Download Specify the time interval at which the device must download its environment data from Cisco ISE, by
Environment Data choosing the required values from the drop-down lists in this area. You can choose the time interval
Every <...> in seconds, minutes, hours, days, or weeks. The default value is one day.
Download Peer Specify the time interval at which the device must download the peer authorization policy from
Authorization Policy Cisco ISE by choosing the required values from the drop-down lists in this area. You can specify
Every <...> the time interval in seconds, minutes, hours, days, or weeks. The default value is one day.
Reauthentication EverySpecify the time interval at which the device reauthenticates itself against Cisco ISE after the
<...> initial authentication, by choosing the required values from the drop-down lists in this area. You
can configure the time interval in seconds, minutes, hours, days, or weeks. For example, if you enter
1000 seconds, the device authenticates itself against Cisco ISE every 1000 seconds. The default
value is one day.
Download SGACL Lists Specify the time interval at which the device downloads SGACL lists from Cisco ISE, by choosing
Every <...> the required values from the drop-down lists in this area. You can configure the time interval in
seconds, minutes, hours, days, or weeks. The default value is one day.
Other TrustSec Check the Other TrustSec Devices to Trust This Device check box to allow all the peer devices
Devices to Trust This to trust this Cisco TrustSec device. If this check box is not checked, the peer devices do not trust
Device (TrustSec this device, and all the packets that arrive from this device are colored or tagged accordingly.
Trusted)
Send Configuration Check the Send Configuration Changes to Device check box if you want Cisco ISE to send
Changes to Device Cisco TrustSec configuration changes to the Cisco TrustSec device using CoA or CLI (SSH).
Click the CoA or CLI (SSH) radio button, as required.
Click the CoA radio button if you want Cisco ISE to send the configuration changes to the Cisco
TrustSec device using CoA.
Click the CLI (SSH) radio button if you want Cisco ISE to send the configuration changes to the
Cisco TrustSec device using the CLI (using the SSH connection).
Send From From the drop-down list, choose the Cisco ISE node from which the configuration changes must
be sent to the Cisco TrustSec device. You can select a PAN or a PSN. If the PSN that you choose
is down, the configuration changes are sent to the Cisco TrustSec device using the PAN.
Test Connection You can use this option to test the connectivity between the Cisco TrustSec device and the selected
Cisco ISE node (PAN or PSN).
SSH Key To use this feature, open an SSHv2 tunnel from Cisco ISE to the network device, and use the
device's CLI to retrieve the SSH key. You must copy this key and paste it in the SSH Key field
for validation.
Device Configuration Deployment
Include this device when Check the Include this device when deploying Security Group Tag Mapping Updates
deploying Security check box if you want the Cisco TrustSec device to obtain the IP-SGT mappings using the
Group Tag Mapping device interface credentials.
Updates
EXEC Mode Enter the username that you use to log in to the Cisco TrustSec device.
Username
EXEC Mode Enter the device password.
Password
Click Show to view the password.
Note
We recommend that you avoid using the % character in passwords, including in the EXEC
modes and Enable mode passwords to avoid security vulnerabilities.
Enable Mode (Optional) Enter the enable password that is used to edit the configuration of the Cisco TrustSec
Password device in privileged EXEC mode.
Click Show to view the password.
Out Of Band TrustSec PAC
Issue Date Displays the issuing date of the last Cisco TrustSec PAC that was generated by Cisco ISE for the
Cisco TrustSec device.
Expiration Date Displays the expiration date of the last Cisco TrustSec PAC that was generated by Cisco ISE for the
Cisco TrustSec device.
Issued By Displays the name of the issuer (a Cisco TrustSec administrator) of the last Cisco TrustSec PAC that
was generated by Cisco ISE for the Cisco TrustSec device.
Generate PAC Click the Generate PAC button to generate the out-of-band Cisco TrustSec PAC for the Cisco
TrustSec device.
Default Network Choose Enable from the Default Network Device Status drop-down list to enable the default
Device Status network device definition.
Note
If the default device is enabled, you must enable either the RADIUS or the TACACS+
authentication settings by checking the relevant check box in the window.
Device Profile Displays Cisco as the default device vendor.
RADIUS Authentication Settings
Enable RADIUS Check the Enable RADIUS check box to enable RADIUS authentication for the device.
RADIUS UDP Settings
Shared Secret Enter a shared secret. The shared secret can be up to 127 characters in length.
The shared secret is the key that you have configured on the network device using the
radius-host command with the pac keyword.
Note
The length of the shared secret must be equal to or greater than the value configured in the
Minimum RADIUS Shared Secret Length field in the Device Security Settings window
(Administration > Network Resources > Network Devices > Device Security Settings). By
default, this value is four characters for new installations and upgraded deployments. For the
RADIUS server, the best practice is to have 22 characters.
Key Input Format Choose one of the following formats by clicking the corresponding radio button, and enter
values in the Key Encryption Key and Message Authenticator Code Key fields:
• ASCII: The Key Encryption Key must be 16 characters (bytes) in length, and the
Message Authenticator Code Key must be 20 characters (bytes) in length.
• Hexadecimal: The Key Encryption Key must be 32 bytes in length, and the
Message Authenticator Code Key must be 40 bytes in length.
Specify the key input format that you want to use to enter the Key Encryption Key and
Message Authenticator Code Key so that it matches the configuration on the network device.
The value that you specify must be the correct (full) length for the key. Shorter values are not
permitted.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a dialog box is
displayed. Click Yes or No.
Remaining Retired Period (Optional) Available only if you click Yes in the Retire dialog box. Displays the default value that
is specified in the Work Centers > Device Administration > Settings > Connection
Settings > Default Shared Secret Retirement Period window. You can change the default
values.
This allows a new shared secret to be entered. The old shared secret remains active for the
specified number of days.
End (Optional) Available only if you select Yes in the Remaining Retired Period dialog box. Ends
the retirement period and terminates the old shared secret.
Enable Single Connect Check the Enable Single Connect Mode check box to use a single TCP connection for all
Mode TACACS+ communication with the network device. Click one of the following the radio
buttons:
• Legacy Cisco Devices
• TACACS Draft Compliance Single Connect Support.
Note
If you disable this field, Cisco ISE uses a new TCP connection for every TACACS+ request.
Network Device Import Settings
The following table describes the fields in the Import Network Devices window, which you can use to import network
device details into Cisco ISE. To view this window, click the Menu icon ( ) and choose Administration > Network
Resources > Network Devices. In the Network Devices window, click Import.
Generate a Click Generate a Template to create a comma-separated value (CSV) template file.
Template
Update the template with network devices information in the CSV format and save it locally.
Then, use the edited template to import network devices into any Cisco ISE deployment.
File Click Choose File to choose the CSV file that you have recently created, or previously exported
from a Cisco ISE deployment.
You can import network devices into another Cisco ISE deployment with new and updated
network devices information, by using the Import option.
Overwrite Existing Data Check the Overwrite Existing Data with New Data check box to replace the existing network
with New Data devices with the devices in your import file.
If you do not check this check box, new network device definitions that are available in the
import file are added to the network device repository. Duplicate entries are ignored.
Stop Import on First Error Check the Stop Import on First Error check box if you want Cisco ISE to discontinue import
when it encounters an error during import. Cisco ISE imports network devices until the time of
an error.
If this check box is not checked and an error is encountered, the error is reported and Cisco
ISE continues to import the remaining devices.
After you have defined your network devices in Cisco ISE, configure these device profiles or use the preconfigured
device profiles that are offered by Cisco ISE to define the capabilities that Cisco ISE uses to enable basic
authentication flows, and advanced flows such as Profiler, Guest, BYOD, MAB, and Posture.
URL Redirect Mechanism and Auth VLAN
When a third-party device is used in the network and the device does not support dynamic or static URL
redirect, Cisco ISE simulates the URL redirect flow. The URL redirect simulation flow for such devices is
operated by running a DHCP or DNS service on Cisco ISE.
The following is an example of an Auth VLAN flow:
1. A guest endpoint connects to the NAD.
2. The network device sends the RADIUS or MAB request to Cisco ISE.
3. Cisco ISE runs the configured authentication and authorization policy and stores the user accounting
information.
4. Cisco ISE sends the RADIUS access accept message that contains the Auth VLAN ID.
5. The guest endpoint receives network access.
6. The endpoint broadcasts a DHCP request, and obtains a client IP address and the Cisco ISE DNS sink
hole IP address from the Cisco ISE DHCP service.
7. The guest endpoint opens a browser that sends a DNS query and receives the Cisco ISE IP address.
8. The endpoint HTTP and HTTPS requests are directed to Cisco ISE.
9. Cisco ISE responds with an HTTP 301 Moved message with a guest portal URL. The endpoint browser
redirects to the guest portal window.
10. The guest endpoint user logs in for authentication.
11. Cisco ISE validates endpoint compliance and then responds to the NAD. Cisco ISE sends the CoA,
authorizes the endpoint, and bypasses the sink hole.
12. The guest user receives the appropriate access based on the CoA, and the endpoint receives an IP
address from an enterprise DHCP. The guest user can now use the network.
You can separate the Auth VLAN from the corporate network to prevent unauthorized network access by a
guest endpoint before the endpoint passes authentication. Configure the Auth VLAN IP helper to point to the
Cisco ISE machine, or connect one of the Cisco ISE network interfaces to the Auth VLAN.
Multiple VLANs may be connected to one network interface card by configuring a VLAN IP helper from
the NAD configuration. For more information about configuring an IP helper, see the administration
guide for the network device for instructions. For guest access flows that include VLANs with IP helpers,
define a guest portal, and select that portal in an authorization profile that is bound to MAB authorization.
The following diagram displays a basic network setup when an Auth VLAN is defined (the Auth VLAN is
connected directly to a Cisco ISE node).
The following diagram displays a network with Auth VLAN and an IP helper.
CoA Types
Cisco ISE supports both RADIUS and SNMP CoA types. RADIUS or SNMP CoA type support is required for the NAD to
work in complex flows, while it is not mandatory for basic flows.
Define the RADIUS and SNMP settings that the network device supports when you configure the NAD in Cisco ISE. Indicate the
CoA type to be used for a specific flow when configuring the NAD profile. Check with your third-party supplier to verify which
CoA type your NAD supports before creating the device profile and NAD profile in Cisco ISE.
Wired HP A5500 RADIUS Auth VLAN Yes Yes Yes Yes Yes
provided by
ISE
HP 3800 and RADIUS Auth VLAN Yes Yes Yes Yes Yes
2920 provided by
(ProCurve) ISE
Brocade ICX RADIUS Auth VLAN Yes Yes Yes Yes Yes
6610 provided by
ISE
For other third-party NADs, you must identify the device Yes Yes Requires Requires CoA support.
properties and capabilities, and create custom NAD CoA support
If a wired device does
profiles in Cisco ISE.
not support URL redirect,
Cisco ISE uses Auth
VLAN. Wireless devices
have not been tested
with Auth VLAN.
You must create custom NAD profiles for other third-party network devices that do not have a predefined profile. For
advanced workflows such as Guest, BYOD, and Posture, the network device must support the RADIUS protocol RFC
5176, which pertains to CoA support for these flows. See the device's administration guide for information on the
attributes that are required to create network device profiles in Cisco ISE.
Name Enter a name for the root network device group. For all subsequent child network
device groups added to this root network device group, enter the name of this newly
created network device group.
You can have a maximum of six nodes in a network device group hierarchy, including
the root node. Each network device group name can have a maximum of 32 characters.
Description Enter a description for the root or the child network device group.
No. of Network Devices The number of network devices in the network group is displayed in this column.
Network Device Group Import Settings
The following table describes the fields in the Import dialog box in the Network Device Group window. To view this window,
click the Menu icon ( ) and choose Administration > Network Resources > Network Device Groups.
File Click Choose File and navigate to the location of the CSV file that you want to upload. The file
may be new or a file that was exported from another Cisco ISE deployment.
You can import network device groups from one Cisco ISE deployment to another, with new
and updated network device groups information.
Overwrite Existing Check this check box if you want to replace the existing network device groups with the device
Data with New Data groups in your import file.
If you do not check this check box, only the new network device groups in the import file are
added to the network device group repository. Duplicate entries are ignored.
Stop Import on First Check this check box to discontinue import at the first instance of encountering an error during
Error the import.
If this check box is not checked and an error is encountered, Cisco ISE reports the error and
continues importing the rest of the device groups.
Import Templates in Cisco ISE
Cisco ISE allows you to import a large number of network devices and network device groups using CSV files. The
template contains a header row that defines the format of the fields. You must not edit this header row except to add
columns mentioned in the table below.
Use the Generate a Template link in the relevant import flow for network devices and network device groups to
download a CSV file to your local system.
SNMP:Is MAC Trap Enable or disable the SNMP MAC trap by entering true or false.
Query:Boolean(true|false)
SNMP:Originating Policy Indicate which Cisco ISE server must be used to poll for SNMP data. It is automatic by
Services Node:String(32) default, but you can overwrite the setting by assigning different values in this field.
Trustsec:Device Id:String(32) Enter a Cisco Trustsec device ID, which is a string with a maximum of 32 characters.
Trustsec:Device (Required if you have entered a Cisco TrustSec device ID.) Enter a Cisco TrustSec device
Password:String(256) password, which is a string with a maximum of 256 characters.
Trustsec:Environment Enter the Cisco TrustSec environment data download interval. A valid value is an
Data Download integer from 1 to 2147040000.
Interval:Integer:1-
2147040000 seconds
Field Usage Guidelines
Trustsec:Peer Authorization Policy Enter the Cisco TrustSec peer authorization policy download interval. A valid
Download Interval:Integer:1- value is an integer from 1 to 2147040000.
2147040000 seconds
Trustsec:Reauthentication Enter the Cisco TrustSec reauthentication interval. A valid value is an integer
Interval:Integer:1-2147040000 from 1 to 2147040000.
seconds
Trustsec:SGACL List Download Enter the Cisco TrustSec security group ACL list download interval. A valid
Interval:Integer:1-2147040000 value is an integer from 1 to 2147040000.
seconds
Trustsec:Is Other Trustsec Devices Indicate whether a Cisco TrustSec device is trusted by entering true or false.
Trusted:Boolean(true|false)
Trustsec:Notify this device about Notify Cisco TrustSec configuration changes to the Cisco TrustSec device by
Trustsec configuration entering ENABLE_ALL or DISABLE_ALL .
changes:String(ENABLE_ALL|DISABLE_
ALL)
Trustsec:Include this device when Indicate if the Cisco TrustSec device is included in security group tag by entering
deploying Security Group Tag Mapping true or false.
Updates:Boolean(true|false)
Deployment:Execution Enter the user name that has privileges to edit the network device configuration.
Mode It is a string with a maximum of 32 characters.
Username:String(32)
Deployment:Execution Enter the device password, which is a string with a maximum of 32 characters.
Mode
Password:String(32)
Deployment:Enable Mode Enter the password of the device that allows you to edit its configuration. It is a
Password:String(32) string with a maximum of 32 characters.
Trustsec:PAC issue date:Date Enter the issuing date of the last Cisco TrustSec PAC that was generated by Cisco
ISE for the Cisco TrustSec device.
Trustsec:PAC expiration date:Date Etner the expiration date of the last Cisco TrustSec PAC that was generated by
Cisco ISE for the Cisco TrustSec device.
Trustsec:PAC issued by:String Enter the name of the issuer (a Cisco TrustSec administrator) of the last Cisco
TrustSec PAC that was generated by Cisco ISE for the Cisco TrustSec device.
It must be a string value.
Network Device Groups Import Template Format
The following table lists the fields in the template header and provides a description of the fields in the Network Device Group
CSV file.
Field Description
Name:String(100): (Required) This field is the network device group name. It is a string with a maximum of 100
characters in length. The full name of an NDG can have a maximum of 100 characters in length. For
example, if you create a subgroup India under the parent groups Global > Asia, then the full name of
the NDG that you create would be Global#Asia#India. The full name cannot exceed 100 characters in
length. If the full name of the NDG exceeds 100 characters in length, the NDG creation fails.
Description:String(1024) This is an optional field. It is a string, with a maximum of 1024 characters in length.
Type:String(64): (Required) This field is the network device group type. It is a string, with a maximum of 64
characters in length.
Is (Required) This is a field that determines if the specific network device group is a root group. Valid
Root:Boolean(true|false): value is true or false.