ISE High Level Design (HLD) (2024)

ISE High Level Design (HLD) (1)

Contents

  • Instructions
  • Introduction
  • Business Objectives
  • Environment
  • Network Architecture Diagram
  • User Groups
  • Network Devices
  • Endpoints
  • ISE Architecture
  • Scenarios
  • Device Administration (TACACS+)
  • Visibility
  • Secure Wireless
  • Guest
  • HotSpot
  • Self-Registered
  • Sponsored
  • API
  • BYOD
  • Secure Wired
  • VPN
  • Segmentation
  • Security Integrations
  • Context Exchange
  • Rapid Threat Containment (RTC)
  • Threat-Centric NAC
  • REST APIs
  • Policy Details
  • Resources

Instructions

  1. Make a copy of this document
    ISE High Level Design (HLD) (2)For an offline or printed copy of this document, simply choose ⋮ Options > Printer Friendly Page. You may then Print, Print to PDF or copy and paste to any other document format you like.
  2. Delete anything that does not pertain to your deployment
  3. Fill in the rest with the appropriate details
  4. Make it happen
  5. Post any questions you have to the ISE Community

Introduction

An ISE High Level Design (HLD) is recommended to assist you with the design and planning of your ISE deployment. Having a clearly written security policy - whether aspirational or active - is the first step in assessing, planning and deploying network access security. Without this, it is hard to break down the deployment into phases by location or capabilities. When seeking outside help, the HLD provides a huge time savings for education other teams, partners, Cisco Sales representative, Technical Assistance Center (TAC) representative or even the ISE product and engineering teams. Clearly state the desired solution capabilities, hardware and software environment and integrations can quickly allow people to understand what you want and how to configure it or troubleshoot it.

ISE High Level Design (HLD) (3)

Business Objectives

Identify the Customer Business Objectives that ISE must solve. Typically this involves regulations and compliance or identified security threats and risks to smooth operation of the business or brand. But it also involves mitigating risks with controlled network access for everyday IT processes. This is how you begin to craft your network access control policy. The more specific you can be, the better.

Consider the following example business objectives that must translate into access control policy :

  • We want to provide sponsored guest access to our visitors
  • All network device administration commands must be authorized and logged for potential audit
  • We want to identify all endpoints on our network so we can begin to apply access control policies
  • We do not want our employees personal devices on our corporate network
  • We want our employees to any device they want but we want to manage it to ensure it and any information on it is properly secured
  • Printers should only talk to print servers
  • We need to be able to re-image our workstations over the network via PXE
  • We must comply with [PCI, HIPAA, etc.] regulation
  • All Windows devices must be patched within the last 30 days to minimize known vulnerabilities
  • We want to automatically quarantine endpoints when [Stealthwatch, AMP, etc.] detects malicious behavior

Business Objectives

Environment

Network Architecture Diagram

<Insert image of your network architecture with ISE here>

Trust & Identity Services

List all of the products that ISE will need to integrate with for authoritative trust and identity for authentication and authorization. Please note any known issues or concerns with their behavior, capabilities or scale.

Note: Cisco strongly recommends server certificate, which is signed by in-house CA or other 3rd party Root CA server, to be used for ISE. Self-signed server certificate should not be used for production deployment.

Scenario (one line per device to be validated)Vendor / VersionCountNotes
Identity Sources
Certificate Authorities (CA)
  • How will ISE integrate with 3rd party CA?
  • Will ISE be issuing certificates for BYOD?
  • Utilize web based CA portal on ISE?
  • Utilize API for certificate management?
  • Utilize AnyConnect/ASA for SCEP enrollment?
Active Directory:
  • How many AD domains / forests are to be integrated?
  • ISE requires AD forest DNS consolidated into central DNS servers. What method is used to consolidate DNS information for the separate AD forests?
  • What version of AD is in use?
  • Are there any Read-Only domains in place?
  • AD Site & Services is recommended for ISE in all forests.
Microsoft#
LDAP#
Token#
SAML#
ODBC#
Social LoginFacebook?#

User Groups

Identify the specific user groups that will require differentiated access and for which scenarios.

Scenario (one line per device to be validated)Notes
Groups

Network Devices

Provide the general switch/controller model numbers/platforms deployed and Cisco IOS and AireOS Software versions to be deployed to support ISE design. Please use the ISE Compatibility Guides to see our latest list of Validated products and protocols. If you still don't believe that ISE supports heterogeneous networks and can support your network devices, please read Does ISE Support My Network Access Device?

VendorHardware Model
@ Software Version
CountNotes
Wired
Cisco9300 @ IOS-XE 15.x.x#
Wireless
CiscoWLC xxxx @ AireOS 8.x#
CiscoMeraki xxxx
VPN
CiscoASA 55xx @ x.x#

Endpoints

List all of the unique endpoint types you expect to find and apply policy to in your deployment.

Provide an approximate number of each of possible.

Note: For domain joined Windows machines to function properly, machine authentication is recommended. Performing user only authentication may break critical functions such as machine GPO and other background services such as backup and software push.

Note: State whether the deployment is using machine or user authentication, or both. If both machine and user authentication are planned, are Machine Access Restrictions (MAR) planned? If so, review the Appendix information on MAR caveats. For machine / user authentication details, please refer to 802.1X Authenticated Wired and Wireless Access

Endpoints
(one line per scenario to be validated)
VendorHardware Model
@ Software Version
CountNotes
Workstations
WindowsXPMicrosoftWindows XP#
Windows7MicrosoftWindows 7.x#
Windows8MicrosoftWindows 8.x#
Windows10MicrosoftWindows 10#
KioskMicrosoftWindows Embedded#
MacBookApplemacOS 11.2#
MacBookApplemacOS 10.15#
Chromebook#
LinuxLinux#
VDI
Mobile Devices
AppleiOS 14.x
AppleiOS 13.x
AppleiOS 12.x
AndroidAndroid 11.x
AndroidAndroid 10.x
AndroidAndroid 9.x
Office
Access PointsCisco#
IP PhonesCisco7xxx#
Printers#
IOT
Cameras#
Lighting#
Badging#
HVAC#
Medical#
Manufacturing#
SCADA#
Others#
Approximate Total:###

ISE Architecture

List all of the nodes in your ISE deployment.

When deploying VMs:

  • The VM host should be sized comparably with the ISE hardware appliance(s)
  • The phyiscal RAM and CPU resources must be reserved for each ISE node and cannot be shared among different ISE nodes or other guest VMs on the VM host. If you cannot do this, please use physical appliances.
  • Hard disks with 10K or higher RPM are required. Average IO Write performance for the disk should be higher than 300MB/sec and IO Write performance should be higher than 50MB/sec.
  • For the MnT nodes, it is highly recommended to use SSD/Flash storage to greatly improve read/write performance
Host Name (FQDN)PersonaIP AddressVM/HWSizeStorage
ise1.example.comPAN+MnTVM3695600GB

Scenarios

Device Administration (TACACS+)

ISE High Level Design (HLD) (4)

Differentiated access for network device administrators

Scenarios✓ DoneNotes
SuperAdmin
NetworkAdmin
HelpDesk
AutomationScript
ReadOnlyAdmin

Visibility

See what, when, where and how users and endpoints are on your network.

In the table below, list the primary endpoint devices (one per row) that need to be profiled.

  • Identify the primary device types to be profiled
  • Which probes/protocols will be used to collect the required data? Leverage Device Sensor to collect endpoint attributes whenever possible and SNMP for other network devices. Uncommon devices may require collecting additional protocol attributes to classify the endpoint properly.
    • ISE Probes: AD, DHCP, DNS, HTTP, NMAP, RADIUS, SNMP, Netflow
    • Device Sensor: CDP, LLDP, DHCP, HTTP, H323, SIP, MDNS
    • AnyConnect: ACIDex
  • What is the endpoint attribute data required to classify each device type?
  • Is profiling for visibility only or for use in authorization policy?
  • Leverage Device Sensor to collect endpoint attributes whenever possible and SNMP for other network devices
  • Uncommon devices may require collecting additional protocol attributes to classify the endpoint properly.
  • For Visibility with SPAN/RSPAN, use a dedicated interface on the ISE PSN for the DHCP SPAN or HTTP SPAN probe.
  • If RSPAN or Netflow is to be used:
    • does infrastructure support these technologies?
    • a dedicated interface should be used on the Policy Service Node for the DHCP SPAN or HTTP SPAN probe. Is there sufficient bandwidth between source SPAN/Netflow exporter and ISE Policy Service node used for profiling?
Scenarios✓ DoneNotes
Enable Profiling Feed Service or retrieve offline update
Create Custom Endpoint Profiles for _____ Devices
Create Endpoint Purge Policies
Move profiled endpoints to static MAC-based endpoint lists and do not use endpoint profiles in authorization rules
if you want to minimize Plus License consumption

Secure Wireless

Control authenticated endpoint & user access

ISE High Level Design (HLD) (5)

Scenarios✓ DoneNotes

Wireless

Wireless 802.1X User Authentication & Authorization: Show Successful Login and Role-Based Access
Wireless Machine Authentication and Authorization: use digital certificate for Corporate device
Individual Pre-Shared Key (iPSK)
Static Endpoint MAC Whitelisting: allow non-authenticating (no 802.1X) endpoints with MAB
Wireless user with Passive Identity (No 802.1x)
eduroam

Guest

ISE High Level Design (HLD) (6)

Internet access for visitors. Generally, you should only implement one type of Guest network.

Scenarios✓ DoneNotes

HotSpot

Customize Portal

  • Behavior: Acceptable Usage Policy (AUP), Password, Auto-Login, Success URL, etc.
  • Presentation: Logo, Colors, Fonts

Demonstrate Hotspot with desired flow:

Self-Registered

Create desired Guest Types
Demonstrate Self-Service Guest registration

Sponsored

Customize Sponsor Portal Flow and Presentation
Create Sponsor Groups
Demonstrate Sponsor Portal (sponsored Guest access)
Login with Sponsored Guest Credentials
Concurrent Guest Logins

API

Guest API integration with external application(s)

BYOD

Onboard & differentiate personal & corporate devices. Consider the following topics when determining your scenarios:

  • Is it Single SSID or Dual SSID?
  • Will Android be in the BYOD design? If so, please provide details of provisioning authorization profile
  • What devices will and will not be provisioned?
  • What supplicant will be used? Native or AnyConnect or Other?
  • What access will unsupported device get? (i.e. Blackberry, Windows phones, Chromebooks)
  • Will EMM/MDM be integrated with BYOD design? If so, please provide details of MDM policy below in the Authorization Policy section and whether or not redirection will be used for MDM agent installation
Scenarios✓ DoneNotes

Device Registration

Single SSID: Unregistered devices are redirected to a WebAuth portal and respective users
Dual SSID: Unregistered devices are redirected to a WebAuth portal and respective users

Certificate Provisioning

BYOD: Onboarding, Certificate Provisioning with Internal or External CA
Certificate Expiration with Internal or External CA
Certificate Renewal 2-4 weeks before Certificate Expiration

Device Management

Certificate Revocation by Administrator
End-User self management, Device Lost; Blacklist endpoint
End-User self management, Device Stolen; revoke Certificate

Secure Wired

Control authenticated endpoint & user access

Scenarios✓ DoneNotes

Wired

ISE Wired Access Deployment Guide

Static Endpoint MAC Whitelisting: allow non-authenticating (no 802.1X) endpoints with MAB
Static Endpoint MAC Blacklisting: block non-authenticating endpoints with MAB
Dynamic Endpoint Profiling and Authorization: List each endpoint profile and the desired authorization
Easy Connect: Wired user with Passive Identity (No 802.1X supplicant)
Wired Web Authentication (No 802.1X Supplicant. For Guest or Employees)
EAP-Chaining: Wired machine+user authentication using EAP-FAST with AnyConnect
Wired Machine Authentication and Authorization: use digital certificate for Corporate device
Wired User 802.1X Authentication: Show Successful Login and Role-Based Access
Wired WebAuth Login: Show Login With No Supplicant
Wired Authentication (user or machine) & Authorization on a Docking Station
Wired Authentication for a user via an Windows Remote Desktop Protocol (RDP) Session
Wired Authentication for Multi-User devices (Nurses Station, Call Center, etc.)
Wired Authentication (user or machine) & Authorization on a Docking Station Behind IP-Phone
Wired Authentication with Two-Factor Authentication (2FA)

VPN

Control remote access of endpoints and users.

Scenarios✓ DoneNotes

VPN

VPN Authentication and Authorization with Username:Password: Show Successful Login and Role-Based Access
VPN Authentication and Authorization with Token/2FA: Show Successful Login and Role-Based Access
VPN Access Attempt, Revoked Certificate (Testing OCSP)

Compliance & Posture

ISE High Level Design (HLD) (7)

Ensure that endpoints meet security standards.

Review the list of currently supported packages for Windows and macOS.

Scenarios✓ DoneNotes

Agent-less

Posture Windows with Temporal Agent
Posture macOS with Temporal Agent

Agent-ed

Non-Compliant endpoints are quarantined and redirected to provision AnyConnect and the Posture Module via ISE
Non-Compliant endpoints are quarantined and redirected until provisioned by [WSUS, etc.]
Compliant endpoints are properly authorized on the network

Enterprise Mobility Management (EMM) / Mobile Device Management (MDM)

Integrate ISE with EMM/MDM vendor(s)
Non-Compliant endpoints are quarantined and redirected until provisioned by [WSUS, etc.]
Compliant endpoints are properly authorized on the network

Posture Policies

Describe posture policy requirements for endpoint compliance. This may include many areas such as asset checking, application and services checking, and antivirus and antispyware checks, as well as customized checks for specific use cases. Describe remediation plans and include remediation servers that need to be integrated into the design.

Rule NameOS (Windows/macOS)ConditionsPosture AgentChecksRemediationEnforcement
(Audit/Opt/ Mandatory)
When Assessed
(Login/PRA/Both)
Employee_AVWindows XP/7AD group= EmployeeNAC Agent for WindowsAV Rule:
Microsoft Security
Essentials 2.x
Live update (Automatic)MandatoryBoth
Employee_AssetWindows XP/7AD group= EmployeeNAC Agent for WindowsCustom registry checkLink redirect
to policy page (Manual)
MandatoryLogin
Contractor_AVWindows ALLID Group= ContractorWeb AgentAV_Rule:
Any AV w/current signatures
Local Message regarding AV PolicyMandatoryLogin

Client Provisioning Policies

Describe Client Provisioning policy requirements for posture and native supplicant provisioning.

Rule NameIdentity GroupsOperating SystemsOther ConditionsResults
AppleAnyMAC OSX or Apple iOSNative Supplicant:

EAP-TLS, SSID

WindowsAnyWindows AllAgent:
NAC Agent

Native Supplicant:

PEAP-MSCHAPv2, SSID

AndroidAnyAndroidNative Supplicant:

EAP-TLS, SSID

Segmentation

Limit exposure with pre-defined access segmentation.

Scenarios✓ DoneNotes
Classification
Dynamically classify endpoints with SGTs via MAB (static or profiled, e.g. IOT)
Dynamically classify endpoints with SGTs via 802.1X Machine Authentication
Dynamically classify users with SGTs via 802.1X Authentication
Dynamically classify users with SGTs via Easy Connect (MAB+Passive Identity)
Dynamically classify users with SGTs using WebAuth (e.g. Guests)

Statically classify traffic by VLAN

Statically classify traffic by Subnet

Statically classify traffic by L2 Interface

Statically classify traffic by L3 Port

Statically classify traffic by VM (port profile)

East-West Segmentation

Malware blocking between Employees
Virtual machines in the data center
Firewall Rule Reduction
Use group-based policies to reduce firewall rules by eliminating need to specify IPv4/IPv6 addresses
User to Data Center
Use group-based policy to enforce access to resources in the data center

Security Integrations

Share contextual information with other products using Cisco Platform Exchange Grid (pxGrid) and REST APIs.

See the full list of technology partners at Cisco Security Technology Alliance.

Scenarios✓ DoneNotes

Context Exchange

Sharing network identity (Who/What/When/Where/How) with other network and security services.

Cisco Firepower
Cisco Stealthwatch
Cisco Web Services Appliance (WSA)
SIEM (Splunk)
Cisco Industrial Network Director (share IOTAsset topic with ISE)
...

Rapid Threat Containment (RTC)

Security services with their own policy that tell ISE when to deny/quarantine a specific user or device.

Stealthwatch
...

Threat-Centric NAC

Security services provide CVSS threat and vulnerability information to ISE for deny/quarantine decisions.

Vulnerability Scanner
AMP
...

REST APIs

Integrate Guest Management workflow from another application

Integrate DNA Center with ISE for Access Control Policy and software-defined Segmentation with TrustSec

Integrate network management tool for adding/updating/removing network devices, endpoints, etc.

...

Operations & Management

List the day-to-day operations you anticipate needing to do.

Scenarios✓ DoneNotes

Monitoring

Real-Time Event Log (Live Log)
Illustrate the Live Log Authentication Details
Debug Endpoint (Working across entire ISE deployment)
TCP Dump from Central Location
Troubleshooting Active Directory - Basic and Detailed
Policy Export
Suppression Bypass
Collection Filters
NAD Syslog Correlation in Reports
Time-Range Bound Support Bundles
Guest Activity Monitoring

Management

Create a Wildcard Certificate for an ISE deployment
Centralized, Encrypted Backup
Create and run Scheduled or On-Demand Backups
RBAC, with predefined roles, customize, add and remove options, Help desk accounts, super user account.
Centralized Monitoring of All ISE Nodes
Simultaneous Admin Users Logged in & working with ISE
Enable and use External RESTful Services (ERS) APIs
Demonstrate the Upgrading of ISE Nodes with Zero Down Time

Scale & High Availability

List the scale and HA scenarios you want to test. See ISE Performance & Scale for detailed performance metrics.

Scenarios✓ DoneNotes

ISE Cube

Multi-Forest AD Join
Multi-AD within Single Forest Joins
Policy Admin Node (PAN) Down
Policy Service Node (PSN) Down

Survivability & High Availability

Identity Store (AD) Down/Unavailable
Remote Site WAN Link Down
Reinitialization once WAN is back up
Fail Open
Fail Half-Open (Critical ACL)
Fail Closed

Policy Details

List all security policies that are needed to implement the business requirements described above.

Authentication Policy

For each use case (wired, wireless, VPN), describe the authentication policies that will be implemented for all users and endpoints whether managed or unmanaged.

Rule NameConditionAllowed ProtocolsID Store / ID Sequence
Device AccessWired_MABDefault Network AccessInternal EndPoints

802.1X Access

Wired_802.1XDefault Network AccessAD_then_Local
VPNNAS-Port-Type = VirtualDefault Network AccessAD
Default-Default Network AccessInternal Users

Authorization Policy

For each use case (wired, wireless, VPN), describe the authorization policies that will be implemented for all users and endpoints whether managed or unmanaged.

Rule NameIdentity GroupsOther ConditionsPermissions
BYOD UnknownMobile Devices Logical GroupEAP Tunnel = PEAP

EAP Type = MSCHAPv2

NSP dACL

NSP Redirect

BYOD RegisteredRegisteredEAP Type = EAP-TLS

SAN = Calling-StationID

Registered dACL
IP_PhonesCisco-IP-Phones-Voice VLAN
Authz VVID
PrintersManaged-Printers-Printer VLAN
CamerasManaged-Cameras-Camera VLAN
Workstation_AccessAnyDomain PCAD Access dACL
User_Role_1_AccessAnyDomain Member Role1Role1 dACL
User_Role_2_AccessAnyDomain Member Role2Role2 dACL
Guest_AccessGuest-Internet Only dACL
Default--Web Auth

Resources

ISE High Level Design (HLD) (2024)

References

Top Articles
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6276

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.