Cisco ISE Certificate
- A certificate is an electronic document that identifies an individual, a server, a company, or another entity, and associates that entity with a public key.
- A self-signed certificate is signed by its creator. Certificates can be self-signed or digitally signed by an external CA. A CA-signed digital certificate is considered an industry standard and more secure than a self-signed certificate.
- Certificates are used in a network to provide secure access. Certificates identify a Cisco ISE node to an endpoint and secure the communication between that endpoint and the Cisco ISE node.
Cisco ISE uses certificates for:
- Communication between Cisco ISE nodes.
- Communication between Cisco ISE and external servers such as the syslog and feed servers.
- Communication between Cisco ISE and end user portals such as guest, sponsor, and BYOD portals.
- System Certificates: These are server certificates that identify a Cisco ISE node to client applications. Every Cisco ISE node has its own system certificates that are stored on the node along with the corresponding private keys.
- Trusted Certificates: These are CA certificates that are used to establish trust for the public keys that are received from users and devices. The Trusted Certificates store also contains certificates that are distributed by the Simple Certificate Enrolment Protocol (SCEP), which enables the registration of mobile devices into the enterprise network. Trusted certificates are managed on the primary PAN and are automatically replicated to all the other nodes in a Cisco ISE deployment.
To ensure certificate authentication in Cisco ISE is not impacted by minor differences in certificate-driven verification functions, use lowercase hostnames for all Cisco ISE nodes that are deployed in a network.
Note: Cisco ISE cannot import more than one certificate with the same private key. If the certificate is renewed and imported without changing the private key, then the existing certificate is replaced with the imported certificate.
When you import a certificate into
Cisco ISE, specify the purpose for which the certificate is to be used. Choose
Administration > System > Certificates > System Certificates and click
Import.
Choose one or more of the
following uses:
Admin: For internode
communication and authenticating the administration portal.
- Admin certificate is a server certificate used to authenticate or secure communication with ISE Admin portal. It is also used to establish trust relationship and secure communication between ISE nodes in a multi-node deployment.
- Whenever you browse to ISE GUI on an endpoint, just like another HTTPS server, ISE will present its certificate to the client browser, if the client trusts the certificate, a TLS/SSL tunnel will be formed. The client will them send the required login credentials and further requests /response via the established tunnel. If the client did not trust the certificate, a warning will be displayed on the browser which in most cases will give the user the privilege of accepting the risk and proceed to establish communication with the server. But if the client did not trust the certificate and not willing to accept the risk, then the HTTPS connection to ISE will be terminated.
EAP Authentication: For
TLS-based EAP authentication.
- EAP authentication certificate is a server certificate used for SSL/TLS tunnelling which is needed by EAP protocols for secure credential exchange.
- EAP protocols use TLS secure credential exchange between a dotlx endpoint (supplicant) and the RADIUS/AAA server. If the endpoint trusts the RADIUS server certificate (ISE EAP Authentication certificate), TLS tunnel will be established between the dotlx endpoint and ISE. The TLS tunnel will then be used for secure credential exchange. If the server certificate is not trusted by the client/supplicant/endpoint, TLS tunnel will not be formed with ISE. Therefore, client credentials will not be sent. That mean dotlx authentication will not be successful.
RADIUS DTLS (RADIUS Datagram
Transport Layer Security): For RADIUS DTLS server authentication.
- RADIUS DTLS certificate is a server certificate used for RADIUS DTLS authentication. RADIUS DTLS is used for encrypting RADIUS traffic between a Network Access Device (NAD) and Radius DTLS server (ISE).
- Examples of Network Access device are Access switch, Wireless LAN controller (WLC), and Remote Access VPN Server.
Portal: For communicating
with all Cisco ISE end-user portals.
- Portal certificate refers to the server certificate used to secure communication will all Cisco ISE web or end-user portals.
- Example of end-user portal are Guest or Central Web Authentication (CWA) portal, sponsor portal, Mydevice Portal, and so on
SAML (Security Assertion
Markup Language): For verifying that the SAML responses are being received from
the correct identity provider.
- SAML certificate is used to secure communication between ISE and SAML identity provider (IdP).
- SAML is a open standard for exchanging authentication and authorization data between an identity provider and a service provider (i.e., ISE).
- A certificate designated for SAML use cannot be used for any other service such as EAP authentication, portal, Admin, etc.
pxGrid: For communicating with
the pxGrid controller.
- pxGrid certificate is a client and server certificate used for establishing secure communication between pxGrid client and server.
Certificate Installation
- Generate Certificate Signing Request (CSR)
- Submit the CSR to the root CA server for signing
- Download the signed certificate
- Download the root CA certificate
- Install the root CA certificate into ISE trusted certificate store.
- Bind the CA signed certificate to the generated CSR on ISE.
Cisco ISE Licensing
The Cisco ISE licensing model allows you to purchase licensee based on your enterprise needs. There are two ways of consuming licenses. Traditional or Smart.
- Traditional licensing is where you import a license onto the appliance
- Smart licensing is where you manage a cisco account that holds all the information on the license purchased for your deployment.
The valid license options are:
ISE Base only: The base license is a perpetual license and is the only
requirement for AAA and IEEE802.1x and covers guest services and Trustsec. A
base license is consumed for every active device on the network.
Feature supported in Cisco ISE Base License
- Basic RADIUS authentication, authorisation, and accounting, including 802.1x, MAC Authentication Bypass
- Web authentication (local, central, device registration)
- MACsec (all)
- SSO, SAML, ODBC – based authentication
- Guest portal and sponsor services
- Representational state transfer (monitoring) APIs
- External RESTful services (CRUD)-capable APIs
- Security group tagging (Cisco TrustSec SGT)
- PassiveID (Cisco Subscribers)
Feature supported in Cisco ISE Plus License
- Passive ID (Non-Cisco Subscribers)
- Profiling
- Profiler feed service
- Device registration (My Devices portal) and provisioning for Bring Your Own Device (BYOD) with built-in Certificate Authority (CA)
- Context sharing pxGrid
- Endpoint Protection Services (EPS)
- TrustSec – ACI Integration
- Location based integration using CMX/MSE
- Rapid Threat Containment (RTC) (using ANC and pxGrid)
Feature supported in Cisco ISE Apex License
- Posture (endpoint compliance and remediation)
ISE Base, Plus, Apex and AnyConnect Apex
Note:
No comments:
Post a Comment