93

Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Embed Size (px)

Citation preview

Page 1: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Paradigm shift in Business World

Yesterdayhellip Todayhellip

hellip BYOD was trendy and fancy hellip BYODCYOD simply is

hellip clear cut between privatebusiness usage hellip mobile device must take care of separation (sandboxcontainer)

Mobile devices will be part of the network the question is when and not if

Be preparedhellip

Private mobile device usage influences business world

2

Donrsquot just connect your mobile device integrate it

Successful designing and deploying Ciscos ISE 13MDM integration

BRKSEC-2035

Christoph Altherr Security Systems Engineer

Cisco ISE 13 provides integration with several 3rd party MDM vendor To fully unlock the power of this newly provided mobile device posturing capability several things should be considered into account As a quick start into this topic the session uncovers given dependencies within ISE and surrounding network infrastructure The second part of the session focusses on how to provide best possible MDM onboarding and quarantine user experience while not breaching security regulation Session Level IntermediateAdvanced

Uncut (with hidden slides) pdf versionhttpsciscoboxcomCL-Milan-BRKSEC-2035

Session Abstract

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Call to Action

bull Visit the World of Solutions for

ndash Cisco Campus

ndash Walk in Labs

ndash Technical Solution Clinics

bull Meet the Engineer

bull Lunch time Table Topics

bull DevNet zone related labs and sessions

bull Recommended Reading for reading material and further resources for this session please visit wwwpearson-bookscomCLMilan2015

6

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 2: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Donrsquot just connect your mobile device integrate it

Successful designing and deploying Ciscos ISE 13MDM integration

BRKSEC-2035

Christoph Altherr Security Systems Engineer

Cisco ISE 13 provides integration with several 3rd party MDM vendor To fully unlock the power of this newly provided mobile device posturing capability several things should be considered into account As a quick start into this topic the session uncovers given dependencies within ISE and surrounding network infrastructure The second part of the session focusses on how to provide best possible MDM onboarding and quarantine user experience while not breaching security regulation Session Level IntermediateAdvanced

Uncut (with hidden slides) pdf versionhttpsciscoboxcomCL-Milan-BRKSEC-2035

Session Abstract

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Call to Action

bull Visit the World of Solutions for

ndash Cisco Campus

ndash Walk in Labs

ndash Technical Solution Clinics

bull Meet the Engineer

bull Lunch time Table Topics

bull DevNet zone related labs and sessions

bull Recommended Reading for reading material and further resources for this session please visit wwwpearson-bookscomCLMilan2015

6

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 3: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Successful designing and deploying Ciscos ISE 13MDM integration

BRKSEC-2035

Christoph Altherr Security Systems Engineer

Cisco ISE 13 provides integration with several 3rd party MDM vendor To fully unlock the power of this newly provided mobile device posturing capability several things should be considered into account As a quick start into this topic the session uncovers given dependencies within ISE and surrounding network infrastructure The second part of the session focusses on how to provide best possible MDM onboarding and quarantine user experience while not breaching security regulation Session Level IntermediateAdvanced

Uncut (with hidden slides) pdf versionhttpsciscoboxcomCL-Milan-BRKSEC-2035

Session Abstract

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Call to Action

bull Visit the World of Solutions for

ndash Cisco Campus

ndash Walk in Labs

ndash Technical Solution Clinics

bull Meet the Engineer

bull Lunch time Table Topics

bull DevNet zone related labs and sessions

bull Recommended Reading for reading material and further resources for this session please visit wwwpearson-bookscomCLMilan2015

6

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 4: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Cisco ISE 13 provides integration with several 3rd party MDM vendor To fully unlock the power of this newly provided mobile device posturing capability several things should be considered into account As a quick start into this topic the session uncovers given dependencies within ISE and surrounding network infrastructure The second part of the session focusses on how to provide best possible MDM onboarding and quarantine user experience while not breaching security regulation Session Level IntermediateAdvanced

Uncut (with hidden slides) pdf versionhttpsciscoboxcomCL-Milan-BRKSEC-2035

Session Abstract

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Call to Action

bull Visit the World of Solutions for

ndash Cisco Campus

ndash Walk in Labs

ndash Technical Solution Clinics

bull Meet the Engineer

bull Lunch time Table Topics

bull DevNet zone related labs and sessions

bull Recommended Reading for reading material and further resources for this session please visit wwwpearson-bookscomCLMilan2015

6

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 5: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Call to Action

bull Visit the World of Solutions for

ndash Cisco Campus

ndash Walk in Labs

ndash Technical Solution Clinics

bull Meet the Engineer

bull Lunch time Table Topics

bull DevNet zone related labs and sessions

bull Recommended Reading for reading material and further resources for this session please visit wwwpearson-bookscomCLMilan2015

6

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 6: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-2035

Successfully Designing

and Deploying Ciscorsquos

ISE 13MDM

Integration

(Wed 230pm)

Cisco ISE Sessions Building Blocks

BRKSEC-2044 Building an Enterprise Access Control Architecture Using ISE amp TrustSec (Tue 215pm)

BRKSEC-3697

Advanced ISE

Services Tips and

Tricks

(Wed 900am)

BRKSEC-3699

Designing ISE for

Scale amp High

Availability

(Thu 900am)

BRKSEC-2203

Deploying TrustSec

Security Group

Tagging

(Tue 1115am)

BRKSEC-3690

Advanced Security

Group Tags The

Detailed Walk Through

(Fri 900am)

PSOSEC-2004

How ISE Helps in

in an Increasingly

Uncontrolled

Environment

(Tue 100pm)

BRKSEC-2132

Whats new in ISE

Active Directory

connector (Wed

1130am)

BRKSEC-2045

Mobile Devices and

BYOD Security -

Deployment and Best

Practice

(Tue 1115am)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 7: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

BRKSEC-3068

Red Team Blue Team

Lessons Learned for

Real World Attacks

(Tue 215pm)

Other Complimentary Sessions

BRKSEC-3033

Advanced AnyConnect

Deployment and

Troubleshooting with

ASA

(Fri 1100am)

BRKSEC-2138

Deploying an IPv6

Identity Network

(Thu 230pm)

LABSEC-2338

IBNS 20 (Advanced

8021X) Lab

(Wed 900am)

BRKSEC-3053

Practical PKI for

Remote Access VPN

(Fri 900am)

BRKSEC-2136

Preventing

Armageddon Finding

the Threat Before its

Too Late

(Wed 230pm)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 8: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

9

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 9: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 10: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

Legacy Mobility ldquoSilosrdquoMDM misses tight network Integration

14

Register with ISE

for BYOD

Allow Internet Access

Register with MDMAllow Corp Access

Internet

ISE

MDM

Goal Ensure MDM compliance before allowing access to Corp resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 11: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Mobile App

Management (MAM)

Mobile Information

Management (MIM)

Mobile Device

Management (MDM)

Enterprise Mobility Management

15

EMM(aka MDM historically)

Centralized

Management

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 12: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE and MDM home turf

16

UserIT Co-Managed DeviceDevice and Network-Based IT Control

User Managed DeviceNetwork-Based IT Control

Enterprise Software Distribution

InventoryManagement

Management (Backup Remote Wipe etc)

AUP

ClassificationProfiling

Registration

Secure Unified Access(Wireless Wired VPN)

Context-Aware Access Control (Role Location etc)

Cert + Supplicant Provisioning

User lt-gt Device Ownership

Mobile + PC

Policy Compliance (Jailbreak Pin Lock etc)

Secure Data Containers

Network Enablement (ISE) Device Management (MDM)

CostManagement

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 13: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE ndash MDM (EMM) IntegrationSolution Components

17

Enrollment and posture assessment policy is applied

Cisco ISE queries MDM platform for posture information

Cisco ISE assigns network access level based on enrollment and posture results

3rd party

MDM Ciscoreg ISE

2

3

4

Mobile devices are discovered by Cisco ISE as they access network1

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 14: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Bridging the Mobile Device Gap

18

Cisco ISE + 3rd Party MDM + Integration

bull True context basedwho where when how and compliance

bull Covers all Mobile Devices

bull Secure Device Apps and Information management

bull Unified Access enforcementfull- partial- quarantine- or no network access

+ =+

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 15: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Integration Steps

19

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 16: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

20

Internet

Proxy

Cisco ISELive Update

1

2

3

WLAN1

ISE-MDM integration

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 17: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

21

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 18: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Integration ndash The Big Picture

22

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 19: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following controller releases are used

bull AirOS 76130 release is mainly used because of

ndash Pre-Auth DNS-based ACL enhancement

ndash iOS7 Captive Network Assistant (CNA) behavior change

ndash Stability improvements

bull AirOS 74130

ndash Alternative AirOS release containing most ISE ndash MDM Integration related features and stability improvements

ndash Missing Pre-Auth DNS-based ACL enhancementTherefore the first proposed implementation option later in this deck ldquoPre-Auth DNS-based ACLrdquo isnrsquot applicable

bull A note to converged access controllers

ndash IOS-XE 33 adds URL-redirection functionality

ndash IOS-XE 36 adds FQDN ACLs

Cisco AirOS release

23

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 20: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ndash RefresherApple iOS7 Captive Network Assistant (CNA) changes

26

Redirect URL For CWA Client Provisioning Posture and MDMURL value returned from ISE as Cisco AV-pair RADIUS attribute

Example ciscocisco-av-pair=url-redirect=httpsipportguestportalgatewaysessionId=SessionIdValueampaction=mdm

Redirect ACL Network Access Device must be locally configured with ACL that specifies traffic to be permitted or to bypass redirection

ACL value returned as a named ACL on NAD

Example ciscocisco-av-pair=url-redirect-acl=ACL-MDM-QUARANTINE-IOS

WLC Redirect ACL Conventions

Permit ACL entries define traffic to bypass redirection

Deny ACL entries define traffic subject to redirection

Redirect

URL

Redirect-

ACL

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 21: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL

bull Problem Statement To register iOS and Android devices for BYOD or MDM they may require Internet access for either downloading supplicant software or for device validation from highly dynamic sources like iTunes and Google Play Same applies for MDM marked non-compliant devices In contrast WLC URL redirection ACL only offers static IP-based rule definition

bull Workaround (works also with older WLC versions eg 741300)

a) Permit full Internet access denyredirect only internal IP address ranges

b) Permit access to Apple and Google IP ranges denyredirect other traffic

c) Fake DNS resolutionbull Optional Plus external DNS-based network access enforcement (ASA WSA or others)

d) Out-of-band MDM onboarding just do endpoint compliance checking

bull Solution WLC 76130 and later ndash DNS based Pre-Auth ACL

Access to non-static IP resources

27

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 22: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL

34

same IP-based rules for

ACL-MDM-QUARANTINE-ANDROID

Seq 1-4 Infrastructure rules (including DNS MDM Portal (default 8443) and optional ICMP access)

Seq 5 Permit outbound traffic

Seq 6 Deny any traffic

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 23: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Solution WLC 76130 ndash DNS based Pre-Auth ACL

WLC ndash URL Redirection ACL (cont)

35

Note Allowed URL lists may need to be updated for your environment

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 24: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC ndash URL Redirection ACL (cont)

37

APClient WLC ISE

Authentication Request

Access-Accept

ACL = ACL-MDM-QUARANTINE

URL Redirect = ISE MDM Portal

Device Status Query

Device Status Response

register_status = falseEnable DNS snooping on AP

for URLs in ACL

DNS

DNS query (assumption host ISNrsquoT part of ldquoACL URL Listrdquo ndash eg ltwwwgooglecomgt)

1st IP address returned to WLC

http

hellipStarts EAP-TLS based authentication

DNS response is forwarded ldquoas isrdquo to client

MDM

1

1a

1b

3a

ldquoEnrollrdquo button points to httpsltMDM-ServergtltClient Redirect Pagegt3b

URL Redirect to ISE (action=mdm)

Forward DNS response with only the 1st IP address resolved to client

Add IP address to allowed list

ldquoEnrollrdquo button points to

MDM-Serverrsquos Client

Redirect Page

2a

DNS query for ltMDM-Servergt which IS part of the ldquoACL URL Listrdquo2b

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 25: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Feature limitations

bull IPv6 address not supported

bull Up to 10 Allowed URLs can be defined per ACL

bull AP to AP roaming after client authentication is completed the URLs to be snooped are not passed to the new AP

bull Supports both Local- and FlexConnect operation mode for central authentication

WLC 76130 ndash DNS based Pre-Auth ACL

40

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 26: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

WLC 76130 ndash DNS based Pre-Auth ACLAP Mode Support

41

For Your Reference For Your Reference

AP ModeFeature

SupportDescription

Local Mesh or

FlexConnect

(Central Switched)

YesDNS snooping works and Cisco WLC is updated

about the learned IP addresses to be allowed

FlexConnect

(Local Switched)Yes

When pre-authentication ACL is received in

Access Accept with the mapped URLs the DNS

snooping is enabled per client on the AP

FlexConnect

(Central Authentication)Yes Works as expected

FlexConnect

(Local Authentication)No Not Supported

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 27: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite ISE

42

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 28: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Throughout this breakout session the following ISE release is used

bull ISE 13 or

bull ISE 12 Patch with latest patch (but min patch 6 is recommended)

ndash MDM cachingbull If device connects to network ISE caches the MDM state

bull Next time device attempts to log-on ISE use the cache to allow access per previous MDM check

bull Once the device is on the network ISE checks with MDM using API call if the MDM state has changed (eg compliant -gt non-compliant)

bull If the state has changed ISE issues a COA to give a new policy (as per updated MDM attributes)

bull A note to ISE 13 12 patches

ndash Patches are cumulative

ndash Patches posted roughly on a 4-6 weeks basis

Cisco ISE release

43

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 29: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE LicensingRelease 13

44

BASE

PLUS

APEXMDM integration capabilities

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 30: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cisco ISE allows to automatically scheduled and recurrently retrieve profiling- and posture check updates as well as downloading latest client provisioning and posture software directly from Cisco locations

Administration gt System gt Settings gt Proxy

Proxy-based Internet Access for ISE 13

46

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 31: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull ISE 11 and before

ndash All web services supported on Management interface (eth0) only

ndash URL Redirection always used CN value of node certificate to populate redirect URLhttpsltCert_CN_FQDNgt8443

bull ISE 12

ndash All interfaces enabled for all web services by default

ndash Guest and Client Provisioning Portal is also used for MDM redirection(onboarding and non-compliant)

Web Services Multi-InterfaceISE 12 and before

49

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 32: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Dedicated MDM Portal

ndash Provides dedicated MDM Portal with individual settings options

ndash Full-fledged Portal Page Customization

ndash Full language support integration

ndash Endpoint Identity Group selection including Endpoint Purge

Web Services Multi-InterfaceISE 13

50

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 33: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Services configured to use the same HTTPS Port must use the same interfaces

bull ISE 13Same HTTPS Port must use same certificate group tag

bull RecommendationLimit services to specific interface to simplify management and security policy

Web Services Multi-Interface

52

Blacklist

TCP8444

(eth1)

GuestCPP

TCP8443

(eth1)

My Devices

TCP8445

(eth2)

Sponsor

TCP8446

(eth3)

ISE 13

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 34: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE Node IP Address Interface

ISE-PSN1 101995 eth0

ISE-PSN1 101915 eth1

ISE-PSN1 101925 eth2

ISE-PSN1 101935 eth3

bull Redirection based on first service-enabled IF

ndash If eth0 return host FQDN

ndash Else return interface IP

bull If eth1 is the only IF enabled for MDM Portal

eg Redirect URL = https1019158443

MDM URL Redirection ExampleDNS and Port Settings ndash Single Interface Enabled for MDM Portal

53

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 35: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM URL Redirection Example (FQDN in SAN)URL Redirection uses first MDM Portal-Enabled Interface (eth1)

54

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 User receives cert name mismatch warning

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

4

Name MismatchRequested URL = 101915

Certificate SAN = ise-psn1comanycom

= sponsorcompanycom

= mydevicescompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 36: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example with IP Address in SANURL Redirection uses first MDM Portal-Enabled Interface (eth1)

55

User

RADIUS authorization

URL redirect = https1019158443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to https1019158443

3 User sends web request directly to ise-psn1 101995

4 No cert warning received since SAN includes IP address

ISE Certificate

Subject =

ise-psn1companycom

SAN =

101915

ise-psn1companycom

sponsorcompanycom

mydevicescompanycom

https1019158443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = 101915

Certificate SAN = 101915

4Requires Certificate Signing Request includes SAN

attribute entry for each interface IP address used for URL-

redirected Web services

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 37: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull Problem Statement Any change to interface IP addressing (network relocation vMotion network infrastructure changes etc) requires new certificates to be generated with SAN attributes updated for new IP addresses

ndash Time-consuming process

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Disruption to application services after new cert loaded

bull Solution

ndash Interface Alias Optionally assign ISE node interface (eth1 eth2 eth3) a unique hostnameFQDN which can be resolved to its local IP address using DNS

ndash Each PSN tracks which interfaces are enabled for each service and dynamically substitutes IP variable for URL redirection to the PSNs local interface alias (hostname + domain)

bull Considerations

ndash Manual configuration process from CLI

ndash Requires DNS to be updates for each alias

IP Address-Based URL Redirection

56

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 38: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Interface AliasConfiguration

57

For Your Reference For Your Reference

bull Aliases assigned to interfaces using ip host global config command in ADE-OSndash (config) ip host ltinterface_ip_addressgt lthostname|FQDNgt lthostname|FQDNgt

bull Up to two values can be specified ndash hostname andor FQDNIf hostname specified then globally configured ltip domain-namegt appended for use in URL redirectionExamplendash ise-psn1admin(config)

ip host 101915 ise-psn1-guest ise-psn1-guestcompanycom (eth1)

bull Host entry for Gigabit Ethernet 0 (eth0) cannot be modified

bull Use show run to view entries Use no ip host ltip_addressgt to remove entry

bull Change in interface IP address or alias requires application server restart

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 39: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Interface AliasURL Redirection Uses First MDM Portal-Enabled Interface (eth1)

59

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and sends web

request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

ise-psn1companycom

SAN =

ise-psn1companycom

ise-psn1-guestcompanycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = ise-psn1-guestcompanycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 40: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

FQDN in SAN

60

bull Problem Statement Every ISE node requires a unique certificate

ndash New certificates signed by 3rd-party CAs can be expensive

ndash Time-consuming process to generate new certs each time new node added

ndash Certificate SAN must include FQDN entry for other web services (Sponsor MDP etc)

ndash Some endpoints require each PSN cert to be trusted and will prompt user to accept

bull Solution Wildcard Certificates

ndash Allows multiple ISE nodes to share single certificate for WebEAP authentication

ndash No longer requires custom SAN with node FQDN or interface IP addresses

ndash Most seamless and improved end-user experience

bull Considerations

ndash Less secure than unique certificate per node greater care to safeguard private key

ndash Limit exposure and deploy ISE into subdomain eg isecompanycom

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 41: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

NetworkWorld Blog from Aaron WolandWhat are Wildcard Certificates and how do I use them with Ciscos ISE

61

For Your Reference For Your Reference

Source httpwwwnetworkworldcomcommunityblogwhat-are-wildcard-certificates-and-how-do-i-use-them-ciscos-ise

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 42: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

63

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 43: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Cert

CA Provider

Wildcard SAN

SupportComments

sslcom Yes Full support

Digicert YesSupports wildcard SAN plus option to add IP in SAN DNS

label

Comodo Yes Choose UC certificate option and select Tomcat software

Entrust Yes No

Wildcard in the SAN with Entrust is not a standard UC Multi-

domain cert option It is however available as part a special

promotion and will take longer processing time

Geotrust No Only supports SAN with UC certificates and SAN cost extra

Verisign No

GoDaddy No

3rd Party Cert Provider Support for Wildcard in SAN

64

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 44: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Example using Alias amp Wildcard in SANURL Redirection Uses First MDM Port-Enabled Interface (eth1)

65

User

RADIUS authorization

URL redirect = httpsise-psn1-guestcompanycom8443

RADIUS request to ise-psn1 101995

SwitchAccess

Device

1 RADIUS Authentication requests sent to ise-psn1 101995

2 RADIUS Authorization received from ise-psn1 101995 with

URL Redirect to httpsise-psn1-guest8443

3 DNS resolves alias FQDN ise-psn1-guest to 101915 and

sends web request to ise-psn1-guest 101995

4 No cert warning received since SAN contains interface alias FQDN

ISE Certificate

Subject =

isecompanycom

SAN =

isecompanycom

companycom

httpsise-psn1-guestcompanycom8443

HTTPS response from 101915

1

2

3

PSN

ISE-PSN1

MDM Portal

eth1 101915

MyDevices

eth2 101925

Sponsor

eth3 101935

AdminRADIUS

eth0 101995

Certificate OKRequested URL = ise-psn1-guestcompanycom

Certificate SAN = companycom

4

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 45: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Key business driver for multi-interface support is traffic separation and assumption that traffic for one service that enters on interface X will return from the interfacenetwork path

bull Problem Statement

ndash Packets received on any ISE interface relies on CARS routing table to determine egress interface and next hop address

bull Solution

ndash Static routes for each endpoint subnet must be configured on each node using CLI to use the desired web service interface

ndash Source NAT to Web Portal interfaces and configure static route to NATrsquoed network

bull Considerations

ndash If NAT not used then depending on network size and addressing complexity may require hundreds of static routes to be configured very difficult to manage and maintain

ndash Dedicated interface for Anchor Controller use case should not be impacted since client IP is local (L2 adjacent) to dedicated ISE interface in DMZ

Web Services Multi-InterfaceRouting Challenge

68

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 46: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

First service

enabled IF

URL RedirectionRouting

IP in SAN Interface Alias FQDN in SAN Wildcard Certificate

Standalone ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

possible

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Distributed ISE Deployment

eth0 not required not applicablenot required

(host FQDN returned)not required no changes required

eth1 ndash eth3required OR

use IF-Alias

recommended

unless IP in SAN used

possible

requires IF-Alias definition

recommended

requires IF-Alias definition

adjust static routes

OR add SRC-NAT

Web Services Multi-Interface Summary

69

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 47: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Integration Prerequisite MDM

70

Cisco ISELive Update

1

2

3

WLAN1

Prerequisites

2

3

ISE

MDM

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 48: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

3rd Party MDM Vendor Support

71

ISE 13 ISE 12 Vendor Support

Version 62

Version 70 SP3

App Center v4110

Version 55Version 71

Version 23

Cisco MCMS v10

Version 132 Patch 5

Systems Manager Enterprise Casper Suite Version XY

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 49: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Onboarding Compliance Check Flow

73

BYOD

registered

Access-Accept

Internet Only

MDM

registered

MDM

compliant

BYOD Registration

MDM Onboarding

MDM non-compliant

Note Various other onboarding and compliance check flows feasible

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 50: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

74

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 51: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration Overview

75

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 52: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

76

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 53: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Temporary replace ISE PSN by another device (use ISEs proxy settings if any) and verify basic MDM Server connectivity information and API credentialshttpsltMDM-ServergtltPortgtciscoisemdminfo

MDM HTTPS based XML API ndash MDM server info (eg Meraki SME)

77

API path for further calls (eg ciscoise)

Meraki doesnrsquot use instances no need

adding ltInstancegt before ltapi_pathgt

httpsltMDM-ServergtltPortgtltInstancegtltAPI_Pathgt

Client redirection URL used for MDM registration

Messaging API Optional enables ISE to send messages

through MDM to end user mobile devices

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 54: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM communication

Query endpoint status and compliance information examplehttpsltMDM-ServergtltPortgtltapi-pathgtdevices0macaddressltMAC-Addressgtall

Endpoint StatusCompliance Query Example

79

Endpoint to be validated

MDM registration status

MDM compliance statusbull Overall status (macro)

bull Specific compliance checks (micro)

Endpoint details provided by MDM(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

All attributes retrieved and reachability determined by single API call for each new client session Starting with ISE 12 P6 Endpoint

immediately reconnect based on previous MDM API records Only if post authorization lookup determines value changes a CoA is sent

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 55: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

81

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 56: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt System gt Certificates gt Trusted Certificates

Add MDM Server certificate to ISE Trusted Certificates

82

Note If MDM server certificate is CA-signed import root CA instead

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 57: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Administration gt Network Resources gt External MDM

Add new MDM Server

84

Instance Name field is for multi-tenant MDMs

User must have API rights on MDM

Recommended same polling interval set on MDM

Server (default = 240 minutes 0 = disable)Caution Aggressive polling can impact system load as ISE

must collect status for all endpoints using API and trigger

CoAs to all non-compliant devices

Multiple MDM servers can be defined

only one can be active at any time

Test Server reachability

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 58: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM configuration most common issues

Connection Messages Explanation

Connection Failed

Please check the connection

parameters

A routing or firewall problem exists between the ISE located in the data center and the MDM located in either the

DMZ or Cloud The firewalls configuration should be checked to confirm HTTPS is allowed in this direction

Connection Failed

404 Not Found

The most likely cause of an HTML 404 error code is that an instance was configured when it was not required or

that the wrong instance has been configured

Connection Failed

403 Forbidden

The user account setup on the MDM server does not have the proper roles associated to it Validate that the

account being used by ISE is assigned the REST API MDM role

Connection Failed

401 UnauthorizedThe user name or password is not correct for the account being used by ISE

Connection Failed There is a

problem with the server

certificate or ISE Trust store

ISE does not trust the certificate presented by the MDM website This indicates the certificate was not imported to

the ISE certificate store or the certificate has expired since it was imported

The MDM Server details are

valid and the connectivity was

successful

The connection has successfully been tested The administrator should also verify the MDM AUTHZ dictionary

has been populated with attributes

ISE ndash MDM Configuration

85

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 59: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Add MDM Server

Path Policy gt Policy Elements gt Dictionaries gt System gt MDM

Review MDM Dictionaries

86

Once the MDM server is added the

MDM and MDM_LOG dictionaries

show-up on ISE which could be later

used in ISE Authorization Policies

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 60: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM Configuration

88

Add MDM Server

ISE

ndashM

DM

In

teg

ratio

n p

rere

qu

isite

s(W

LC

3

rdP

art

y M

DM

Se

rve

r N

etw

ork

Co

nn

ectivity

hellip)

ISE ndash MDM Communication

ISE ndash MDM communication verification

(API and MDM Server access rights testing)

Configure Profiles and Policies

Review MDM

Dictionaries

Add MDM Server certificate to

ISE trusted Certificate Store

Configure ISE

Authentication Policy

Configure ISE

Authorization Profiles

Add new MDM Server

Configure ISE

Authorization Policy

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 61: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authentication

Configure ISE Authentication Policy

89

The sample authentication

policy shown is representative

for both single SSID and

dual SSID configuration with

MAB and Dot1x

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 62: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Policy Elements gt Results gt Authorization gt Authorization Profiles

Configure ISE Authentication Policy

90

MDM redirect is a common task

under Web Redirection

Can use same MDM Redirect

authorization profile for both

Registration with MDM Server

Compliance and Remediation

with MDM Server policy

OR

Use two different profiles for

better visibility

Redirect ACL must allow access to

MDM Server onboarding and

remediation resources

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 63: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization (Condition MDM Attributes)

Configure ISE Authorization Policy

91

MDM Server reachability

Endpoint registration status

Endpoint macro-level compliance status

Endpoint micro-level compliance status(Disk Encryption- Pinlock- and Jail broken status)

MDM attributes available for policy conditions(Manufacturer Model IMEI Serial Number

OS Version Phone Number)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 64: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and PoliciesConfigure ISE Authorization Policy ndash cont

92

MDM Server reachability

Best Practice Include MDM Server

reachability rule above other MDM

rules to return fallback permission

if MDM is down

OR

Include this condition to each rule that

relies on MDM replay to complete

Without MDM reachability rule access may be blocked

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 65: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Configure Profiles and Policies

Path Policy gt Authorization

Configure ISE Authorization Policy ndash cont

93

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 66: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash MDM IntegrationScalability

bull Scalability = 30 API calls per second ( gt100`000 callsh)Consider Internet bandwidth and latency for cloud-based solutions

Passive Reassessment

bull Bulk recheck against MDM server using configurable timer (polling interval)

bull If result of periodic recheck shows that a connected endpoint is no longer compliant ISE sends a CoA to terminate session

Survivability

bull CoA is NOT sent for devices granted access while MDM server unavailable

bull If device is granted a ldquofail openrdquo or other limited access state (for example URL-redirected to MDM) user can hit Continue button when MDM is back online to trigger CoA

96

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 67: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

97

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 68: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

End-User ExperienceBYOD amp MDM on-boarding (Video)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 69: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public 99

End-User Experience (BYOD amp MDM on-boarding)

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 70: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

114

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 71: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Tracking Devices Logging amp Reporting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 72: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Tracking Devices

User can issue additional remote actions through the My Devices Portal

MyDevices Portal

116

Remote Actions

bull LostReinstate

bull Stolen (+revoke cert)

bull PIN Lock

bull UnenrollCorp Wipe

bull Full Wipe

bull Edit Description

bull DeleteRemove device

ISE Endpoints Directory

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 73: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

ISE ndash Live Auth Log ndash Session Details

ISE and WLC ndash Session Logging

118

WLC ndash Monitor ndash Client Details

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 74: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM Reporting

Path Operations gt ISE Reports gt Endpoints and Users gt Mobile Device Management

Authorization Conditions Definitions

119

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 75: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Troubleshooting

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 76: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Path Administration gt System gt Logging gt Collection Filters

Selective Client Log Suppression

122

PSN static log collection filters

Filter Messages based on

Auth Result

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 77: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Temporary Client Log Suppression

Path Operations gt Authentications

Enhanced Suppression Filter handling

123

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 78: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging

124

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 79: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Endpoint Debug

Path Operations gt Authentications

Enhanced endpoint debugging (cont)

125

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 80: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection

1 Set MDM debug level to DEBUG(Administration gt System gt Logging gt Debug Log Configuration

bull Select PSN node used for debugging

2 Examine the Component Names and flip these components log level to DEBUG

bull mdm

bull mdm-pip

3 Repeat steps above if more than one PSN is involved in debugging126

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 81: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

MDM DEBUG log collection (cont)

4 (Optional) During the tests note datetime and session IDs

5 Gather generated log files and review debug messages

bull ise-psclog

bull catalinaout

6 Revert log level changes made in step 2 (default = INFO)

127

bull iseLocalStorelog

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 82: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

bull View list of available log files

bull View new log entries in specific log file

View Log from Console (CLI or SSH)

128

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 83: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

nslookup options

bull name-server Specify Alternate name server to use

bull querytype Specify DNS record query type

NSLookup

129

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 84: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from iOS Devices

bull Use ldquoiPhone Configuration Utilityrdquo httpswwwapplecomsupportiphoneenterprise

bull Connect iOS Device via cable

bull Switch to Console

bull Reproduce problem

130

For Your Reference For Your Reference

iOS Troubleshooting

Push Notifications httpsdeveloperapplecomlibraryiostechnotestn2265_indexhtml

iOS Packet Tracing httpsdeveloperapplecomlibrarymacqaqa1176_indexhtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 85: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Capture Console Logs from Android Devices

bull Android provides a mechanism for collecting and viewing system debug output known as LogCat

131

For Your Reference For Your Reference

Android Troubleshooting

Using DDMS httpdeveloperandroidcomtoolsdebuggingddmshtml

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 86: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Agenda

ISE ndash MDM Integration Overview

Integration Prerequisites

ISEs MDM Configuration

End-User Experience

Tracking Logging Reporting amp Troubleshooting

Wrap-Up amp Closing

132

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 87: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Corporate Resources

ClosingTight ISE and MDM Integration

133

Register with ISE

for BYOD

Allow Internet Access

Register with MDM

Internet

ISE

MDM

Goal reached Tear-down the legacy silos

Fetch MDM

compliance status

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 88: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Wrap-Up

134

MDM integration consists of 3 main steps

Integration Prerequisites

Add MDM Server

Configure ISE policies

1

2

3

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 89: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Link

bull Secure Access TrustSec and ISEhttpwwwciscocomgotrustsechttpwwwciscocomgoisehttpwwwyoutubecomuserCiscoISE

bull Cisco ISE Design Guides - Integrating MDM with Cisco ISEGuides available for AirWatch Cisco MCMS Fiberlink MobileIronhttpwwwciscocomenUSnetsolns1063networking_solutions_design_guidances_listhtml

bull Cisco ISE ndash MDM Partner Integration At a GlanceLists current API capabilities per MDM vendorhttpwwwciscocomenUSprodcollateralvpndevcps5712ps11640at_a_glance_c45-726284pdf

bull Cisco TrustSec and ISE Deployment GuideshttpwwwciscocomenUSsolutionsns340ns414ns742ns744landing_DesignZone_TrustSechtml

bull Cisco MCMS = Cisco Mobile Collaboration Serviceshttpssupportforumsciscocomcommunitynetprosolutionsmcms

135

For Your Reference For Your Reference

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 90: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

copy 2015 Cisco andor its affiliates All rights reservedBRKSEC-2035 Cisco Public

Complete Your Online Session Evaluation

bull Please complete your online sessionevaluations after each sessionComplete 4 session evaluationsamp the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt

bull All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

138

Donrsquot just connect your mobile device

INTEGRATE IT

Page 91: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description

Donrsquot just connect your mobile device

INTEGRATE IT

Page 92: Paradigm shift in Business Worldd2zmdbbm9feqrf.cloudfront.net/2015/eur/pdf/BRKSEC-2035.pdf · Paradigm shift in Business World Yesterday ... Apps and Information management ... Description