6 Ise 1 3 PVT Lab Guide
6 Ise 1 3 PVT Lab Guide
6 Ise 1 3 PVT Lab Guide
Lab Overview
This lab is designed to help attendees understanding how to deploy Cisco Identity Services Engine (ISE)
focusing on new key ISE 1.3 features such as Active Directory Multi-Join, ISE Internal Certificate
Services, and many Guest enhancements. In the lab the students will learn how configure ISE to connect
multiple AD domains, and use ISE internal CA to issue certificates for BYOD endpoints. The lab also
covers the new Guest UI available in ISE 1.3.
Lab participants should be able to complete the lab within the allotted time of 2 hours.
Lab Exercises
This lab guide includes the following exercises:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 1 of 70
Lab Topology
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 2 of 70
Name/Hostname
IP Address
3560CG.demo.local or 3560CG
10.1.100.1
vwlc.demo.local
10.1.100.41
ap.demo.local
10.1.90.x/24 (DHCP)
ASA (5505)
asa.demo.local
10.1.70.1
ISE Appliance
ise-1.demo.local
10.1.100.21
AD (AD/CS/DNS/DHCP)
ad.demo.local
10.1.100.10
mail.demo.local
10.1.100.40
Services
services.demo.local, ntp.demo.local
10.1.100.12
portal.demo.local, updates.demo.local
10.1.100.222
business.demo.local
10.1.100.223
it.demo.local
10.1.100.224
records.demo.local
10.1.100.225
admin.demo.local
10.1.100.6
ftp.demo.local
VLAN Name
IP Subnet
Description
10
ACCESS
10.1.10.0/24
20
MACHINE
10.1.20.0/24
50
GUEST
10.1.50.0/24
90
AP
10.1.90.0/24
Wireless AP VLAN
99
LAB.LOCAL
10.1.99.0/24
100
Management
10.1.100.0/24
130
DB
10.1.130.0/24
172
ISE.LOCAL
172.17.100.0/
24
AD domain ise.local
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 3 of 70
Account (username/password)
admin / ISEisC00L
admin /
ISEisC00L
ASA (5505)
admin /
ISEisC00L
ISE Appliances
admin /
ISEisC00L
AD (CS/DNS/DHCP/DHCP)
admin /
ISEisC00L
Services Servers
admin /
ISEisC00L
admin /
ISEisC00L
To access the lab, you must first connect to the Admin PC. The Admin PC provides a launching point for
access to all the other lab components
Admin PC access is through RDP, therefore you must have an RDP client installed on your computer
Connect to a POD
Step 1
Note: All lab configurations can be performed from the Admin client PC.
From the Admin client PC, click the VMware vSphere Client icon on the taskbar
Step 2
Step 3
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 4 of 70
b. To login to a Windows VM, select Guest > Send Ctrl+Alt+del from the VM Console
menu:
Step 4
For this lab ensure that the following VMs are up and running:
p##-ad
p##-ise-1-13update
p##-mail
p##-services
p##-vWLC
p##-admin (might not be visible)
p##-w7pc-corp (should be Power-OFF)
p##-ws2012r2-lab.local
p##-ws2012r2-sam.lab.local
## refers to the pod number that you are assigned to. E.g., For POD 2, p##-ad would be p02-ad.
w7pc-guest may be powered on manually during the exercises.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 5 of 70
b. Select the device that youd like to log into and double click on it.
c.
If prompted, click Yes to cache the server host key and to continue login.
d. Login using the credentials listed in the Accounts and Passwords table.
Step 1
Step 2
Verify that ping succeeds for all devices tested by the script.
Home: (On PC/Mac with 2/3-button mouse) Right click once with a mouse. (On Mac with track
pad) Touch with two fingers on the Track Pad If Secondary Click is configured.
Mouse: Mouse pointer mimics touching the iPad screen with one finger.
Scrolling or dragging: Press and hold Left mouse button and move the mouse pointer to scroll
Keyboard: Move the pointer over any text box on the iPad, click once, and then begin using your
local keyboard for input.
Note: The tab key is not available on the iPads virtual keyboard so you will have to move the pointer to the text field you want to
input text, and click on it.
Note: When interacting with the iPad VNC session, US keyboard is preferred.
Note: US keyboard is needed for the RDP session too unless you have additional language packs installed to provide keyboard
mappings. This is only for the RDP sessions.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 6 of 70
Before ISE 1.3, an ISE deployment may join to only one Microsoft Active Directory (AD) domain, and
requires two-way trusts to authenticate users located in other AD domains. Now an ISE 1.3 deployment
can join directly to multiple AD domains to authenticate users and computers in them. ISE 1.3 represents
each AD instance as an AD Join Point, each of which is essential the same as the AD identity store in
previous releases.
Exercise Objective
In this exercise, you are to explore new features implemented for ISE 1.3 Active Directory. You are to
Step 1
(Join Point #1) Join to a simple domain demo.local and check out new user interface
(Join Point #2) Add and join to the second domain sam.lab.local and experiment with
authentication domains
Step 2
Step 3
Access ISE Active Directory configuration page by navigating to Administration > Identity
Management > External Identity Sources and select Active Directory from the left-hand
pane.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 7 of 70
c.
The Connection tab shall show ad.demo.local as the domain controller and Default-FirstSite-Name as the site.
Note: The Join Point Name is its ISE dictionary name for this external identity source and needs to be unique among all identity
sources. Although here we use the same name as its AD domain, they are not required to match.
c.
d. Click Yes, when prompted after ISE Reloading page following the create,
Would you like to Join all ISE Nodes to the Active Directory Domain?
e. In Join Domain pop-up window, fill in
* AD User Name lisa
* Password ISEisC00L
f.
g. A window Join Operation Status will pop up. Wait until the node status turns
Completed, and then click Close.
h. The Connection tab shall show ws2012r2-2.sam.lab.local as the domain controller and
Default-First-Site-Name as the site.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 8 of 70
Step 5
Step 6
Test Authentication Domains with default Use all AD domains for authentication in Join Point
sam.lab.local
a. Click back to tab Connection. Tick ise-1.demo.local and click Test User.
b. Test User Authentication with a user in lab.local (the parent domain). In Test User
Authentication Window, fill in
* Username
* Password
Authentication Type
Authentication Data
c.
homer
ISEisC00L
MS-RPC (drop-down)
Retrieve Groups
Retrieve Attributes
Select sam.lab.local and click Enable Selected to turn its Authenticate column to YES.
Then, Save.
homer
ISEisC00L
MS-RPC (drop-down)
Retrieve Groups
Retrieve Attributes
Identity Rewrites manipulate identity names before searches in AD. Here exemplifies this
feature by Eduroam Realm Striping
Eduroam uses realm for routing the authentication requests so it needs the client supplicants to
send the outer identity in the form of username@realm. Certain 802.1X supplicants, such as
Windows native supplicants, are not configurable to use different identities for inner and outer
identities, so that the home RADIUS authentication server may receive the requests in that form
(username@realm). If the realm is not one of the authentication domains, a Join Point may be
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 9 of 70
configured either to strip it or to rewrite the identity to a UPN with an authentication domain
suffix.
a. Click tab Advanced Settings for the join point sam.lab.local.
Note: This is at Administration > Identity Sources > External Identity Sources. Select sam.lab.local under Active Directory in the left
pane.
c.
d. Scroll down to see the built-in rules. Click the drop-down arrow next to the gears icon in
rule #4 if Indentity Matches [IDENTITY]@[DOMAIN]. And, select Duplicate above.
e. In the newly duplicated rule, update the rule as below:
If Identity Matches
f.
[IDENTITY]@demo.edu
rewrite as
[IDENTITY]
g. In the pop-up Test rewrite window, input maggie@demo.edu in the text box next to Test
Subject. It should result in maggie as the rewrite.
h. Click Close when done.
i.
Step 9
AD Diagnostic Tool is a new utility in ISE 1.3 AD to help determining any environment issues
related to the join points.
a. Click Active Directory from the left-hand pane to return to the main configuration page.
b. Click Advanced Tools and then select Diagnostics Tools from the drop-down menu.
c.
d. If Summary shows Failure(s), click the hyperlink See Details for warning/failed test
details. Then, click Close when done.
Note: The DNS failures are due to known defect CSCuq95531.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 10 of 70
Primary PAN (PPAN) may be Subordinate to an existing Root CA or may be Standalone Root CA.
All PSNs are Subordinate CAs to
PPAN
PSNs are SCEP Registration
Authorities (RAs)
Promotion of Standby PAN:
o Will not have any effect on
operation of the subordinate CAs.
o For Standby to become Root
CA must manually install the
Private/Public keys from PPAN.
Exercise Objective
In this exercise, your goal is to configure the ISE 1.3 Internal CA. This includes completion of the
following tasks:
Step 1
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 11 of 70
Step 2
Go to Administration > System > Certificates. Under Certificate Authority, select Internal
CA Settings and verify Internal CA is running.
Step 3
In the same page Administration > System > Certificates. Under Certificate Authority, click
Certificate Templates. ISE 1.3 preloaded with EAP_Authentication_Certificate_Template,
which could be used for BYOD. In this Lab we will create a new template to go through
certificate template creation process.
Step 4
In Certificate Templates page, click Add, and fill-in with the following values
* Name
Description
Common Name (CN)
Organizational Unit (OU)
Organization (O)
City (L)
State (ST)
Country (C)
Subject Alternative Name (SAN)
Key Size
* SCEP RA Profile
Valid Period
internalCertBYOD
ISE internal cert template
$UserName$
MAC Address
2048
ISE Internal CA
730
Exercise Objective
In this exercise your goal is to configure ISE for single SSID Wireless BYOD, which includes the
completion of the following tasks:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 12 of 70
Create Client Provisioning Policy to use ISE internal CA to issue BYOD endpoint
certificates.
Review the Certificate Authentication Profile and the Identity Source Sequence
Review the Authentication Policy to accept 802.1X authentication from wireless access
devices with EAP-TLS or PEAP/EAP-MSCHAPv2 protocols.
Step 1
If timed out, re-login to the ISE administration web portal at https://ise-1.demo.local using the
credentials admin / ISEisC00L
Step 2
Rule Name
Identity
Groups
Apple iOS
Any
Operating
Systems
Apple iOS All
Other
Conditions
Results
iOS WPA2e TLS
You may add a new Native Supplicant Configuration/Wizard Profile in-line within the Results cell.
Create the native supplicant profile iOS WPA2 TLS in-line as shown below:
* Name
Description
* Operating System
* Connection Type
* SSID ##-ISECOLD
Security WPA2 Enterprise
* Allowed Protocol TLS
Certificate Template internalCertBYOD
Note: SSID value is case-sensitive and needs to be exactly the same as the one defined in the WLC.
To avoid typos, copy the SSID name from the WLC and paste it on the ISE GUI. To find SSID for your POD, Go to admin PC,
launch a browser and login to WLC (https://vwlc.demo.local) with Username = admin and Password = ISEisC00L. Click WLANs and
then copy the name of the Secure SSID i.e. ##-ISECOLD (e.g. 02-ISECOLD for pod-02).
b. Click Save to persist the native supplicant profile. Save again to update to Client
Provisioning Policy.
You may skip the rest of this exercise and jump to Exercise 2.3, if already familiar with ISE BYOD from the previous ISE releases.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 13 of 70
Step 3
Go to Administration > Identity Management > External Identity Sources > Certificate
Authentication Profile. Review
Preloaded_Certificate_Profile.
Step 4
Step 5
Step 6
Go to Policy > Policy Elements > Results > Authorization > Authorization Profiles. Review
two Authorization Profiles that are used in the Authorization Policy one for full network access
and the other for native supplicant provisioning.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 14 of 70
wlcFullAccess
-ACCESS_ACCEPT
PERMIT-ALL-TRAFFIC
Web Redirection
(CWA,MDM,NSP,CPP)
wlcSupplicantProvisioning
-ACCESS_ACCEPT
Drop-down menu: Native Supplicant Provisioning
ACL: PERMIT-2-ISE-a-DNS
Value: BYOD Portal (default)
Attributes Details
Access Type = ACCESS_ACCEPT
cisco-av-pair = url-redirect-acl=PERMIT-2-ISE-a-DNS
cisco-av-pair = urlredirect=https://ip:port/guestportal/gateway?sessionIdValue&portal=&action=nsp
Step 7
Go to Policy > Policy Sets. Select wirelessDOT1X. Expand its Authentication Policy and
ensure that the authentication policy is configured as below. The modified are highlighted in
Yellow.
Enabled
Step 8
Name
Protocols
Identity Source
Options
Default Rule Allow Protocols PEAPoTLS and use DOT1X_ID_Sequence Reject
(if no match)
Reject
Drop
Next, expand the Authorization Policy to review two rules as shown below the Rule Name
Registered with ISE and EAP-TLS and Employee Personal Device.
Rule Name
Groups
Other Conditions
Registered
with
ISE
and
EAPAny
EndPoints:BYODRegistration
EQUALS
TLS
Yes
AND
Network Access:EapAuthentication
EQUALS EAP-TLS
AND
CERTIFICATE:Subject Alternative Name
EQUALS Radius:Calling-Station-ID
Employee_Personal_Device
Any
Network Access:EapAuthentication
EQUALS EAP-MSCHAPv2
Any
Default
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Permissions
wlcFullAccess
wlcSupplicantProvisioning
DenyAccess
Page 15 of 70
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Step 1
Step 2
Double click on the batch file vnc-to-iPad on the admin-PCs Desktop to start a VNC session to
the iPad. The batch file will prompt you to press any key to continue. You will then see the VNC
Viewer pop up.
Step 3
On the iPad, navigate to Settings > General > Profiles. Remove any existing profiles, if
present.
Note: You might not see the Profiles menu option, when no profile installed on the iPad.
Step 4
Next on the iPad, go to Settings > Safari and hit Clear History as well as Clear Cookies and
Data.
Step 5
Go to Settings > Wi-Fi and slide the virtual switch to enable Wi-Fi. Select and connect to the
network ##-ISECOLD
a. Enter the username/password AD
credentials (employee1/ISEisC00L) and click
Join
b. Click to Accept the certificate
c.
Next click on the blue arrow of the connected network and verify the IP address assigned
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 16 of 70
Note: IP address for iPad might be different depending on the DHCP server in the POD, iPad might get an IP address from
10.1.10.x subnet which is OK.
Step 6
Now launch the mobile Safari app and access the website portal.demo.local.
If receiving a warning Cannot Verify Server Identity, click Continue and it will redirect to the
self-provisioning page.
This will take you to the ISE 1.3 BYOD Welcome Screen, which guides the end-user over a
series of steps to onboard the device and also keeps tracks of these steps with proper
numbering.
Click Start to proceed.
Next, enter Device Name and Description
Device Name
Description
Personal iPad
This is my iPad
Step 7
Step 8
Now entering portal.demo.local in the mobile Safari app should take you to the website.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 17 of 70
Step 9
Verifying Settings > General > Profiles shows two profiles are installed
Note: iOS WPA2e TLS is the name of the supplicant profile created in Step 2 of Exercise 2.2
Step 10
Go to Operations > Authentications. Check the live logs on ISE admin web portal to verify that
the correct authorization profiles were applied. Initially, the device is authorized for
wlcSupplicantProvisioning. Once the provision is done, the wlcFullAccess profile is applied.
Note: For debugging, enable DEBUG logging for relevant components -- client, guest, provisioning, SCEP, and OCSP.
(Admin>System>Logging>Debug Log > Conifg)
Step 11
Note:
Under Administration > System > Certificates > Certificate Management > Endpoint
Certificates, look at the certificate issued to the iPad
The certificate is shown as issued one the day before. This is by design to reduce issues (e.g. CSCui15922)
where endpoints may clock slightly earlier than the CA.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 18 of 70
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Complete general system settings to support Client Provisioning and Posture Services
The diagram highlights the key tasks covered in this exercise including System Settings,
Download of Dynamic Updates and CPP Packages, Agent Profiles and CPP Policy:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 19 of 70
Lab Exercise 3.1: Configure Client Provisioning Services for Unified Agent
The ISE Home Dashboard page should display. Navigate the interface using the multi-level menus.
Step 2
Note:
proxy-wsa.esl.cisco.com
80
Web
Update Feed URL:
Proxy Address:
Proxy Port:
https://www.cisco.com/web/secure/pmbu/posture-update.xml
proxy-wsa.esl.cisco.com
80
Automatically check for updates starting from initial delay every 24 hours
a. Click the Save button.
d. Click Update Now to run it immediate.
Note:
Step 4
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 20 of 70
Lab Exercise 3.1: Configure Client Provisioning Services for Unified Agent
The posture agent profiles may be used to override these global settings.
Step 6
aupAnyUser
Simple Acceptable Use Policy
[
Use URL for AUP message
Use file for AUP message
anyconnect-win-4.0.00048-k9.pkg
ii.
anyconnect-win-compliance-3.6.9492.2.pkg
iii.
anyconnect-VPN-disable.xml
iv.
anyconnect-NAM-EAP-FAST.xml
b. Back to ISE admin web UI, go to Policy > Policy Elements > Results and click the
icon to left of Client Provisioning to expand its contents.
c.
d. From the right-hand pane, click Add then click Agent Resources from local Disk from
the drop-down list. Select Cisco Provided Packages from Category drop-down.
e. Browse to C:\Users\admin\Downloads\, select to open, Submit, and Confirm the
checksum for:
anyconnect-win-4.0.00048-k9.pkg
anyconnect-win-compliance-3.6.9492.2.pkg
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 21 of 70
Lab Exercise 3.1: Configure Client Provisioning Services for Unified Agent
AnyConnect ISE Posture Agent Profiles: Configuration files for AnyConnect ISE Posture
agent.
Step 7
Enter the following values for the new Agent profile. When finished, click Submit.
The defaults should work for most cases. Changed items are highlighted. See ISE User
Guide, Release 1.3 for more info on Agent Profile Parameters and Applicable Values.
AnyConnect
* Name:
acPostureWinProfile
Description:
Agent Behavior
Parameter
Enable debug log
Operate on non-802.1X
wireless
Value
No
No
Notes
Description
Enables the debug log on the agent
Enables the agent to operate on non802.1X wireless networks.
No
OSX: N/A
5 MB
4 mins
IP Address Change
Parameter
Enable agent IP refresh
Value
Yes
Notes
Enables VLAN change detection
Description
Sets the Vlan change detection flag on
the server, to transmit the configured
dhcp release delay, and the dhcp renew
delay values from the server to the client.
0 secs
Ping or ARP
Maximum timeout for ping
DHCP renew delay
DHCP release delay
Network transition delay
Ping
1 secs
1 secs
4 secs
3 secs
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Ping timeout.
Page 22 of 70
Lab Exercise 3.1: Configure Client Provisioning Services for Unified Agent
Posture Protocol
Parameter
PRA retransmission time
Value
120 secs
Discovery host
biz.demo.local
Step 8
Note:
Notes
Description
This is the agent retry period if there is a
Passive Reassessment communication
failure
The server that the agent should connect
to
Configure an AnyConnect VPN profile to hide the VPN tile in AnyConnect GUI.
We need a VPN profile in order not to show AnyConnect VPN module tile on the client machine.
Ref: CSCur22131: Discrepancy with VPN module appearing on client when it is de-selected
a. Click Add then click Agent Resources from local Disk from the drop-down list.
Category:
Type:
Name:
Description:
b. Browse to C:\Users\admin\Downloads\
c.
d. Click Submit to save changes. Confirm when prompted for Please confirm this
package's SHA1 hash matches : 7f7003bd2e53ab111aa55f63a0d737a373276501.
Step 9
b. Browse to C:\Users\Admin\Downloads\
c.
Select anyconnect-NAM-EAP-FAST.xml
d. Click Submit to save changes. Confirm when prompted for Please confirm this
package's SHA1 hash matches : aae7e54819644d3219b7282a179133a184c1d3bd.
Step 10
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 23 of 70
Lab Exercise 3.1: Configure Client Provisioning Services for Unified Agent
c.
Enter the following values for the new Agent Configuration. When finished, click Submit
to save the changes.
Step 11
acPostureWinProfile
acVPNdisableProfile
acNAMProfile
-
Rule Name
ID Groups
OS
Conditions
Results
Agent Configuration
Employee WinAll Any
Windows All demoAD.local:ExternalGroups
EQUALS demo.local/HCC/Groups/Employees Agent: acConfigWin
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 24 of 70
Lab Exercise 3.2: Define Authorization Policy for Client Provisioning and Posture Compliance
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Define a Downloadable ACL (dACL) that restricts network access for endpoints whose
compliance state is either Unknown or NonCompliant.
Review a URL Redirect ACL on the access switch to ensure that general http/https traffic
is redirected to the ISE Policy Service node while allowing access to remediation servers.
Define a new Authorization Profile that apply the quarantine dACL and Redirect ACL to
redirect endpoints to provisioning and posture services.
Add new rules to the Authorization Policy that leverage the new Authorization Profiles to
quarantine, assess posture, and remediate endpoints that are not posture compliant.
Update existing Authorization Policy rules such that privileged network access is based
on posture compliance.
The diagram highlights the key tasks covered in this exercise including Authorization Profiles,
their component dACLs, and Authorization Policy:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 25 of 70
Lab Exercise 3.2: Define Authorization Policy for Client Provisioning and Posture Compliance
The ISE Home Dashboard page should display. Navigate the interface using the multi-level menus.
Step 2
Define a dACL that restricts network access for endpoints that are not posture compliant.
a. Go to Policy > Policy Elements > Results and click
double-click Authorization) to expand its contents.
* Name POSTURE_REMEDIATION
Description Permit access to posture and remediation services and deny all
other access. Permit general http and https for redirection only.
* DACL Content permit udp any any eq domain
permit icmp any any
permit tcp any host 10.1.100.21 eq 8443
permit tcp any host 10.1.100.21 eq 8905
permit udp any host 10.1.100.21 eq 8905
permit tcp any host 10.1.100.222 eq 80
c.
Step 3
Description
Permit DNS for name resolution
Permit ICMP for initial troubleshooting
Permit CWA/CPP to ISE Policy Service node
Allow Agent discovery direct to Policy Service node
Allow Agent discovery and keep-alives
Explicit allow to remediation server
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 26 of 70
Lab Exercise 3.2: Define Authorization Policy for Client Provisioning and Posture Compliance
Note:
* Name AD_LOGIN_ACCESS
Description Employee AD Access
* DACL Content permit udp any eq bootpc any eq bootps
permit udp any any eq domain
permit icmp any any
permit tcp any host 10.1.100.10 eq 88
permit udp any host 10.1.100.10 eq 88
permit udp any host 10.1.100.10 eq ntp
permit tcp any host 10.1.100.10 eq 135
permit udp any host 10.1.100.10 eq netbios-ns
permit tcp any host 10.1.100.10 eq 139
permit tcp any host 10.1.100.10 eq 389
permit udp any host 10.1.100.10 eq 389
permit tcp any host 10.1.100.10 eq 445
permit tcp any host 10.1.100.10 eq 636
permit udp any host 10.1.100.10 eq 636
permit tcp any host 10.1.100.10 eq 1025
permit tcp any host 10.1.100.10 eq 1026
Step 4
Review URL Redirect ACL on the access switch. An Authorization Profile will reference this ACL
and work in conjunction with the accompanying dACL applied to the switchport interface.
a. From the Admin client PC, use the desktop shortcut for the PuTTY
to launch a
terminal session to the c3560cg switch using the credentials admin / ISEisC00L.
b. Enter the following command at the access switch exec shell prompt to verify the
contents of the ACL:
3560CG# show ip access-lists ACL-AGENT-REDIRECT
Extended IP access list ACL-AGENT-REDIRECT
10 deny tcp any host 10.1.100.222 eq www
20 permit tcp any any eq www
Step 5
Define a new Authorization Profile PostureRemediation that leverages both the new dACL for
port access control and the URL Redirect ACL for traffic redirection.
a. Return to the ISE admin interface from the Admin client PC.
b. Click Authorization Profiles from the left-hand pane under Policy > Policy Elements >
Results > Authorization.
c.
Click Add from the right-hand pane and enter the values for the Authorization Profile as
shown below.
Name
Description
Access Type
DACL Name
Web Redirection
(CWA, MDM, NSP, CPP)
Posture Remediation
Permit access to posture and remediation services; redirect
traffic to client provisioning and posture services.
ACCESS_ACCEPT
POSTURE_REMEDIATION
Client Provisioning (Posture)
ACL: ACL-AGENT-REDIRECT
Value: Client Provisioning Portal (default)
d. The resultant Attribute Details should appear at the bottom of the page as the following:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 27 of 70
Lab Exercise 3.2: Define Authorization Policy for Client Provisioning and Posture Compliance
Step 6
Define a new Authorization Profile for Compliant Employees named Employee that allows
complete access.
a. From the left-hand pane under Policy > Policy Elements > Results > Authorization>
Authorization Profiles.
b. Click Add from the right-hand pane and enter the values for the Authorization Profile as
shown below.
Name
Description
Access Type
DACL Name
c.
Employee
Full Access
ACCESS_ACCEPT
PERMIT_ALL_TRAFFIC
The resultant Attribute Details should appear at the bottom of the page as the following:
Step 7
AD Login
Allow machine to login to AD through dot1.x
ACCESS_ACCEPT
AD_LOGIN_ACCESS
The resultant Attribute Details should appear at the bottom of the page as the following:
Step 8
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 28 of 70
Lab Exercise 3.2: Define Authorization Policy for Client Provisioning and Posture Compliance
b. Update the existing Authorization Policy with the following values as highlighted using the
selector at the end of a rule entry to insert or duplicate rules above:
S
Rule Name
Groups
Other Conditions
Permissions
Domain Computer
Any
AD Login
Basic_Authenticated_Access Any
demoAD.local:ExternalGroups
EQUALS demo.local/Users/Domain Computers
demoAD.local:ExternalGroups
EQUALS demo.local/HCC/Groups/employees
AND
Session:PostureStatus EQUALS Compliant
demoAD.local:ExternalGroups
EQUALS demo.local/HCC/Groups/Employees
AND
Session:PostureStatus NOT EQUALS Compliant
Network_Access_Authentication_Passed
Employee Compliant
Any
Employee NonCompliant
Any
Default
DenyAccess
Any
c.
Employee
Posture Remediation
PermitAccess
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 29 of 70
Lab Exercise 3.3: Test and Monitor Client Provisioning Services for AnyConnect
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Login to the secured lab network from a Windows 7 PC client as an Employee via 802.1X
machine authentication and user authentication and verify NAC Agent provisioning.
Review ISE and switch logs to validate proper operation and application of the
Authorization Policy.
Step 2
Step 3
Validate the session status of the switchport authorization after Windows login (802.1X User
authentication):
a. At the W7PC-corp VM console, send Ctrl+Alt+del and login to Windows domain.
To login to a Windows VM, select Guest > Send Ctrl+Alt+del from the VM Console
menu:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 30 of 70
Lab Exercise 3.3: Test and Monitor Client Provisioning Services for AnyConnect
MAC Address:
IPv6 Address:
IPv4 Address:
User-Name:
Status:
Domain:
Oper host mode:
Oper control dir:
Session timeout:
Common Session ID:
Acct Session ID:
Handle:
Current Policy:
0050.5693.a76b
Unknown
10.1.10.201
DEMO\employee1
Authorized
DATA
multi-auth
both
N/A
0A0164010000001B0233334D
0x00000015
0x54000010
POLICY_Gi0/4
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
ACS ACL: xACSACLx-IP-POSTURE_REMEDIATION-5464abc7
URL Redirect: https://ise1.demo.local:8443/portal/gateway?sessionId=0A0164010000001B0233334D&portal=528d2310276c-11e4-9866-005056bf01c9&action=cpp&token=a654130b16dfa0bcc928d989f42226a8
URL Redirect ACL: ACL-AGENT-REDIRECT
Runnable methods list:
Method
mab
dot1x
State
Not run
Authc Success
Note:
If receiving [ 500 ] Internal Error, please clear auth session on the switch while the user logged-in and try
again. Defect: CSCup20844
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 31 of 70
Lab Exercise 3.3: Test and Monitor Client Provisioning Services for AnyConnect
After CPP takes ~ 10 seconds to detect any existing AnyConnect installation, it shows an
info page for the location to download and install AnyConnect.
d. Expand + This is my first time here and click the hyperlink and download AnyConnect
ISE Setup Assistant.
e. Double click to run the downloaded program. If prompted by Windows UAC, enter
credentials admin / ISEisC00L.
Note:
Admin privileges are required to install AnyConnect for the first time. Once installed, upgrades can occur
without escalated privileges. AnyConnect can also be distributed using an MSI installer package.
f.
AnyConnect ISE Network Setup Assistant window appears. Click Connect to start
running AnyConnect Downloader Click Yes to restart your computer now when
prompted.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 32 of 70
Lab Exercise 3.3: Test and Monitor Client Provisioning Services for AnyConnect
i.
Step 5
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 33 of 70
Lab Exercise 3.3: Test and Monitor Client Provisioning Services for AnyConnect
Security Policy:
Security Status:
Server Policies:
ACS ACL:
Should Secure
Link Unsecure
xACSACLx-IP-PERMIT_ALL_TRAFFIC-4478ace7
b. In the above output, note that the dACL (ACS ACL) = PERMIT_ALL_TRAFFIC has been
successfully downloaded to the interface to grant the compliant Employee full network
access.
Step 6
Verify the authentication/authorization phases of the 802.1X Auth and Client Provisioning from
the ISE admin interface.
a. Go to Operations > Authentications. View the recent entries associated with the
Employee session by MAC Address, IP address, Interface, or Session ID. It may be help
to filter the log entries by entering a couple bytes of the Session ID or MAC address
(Calling Station ID) into the appropriate column header and hitting Enter. Click the circled
x in the field to clear the filter.
b. Referring to the sample log below, you should see entries similar to the following that
match the output received from the switch, where 1 is the lowest or first entry:
1.
2.
3.
Successful 802.1X user authentication of the Domain User DEMO\employee1; Authorization Profile named
Posture_Remediation applied.
4.
5.
6.
7.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 34 of 70
8.
9.
Successful 802.1X user authentication of the Domain User employee1; Authorization Profile named
Posture_Remediation applied.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Lab Exercise 4.1: Configure Authorization Profiles for Guest Hotspot and Self Registration
Lab Exercise 4.2: Configure Policy Sets for Guest Authentication and Authorization
Lab Exercise 4.5: Configure Settings for Self-Registered with Sponsor Approval
Lab Exercise 4.6: Test Self Registration Portal with Approval Flow
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 35 of 70
Lab Exercise 4.1: Configure Authorization Profiles for Guest Hotspot and Self Registration
Exercise Objective
In this exercise, your goal is to complete the following task:
Step 1
Step 2
Step 3
* Name
Description
* Access Type
Common Tasks
Web Redirection
(CWA )
HotSpot Redirect
ACCESS_ACCEPT
Hot Spot
ACL: ACL-WEBAUTH-REDIRECT Value: Hotspot Guest Portal (default)
Note: The ACL is case-sensitive and should match exactly as defined in WLC.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 36 of 70
Lab Exercise 4.1: Configure Authorization Profiles for Guest Hotspot and Self Registration
b. Click Submit
Step 4
* Name
Description
* Access Type
Common Tasks
Web Redirection
(CWA )
Guest Redirect
ACCESS_ACCEPT
Centralized Web Auth
ACL: ACL-WEBAUTH-REDIRECT Value: Self-Registered Guest Portal (default)
Note: The ACL is case-sensitive and should match exactly as defined in WLC.
b. Click Submit
Step 5
Note: The ACL is case-sensitive and should match exactly as defined in WLC.
b. Click Submit
Note: You should have 3 new Authorization profiles after completing this task: HotSpot_Redirect, Guest_Redirect and GuestPermit
Authorization profiles for the basic portal setup has been completed. Lets now work with the Policy Sets.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 37 of 70
Lab Exercise 4.2: Configure Policy Sets for Guest Authentication and Authorization
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Step 1
c.
Click Edit on the far right to edit the Policy Name and Conditions
Attribute
Value
Name
Description
wirelessMAB
-
Select Attribute
d. Click Done
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 38 of 70
Lab Exercise 4.2: Configure Policy Sets for Guest Authentication and Authorization
j.
Click Done
k.
l.
Info for saving time: The following table and screenshot are how we are setting up the authorization policy for HotSpot and Guest
Access if you would like to attempt this without following the steps then please do, or continue on with the steps below the
screenshot. Remember after you enter your first rule above default you can use Duplicate above instead to save time. Dont forget
to click Save and then skip to Section 3.3.
Rule Name
Guest Internet Access
Guest Redirect
Identity Groups
Other Conditions
Any
Radius:Called-Station-ID ENDS_WITH guest
AND
NetworkAccess:UseCase EQUALS Guest Flow
Any
Radius:Called-Station-ID ENDS_WITH guest
Guest Permit
Hotspot Redirect
Any
HotSpot Redirect
Default
Any
DenyAccess
Step 2
Permissions
Guest Permit
Guest Redirect
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 39 of 70
Lab Exercise 4.2: Configure Policy Sets for Guest Authentication and Authorization
f.
g. Click Done
Step 3
Info for Saving time: Remember to use Duplicate above and then change what is needed instead of inserting new fresh policies
Attribute
Rule Name
Identity Group
Conditions
Permissions
Value
Hotspot Internet Access
b. Click Done
Step 4
Attribute
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Value
Page 40 of 70
Attribute
Rule Name
Identity Group
Conditions
Permissions
Value
Guest Redirect
Any
Create New Condition Select Attribute
Radius Called-Station-ID Ends with guest
Standard Guest Redirect
b. Click Done
Configure Authorization Policy for Guest Permit
a. Click arrow to the right of edit of GuestRedirect and duplicate above
Step 5
Attribute
Rule Name
Identity Group
Value
Guest Internet Access
Any
Create New Condition Select Attribute
Radius Called-Station-ID Ends with guest
Conditions
Permissions
b. Click done
Dont Forget to Click Submit
Hotspot and Guest Authentication/Authorization Setup has been completed. Lets now look at the Default Hotspot Portal.
The default settings are a good start. We will also go over some of the cool extras to go along with it.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 41 of 70
Step 2 Click on the Hotspot Guest Portal (default) and click Edit
Lets highlight some of the new settings that make hotspot operational. Note this is also known as DRW
(Device Registration Web Auth) and it is meant for simple registration of a device MAC address with a
splash page, optional AUP and other options.
Step 3 Navigate to the section under Portal Settings that shows the Endpoint Identity Groups and
Purging.
Step 4 Look at the following settings, Guest Endpoint and Purging, leave these default.
GuestEndpoints:
This Hotspot configuration by default will automatically take the MAC address from the MAB (MAC
authentication bypass) and place it into GuestEndpoints group. Remember in our authorization policy
that we based GuestInternet Access off GuestEndpoints as an identifier. This group could be changed so
that you have different Endpoint groups for different portals or types of access. Its also available in the
self registered and sponsor portal types. Dont change this group.
Purging:
Next notice the new purge policy. This will remove the device after it has been in the endpoint group for
30 days. The purge runs daily. This setting can be set as low as 1 day. There is no way to set it lower as
the purge runs as a process 1x a day. In ISE 1.2, DRW, required the endpoints to be manually purged
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 42 of 70
from the database when you wanted to remove access. There is a link to advanced purge policies where
you can purge
Step 5 Click on the little arrow next to Portal Settings to collapse this section.
Step 6 Under the Acceptable Use Policy (AUP) Page Settings notice Include an AUP is already
enabled - An AUP is not necessary but likely a customer would want one.
Step 7 Check the box to enter an access code of iseiscool An access code is used to protect the open
SSID from those outside of your business from getting Internet access. This can also be
configured for self registration and sponsor approval flows
Step 8 Notice on the right side of the screen the flow chart in real-time, if you change/add/remove a
component you see the changes immediately. Try toggling the checkbox Include An AUP off and
on and notice the difference
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 43 of 70
A new option in ISE 1.3 is the option to customize where the user is sent for a success. Configure
success page redirection to a static URL
Step 9 Scroll down to the section that says Authentication Success Settings
Step 10 Enter URL: http://www.cisco.com
ISE 1.3 gives you basic customization built right into the product. It also makes it easier to
see what changes you are making in real-time. We wont go into detail of all of these but to
start you notice at the top of the page you can change things like the logos, banner and main
text elements. You can also choose from some built in color themes.
Step 13 Lets start by messing with the portal theme. Click on the pull down and pick the High Contrast
Theme. Notice how the Preview window in the bottom right of the screen shows the changes.
Step 14 Now click on the Tweaks button to see how you change the
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 44 of 70
Step 18 Check Save File and Click OK the file will be saved to C:\Users\admin\Downloads
Step 19 Click on the download arrow in the upper right of firefox to open the location it downloaded
Step 20 Right click on the package and choose the option to Extract All
Step 21 Use the default location C:\Users\admin\Downloads\iseiscool-images
Step 22 Click Next and OK to close window, close all tabs and explorer windows for the download
process
Step 23 Go back to ISE tab in Firefox
Step 24 Upload the banner and logo for mobile (iseiscool_logo_hotspot.png & iseiscool-banner.png) from
Step 25 Remove the text for Banner title as it Is part of the logo (you may need to click in another place on
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 45 of 70
Step 26 Below this main section where you can tweak the overall look and feel, you can also go into each
of the pages. Depending on your portal settings and portal type you will see different options on
the left hand side of the page. You can also tweak the text in the different areas on the page.
Step 27 After some basic customization is done check out the desktop preview (same as the portal test
URL at the top of the page) by clicking on the option in the bottom right of the mini preview.
Note:
You have now completed setup of the Hotspot Portal. Next step is to try it out.
Exercise Objective
In this exercise, your goal is to complete the following task(s):
Step 1
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 46 of 70
Select WLAN ID 1 ##-ISECOLD, Disable Selected from the drop-down next to Go, and
hit Go.
d. Select WLAN ID 2 ##-hotspot, Enable Selected from the drop-down next to Go, and hit
Go.
Step 2
Remove the iPad from ISE internal endpoints (as we registered it during the BYOD lab 2 and it
needs to be removed for this lab)
On ISE GUI go to Administration > Identity Management > Identities > endpoints
Step 4
Step 5
From the workstation double click on the icon VNC-to-iPad on the desktop and press any key
to continue. The IPad screen will launch
If not already on the home screen, right click on the screen
Go to settings Wi-Fi
If Wi-Fi is disabled then turn it on and skip past the clean-up steps
b. Next on the iPad, go to Settings > Safari and hit Clear History as well as Clear
Cookies and Data.
c. Forget any networks the device is automatically connecting to
d. Disable the Wi-Fi
e. On the Windows workstation, navigate to Admin Identity Management Identities
Endpoints and delete the iPad, you can delete anything in the list as there should only be
your iPad connected
f. Launch Firefox, go to vwlc, and login.
g. On the vWLC click on Monitor then Clients on the left side bar
h. Find your wireless session (there should only be one), click on the MAC address and
then click Remove in the upper right of the window
i. Go back to the iPad and enable the Wi-Fi
On the iPad from the list of wireless networks find the one that shows XX-hotspot, click to
connect to this
Step 7
Once youre connected to the hotspot (shows in the upper left of the iPad screen). Right click on
the iPad screen to show the home screen and then launch Safari.
Step 8
Using safari enter a site to visit, cnn.com, you will be redirected to the hotspot portal
Step 9
Enter the passcode iseiscool and click accept
Step 10 You are redirected to a success page and then can choose your original site.
Step 11 Enter cnn.com
Step 12 Navigate to Operation Authentications and look at the sessions that came through.
Step 6
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 47 of 70
Lab Exercise 4.5: Configure Settings for Self-Registration with sponsor approval flow
a. When you first come in MAB from hotspot SSID redirects to hotspot
b. After AUP acceptance, the device is authorized by GuestEndpoints Group on a separate
line.
Step 13 Cleanup the iPad connection before continuing on with self-registration
a. Close the browser tab on the iPad
b. Right click to go to home screen
c. Forget the hotspot network on the iPad, make sure its not connecting to another network,
if it is also forget such network.
d. Turn Wi-Fi off
e. Navigate to Admin Identity Management Identities Endpoints and delete the
iPad, you can delete anything in the list as there should only be your iPad connected
HOTSPOT COMPLETE! You have now completed setup and testing of the Hotspot Portal. Next lets look into
Self-Registration with Sponsor Approval
Lab Exercise 4.5: Configure Settings for SelfRegistration with sponsor approval flow
Exercise Description
In this Exercise you will configure the minimum settings to allow you to use the self-registered
flow with sponsor approval
Exercise Objective
In this exercise, your goal is to complete the following tasks:
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 48 of 70
Lab Exercise 4.5: Configure Settings for Self-Registration with sponsor approval flow
a.
b.
c.
d.
e.
f.
g.
h.
i.
Important Info: This setting is needed as the default comes as San Jose, the workstation is using time zone as UTC so we need to
add in a location of UTC for it to create an account with a valid start time. This is instead of having to choose from a LONG list of
time zones as in prior ISE releases
j.
k.
l.
Note:
If you see a UI WAP Error please log out of ISE and log back in
Step 2 (Use Internet Explorer if Firefox doesnt work) Setup AD sponsor group in All_Accounts
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 49 of 70
Lab Exercise 4.5: Configure Settings for Self-Registration with sponsor approval flow
d. Click OK
Note: If those steps dont work with Firefox: use Internet Explorer
Step 3 (Use Internet Explorer if Firefox doesnt work) Configure Guest Locations for this sponsor
a. Under Select the locations that guests will be visiting Choose UTC
Critical Info: Its important to setup the location where your user(s) are located, otherwise when the account is created it will be
using San Jose by default but the browser of the sponsor (workstation) is set to use UTC time. The account wont be active until
many hours later since it was created using SJC time. This is critical when setting up guest to create the locations your sponsors
will be using for visiting guests. Our admin machine is in UTC time so the guest accounts needs to be created per UTC time in order
for the account to be active
If you have trouble viewing this try setting it using Internet Explorer or log-out and then log back in.
Step 4 (Use Internet Explorer if Firefox doesnt work) Allow the Sponsor to send SMS (text messages)
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 50 of 70
Lab Exercise 4.5: Configure Settings for Self-Registration with sponsor approval flow
Step 13 Check the box to the right of Person being visited so that the field is required when doing self-
registration. This will require a guest to enter an email address of employee they are visiting.
Info only: There is currently no way in ISE to verify the person being visited email or name. This could be done with advanced
customization by integrating with an external LDAP for the lookups.
Info only: If choosing sponsor email addresses listed below, it could be the email of a sponsor or a group of sponsors
Step 15 After registration submission, direct guest to - Login page with instructions about how to
Step 16 Check both Email and SMS notifications are checked under Send credential notification upon
approval using:
Important Info: This could also be the email of a sponsor or a group of sponsors System behavior for email and SMS notifications:
There is no way to currently give a guest the ability to choose email or SMS as an option to choose for notification. If you check both
then they will both be required. If you choose Email then the guest will be required to enter an email address and only email
notification will work (even though the user enters their phone number). The same will hold true if you check SMS, they must enter a
phone number and email notification wont work even though they entered an email. For this demo we are showcasing both.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 51 of 70
Lab Exercise 4.6: Test the self registration with approval flow
You have now completed setup of Self-registration with sponsor approval setup
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Create an account
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 52 of 70
Lab Exercise 4.6: Test the self registration with approval flow
Step 1
Select WLAN ID 2 ##-hotspot, Disable Selected from the drop-down next to Go, and hit
Go.
d. Select WLAN ID 3 ##-guest, Enable Selected from the drop-down next to Go, and hit Go.
Step 2
Step 3
Step 4
Step 5
From the workstation double click on the icon VNC-to-iPad on the desktop and press any key
to continue. The IPad screen will launch
If not already on the home screen, right click on the screen
Go to Settings Wi-Fi
If Wi-Fi is disabled then turn it on and skip pass the clean up steps below
Here are the steps to start with new session on iPad (clean-up)
a. On the iPad, navigate to Settings > General > Profiles. Remove any existing profiles, if
present.
Note: You might not see the Profiles menu option, when no profile installed on the iPad.
b. Next on the iPad, go to Settings > Safari and hit Clear History as well as Clear
Cookies and Data.
c. Forget any networks the device is automatically connecting to
d. Disable the Wi-Fi
e. On the Windows workstation, navigate to Admin Identity Management Identities
Endpoints and delete the iPad, you can delete anything in the list as there should only be
your iPad connected
f. Launch Firefox, go to vwlc, and login.
g. On the vWLC click on Monitor then Clients on the left side bar
h. Find your wireless session (there should only be one), click on the MAC address and
then click Remove in the upper right of the window
i. Go back to the iPad and enable the Wi-Fi
Step 6
Step 7
Step 8
On the iPad from the list of wireless networks find the one that shows XX-guest, click to connect
to this
Once youre connected to the hotspot (shows in the upper left of the iPad screen). Right click on
the iPad screen to show the desktop and then launch Safari.
Using safari enter a site to visit, cnn.com, you will be redirected to the guest portal
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 53 of 70
Lab Exercise 4.6: Test the self registration with approval flow
Step 9
Step 10
Create a guest account using the following info (at a minimum these are basic to show the flow):
Attribute
Username
Value
iseiscool
Email address*
guest@demo.local
Phone number*
12025550133
Description
(new) This could be anything the user chooses.
To receive email notification of credentials once
account is approved, this must be entered as it is.
Location*
UTC
Person being
visited(email)*
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 54 of 70
Lab Exercise 4.6: Test the self registration with approval flow
Step 11
Click Register
Defect Note: A message will be shown: Youre notified you will be sent the credentials via email and text. There is a bug currently
that says instead you have been sent credentials when youre waiting for credentials
Step 12
You are redirected to the login page with instructions on how to connect. This message as
customized says once approved you will be sent the credentials.
Step 13
Step 14
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 55 of 70
Lab Exercise 4.6: Test the self registration with approval flow
Step 15
Info only: The email says there is a guest approval request. This can be customized (changing logo, text, color, font with HTML).
You can also add a message that will link directly to the sponsor portal for easy access to the person approving the request.
Step 16
Sign-out of the webmail client, you will need to later login as another user.
In absence of a hyperlink to the sponsor portal, on the Firefox browser, click on the sponsor
shortcut to sponsor.demo.local
Step 18 Login to the sponsor portal as sponsor/ISEisC00L
Step 17
Step 19
Navigate to Pending
accounts
Step 20
Step 21
Info only: This is the only way to set the sponsors email address in the system. This email is used to receive a copy of the requests
when notifying a user of their credentials. It will be saved the first time its entered. The employ (person visiting) would enter their
email address here.
Step 22
Step 23
Step 24
Step 25
Step 26
Step 27
Step 28
Step 29
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 56 of 70
a. When you first come in MAB with SSID of guest is redirected to self registration portal
b. After login you are authorized on Guest Flow to Permit Access
Warning: If you see a message, Maximum Devices Reached, then please follow the steps below to clean up the iPad connection,
this was caused because the endpoint is already in the store after BYOD and you didnt delete it after you ran through the hotspot.
Step 30
Note: If you ran through the cleanup after getting the Maximum device limit reached then you can do the following to try it again.
1. Enable WIFI
2. Open Safari and try to get to cnn.com
3. Enter the necessary credentials to login again
You have now completed setup of Self-registration with sponsor approval flow
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 57 of 70
Exercise Objective
In this exercise, your goal is to complete the following tasks:
creating an account:
a. Expand Custom Fields
b. Enter the following information per table clicking Add after each entry:
Custom Field Name Data type Tip text
Badge #
Number
Enter Badge #
Manager
String
Enter Manager
c.
Step 4 Setup a Guest SSID variable used for information purposes when notifying guests on what
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 58 of 70
b.
c.
Employees using this portal as guests inherit login options from: We will use the
default, Contractor
Step 8 Collapse all setting areas under you get to Post-Login Banner page
Step 9 Under Post-login banner page settings uncheck Include a Post-Login Banner page.
Note: This will remove one of the pages that the user is required to click through, it could be used to post
coupons, advertisements, announcements, etc so that there is a screen available before redirecting to
an Original URL or static page, otherwise this can be done on the success page
Step 10 Click Save at the top of the page
Note: There really isnt much to a Sponsored Guest portal, thats it, with a tweak to make the flow shorter. You can
customize this portal just like any other Guest Portal with same customization and branding.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 59 of 70
Note:
Guest Types are used with the credentialed guest portals such as Self-Registration and Sponsored. Under
self-registration with sponsor approval we used the default Contractor type that allows access for 90 days by
default. For Self-Registration without approval a nice default is Daily guest type as it only has 1-day access.
For sponsored we will look at the Contractor type options.
b.
c.
Click OK
Set all of these to be required, we will use them later when creating an account and
see how they are reported
Step 14 Navigate to Login Options section and look at some of these settings, these are new or
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 60 of 70
login or AUP portal and can be used with more secure options (802.1X and VPN
access)
Step 15 Lastly lets look at Sponsor Groups. This is basic but a new way of working with groups, if
you are a sponsor and part of any of these groups then you can use this Guest Type
Step 16 At the top of the Contractor Guest Type Page, click Save and Close
Up until this point you have been working with the Guest Portals. The Sponsor Portals are configurable the same
way. Settings and Customization are the same and allow for a consistent experience. Here to save time and since
you already went through basic customization we will setup only what is needed (and a few nice options) to make this
flow work
Step 18 Under portal settings lets look at a few options
a. Certificates (NEW FEATURE IN 1.3) each portal can have its own certificate, the
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 61 of 70
b.
Note:
FQDN (ENHANCED IN 1.3) In ISE 1.2 you could put in the FQDN or hostname of
your sponsor portal so you can access with sponsor or sponsor.demo.local, in ISE
1.3 it has been enhanced to allow both options. You can also have multiple sponsor
portals access using different names for different business entities and customized
with its own branding. Example: city fire dept vs. city police dept
NOTE : In this lab you may try to access using just sponsor in the address bar but make sure your Firefox proxy
settings are setup with no proxy for sponsor if you would like to try it out. Otherwise the bookmark in firefox or going
to sponsor.demo.local will work fine.
c.
SSIDs available to sponsors: (NEW IN 1.3) This gives the sponsor the ability to
choose from a list of guest networks a user would connect to. This field is used in
notifications to those guests when notified via email/sms/print. Will show this used
later on. Choose the SSID you configured before, example 02-guest
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 62 of 70
o
o
o
Note:
Company
Person Being Visited
Reason for Visit
The Custom Fields already associated with this guest type. Please do not
select again here.
c.
Note:
variable
In the email introduction text editor insert text on the second line:
Welcome to the ISE training lab, the wireless network you will connect to is:
$ui_ssid$
Click on insert variable SSID
The variable icon X could be blocked by the preview pane if your browser screen is not wide enough.
Step 25 Click on SMS notification
a. Put in the following message: Please connect to the network: $ui_ssid$
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 63 of 70
Exercise Objective
In this exercise, your goal is to complete the following tasks:
The managed account option is a quick easy way to see all the accounts and perform
Sponsor Actions. The admin account is auto-authenticated and not part of any Sponsor
Group. It has permissions to do everything and see everything, accept if the guest changes
their password they wont be able to see it (just like any other sponsor). If the Sponsor
Portal Session terminates for any reason, the admin will have to go back to the Admin UI to
get back in or login with a valid Sponsor Account. Their admin creds will not get them back
in unless it is part of a sponsor group. This was just a preview and we will be using the
sponsor portal to do our work.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 64 of 70
Attribute
First Name &
Last Name
Value
Your first and last
name
Email address
guest@demo.local
Phone number
Description
Please enter your first and last name
Mandatory: To receive email notification of
credentials, guest@demo.local
12025550133
12025550133
Badge #
Manager
Group tag
EBC
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 65 of 70
Copy ME checkbox)
Step 9 Enter the email address of the sponsor, sponsor@demo.local
Note:
This is the ONLY way a sponsor can add or change their email address to receive notifications for sponsor approval
or to be copied on a guests credentials when being created
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 66 of 70
SMS receipt: If you put in your cell phone number you should see a text with all the info
(including the SSID to connect to)
b.
Email receipt:
i. In Firefox open a new browser tab and click on the mail bookmark
ii. Login as guest / ISEisC00L
iii. Notice the customized test also shown here for the SSID variable
Note:
We wont be logging into the portal you created, as you are familiar with how this works after using the Self
Registration Portal Flow. The only difference with this flow is that youre using credentials created by a Sponsor. This
lab was to show you the needed pieces to get this particular flow configured and working.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 67 of 70
Exercise Objective
In this exercise, your goal is to complete the following tasks:
There are several options for reports, click through each of them to understand what they are used for
and run the report to see the results if you like:
AUP Acceptance Status shows you information on what devices and/or users accepted AUPs
on what portals, this is an AUP for all guest portals (including Sponsor)
Sponsor Login and Audit shows sponsor activity such as logins and anything the added or
modified for guest accounts
Lets modify the columns seen so that we can work with the Optional
Data Field:
Step 4 Setup per the screenshot below:
a.
b.
c.
d.
Now click on the optional data and see it expanded in a larger box
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 68 of 70
e.
f.
I messed with the account a few times so there are multiple entries shown in my
example:
My Devices Login and Audit for BYOD devices shows user activity in the My Devices
portal
Master Guest Report - The Master Guest report combines data from various Guest Access
reports into a single view enabling you to export data from different reporting sources. This
report collects all guest activity and provides details about the web sites that guest users visit.
In this setup we dont track what sites the user is going to however here is a sample. There
are requirements for the firewall to send syslog information to ISE M&T node for inclusion in
this report, please refer to the product documentation for more information.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 69 of 70
Guest Accounting - The Guest Accounting report is a subset of the RADIUS Accounting
report. All users assigned to Guest identity groups appear in this report
End of Lab: Congratulations! You have successfully completed the lab. Please let your
proctor know you finished and provide any feedback to help improve the lab experience.
ISE_1.3_PVT_Lab_Guide_2014-11-14.docx
Page 70 of 70