Cisco ISE Configuration For Switches
Cisco ISE Configuration For Switches
To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are
successful across the network segment, you need to configure network switches with the necessary NTP,
RADIUS/AAA, 802.1X, MAB, and other settings for communication with Cisco ISE. This appendix
contains the following sections:
Enable Your Switch to Support Standard Web Authentication, page F-2
Define a Local Username and Password for Synthetic RADIUS Transactions, page F-2
Set the NTP Server to Ensure Accurate Log and Accounting Timestamps, page F-2
Enable AAA Functions, page F-3
Configure a RADIUS Server, page F-3
Configure the Switch to Send RADIUS Accounting Start/Stop to Inline Posture Nodes, page F-4
Enable RADIUS Change of Authorization (CoA), page F-4
Enable Device Tracking and DHCP Snooping, page F-4
Enable 802.1X Port-Based Authentication, page F-4
Use EAP for Critical Authentications, page F-5
Throttle AAA Requests Using Recovery Delay, page F-5
Define VLANs Based on Enforcement States, page F-5
Define Local (Default) ACLs on the Switch, page F-5
Enable Cisco Security Group Access Switch Ports, page F-6
Enable EPM Logging, page F-8
Enable SNMP Traps, page F-8
Enable SNMP v3 Query for Profiling, page F-8
Enable MAC Notification Traps for Profiler to Collect, page F-9
Configure the RADIUS Idle-Timeout, page F-9
Set Up the Wireless LAN Controller for iOS Supplicant Provisioning, page F-9
Configure the Wireless LAN Controller to Support Apple Devices, page F-9
Configure ACLs on the Wireless LAN Controller for MDM Interoperability, page F-10
Note We recommend that you configure a dead-criteria time of 30 seconds with 3 retries to provide longer
response times for RADIUS requests that use Active Directory for authentication.
Note Cisco ISE uses port 1700 (Cisco IOS software default) versus RFC default port 3799 for CoA. Existing
Cisco Secure ACS 5.x customers may already have this set to port 3799 if they are using CoA as part of
an existing ACS implementation.
In RADIUS Accounting, the DHCP attributes are not sent by IOS sensor to Cisco ISE even when dhcp
snooping is enabled. In such cases, the dhcp snooping should be enabled on the VLAN to make the
DHCP active.
Use the following commands to enable dhcp snooping on VLAN:
ip dhcp snooping
ip dhcp snooping vlan 1-100
(VLAN range should include used for data and vlan)
Note The first IP helper goes to the DHCP server and the second IP helper sends a copy of the DHCP request
to the inline posture node for profiling.
vlan <VLAN_number>
name ACCESS
!
vlan <VLAN_number>
name VOICE
!
interface <VLAN_number>
description ACCESS
ip address 10.1.2.3 255.255.255.0
ip helper-address <DHCP_Server_IP_address>
ip helper-address <Cisco_ISE_IP_address>
!
interface <VLAN_number>
description VOICE
ip address 10.2.3.4 255.255.255.0
ip helper-address <DHCP_Server_IP_address>
ip helper-address <Cisco_ISE_IP_address>
!
ip access-list extended ACL-DEFAULT
remark DHCP
permit udp any eq bootpc any eq bootps
remark DNS
permit udp any any eq domain
remark Ping
permit icmp any any
remark Ping
permit icmp any any
remark PXE / TFTP
permit udp any any eq tftp
remark Allow HTTP/S to ISE and WebAuth portal
permit tcp any host <Cisco_ISE_IP_address> eq www
permit tcp any host <Cisco_ISE_IP_address> eq 443
permit tcp any host <Cisco_ISE_IP_address> eq 8443
permit tcp any host <Cisco_ISE_IP_address> eq 8905
permit udp any host <Cisco_ISE_IP_address> eq 8905
permit udp any host <Cisco_ISE_IP_address> eq 8906
permit tcp any host <Cisco_ISE_IP_address> eq 8080
permit udp any host <Cisco_ISE_IP_address> eq 9996
remark Drop all the rest
deny ip any any log
!
! The ACL to allow URL-redirection for WebAuth
ip access-list extended ACL-WEBAUTH-REDIRECT
deny ip any host <Cisco_ISE_IP_address>
permit tcp any any eq www
permit tcp any any eq 443
permit tcp any any eq 8443
Step 1 Enter configuration mode for all of the access switch ports:
interface range FastEthernet0/1-8
Step 2 Enable the switch ports for access mode (instead of trunk mode):
switchport mode access
Step 3 Statically configure the access VLAN. This provides local provisioning the access VLANs and is
required for open-mode authentication:
switchport access <VLAN_number>
Step 5 Enable open-mode authentication. Open-mode allows traffic to be bridged onto the data and voice
VLANs before authentication is completed. We strongly recommend using a port-based ACL in a
production environment to prevent unauthorized access.
! Enables pre-auth access before AAA response; subject to port ACL
authentication open
Step 6 Apply a port-based ACL to determine which traffic should be bridged by default from unauthenticated
endpoints onto the access VLAN. Because you should allow all access first and enforce policy later, you
should apply ACL-ALLOW to permit all traffic through the switch port. You have already created a
default ISE authorization to allow all traffic for now because we want complete visibility and do not want
to impact the existing end-user experience yet.
! An ACL must be configured to prepend dACLs from AAA server.
ip access-group ACL-ALLOW in
Note Prior to Cisco IOS software Release 12.2(55)SE on DSBU switches, a port ACL is required for
dynamic ACLs from a RADIUS AAA server to be applied. Failure to have a default ACL will
result in assigned dACLs being ignored by the switch. With Cisco IOS software
Release12.2(55)SE, a default ACL will be automatically generated and applied.
Note We are using ACL-ALLOW at this point in the lab because we want to enable 802.1X port-based
authentication, but without any impact to the existing network. In a later exercise, we will apply
a different ACL-DEFAULT, which blocks undesired traffic for a production environment.
Step 7 Enable Multi-Auth host mode. Multi-Auth is essentially a superset of Multi-Domain Authentication
(MDA). MDA only allows a single endpoint in the data domain. When multi-auth is configured, a single
authenticated phone is allowed in the voice domain (as with MDA) but an unlimited number of data
devices can be authenticated in the data domain.
! Allow voice + multiple endpoints on same physical access port
authentication host-mode multi-auth
Note Multiple data devices (whether virtualized devices or physical devices connected to a hub)
behind an IP phone can exacerbate the access ports physical link-state awareness.
Note The dot1x tx-period timeout should be set to 10 seconds. Do not change this unless you
understand the implications.
Note The snmp-server group <group> v3 priv context vlan-1 command must be configured for each context.
The snmp show context command lists all the context information.
If the SNMP Request times out and there is no connectivity issue, then you can increase the Timeout
value.
where inactivity is interval of inactivity in seconds, after which client activity is considered
unauthorized.
In Cisco ISE, you can enable this option for any Authorization Policies to which such a session inactivity
timer should apply from Policy > Policy Elements > Results > Authorization > Authorization
Profiles. For more information on creating Authorization Policies, see Permissions for Authorization
Profiles, page 21-10.
Figure F-1 shows the ACLs for redirecting a nonregistered device to the BYOD flow. In this example,
the Cisco ISE ip address is 10.35.50.165, the internal corporate network ip address is 192.168.0.0 and
172.16.0.0 (to redirect), and the MDM server subnet is 204.8.168.0.