Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 SECURE ACCESS HOW-TO GUIDES Table of Contents 3850 Switch Wireless Configuration ............................................................................................................................. 3 Overall Design............................................................................................................................................ 3 3850 Switch Wireless Configuration Steps................................................................................................. 4 Validate licensing ................................................................................................................................. 5 Configure the HTTP Server on the Switch ................................................................................................. 6 Configure the Global AAA Commands ....................................................................................................... 6 Configure the Global RADIUS Commands................................................................................................. 7 Configure VLANs and SVIs. ....................................................................................................................... 9 Configure DHCP Snooping (Optional) ........................................................................................................ 9 Configure Local Access Control Lists ....................................................................................................... 10 Configure the Global 802.1X Commands ................................................................................................. 10 Configure the Global Wireless feature ..................................................................................................... 11 Configure WLANs .................................................................................................................................... 12 Configure Interfaces for Wireless APs ..................................................................................................... 14 Create Identity Sequence ......................................................................................................................... 19 Enable policy Set ..................................................................................................................................... 19 Configure Policy ....................................................................................................................................... 21 ISE Configuration - Suppressing RADIUS test messages ......................................................................................... 23 Configure ISE to suppress RADIUS test messages ................................................................................. 23 Cisco Systems © 2015 Page 2 SECURE ACCESS HOW-TO GUIDES 3850 Switch Wireless Configuration The Cisco Catalyst 3850 is the first stackable access-switching platform that enables wired plus wireless services on a single Cisco IOS XE Software-based platform. It provides a host of rich capabilities such as high availability based on state-ful switchover (SSO) on stacking, granular QoS, security, and Flexible Netflow (FNF) across wired and wireless in a seamless fashion. Also, the wired plus wireless features are bundled into a single Cisco IOS Software image, which reduces the number of software images that users have to qualify/certify before enabling them in their network. The single console port for command-line interface (CLI) management reduces the number of touch points to manage for wired plus wireless services, thereby reducing network complexity, simplifying network operations, and lowering the TCO to manage the infrastructure. Converged wired plus wireless not only improves wireless bandwidth across the network but also the scale of wireless deployment. Each 48-port Cisco Catalyst 3850 provides 40 Gbps of wireless throughput (20 Gbps on the 24-port model). This wireless capacity increases with the number of members in the stack. This makes sure that the network can scale with current wireless bandwidth requirements, as dictated by IEEE 802.11n-based access points and with future wireless standards such as IEEE 802.11ac. Additionally, the Cisco Catalyst 3850 distributes the wireless controller functions to achieve better scalability. Each Cisco Catalyst 3850 switch/stack can operate as the wireless controller in two modes: Mobility agent (MA): This is the default mode in which the Cisco Catalyst 3850 switch ships. In this mode the switch is capable of terminating the CAPWAP tunnels from the access points and providing wireless connectivity to wireless clients. Maintaining wireless client databases and configuring and enforcing security and QoS policies for wireless clients and access points can be enforced in this mode. No additional license on top of IP Base is required to operate in the mobility agent mode. Mobility controller (MC): In this mode, the Cisco Catalyst 3850 switch can perform all the mobility agent tasks in addition to mobility coordination, radio resource management (RRM), and Cisco CleanAir® coordination within a mobility subdomain. The mobility controller mode can be enabled on the switch CLI. IP Base license level is required when the Cisco Catalyst 3850 switch is acting as the mobility controller. A centrally located Cisco 5508 Wireless LAN Controller (WLC 5508), Cisco Wireless Services Module 2 (WiSM2) (when running AireOS Version 7.3), and Wireless LAN Controller 5760 can also perform this role for larger deployments. Overall Design Following diagram shows the overall layout of the components. There are two Service Set IDentifiers (SSIDs), one secured with WPA2 (Wi-Fi Protected Access V2) + 802.1x and another Open + Central Web Authentication (CWA). Although we won't go into the details of different Bring Your Own Device (BYOD) policies or posture policies within Cisco Identity Services Engine (ISE), this setup will provide a baseline for such operations. This document will only cover the baseline configurations on 3850 switches for wireless configuration, for deploying 3850 on wired network or other ISE configurations please refer to respective ISE How-to documents. Cisco Systems © 2015 Page 3 SECURE ACCESS HOW-TO GUIDES Figure 1. Components used: Cisco ISE 1.2.0.899 Cisco 3850 running IOS-XE version 03.02.02.SE Cisco LWAP 3602 Microsoft Windows 2008 as AD/DNS/DHCP server Few notes about NGWC wireless functions: Wireless management interface has to be same as AP access VLAN, APs in FlexConnect mode is not supported in this layout Client idle timeout is global setting (As opposed to latest AireOS) AP needs to be directly connected to 3850 switch No need for legacy discovery method for AP using DHCP option 43 or DNS entry, with CAPWAP snooping all directly connected AP can join the 3850 if they are configured with correct VLAN. Due to CAPWAP snooping, if wireless management interface is configured on 3850 all directly connected APs can only talk to 3850 Support for https redirect, however, user will be required to trust the certificate of 3850 https before continuing to login page With IOS-XE version 03.02.02.SE, the 3850 switch provides some functions of GUI based wireless configuration Note: Cisco 3850 can act as Mobility Agent (MA) mode or Mobility Controller (MC) mode. Every mobility deployment requires at least one MC and since our design consists of one 3850 switch, we will be configuring the switch as MC mode. 3850 Switch Wireless Configuration Steps The Cisco 3850 is a Unified Access platform that provides convergence of the wired and wireless networks into one physical infrastructure. This configuration example shows how to integrate Cisco 3850 switches for wireless authentication with ISE to provide basis for advanced identity functionality such as BYOD and Posture assessment. The example provided in this document will primarily focus on command line interface on the 3850 for wireless configuration. Cisco Systems © 2015 Page 4 SECURE ACCESS HOW-TO GUIDES Note: With Version 03.02.02.SE, Cisco introduces GUI access to wireless configuration on the 3850. However, many part of the configuration still relies on CLI. For this document, only CLI configuration will be covered. Validate licensing 3850 comes with Right-To-Use (RTU) license scheme. RTU licensing allows one to order and activate a specific license type and level, and to manage license usage on the switch. To activate a license, one is required to accept the End-User License Agreement (EULA). For the evaluation license, one is notified to purchase a permanent license or deactivate the license before the 90-day period expires. Before one can enable wireless function on the 3850 switch, one needs to be running either ipbase or ipservices feature pack and RTU license present and have accepted EULA. The RTU also governs number of AP count in case the switch is acting as Mobility Controller (MC). Note: Prerequisite configuration: This guide assumes that the switches have the required licenses and following step will focus on validation of RTU license on the platform. Step 1 Step 2 Validate RTU licenses are in place. Run following show command to view what licenses are available and in use: 3850#show license right-to-use summary Sample output 3850#show license right-to-use summary License Name Type Count Period left ----------------------------------------------ipservices permanent N/A Lifetime apcount base 0 Lifetime apcount adder 10 Lifetime -------------------------------------------License Level In Use: ipservices License Level on Reboot: ipservices Evaluation AP-Count: Disabled Total AP Count Licenses: 10 AP Count Licenses In-use: 4 AP Count Licenses Remaining: 6 3850# Step 1 Activate feature set that supports wireless controller functionality and also activate AP count RTU as well: 3850#license right-to-use activate ipservices slot 1 acceptEULA 3850#license right-to-use activate apcount 10 slot 1 acceptEULA Cisco Systems © 2015 Page 5 SECURE ACCESS HOW-TO GUIDES Note: Activating AP count RTU may require to have mobility controller feature enabled first Configure the HTTP Server on the Switch Step 1 Step 2 Set the DNS domain name on the switch. Cisco IOS® Software does not allow for certificates, or even selfgenerated keys, to be created and installed without first defining a DNS domain name on the device. Enter the following: 3850(config)#ip domain-name example.com Step 3 Generate keys to be used for HTTPS by entering the following: 3850(config)#crypto key generate rsa general-keys modulus 2048 Note: To avoid possible certificate mismatch errors during web redirection, we recommend that you use a certificate that is issued by your trusted certificate authority instead of a local certificate. This topic is beyond the scope of this document. Step 4 Enable the HTTP servers on the switch. The HTTP server must be enabled on the switch to perform the HTTP / HTTPS capture and redirection. Enter the following: 3850(config)#ip http server 3850(config)#ip http secure-server Note: Do not run the ip http secure-server command prior to generating the keys in step 2. If you perform the commands out of order, the switch will automatically generate a certificate with a smaller key size. This certificate can cause undesirable behaviour when redirecting HTTPS traffic. Unlike WLC with AireOS, 3850 Series wireless supports redirection of HTTPS request, however, endpoints will be prompted to trust the switch’s self-signed certificate during the redirection. Step 5 Disable HTTP & HTTPS for other switch management functions (Optional): 3850(config)#ip http active-session-modules none 3850(config)#ip http secure-active-session-modules none Note: This will disable management access to the 3850 wireless configuration as well as configuration from NCS Prime Infrastructure Configure the Global AAA Commands Step 1 Enable authentication, authorization, and accounting (AAA) on the access switches. By default, the AAA “subsystem” of the Cisco switch is disabled. Prior to enabling the AAA subsystem, none of the required commands will be available in the configuration. Enter the following: Cisco Systems © 2015 Page 6 SECURE ACCESS HOW-TO GUIDES 3850(config)#aaa new-model 3850(config)#aaa session-id common Note: This command enables any of the services that AAA network security services provide—for example, local login authentication and authorization, defining and applying method lists, and so on. For further details, please refer to the Cisco IOS Security Configuration Guide. Step 2 Create an authentication method for 802.1X. An authentication method is required to instruct the switch on which group of RADIUS servers to use for 802.1X authentication requests: 3850(config)#aaa authentication dot1x default group radius Step 3 Create an authorization method for 802.1X. The method created in step 2 will enable the user/device identity (username/password or certificate) to be validated by the RADIUS server. However, simply having valid credentials is not enough. There must be an authorization as well. The authorization is what defines that the user or device is actually allowed to access the network, and what level of access is actually permitted. 3850(config)#aaa authorization network default group radius Step 4 Create an accounting method for 802.1X. RADIUS accounting packets are extremely useful and are required for many ISE functions. These types of packets will help ensure that the RADIUS server (Cisco ISE) knows the exact state of the interface and endpoint. Without the accounting packets, Cisco ISE would have knowledge only of the authentication and authorization communication. Accounting packets provide information on length of the authorized session, as well as bandwidth usage of the client. 3850(config)#aaa accounting dot1x default start-stop group radius Step 5 Configure periodic RADIUS accounting update. Periodic RADIUS accounting packets allows Cisco ISE to track which sessions are still active on the network. This command sends periodic updates every 15 minutes. 3850(config)#aaa accounting update periodic 15 Configure the Global RADIUS Commands We configure a proactive method to check the availability of the RADIUS server. With this practice, the switch will send periodic test authentication messages to the RADIUS server (Cisco ISE). It is looking for a RADIUS response from the server. A success message is not necessary; a failed authentication will suffice, because it shows that the server is alive. Cisco Systems © 2015 Page 7 SECURE ACCESS HOW-TO GUIDES Best Practice: With ISE 1.2 there is a feature to suppress authentications with certain conditions. We will use that feature to suppress any RADIUS keep alive messages. See end of this document for instructions. Step 1 Add the Cisco ISE servers to the RADIUS group. In this step we will add each Cisco ISE Policy Services Node (PSN) to the switch configuration, using the radius-test account. Repeat for each PSN. 3850(config)#radius-server host 192.168.201.88 auth-port 1812 acct-port 1813 test username radiustest idle-time 5 key cisco123 Note: The server will be proactively checked for responses once every 5 minutes, in addition to any authentications or authorizations occurring through normal processes. This value may be too aggressive for non ISE 1.2 deployments due to lack of log suppression feature on older versions of ISE, in that case increase this value to 60 minutes or higher. Step 2 Set the dead criteria. The switch has been configured to proactively check the Cisco ISE server for RADIUS responses. Now configure the counters on the switch to determine if the server is alive or dead. Our settings will be to wait 10 seconds for a response from the RADIUS server and attempt the test 3 times before marking the server dead. If a Cisco ISE server doesn’t have a valid response within 30 seconds, it will be marked as dead. Also deadtime defines how long the switch will mark the server dead, which we are setting it to 15 minutes. 3850(config)#radius-server dead-criteria time 10 tries 3 3850(config)#radius-server deadtime 15 Note: We will discuss high availability in more detail in the deployment mode sections. Step 3 Enable change of authorization (CoA). Previously we defined the IP address of a RADIUS server that the switch will send RADIUS messages to. However, we define the servers that are allowed to perform change of authorization (RFC 3576) operations in a different listing, also within global configuration mode, as follows: 3850(config)#aaa server radius dynamic-author 3850(config-locsvr-da-radius)#client 192.168.201.88 server-key cisco123 3850(config-locsvr-da-radius)#auth-type any Step 4 Configure the switch to use the Cisco vendor-specific attributes. Here we configure the switch to send any defined vendor-specific attributes (VSA) to Cisco ISE PSNs during authentication requests and accounting updates. 3850(config)#radius-server vsa send authentication 3850(config)#radius-server vsa send accounting Step 5 Next, we will enable the vendor-specific attributes (VSAs). Cisco Systems © 2015 Page 8 SECURE ACCESS HOW-TO GUIDES 3850(config)#radius-server 3850(config)#radius-server 3850(config)#radius-server 3850(config)#radius-server 3850(config)#radius-server Step 6 attribute attribute attribute attribute attribute 6 on-for-login-auth 8 include-in-access-req 25 access-request include 31 mac format ietf upper-case 31 send nas-port-detail mac-only Ensure the switch always sends traffic from the correct interface for RADIUS request. Switches may often have multiple IP addresses associated to them. Therefore, it is a best practice to always force any management communications to occur through a specific interface. This interface IP address must match the IP address defined in the Cisco ISE Network Device object. Cisco Best Practice: As a network management best practice, use a loopback adapter for all management communications, and advertise that loopback interface into the internal routing protocol. 3850(config)#ip radius source-interface vlan 201 Configure VLANs and SVIs. Wireless management interface is required to create CAPWAP tunnel with the Light Weigh APs. Also, VLANs will need to be created for each of the WLAN that will be setup for wireless access. Also, we will need to create any user VLANs that will map to WLANs. Step 1 Add the following VLANs for wireless management and WLAN interface: 3850(config)#vlan 80 3850(config-vlan)#name 3850(config-vlan)#vlan 3850(config-vlan)#name 3850(config-vlan)#vlan 3850(config-vlan)#name Step 2 AP_VLAN 30 WLAN_USER 40 WLAN_GUEST Create SVI for wireless management interface. This interface will be used to communicate with the LWAP. The LWAPs needs to be connected directly to the 3850 switch and the interface needs to be configured with same VLAN as wireless management VLAN. Also, configure ip helper to forward DHCP request from the LWAP to DHCP server. 3850(config)# 3850(config-if)#ip address 192.168.80.1 255.255.255.0 3850(config-if)#ip helper-address 192.168.201.72 3850(config-if)#no shutdown Configure DHCP Snooping (Optional) DHCP snooping is not required for 3850 wireless feature to function, but it is considered a best practice to require all endpoints to get addresses assigned by the DHCP server. This is done by enabling DHCP snooping globally and running the dhcp required option on the WLAN configuration. Cisco Systems © 2015 Page 9 SECURE ACCESS HOW-TO GUIDES Before configuring DHCP snooping, be sure to note the location of your trusted DHCP servers. When you configure DHCP snooping, the switch will deny DHCP server replies from any port not configured as “trusted.” Enter interface configuration mode for the uplink interface and configure it as a trusted port. Step 1 Configure Dynamic Host Configuration Protocol (DHCP) snooping for trusted ports. 3850(config)#interface 3850(config-if)#description Server 3850(config-if)#ip dhcp snooping trust Step 2 Enable DHCP snooping. DHCP snooping is enabled at global configuration mode. After enabling DHCP snooping, you must configure the VLANs it should work with, which in our example is VLAN 30 & 40. 3850(config)# 3850(config)#no ip dhcp snooping information option 3850(config)#ip dhcp snooping Configure Local Access Control Lists Certain functions on the switch require the use of locally configured access control lists (ACLs), such as URL redirection. Some of these ACLs you create will be used immediately, and some may not be used until a much later phase of your deployment. The goal of this section is to prepare the switches for all possible deployment models at one time, and limit the operational expense of repeated switch configuration. Step 1 Add the following ACL to be used for URL redirection with web authentication: 3850(config)#ip access-list extended REDIRECT-ACL 3850(config-ext-nacl)#deny udp any host 192.168.201.72 eq 53 3850(config-ext-nacl)#deny udp any eq bootpc host 192.168.201.72 eq bootps 3850(config-ext-nacl)#deny ip any host 192.168.201.88 3850(config-ext-nacl)#permit ip any any Configure the Global 802.1X Commands Step 1 Enable 802.1X globally on the switch. Enabling 802.1X globally on the switch does not actually enable authentication on any of the WLANs or interfaces. 3850(config)# Step 2 Enable Downloadable ACLs to function. Downloadable access control lists (dACLs) are a very common enforcement mechanism in a Cisco ISE deployment. In order for dACLs to function properly on a switch, IP device tracking must be enabled globally, as follows: Cisco Systems © 2015 Page 10 SECURE ACCESS HOW-TO GUIDES 3850(config)# Note: There are some uncommon cases with Windows 7 and devices that do not respond to ARPs where it may be required to use the command ip device tracking use SVI. Configure the Global Wireless feature Step 1 Enable mobility controller (MC) feature on the switch. 3850 switch can act as Mobility Agent (MA) only or MC+MA. For any 3850 wireless deployment there needs to be at least one MC available for the deployment. We are configuring the 3850 as MC+MA as we only have one 3850 switch. 3850(config)# Note: 3850 switch is always configured as MA Step 2 Enable management interface. With 3850, all AP needs to be on the same VLAN as the management interface. This allows CAPWAP tunnel between the APs and the 3850 switch. 3850(config)# Note: If there are LWAPs configured with CUWN WLC connected to the 3850 switch, after above command is entered all the LWAPs connected to the 3850 will lose connection to the CUWN WLC and start registering with the 3850 switch. The LWAPs will then go through code upgrade and finally join the 3850 switch. Step 3 Enable fast-ssid-change feature. Fast-SSID-Change feature allows clients to move from one SSID to another without delay. This feature allows client to move from open SSID to secure SSID in dual-SSID scenario for BYOD without delay. 3850(config)# Note: This is primarily to address Apple iOS devices shifting from one SSID to another within short period of time Step 4 Configure client idle timeout. Idle-time out allows the switch to remove the client session when no traffic has been seen from the client within configured timeframe. If this value is too short, client devices will be forced to reauthenticate when coming out of stand-by mode. Here we are setting it to 2 hours. 3850(config)# Cisco Systems © 2015 Page 11 SECURE ACCESS HOW-TO GUIDES Step 5 Enable captive portal bypass feature. Apple introduced an iOS feature to facilitate network access when captive portals are present. This feature attempts to detect the presence of captive portal by sending a web request upon connecting to a wireless network, and directs the request to http://www.apple.com/library/test/success.html. If a response is received, then Internet access is assumed and no further interaction is required. If no response is received, Internet access is assumed to be blocked by captive portal and CNA auto launches the pseudo browser to request portal login in a controlled window. CNA may break when redirecting to an ISE captive portal. Following CLI command will prevent the pseudo browser from popping up. 3850(config)# Configure WLANs Step 1 Add 802.1x-enabled WLAN. This command creates a WLAN with example_employee as profile and SSID with WLAN ID of 1. If this 3850 switch is part of bigger deployments, make sure all the settings match on all the switches for the WLAN settings. 3850(config)# Note: Although we are not entering L2 security settings for the wlan, the default setting for any wlan is WPA2/AES with 802.1x Step 2 Configure WLAN to accept RADIUS Authorization and instructions from the RADIUS server. The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the ISE. Also, the nac directive enables different client state based on instructions in the URL-Redirect such as CWA, DRW, MDM, NSP, and CPP. 3850(config-wlan)# 3850(config-wlan)#nac Step 3 Map VLAN to the WLAN. Assign user VLAN created earlier to the WLAN. 3850(config-wlan)# Cisco Systems © 2015 Page 12 SECURE ACCESS HOW-TO GUIDES Step 4 Prevent network access from clients with static IP (Optional). If DHCP snooping was configured for the above VLAN in previous steps, this setting prevents client devices with static IP address. 3850(config-wlan)# Step 5 Configure session timeout (Reauthentication timer). This value dictates how often the client will re-authenticate via the RADIUS server. 3850(config-wlan)# Step 6 Enable the WLAN. 3850(config-wlan)# Note: Whenever wlan configuration needs to be modified, the wlan has o be shutdown. Once modified it can be reenabled by running above command. Note that this will disconnect all users on the respective wlan. Step 7 Add open SSID to use with ISE CWA. 3850(config)# Step 8 Enable MAC filtering on the WLAN. Since this is open SSID, enabling MAC-Filtering with default RADIUS list will provide CWA using ISE as external web server. 3850(config-wlan)# Step 9 Configure WLAN to accept RADIUS Authorization messages from the RADIUS server 3850(config-wlan)# 3850(config-wlan)#nac Step 10 Map VLAN to the WLAN. 3850(config-wlan)# Step 11 Prevent network access from clients with static IP (Optional). Cisco Systems © 2015 Page 13 SECURE ACCESS HOW-TO GUIDES 3850(config-wlan)# Step 12 Disable WPA and 802.1x on the WLAN. Disable all L2 security features and set the WLAN as open SSID. 3850(config-wlan)# 3850(config-wlan)# 3850(config-wlan)# 3850(config-wlan)# Step 13 Configure session timeout (Reauthentication timer). 3850(config-wlan)# Note: The session-timeout for open SSID is set to lower value than secure SSID, as reauthentication of MAB request does not impact ISE as much as 802.1x request Step 14 Enable the WLAN 3850(config)# Configure Interfaces for Wireless APs Step 1 Identify and configure interfaces where LWAP plugs in. 3850(config)# 3850(config-if)#description AP Note: With 3850 switch, the LWAP needs to be directly connected to the switch Step 2 Assign wireless management VLAN. Enabling 802.1X globally on the switch does not actually enable authentication on any of the switchports. Authentication will be configured, but not enabled until we configure Monitor Mode. 3850(config-if)# 3850(config-if)#switchport access vlan 80 Note: 3850 introduces a new way of discovering new LWAPs by using CAPWAP snooping feature. There is no need to configure DHCP option 43 or DNS entry for 3850 wireless management IP address Step 3 Enable spanning-tree portfast. Cisco Systems © 2015 Page 14 SECURE ACCESS HOW-TO GUIDES 3850(config-if)# Step 4 Enable the interface. 3850(config-if)# Step 5 Validate AP status. After APs have been upgraded and rebooted, validate that all APs are running in Local mode and the Country setting is correct. Also, make sure all AP Status shows up as Joined. 3850#show ap status 3850#show ap join stats summary Note: Currently 3850 only supports LWAPs in Local, Monitor, se-connect, and sniffer mode. If the LWAP was previously configured as FlexConnect mode then run ‘ap name {AP_NAME} mode local’ command Cisco Systems © 2015 Page 15 SECURE ACCESS HOW-TO GUIDES Sample output 3850#show ap status AP Name Status Mode Country ------------------------------------------------------------------------AP4c4e.350d.35f8 Enabled Local US APd48c.b5e4.3b88 Enabled Local US AP4c4e.35c7.1572 Enabled Local US AP44d3.ca42.58cd Enabled Local US 3850#show ap join stats summary Number of APs : 4 Base MAC Ethernet MAC AP Name IP Address Status ----------------------------------------------------------------------------20bb.c067.fda0 4c4e.350d.35f8 AP4c4e.350d.35f8 192.168.80.103 Joined 34bd.c890.52f0 d48c.b5e4.3b88 APd48c.b5e4.3b88 192.168.80.101 Joined 5006.046e.f300 4c4e.35c7.1572 AP4c4e.35c7.1572 192.168.80.100 Joined 64d9.8946.b160 44d3.ca42.58cd AP44d3.ca42.58cd 192.168.80.102 Joined 3850# Step 6 Save configuration. 3850#write memory Cisco Systems © 2015 Page 16 SECURE ACCESS HOW-TO GUIDES 3850 Example Configuration hostname 3850 ! aaa new-model aaa session-id common aaa authentication dot1x default group radius aaa authorization network default group radius aaa accounting dot1x default start-stop group radius aaa accounting update periodic 15 ! aaa server radius dynamic-author client 192.168.201.88 server-key cisco123 auth-type any ! vlan 80 name AP_VLAN vlan 30 name WLAN_USER vlan 40 name WLAN_GUEST ! interface vlan 80 ip address 192.168.80.1 ip helper 192.168.201.72 no shut interface vlan 30 ip address 192.168.30.1 ip helper 192.168.201.72 ip helper 192.168.201.88 no shut interface vlan 40 ip address 192.168.40.1 ip helper 192.168.201.72 ip helper 192.168.201.88 no shut ! ip device tracking ! ip dhcp snooping vlan 30, 40 no ip dhcp snooping information option ip dhcp snooping ! ip domain-name example.com ! crypto key generate rsa general-keys modulus 2048 ! dot1x system-auth-control ! ip http server ip http secure-server ip http secure-active-session-modules none ip http active-session-modules none ! ip access-list extended REDIRECT-ACL deny udp any host 192.168.201.72 eq 53 deny udp any eq bootpc host 192.168.201.72 eq bootps deny ip any host 192.168.201.88 permit ip any any ! ip radius source-interface Vlan201 snmp-server community cisco123 RO radius-server attribute 6 on-for-login-auth radius-server attribute 8 include-in-access-req radius-server attribute 25 access-request include radius-server attribute 31 mac format ietf upper-case radius-server attribute 31 send nas-port-detail mac-only radius-server dead-criteria time 10 tries 3 Cisco Systems © 2015 Page 17 SECURE ACCESS HOW-TO GUIDES radius-server host 192.168.201.88 auth-port 1812 acct-port 1813 test username radius-test idletime 5 key cisco123 radius-server deadtime 15 radius-server vsa send accounting radius-server vsa send authentication ! wireless mobility controller wireless management interface Vlan80 wireless client fast-ssid-change wireless mgmt-via-wireless wireless client user-timeout 7200 captive-portal-bypass ! wlan example_secure 1 example_secure aaa-override client vlan 30 nac ip dhcp required session-timeout 86400 no shutdown ! wlan example_open 2 example_open aaa-override client vlan 40 mac-filtering default nac ip dhcp required no security wpa no security wpa akm dot1x no security wpa wpa2 no security wpa wpa2 ciphers aes session-timeout 7200 no shutdown ! interface GigabitEthernet 1/0/17 description Server switch port mode access switch port access vlan 201 ip dhcp snooping trust spanning-tree portfast no shut ! interface GigabitEthernet 1/0/9 description AP switch port mode access switch port access vlan 80 spanning-tree portfast no shut ISE Configuration There are no specific configurations for ISE to integrate with 3850 switches for wireless access. The 3850 can be integrated in the same way as Catalyst switches to support advanced ISE features such as CWA, BYOD, and Posture Assessment. While this document covers policies related to BYOD, please refer to BYOD how-to guide for configuring the underlying services to enable BYOD. This includes configuration of CA server, external identity sources, and supplicant provisioning policy. Cisco Systems © 2015 Page 18 SECURE ACCESS HOW-TO GUIDES Create Identity Sequence We will create an identity sequence to process authentication request for secure SSID. This sequence will authenticate endpoints via certificate, AD, or internal user database. Step Step Step Step 1 2 3 4 Login to ISE primary admin node. Navigate to Administration Identity Management Identity Source Sequences Click ‘Add’ Create a sequence with following name ‘CAP_AD_Internal’ Figure 2. Step 5 Click Save. Enable policy Set Policy set feature within ISE 1.2 allows administrator to create complex identity policy. In this document we will create two policy sets that maps to each of the WLANs and create underlying policies within each policy set. This provides clarity on how policies apply to each use cases with ISE policy structure. Step 1 Step 2 To Enable policy set feature navigate to Administration System Settings Policy Sets Select ‘Enabled’ and click ‘Save’ Cisco Systems © 2015 Page 19 SECURE ACCESS HOW-TO GUIDES Note: Once policy set feature is enabled, policy will need to be recreated if one wants to go back to classic mode. However, the initial policy will be copied to the default policy set when the feature is enabled. Procedure 1 Create Downloadable ACL Here, we will be creating a DACL (Downloadable ACL) to apply during Authorization Step 1 Navigate to Policy Policy Elements Results Authorization Downloadable ACLs Step 2 Click on Add to create NSP Authorization Profile with following parameters Name INTERNET-ONLY DACL Content permit udp any host 192.168.201.72 eq domain permit udp any any eq bootpc deny ip any any Step 3 Click ‘Save’ Procedure 2 Configure Authorization Profile Here, we will be creating three authorization profiles Step 1 Navigate to Policy Policy Elements Results Authorization Authorization Profiles Step 2 Click on Add to create NSP Authorization Profile with following parameters Name NSP Common Tasks Web Redirection Web Redirection Type Native Supplicant Provisioning ACL REDIRECT-ACL Step 3 Click ‘Save’ Step 4 Click on Add to create WebAuth Authorization Profile with following parameters Name WebAuth Common Tasks Web Redirection Web Redirection Centralized Web Auth Cisco Systems © 2015 Page 20 SECURE ACCESS HOW-TO GUIDES Name WebAuth Type ACL REDIRECT-ACL Step 5 Click ‘Save’ Step 6 Click on Add to create Internet Authorization Profile with following parameters Name Internet Common Tasks DACL Name ACL INTERNET-ONLY Step 7 Click ‘Save’ Configure Policy Step 1 Step 2 Navigate to Policy Policy Set Click on the ‘+’ sign on the left pane and click ‘Create Above’ Figure 3. Step 3 Define Policy set as ‘example_secure’ as name and following parameters Cisco Systems © 2015 Page 21 SECURE ACCESS HOW-TO GUIDES Figure 4. Step 4 Step 5 Click Submit. Define Policy set as ‘example_open’ as name and following parameters Figure 5. Step 6 Click Submit. Cisco Systems © 2015 Page 22 SECURE ACCESS HOW-TO GUIDES ISE Configuration - Suppressing RADIUS test messages You can configure collection filters to suppress syslog messages being sent to the monitoring and external servers. The suppression can be performed at the Policy Services Node level based on different attribute types. You can disable the suppression as well. You can define multiple filters with a specific attribute type and corresponding value. Note: It is recommended to limit the number of collection filter to 20 Configure ISE to suppress RADIUS test messages Step Step Step Step 1 2 3 4 Login to ISE primary admin node. Navigate to Administration > System > Logging. Click on Collection Filters on left pane. Click on Add on the top of the right pane. Figure 6. Step Step Step Step 5 6 7 8 Select ‘User Name’ from the Attribute pull down menu. Enter ‘radius-test’ for Value. Select ‘Filter All’ from the Filter Type pull down menu. Click Save. Cisco Systems © 2015 Page 23