Policy Enforcer's Cisco ISE Connector communicates with the Cisco Identity Services Engine server using the Cisco ISE API. As part of threat remediation, Policy Enforcer's Connector uses enforcement profiles. This section provides information for configuring Cisco ISE so that Policy Enforcer can invoke the appropriate enforcement profiles.
As part of the configuration, on Cisco ISE you will create two enforcement profiles, one for quarantine and one for terminate. Then you will use them in the Cisco ISE enforcement policy. Once Cisco ISE is configured, you will configure a Cisco ISE Connector on Policy Enforcer.
On Cisco ISE you will configure the following:
Change policy modes
Create an API client
Configure network profiles
Add a custom attribute
Configure authorization profiles
Set an authorization policy
On Cisco ISE, the Simple Mode policy model is selected by default. For creating an API client, Policy Sets should be enabled.
Navigate to Administration > System > Settings > Policy Sets and Enable Policy Sets mode.
You are prompted to login again after changing the mode.
Figure 113: Cisco ISE: Enable Policy Sets Mode
Create an API Client:
Make note of the username and password. You will need them when you configure the connector portion in Policy Enforcer later on.
Figure 114: Cisco ISE: Create Admin User and Assign to Admin Groups
Enable the External RESTful Services API (ERS) for the Administration Node:
Figure 115: Cisco ISE: Enable ERS
Configure network profiles:
Devices managed by ISE must support RADIUS CoA and have the proper network profiles assigned to handle the CoA commands sent by the ISE server:
If you are creating a new profile, proceed to the next step for information.
Figure 116: Cisco ISE: Network Device Profiles List
Enable RADIUS and add a corresponding dictionary in the supported protocol list.
Figure 117: Cisco ISE: Network Device Profile, Enable RADIUS
Enable and configure the Change of Authorization (CoA) according to the figure below.
Figure 118: Cisco ISE: Configure Change of Authorization (CoA)
Configure the Disconnection and Re-authenticate operation with the proper RADIUS attributes and vendor specific VSA to handle the standard disconnect and reauthenticate operations. Below is the sample configuration for Juniper’s EX devices.
Figure 119: Sample Configuration for Juniper EX
Configure a custom attribute.
Figure 120: Cisco ISE: Add Attribute sdsnEpStatus
Figure 121: Cisco ISE: Verify Attribute
In the screen below,, there are three conditions created using sdsnEpStatus attribute. The condition names do not need to be the same as in the screen here, but the expressions must be matched. These conditions will be used in Policy Sets to handle the threat remediation for managed endpoints as described later in the Policy Sets setting section. Only the sdsnEpStatus-blocked and sdsnEpStatus-quarantine conditions will be used there. sdsnEpStatus-healthy is created for fulfillment purpose and can be ignored for now.
Figure 122: Cisco ISE: Configure Simple Conditions, Match Expression
Figure 123: Cisco ISE: Configure Simple Conditions, Match Expression
Configure permission/authorization profiles.
You can create the authorization profiles corresponding to “block” and “quarantine” actions as fits your needs. In the sample configuration provided here, the block action will result as total denial access to the network, and the quarantine profile will move the endpoint to another designated VLAN.
Refer to the figures below for sample configurations.
Figure 124: Cisco ISE: Configure Authorization Profiles
Figure 125: Cisco ISE: Configure Authorization Profiles
Note For blocking a host, the default ‘DenyAccess’ profile is used.
Set the authorization policy:
Refer to the figure below for a sample configuration.
Figure 126: Cisco ISE: Local Exception Rules, Example
Note Find this under Policy > Policy Sets > Authorization Policy.