Home > Cisco > Interface > Cisco Ise 13 User Guide

Cisco Ise 13 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Ise 13 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 946
    							•PhoneNumber
    Supported MDM Servers
    SupportedMDMserversincludeproductsfromthefollowingvendors:
    •Airwatch,Inc.
    •GoodTechnology
    •MobileIron,Inc.
    •Zenprise,Inc.
    •SAPAfaria
    •Fiberlink/IBMMaaS
    •Meraki
    Ports Used by the MDM Server
    ThefollowingtableliststheportsthatmustbeopenbetweentheCiscoISEandtheMDMservertoenable
    themtocommunicatewitheachother.RefertotheMDMServerDocumentationforalistofportsthatmust
    beopenontheMDMagentandserver.
    Table 13: Ports Used by the MDM Server
    PortsMDM Server
    443MobileIron
    443Zenprise
    19005Good
    443Airwatch
    443Afaria
    443FiberlinkMaaS
    443Meraki
    80and443MicrosoftIntune
    80and443MicrosoftSCCM
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    185
    Mobile Device Manager Interoperability with Cisco ISE 
    						
    							MDM Dictionary Attributes
    AfteryouaddtheMDMserverdefinitioninCiscoISE,theMDMdictionaryattributesareavailableinCisco
    ISEthatyoucanuseinauthorizationpolicies.Youcanviewthedictionaryattributesthatareavailablefor
    useinauthorizationpolicies.
    WhenyouareusingtheseMDMdictionaryattributesinpolicies,youcannotdeletetheMDMserver
    configurationfromCiscoISE.ToremovetheMDMserverconfiguration,youmustfirstremovetheMDM
    dictionaryattributesfrompolicies,andthenremovetheMDMserverfromCiscoISE.
    MDM Integration Process Flow
    ThissectiondescribestheMDMintegrationprocess:
    1TheuserassociatesadevicetoSSID.
    2CiscoISEmakesanAPIcalltotheMDMserver.
    3ThisAPIcallreturnsalistofdevicesforthisuserandtheposturestatusforthedevices.
    TheinputparameteristheMACaddressoftheendpointdevice.Foroff-premiseAppleiOSdevices,this
    istheUDID.
    Note
    4CiscoISEusesMDMtoprovisionthedeviceandpresentsanappropriatepagefortheusertoregisterthe
    device.
    5TheuserregistersthedeviceintheMDMserver,andtheMDMserverredirectstherequesttoCiscoISE
    (throughautomaticredirectionormanualbrowserrefresh).
    6CiscoISEqueriestheMDMserveragainfortheposturestatus.
    7Iftheuser’sdeviceisnotcomplianttotheposture(compliance)policiesconfiguredontheMDMserver,
    theuserisnotifiedthatthedeviceisoutofcomplianceandmustbecompliant.
    8Aftertheuser’sdevicebecomescompliant,theMDMserverupdatesthedevicestateinitsinternaltables.
    9Iftheuserrefreshesthebrowsernow,thecontrolistransferredbacktoCiscoISE.
    10CiscoISEpollstheMDMserveronceeveryfourhourstogetcomplianceinformationandissuesChange
    ofAuthorization(CoA)appropriately.Thiscanbeconfiguredbytheadministrator.CiscoISEalsochecks
    theMDMserverevery5minutestomakesurethatitisavailable.
    ThefollowingfigureillustratestheMDMprocessflow.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    186
    Mobile Device Manager Interoperability with Cisco ISE 
    						
    							Set Up MDM Servers With Cisco ISE
    TosetupMDMserverswithCiscoISE,youmustperformthefollowinghigh-leveltasks:
    Procedure
    Step 1ImportMDMservercertificateintoCiscoISE.
    Step 2Createmobiledevicemanagerdefinitions.
    Step 3ConfigureACLsontheWirelessLANControllers.
    Step 4Configureauthorizationprofileforredirectingnon-registereddevices.
    Step 5ConfigureauthorizationpolicyrulesfortheMDMusecases.
    Import MDM Server Certificate into Cisco ISE
    ForCiscoISEtoconnectwiththeMDMserver,youmustimporttheMDMservercertificateintotheCisco
    ISECertificateStore.IfyourMDMserverhasaCA-signedcertificate,youmustimporttherootCAintothe
    CiscoISECertificateStore.
    Procedure
    Step 1ExporttheMDMservercertificatefromyourMDMserverandsaveitonyourlocalmachine.
    Step 2ChooseAdministration>Certificates>CertificateStore>Import.
    Step 3ClickBrowsetoselecttheMDMservercertificatethatyouobtainedfromtheMDMserver.
    Step 4Addafriendlyname.
    Step 5ClickSubmit.
    Step 6VerifythattheCertificateStorelistpageliststheMDMservercertificate.
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    187
    Set Up MDM Servers With Cisco ISE 
    						
    							What to Do Next
    CreateMobileDeviceManagerDefinitions,onpage188.
    Create Mobile Device Manager Definitions
    YoucancreateoneormoreMobileDeviceManager(MDM)definitionsforexternalMDMserverstohelp
    ensureCiscoISEisabletoobtainthemostup-to-datedeviceconnectionstatusfromlogged-inuserdevices
    aspossibleondemand.(AlthoughyoucanconfiguremultipleMDMserverdefinitions,youcanactivateonly
    oneMDMserverwithwhichCiscoISEinteroperatesatatime.)
    Before You Begin
    EnsurethatyouhaveimportedtheMDMservercertificateintoCiscoISE.
    Procedure
    Step 1ChooseAdministration>NetworkResources>MDM.
    Step 2ClickAdd.
    Step 3EnterthenameanddescriptionoftheMDMserverthatyouwanttoadd.
    Step 4Check(oruncheck)theStatuscheckboxtoindicatewhichMDMservershouldbeActive.CiscoISEcan
    communicatewithonlyoneMDMserveratatime.
    Step 5EntertheMDMserverIPaddressorhostname(FQDN)intheMDMserverhostfield.
    Step 6Specifythenetwork/proxyportthroughwhichCiscoISEmustcommunicatewiththeMDMserver.
    Step 7SpecifyaserverinstancenamefortheMDMserveryouareadding.(Thisdependsonthevendor.)
    Step 8SpecifytheMDMserveradministratorusernameandpasswordsothatCiscoISEcanlogintoandinteroperate
    withtheMDMserverdatabase.
    Step 9EnterthepollingintervalinminutesforCiscoISEtopolltheMDMserverforcompliancecheckinformation.
    ThisvalueshouldbethesameasthepollingintervalonyourMDMserver.Thedefaultvalueis240minutes.
    Werecommendthatyousetthepollingintervalbelow60minutesonlyfortestingafewactiveclientsonyour
    network.Ifyousetthisvaluebelow60minutesforaproductionenvironmentwithmanyactiveclients,the
    system’sloadincreasessignificantlyandmightnegativelyimpactperformance.
    Ifyousetthepollingintervalto0,ISEdisablescommunicationwiththeMDMserver.
    Step 10SpecifythetimeintervalinminutesforCiscoISEtopolltheMDMserverfordevicere-authenticationfor
    compliantdevicesintheTimeIntervalForComplianceDeviceReAuthQueryfield.Thevalidrangeis
    from1to1440minutes.Thedefaultvalueis1minute.
    Ifthedeviceisnon-compliant,CiscoISEqueriestheMDMservereveryoneminutefordevicere-authentication.
    Step 11ChecktheEnablecheckboxtoactivatetheMDMserverconnectionwithCiscoISE.
    Step 12ClickTestConnectiontotestCiscoISE’sconnectiontotheMDMserver.
    IfCiscoISEdisplaysaconnectionerror,theissuemaybewiththecertificate,theusername/password,orthe
    servernotbeingreachable.IfyouareusingaproxyfortheinternetconnectionandMDMserverispartof
    internalnetworkthenyouhavetoputtheMDMservernameoritsIPaddressintheProxy-Bypasslist.Choose
    Administration>Settings>ProxySettingstoperformthisaction.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    188
    Set Up MDM Servers With Cisco ISE 
    						
    							Step 13ClickSubmittosavetheMDMserverdefinition.OnlyafteryousuccessfullyconnectCiscoISEwiththe
    MDMserver,theMDMdictionarygetspopulatedinCiscoISE.
    What to Do Next
    ConfigureanAuthorizationProfileforRedirectingNonregisteredDevices
    Set Permissions When AD User in the Domain Admin Group
    ForWindows2008R2,Windows2012,andWindows2012R2,theDomainAdmingroupdoesnothavefull
    controloncertainregistrykeysintheWindowsoperatingsystembydefault.TheActiveDirectoryadmin
    mustgivetheActiveDirectoryuserFullControlpermissionsonthefollowingregistrykeys:
    •HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
    •HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
    NoregistrychangesarerequiredforthefollowingActiveDirectoryversions:
    •Windows2003
    •Windows2003R2
    •Windows2008
    Tograntfullcontrol,theActiveDirectoryadminmustfirsttakeownershipofthekey,asshownbelow.
    Procedure
    Step 1GototheOwnertabbyrightclickingthekey.
    Step 2ClickPermissions.
    Step 3ClickAdvanced.
    Required Permissions when AD User not in Domain Admin Group
    ForWindows2012R2,givetheActiveDirectoryuserFullControlpermissionsonthefollowingregistry
    keys:
    •HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
    •HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
    ThefollowingpermissionsalsoarerequiredwhenanActiveDirectoryuserisnotintheDomainAdmingroup,
    butisintheDomainUsersgroup:
    •AddRegistryKeystoAllowISEtoConnecttotheDomainController(seebelow)
    •PermissionstoUseDCOMontheDomainController,onpage190
    •SetPermissionsforAccesstoWMIRoot/CIMv2NameSpace,onpage192
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    189
    Set Up MDM Servers With Cisco ISE 
    						
    							ThesepermissionsareonlyrequiredforthefollowingActiveDirectoryversions:
    •Windows2003
    •Windows2003R2
    •Windows2008
    •Windows2008R2
    •Windows2012
    •Windows2012R2
    Add Registry Keys to Allow ISE to Connect to the Domain Controller
    YoumustmanuallyaddsomeregistrykeystothedomaincontrollertoallowISEtoconnectasaDomain
    User,andretrieveloginauthenticationevents.Anagentisnotrequiredonthedomaincontrollersoronany
    machineinthedomain.
    Thefollowingregistryscriptshowsthekeystoadd.Youcancopyandpastethisintoatextfile,savethefile
    witha.regextension,anddoubleclickthefiletomaketheregistrychanges.Toaddregistrykeys,theuser
    mustbeanowneroftherootkey.
    WindowsRegistryEditorVersion5.00
    [HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}]"AppID"="{76A64158-CB41-11D1-8B02-00600806D9B6}"
    [HKEY_CLASSES_ROOT\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]"DllSurrogate"=""
    [HKEY_CLASSES_ROOT\Wow6432Node\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]"DllSurrogate"=""
    MakesurethatyouincludetwospacesinthevalueofthekeyDllSurrogate.
    Keeptheemptylinesasshowninthescriptabove,includinganemptylineattheendofthefile.
    Permissions to Use DCOM on the Domain Controller
    TheActiveDirectoryuserusedforISEsIdentityMappingservicesmusthavepermissionstouseDCOM
    (remoteCOM)ontheDomainController.Youcanconfigurepermissionswiththedcomcnfgcommandline
    tool.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    190
    Set Up MDM Servers With Cisco ISE 
    						
    							Procedure
    Step 1Runthedcomcnfgtoolfromthecommandline.
    Step 2ExpandComponentServices.
    Step 3ExpandComputers>MyComputer.
    Step 4SelectActionfromthemenubar,clickproperties,andclickCOMSecurity.
    Step 5MakesurethattheaccountthatISEwilluseforbothAccessandLaunchhasAllowpermissions.ThatActive
    Directoryusershouldbeaddedtoallthefouroptions(EditLimitsandEditDefaultforbothAccessPermissions
    andLaunchandActivationPermissions).
    Step 6AllowallLocalandRemoteaccessforbothAccessPermissionsandLaunchandActivationPermissions.
    Figure 16: Local and Remote Access for Access Permissions
    Figure 17: Local and Remote Access for Launch and Activation Permissions
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    191
    Set Up MDM Servers With Cisco ISE 
    						
    							Set Permissions for Access to WMI Root/CIMv2 Name Space
    Bydefault,ActiveDirectoryusersdonothavepermissionsfortheExecuteMethodsandRemoteEnable.
    Youcangrantaccessusingthewmimgmt.mscMMCconsole.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    192
    Set Up MDM Servers With Cisco ISE 
    						
    							Procedure
    Step 1ClickStart>Runandtypewmimgmt.msc.
    Step 2Right-clickWMIControlandclickProperties.
    Step 3UndertheSecuritytab,expandRootandchooseCIMV2.
    Step 4ClickSecurity.
    Step 5AddtheActiveDirectoryuser,andconfiguretherequiredpermissionsasshownbelow.
    Figure 18: Required Permissions for WMI Root\CIMv2 Name Space
    Open Firewall Ports for WMI Access
    ThefirewallsoftwareontheActiveDirectoryDomainControllermayblockaccesstoWMI.Youcaneither
    turnthefirewalloff,orallowaccessonaspecificIP(ISEIPaddress)tothefollowingports:
    Cisco Identity Services Engine Administrator Guide, Release 1.3    
    193
    Set Up MDM Servers With Cisco ISE 
    						
    							•TCP135:GeneralRPCPort.WhendoingasynchronousRPCcalls,theservicelisteningonthisport
    tellstheclientwhichportthecomponentservicingthisrequestisusing.
    •UDP138:NetbiosDatagramService
    •TCP139:NetbiosSessionService
    •TCP445:SMB
    Higherportsareassigneddynamicallyoryoucanconfigurethemmanually.Werecommendthatyouadd
    %SystemRoot%\System32\dllhost.exeasatarget.Thisprogrammanagesportsdynamically.
    AllfirewallrulescanbeassignedtospecificIP(ISEIP).
    Configure an Authorization Profile for Redirecting Nonregistered Devices
    YoumustconfigureanauthorizationprofileinCiscoISEtoredirectnonregistereddevices.
    Before You Begin
    •EnsurethatyouhavecreatedanMDMserverdefinitioninCiscoISE.Onlyafteryousuccessfully
    integrateISEwiththeMDMserverdoestheMDMdictionarygetspopulatedandyoucancreate
    authorizationpolicyusingtheMDMdictionaryattributes.
    •ConfigureACLsontheWirelessLANControllerforredirectingunregistereddevices.
    Procedure
    Step 1ChoosePolicy>PolicyElements>Results>Authorization>AuthorizationProfiles>Add.
    Step 2Createanauthorizationprofileforredirectingnonregistereddevicesthatarenotcompliantorregistered.
    Step 3EnteranamefortheauthorizationprofilethatmatchestheMDMservername.
    Step 4ChooseACCESS_ACCEPTastheAccessType.
    Step 5ChecktheWebRedirectioncheckboxandchooseMDMRedirectfromthedrop-downlist.
    Step 6EnterthenameoftheACLthatyouconfiguredonthewirelessLANcontrollerintheACLfield.
    Step 7ClickSubmit.
    What to Do Next
    ConfigureAuthorizationPolicyRulesfortheMDMUseCases.
    Configure Authorization Policy Rules for the MDM Use Cases
    YoumustconfigureauthorizationpolicyrulesinCiscoISEtocompletetheMDMconfiguration.
    Before You Begin
    •AddtheMDMservercertificatetotheCiscoISEcertificatestore.
       Cisco Identity Services Engine Administrator Guide, Release 1.3
    194
    Set Up MDM Servers With Cisco ISE 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Ise 13 User Guide