-
- Administration User Interface Reference
- Guest Access User Interface Reference
- Web Portals Customization Reference
- Policy User Interface Reference
- Operations User Interface Reference
- Network Access Flows
- Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions
- Supported Management Information Bases in Cisco ISE
- Authentication
- Authorization Policy Settings
- Endpoint Profiling Policies Settings
- Dictionaries
- Conditions
- Profiler Condition Settings
- Posture Conditions Settings
- File Condition Settings
- Registry Condition Settings
- Application Condition Settings
- Service Conditions Settings
- Posture Compound Condition Settings
- Antivirus Compound Condition Settings
- Antispyware Compound Condition Settings
- Dictionary Simple Conditions Settings
- Dictionary Compound Condition Settings
- Patch Management Condition Settings
- Time and Date Condition Settings
- Results
- Allowed Protocols
- PAC Options
- Authorization Profile Settings
- Profiling Exception Action Settings
- File Remediation
- Link Remediation
- Antivirus Remediation
- Antispyware Remediation
- Launch Program Remediation
- Windows Update Remediation
- Windows Server Update Services Remediation
- Patch Management Remediation
- Client Posture Requirements
Policy User Interface Reference
Authentication
This section describes the authentication policy page, which allows you to configure simple and rule-based authentication policies.
- Simple Authentication Policy Configuration Settings
- Rule-Based Authentication Policy Configuration Settings
Simple Authentication Policy Configuration Settings
The following table describes the fields in the simple authentication policy page, which allows you to configure simple authentication policies. The navigation path for this page is: .
Rule-Based Authentication Policy Configuration Settings
The following table describes the fields in the rule-based authentication policy page, which allows you to configure simple authentication policies. The navigation path for this page is: .
Authorization Policy Settings
The following table describes the fields in the authorization policy page, which allows you to configure authorization policies. The navigation path for this page is: .
Endpoint Profiling Policies Settings
The following table describes the fields in the Endpoint Policies page. The navigation path for this page is: .
Dictionaries
This section describes RADIUS vendor dictionaries used in Cisco ISE.
The following table describes the fields in the Dictionary page for RADIUS vendors, which allows you to configure dictionary attributes for the RADIUS vendors. The navigation path for this page is: .
Conditions
This section describes policy conditions used for profiling endpoints, posture clients, and to limit or extend permission to access to Cisco ISE system resources.
Profiler Condition Settings
The following table describes the fields in the Profiler Condition page. The navigation path for this page is: .
Posture Conditions Settings
This section describes simple and compound conditions used for posture.
- File Condition Settings
- Registry Condition Settings
- Application Condition Settings
- Service Conditions Settings
- Posture Compound Condition Settings
- Antivirus Compound Condition Settings
- Antispyware Compound Condition Settings
- Dictionary Simple Conditions Settings
- Dictionary Compound Condition Settings
- Patch Management Condition Settings
File Condition Settings
The following table describes the fields in the File Conditions page. The navigation path for this page is: .
Registry Condition Settings
The following table describes the fields in the Registry Conditions page. The navigation path for this page is: .
Application Condition Settings
The following table describes the fields in the Application Conditions page. The navigation path for this page is: .
Select the operating system to which the application condition should be applied. |
Fields |
Usage Guidelines |
---|---|
Name |
Enter the name of the application condition. |
Description |
Enter a description of the application condition. |
Operating System |
Select the Windows OS or the MAC OSX to which the application condition should be applied. |
Process Name |
Enter the name of the application to be checked. |
Application Operator |
Choose the status to be checked. |
Service Conditions Settings
The following table describes the fields in the Service Conditions page. The navigation path for this page is: .
Select the operating system to which the service condition should be applied. |
Fields |
Usage Guidelines |
---|---|
Name |
Enter a name for the service condition. |
Description |
Enter a description of the service condition. |
Operating Systems |
Select the operating system to which the service condition should be applied. You can select different versions of the Mac OSX or Windows OS. |
Service Name |
Enter the name of the service or daemon running as root. The AnyConnect agent uses the command sudo launchctl list to validate the service condition. |
Service Operator |
|
Posture Compound Condition Settings
The following table describes the fields in the Compound Conditions page. The navigation path for this page is: .
Antivirus Compound Condition Settings
The following table describes the fields in the AV Compound Conditions page. The navigation path for this page is: .
Antispyware Compound Condition Settings
The following table describes the fields in the AS Compound Conditions page. The navigation path for this page is: .
Dictionary Simple Conditions Settings
The following table describes the fields in the Dictionary Simple Conditions page. The navigation path for this page is: .
Dictionary Compound Condition Settings
The following table describes the fields in the Dictionary Compound Conditions page. The navigation path for this page is: .
Patch Management Condition Settings
The following table describes the fields in the Patch Management Conditions page. The navigation path is: .
Time and Date Condition Settings
The following table describes the fields in the Time and Date Conditions page. The navigation path for this page is: .
Results
- Allowed Protocols
- PAC Options
- Authorization Profile Settings
- Profiling Exception Action Settings
- File Remediation
- Link Remediation
- Antivirus Remediation
- Antispyware Remediation
- Launch Program Remediation
- Windows Update Remediation
- Windows Server Update Services Remediation
- Patch Management Remediation
- Client Posture Requirements
Allowed Protocols
The following table describes the fields in the Allowed Protocols page, which allows you to configure the protocols to be used during authentication. The navigation path for this page is: .
In the following table, PAC stands for Protected Access Credentials.
PAC Options
The following table describes the fields after you select Use PACs in the Allowed Protocols Services List page. The navigation path for this page is: .
|
Authorization Profile Settings
The following table describes the fields in the Standard Authorization Profiles page. The navigation path for this page is: .
Choose the access type options (ACCESS_ACCEPT or ACCESS_REJECT). |
|||
Check the check box to enable Cisco ISE to support sessions connecting from SAnet capable devices. ISE implements service templates as authorization profiles that contain a special flag that marks them as “Service Template” compatible. This way, the service template, which is also an authorization profile, can be used in a single policy to support connection with SAnet as well as non-SAnet devices. |
|||
Common Tasks | |||
Check the check box and choose existing downloadable ACL options available (for example, Cisco ISE provides two default values in the drop-down list: PERMIT_ALL_TRAFFIC or DENY_ALL_TRAFFIC). The list will include all current DACLs in the local database. |
|||
Check the check box and enter an attribute value that identifies a virtual LAN (VLAN) ID that you want associated with the new authorization profile you are creating (both integer and string values are supported for the VLAN ID). The format for this entry would be Tunnel-Private-Group-ID:VLANnumber.
|
|||
Check the check box to enable the vendor-specific attribute (VSA) of “cisco-av-pair” to be associated with a value of “device-traffic-class=voice”. In a multi-domain authorization mode, if the network switch receives this VSA, the endpoint is placed on to a voice domain after authorization. |
|||
Check the check box to enable a redirection process used for Posture discovery in Cisco ISE, and enter an ACL on the device that you want to associate with this authorization profile. For example, if the value you entered is acl119, this is reflected in the Attributes Details pane as: cisco-av-pair = url-redirect-acl = acl119. The Attributes Details pane also displays: cisco-av-pair = url-redirect=https://ip:8443/guestportal/gateway?sessionid= SessionValueIdValue&action=cpp. |
|||
Check the check box to enable a redirection process that is similar to Posture discovery, but it redirects guest user access requests to the Guest server in Cisco ISE. Enter an ACL on the device that you want to associate with this authorization profile, and select Default or Manual as the redirect option. For example, if the value you entered is acl-999, this is reflected in the Attributes Details pane as: cisco-av-pair = url-redirect-acl = acl-99. The Attributes Details pane also displays: cisco-av-pair = url-redirect=https://ip:8443/guestportal/gateway?sessionid=SessionValueIdValue&action=cwa. Check the Static IP/Host Name check box to specify an exact IP address or hostname to which you want the user to be redirected to. If this check box is not checked, the user will be redirected to the FQDN of the policy service node that received this request. |
|||
Check the check box to enable Auto SmartPort functionality and enter a corresponding event name value in the text box. This enables the VSA cisco-av-pair with a value for this option as “auto-smart-port=event_name”. Your choice is reflected in the Attributes Details pane. |
|||
Check the check box to enable a RADIUS filter attribute that sends the ACL name that you define in the text box (which is automatically appended with “.in”). Your choice is reflected in the Attributes Details pane. |
|||
Check the check box and enter a value in seconds for maintaining connectivity during reauthentication. You can also choose attribute values from the Timer drop-down list. You choose to maintain connectivity during reauthentication by choosing to use either the default (a value of 0) or RADIUS-Request (a value of 1). Setting this to the RADIUS-Request value maintains connectivity during the reauthentication process. |
|||
Check the check box to enable the MACSec encryption policy whenever a MACSec-enabled client connects to Cisco ISE, and choose one of the following three options: must-secure, should-secure, or must-not-secure. For example, your choice is reflected in the Attributes Details pane as: cisco-av-pair = linksec-policy=must-secure. |
|||
Check the check box to enable Network Edge Access Topology (NEAT), a feature that extends identity recognition between networks. Checking this check box displays the following value in the Attributes Details pane: cisco-av-pair = device-traffic-class=switch. |
|||
Check the check box to enable local web authentication for this authorization profile. This value lets the switch recognize authorization for web authentication by Cisco ISE sending a VSA along with a DACL. The VSA is cisco-av-pair = priv-lvl=15 and this is reflected in the Attributes Details pane. |
|||
Check the check box and enter an ACL name in the text field. This value is used in a required Airespace VSA to authorize the addition of a locally defined ACL to a connection on the WLC. For example, if you entered rsa-1188, this would be reflected in the Attributes Details pane as: Airespace-ACL-Name = rsa-1188. |
|||
Check the check box to enable an Adaptive Security Appliances (ASA) VPN group policy. From the Attribute list, choose a value to configure this setting. |
|||
Advanced Attributes Settings | |||
Click the down-arrow icon to display the available options in the Dictionaries window. Click to select the desired dictionary and attribute to configure in the first field. |
|||
Click the down-arrow icon to display the available options in the Attribute Values window. Click to select the desired attribute group and attribute value for the second field. This value matches the one selected in the first field. Any Advanced Attributes setting(s) that you configure will be displayed in the Attribute Details panel.
|
|||
This pane displays any of the configured attribute values that you set for the Common Tasks and Advanced Attributes.
|
Profiling Exception Action Settings
The following table describes the fields in the New Profiler Exception Action page. The navigation path for this page is: .
Enter the name of the exception action that you want to create. |
|
Enter the description of the exception action that you want to create. |
|
Check the CoA Action check box to enforce CoA. When you associate an exception action in the endpoint profiling policy and enforce a CoA, you must configure CoA globally in Cisco ISE that can be done in the following location: Administration > System > Settings > Profiling. |
|
Click the Policy Assignment drop-down list that displays endpoint profiling policies that are configured in Cisco ISE, and choose the profiling policy against which the endpoint will be profiled when the exception action is triggered, regardless of its matched value. |
|
File Remediation
The following table describes the fields in the File Remediation page. The navigation path is: .
Enter a name for the file remediation. Once created and saved, you cannot edit the name of the file remediation. |
|
Click Browse to locate the name of the file to be uploaded to the Cisco ISE server. This is the file that will be downloaded to the client when the file remediation action is triggered. |
Link Remediation
The following table describes the fields in the Link Remediation page. The navigation path is: .
Enter the number of attempts that clients can try to remediate from the link. |
|
Enter the time interval in seconds that clients can try to remediate from the link after previous attempts. |
|
Enter a valid URL that leads to a remediation page or resource. |
Antivirus Remediation
The following table describes the fields in the AV Remediation page. The navigation path is .
Enter the time interval in seconds that clients can try to remediate after previous attempts. |
|
Enter the number of attempts that clients can try to update an antivirus definition. |
|
Antispyware Remediation
The following table describes the fields in the AS Remediation page. The navigation path is .
Enter the time interval in seconds that clients can try to remediate after previous attempts. |
|
Enter the number of attempts that clients can try to update an antispyware definition. |
|
Launch Program Remediation
The following table describes the fields in the Launch Program Remediation page. The navigation path is: .
Enter a description for the launch program remediation that you want to create. |
|
Enter the time interval in seconds that clients can try to remediate after previous attempts. |
|
Enter the number of attempts that clients can try to launch required programs. |
|
From the drop-down list, choose the path where the remediation program has to be installed.
|
|
Enter the name of the remediation program executable, or an installation file. |
|
Existing Programs table displays the installation paths, name of the remediation programs, and parameters if any. |
Windows Update Remediation
The following table describes the fields in the Windows Update Remediation page. The navigation path is: .
Enter the time interval in seconds that clients can try to remediate after previous attempts. |
|
Enter the number of attempts that Windows clients can try for Windows updates. |
|
|
|
Check this check box to enforce the administrator-specified setting for Windows Automatic Updates on all the clients during, and after Windows update remediation. |
Windows Server Update Services Remediation
The following table describes the fields in the Windows Update Remediation page. The navigation path is: .
|
|||
Enter the interval in seconds (the default interval is 0) to delay WSUS updates before the NAC Agents and Web Agents attempt to retry after the previous attempt. |
|||
Enter the number of attempts that the NAC Agents and web Agents retry to update Windows clients with WSUS updates. |
|||
|
|||
|
|||
Check this check box to allow WSUS remediation install the latest service pack available for the client's operating system automatically.
|
|||
Specifies the source from where you install WSUS updates on Windows clients: |
|||
Allows you to display the installation wizard on the client during WSUS updates: |
Patch Management Remediation
The following table describes the fields in the Patch Management Remediation page. The navigation path is: .
|
|||
(Available only when you select the Automatic remediation type) Enter the time interval in seconds after which a scheduled patch update on the client is performed. |
|||
Retry Count |
(Available only when you select the Automatic remediation type) Enter the number of times that a client can attempt to update critical patches. |
||
Operating System |
Windows OS is the only OS that is supported. |
||
Patch Management Vendor Name |
Choose a vendor name from the drop-down list. The patch management remediation products of a vendor along with their product's support for the version, enable remediation, update remediation, and show UI remediation is displayed in the Products for Selected Vendor table.
|
||
Remediation Option |
Click the Products for Selected Vendor drop-down arrow, to view the list of products that the vendor you have specified in the Patch Management Vendor Name supports. For example, if you have selected Vendor A, that has two products, namely Product 1 and Product 2. Product 1 may support the Enable remediation option, whereas Product 2 might not. Or, if Product 1 does not support the Enable and Install missing patches remediation options, then Product 1 is disabled (grayed out). The Products for Selected Vendor table changes according to the selected remediation option. |
Client Posture Requirements
The following table describes the fields in the Posture Requirements page. The navigation path is: .
Click plus [+] to associate more than one operating system to the policy. Click minus [-] to remove the operating system from the policy. |
|
Choose a Condition from the list. You can also create any user defined condition by clicking the Action Icon and associate it with the requirement. You cannot edit the associated parent operating system while creating user defined conditions. The pr_WSUSRule is a dummy compound condition, which is used in a posture requirement with an associated Windows Server Update Services (WSUS) remediation. The associated WSUS remediation action must be configured to validate Windows updates by using the severity level option. When this requirement fails, the NAC Agent that is installed on the Windows client enforces the WSUS remediation action based on the severity level that you define in the WSUS remediation. The pr_WSUSRule cannot be viewed in the Compound conditions list page. You can only select the pr_WSUSRule from the Conditions widget. |
|
Choose a Remediation from the list. You can also create a remediation action and associate it with the requirement. You have a text box for all the remediation types that can be used to communicate to the Agent users. In addition to remediation actions, you can communicate to Agent users about the non compliance of clients with messages. The Message Text Only option informs Agent users about the noncompliance. It also provides optional instructions to the user to contact the Help desk for more information, or to remediate the client manually. In this scenario, the NAC Agent does not trigger any remediation action. |