XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series



Similar documents
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

TrustSec How-To Guide: On-boarding and Provisioning

On-boarding and Provisioning with Cisco Identity Services Engine

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Cisco ISE 1.2 BYOD Lab Guide

Cisco TrustSec Solution Overview

Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led

Configure ISE Version 1.4 Posture with Microsoft WSUS

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

mystanwell.com Installing Citrix Client Software Information and Business Systems

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Cisco Secure BYOD Solution

Windows XP User guide for wired network v1.1

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

ClearPass Policy Manager

Remote Access End User Reference Guide for SHC Portal Access

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

Palo Alto Networks User-ID Services. Unified Visitor Management

AVG Business SSO Partner Getting Started Guide

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

Install and End User Reference Guide for Direct Access to Citrix Applications

Mobile Device Management Version 8. Last updated:

Server Software Installation Guide

Quick Installation Guide

Defender Token Deployment System Quick Start Guide

The BYOD Wave: Policy, Security, and Wireless Infrastructure

Symantec VIP Integration with ISE


Secure Your Mobile Device Access with Cisco BYOD Solutions

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Advanced Configuration Steps

Introduction to Mobile Access Gateway Installation

Integrating Cisco Identity Services Engine with GO!Enterprise MDM

Phone: Fax: Box: 230

VMware Identity Manager Administration

Copyright 2013, 3CX Ltd.

VPN: Virtual Private Network Setup Instructions

Optimum Business SIP Trunk Set-up Guide

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Preparing for GO!Enterprise MDM On-Demand Service

Technical Note. ForeScout CounterACT: Virtual Firewall

VoIP Intercom and Cisco Call Manager Server Setup Guide

Manual for configuring NIC VPN in Windows OS

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

QuickStart Guide for Mobile Device Management

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Virtual Data Centre. User Guide

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

QUICK INSTALLATION GUIDE ACTIVATE

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

QuickStart Guide for Mobile Device Management. Version 8.6

Active Directory Self-Service FAQ

BT Lancashire Services

Getting Started - MDM Setup

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

Mobile Iron User Guide

Cisco EXAM Enterprise Network Unified Access Essentials. Buy Full Product.

Network Security Solutions Implementing Network Access Control (NAC)

Passguide q

D-Link Central WiFiManager Configuration Guide

WatchDox Administrator's Guide. Application Version 3.7.5

Dolphin Ocean Server and Dolphin Mobile Client Installation Guide for Android and ios. May 2012

Using Cisco UC320W with Windows Small Business Server

Avaya Identity Engines Portfolio

OneLogin Integration User Guide

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

IIS, FTP Server and Windows

Configuring a customer owned router to function as a switch with Ultra TV

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Getting Started with the iscan Online Data Breach Risk Intelligence Platform


This chapter describes the licensing mechanism and schemes that are available for Cisco ISE and how to add and upgrade licenses.

Administering Cisco ISE

A Guide to New Features in Propalms OneGate 4.0

Cloud Print Edition Quick Start Guide

Secure Networks for Process Control

Cloud Services MDM. ios User Guide

Introduction to Google Apps for Business Integration

BYOD: BRING YOUR OWN DEVICE.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

USG40HE Content Filter Customization

Multi-Factor Authentication Job Aide

Centrify Identity Service and Mac - Online Training

vcloud Director User's Guide

Test Case 3 Active Directory Integration

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

Student BYOD - Olathe Public Schools

UAG4100 Support Notes

Crestron Electronics, Inc. AirMedia Deployment Guide

TP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide

Citrix XenMobile Mobile Device Management

Transcription:

XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012

Table of Contents Introduction... 3 What Is the Cisco TrustSec System?... 3 About the TrustSec How-To Guides... 3 Mobile Device Management (MDM)... 4 Overview... 4 MDM Integration Use-case... 4 Components... 5 Using MDM Integration Configuration Steps... 7 Cisco ISE and MDM integration configuration... 7 Review MDM Dictionaries... 10 Configure ISE Authorization Policies... 11 Appendix A: Airwatch Configuration... 17 Appendix B: References... 19 Cisco TrustSec System:... 19 Device Configuration Guides:... 19 Cisco Systems 2015 Page 2

Introduction What Is the Cisco TrustSec System? Cisco TrustSec, a core component of the Cisco SecureX Architecture, is an intelligent access control solution. TrustSec mitigates security risks by providing comprehensive visibility into whom and what is connecting across the entire network infrastructure, and exceptional control over what and where they can go. TrustSec builds on your existing identity-aware access layer infrastructure (switches, wireless controllers, and so on). The solution and all the components within the solution are thoroughly vetted and rigorously tested as an integrated system. In addition to combining standards-based identity and enforcement models, such as IEEE 802.1X and VLAN control, the TrustSec system it also includes advanced identity and enforcement capabilities such as flexible authentication, Downloadable Access Control Lists (dacls), Security Group Tagging (SGT), device profiling, posture assessments, and more. Wireless user Ingress Enforcement RADIUS Guest Services Posture Profiler SXP Wired user MACsec Campus Network Security Group Tag Security Group Tag Ingress Enforcement Data Center Egress Enforcement Figure 1. About the TrustSec How-To Guides The TrustSec team is producing this series of How-To documents to describe best practices for TrustSec deployments. The documents in the series build on one another and guide the reader through a successful implementation of the TrustSec system. You can use these documents to follow the prescribed path to deploy, or simply pick the single usecase that meets your specific need. Cisco Systems 2015 Page 3

Mobile Device Management (MDM) Overview Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. A typical MDM product consists of a policy server, a mobile device client and an optional inline enforcement point that controls the use of some applications on a mobile device (like email) in the deployed environment. However the network is the only entity that can provide granular access to endpoints (based on ACL s, TrustSec SGT s etc). It is envisaged that Cisco Identity Services Engine (ISE) would be an additional network based enforcement point while the MDM policy server would serve as the policy decision point. ISE expects specific data from MDM servers to provide a complete solution The following are the high-level use cases in this solution. Device registration- Non registered endpoints accessing the network on-premises will be redirected to registration page on MDM server for registration based on user role, device type, etc Remediation- Non compliant endpoints will be given restricted access based on compliance state Periodic compliance check Periodically check with MDM server for compliance Ability for administrator in ISE to issue remote actions on the device through the MDM server (e.g.: remote wiping of the managed device) Ability for end user to leverage the ISE My Devices Portal to manage personal devices, e.g. Full Wipe, Corporate Wipe and PIN Lock. Sample Network Topology Figure 2. ISE+MDM Integration Topology MDM Integration Use-case 1. User associates device to SSID 2. If user device is not registered, user goes through the BYOD on-boarding flow, details listed in Appendix Cisco Systems 2015 Page 4

3. ISE makes an API call to MDM server 4. This API call returns list of devices for this user and the posture status for the devices Please note that we can pass MAC address of endpoint device as input parameter. 5. If user s device is not in this list, it means device is not registered with the MDM provider. ISE will send an authorization to NAD to redirect to ISE, which will re-direct users to the MDM server (home page or landing page) 6. ISE will know that this device needs to be provisioned using MDM and will present an appropriate page to user to proceed to registration. 7. User will be transferred to the MDM policy engine where registration will be completed by the user. Control will transfer back to ISE either through automatic redirection by MDM server or by user refreshing their browser again. 8. ISE will query MDM again to gain knowledge of posture status 9. If the user device is not in compliant to the posture (compliance) policies configured on MDM, they will be notified that the device is out of compliance, reason for non-compliance and the need to be in compliance to access network resources. 10. Once user s device becomes compliant, MDM server will update the device state in its internal tables. 11. At this stage user can refresh the browser at which point control would transfer back to ISE. 12. ISE would also poll the MDM server periodically to get compliance information and issue COA s appropriately. Components Table 1. Table 1: Components Used in this Document Component Hardware Features Tested Cisco IOS Software Release The Cisco Identity Services Engine (ISE) Any: 1121/3315, 3355, 3395, VMware Integrated AAA, policy server, and services (guest, profiler, and posture) ISE 1.2 MDM Server MDM Certificate Authority Server (Optional) Any per specification of Microsoft (Windows 2008 R2 Enterprise SP2) SCEP, Certificate Authority Server N/A Wireless LAN Controller (WLC) 5500-series 2500-series Profiling and Change of Authorization (CoA) Unified Wireless 7.2.??? WLSM-2 Virtual Controller Test Devices: Apple & Google N/A Apple ios 5.0 Cisco Systems 2015 Page 5

Component Hardware Features Tested Cisco IOS Software Release E.g. Apple ios, Google Android and higher Google Android 2.3 and higher Within this document, we demonstrated MDM configuration only. We recommend using our How-To-Guide to configure ISE and WLC to a recommended state. How-to-Guide: http://www.cisco.com/en/us/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_60_byod_certificate s.pdf More guides are available at: http://www.cisco.com/en/us/solutions/ns340/ns414/ns742/ns744/landing_designzone_trustsec.html Cisco Systems 2015 Page 6

Using MDM Integration Configuration Steps Cisco ISE and MDM integration configuration Figure 3 shows the main steps in configuring MDM Integration. Figure 3. MDM Configuration Flow Add External MDM Server to ISE MDM Servers can be used as a cloud service or installed locally on premises. Once the installation, basic setup and compliance checks are configured on the MDM server, it can then be added to ISE Export MDM Server Certificate Step 1 Export MDM Server Certificate and save it on local machine. Cisco Systems 2015 Page 7

Figure 4. Export MDM Certificate Step 2 Step 3 Import the certificate in to ISE. Navigate to Administration -> Certificates -> Certificate Store -> Import Optional: Add a friendly name and then click Submit Figure 5. Verify MDM Certificate in Cisco ISE Step 4 Verify that Certificate is in Certificate Store. Figure 6. Verify MDM Certificate in Cisco ISE Cisco Systems 2015 Page 8

Figure 7. Certificate Store Step 5 Add MDM Server. Administration -> MDM. Figure 8. ADD MDM Server in Cisco ISE Step 6 Click ADD, and then enter MDM Server details. Figure 9. ADD MDM Server in Cisco ISE Cisco Systems 2015 Page 9

Step 7 Click Test Connection, ISE will confirm that connection is working. Figure 10. ADD MDM Server in Cisco ISE Step 8 Click OK on this pop-up and then select the checkbox. Step 9 Click the Submit button, the server will be added, the following success message with the presented to the admin. Figure 11. ADD MDM Server in Cisco ISE Figure 12. Airwatch Server Added Review MDM Dictionaries Once the MDM server is added, the supported dictionaries now show-up in ISE, which could be later used in to ISE Authorization Policies. Step 1 Navigate to: Policy -> Policy Elements -> Dictionaries -> MDM -> Dictionary Attribute. Cisco Systems 2015 Page 10

Figure 13. Review MDM Dictionaries in Cisco ISE Configure ISE Authorization Policies Once MDM server is added in to ISE, we can configure authorization polices in ISE to leverage the new dictionaries added for MDM servers. Note: Within this document, we demonstrated using dictionary attributes MDM:DeviceRegisterStatus EQUALS UnRegistered and MDM:DeviceCompliantStatus EQUALS NonCompliant. Please configure and test additional attributes as well Cisco Systems 2015 Page 11

Step 2 Create an ACL named NSP-ACL in the Wireless LAN Controller, which would be used in the policy later to redirect clients selected for BYOD supplicant provisioning, Certificate provisioning and MDM Quarantine. The Cisco Identity Services Engine IP address = 10.35.50.165 Internal Corporate Networks = 192.168.0.0, 172.16.0.0 (to redirect) MDM Server subnet = 204.8.168.0 Explanation of the NSP-ACL in Figure 14 is as follows. Figure 14. Access Control List for re-directing client to BYOD flow a. Allow all traffic outbound from Server to Client b. Allow ICMP traffic inbound from Client to Server for trouble shooting, it is optional c. Allow access to MDM server for un-registered and non-compliant devices to download the MDM agent and proceed with compliance checks d. Allow all traffic inbound from Client to Server to ISE for Web Portal and supplicant and Certificate provisioning flows Cisco Systems 2015 Page 12

e. Allow DNS traffic inbound from Client to Server for name resolution. f. Allow DHCP traffic inbound from Client to Server for IP addresses. g. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) h. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) i. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) j. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) k. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) l. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) m. Permit all the rest of traffic (Optional) Step 3 Step 4 Create an Authorization Profile named MDM_Quarantine for devices which are not in compliant to MDM polices. In this case all non-compliant devices will be redirected to ISE and presented with a message. Click Policy Policy Elements Results, Click Authorization Authorization Profiles ADD Figure 15. Authorization Profiles Navigation Cisco Systems 2015 Page 13

Figure 16. Authorization Policy Configuration Figure 17. Authorization Policy Configuration Figure 18. NSP-ACL Note: NSP-ACL needs to be defined on the Wireless LAN Controller. Cisco Systems 2015 Page 14

Step 5 Create Authorization Policy. Click Policy Authorization Authorization Profiles. Click Insert New Rule Below. Please add the following Authorization Policy Figure 19. Insert New Rule Registered with ISE NOT MDM = This Authorization Rule is added for devices which are registered with ISE (RegisteredDevices group) but not yet registered with an MDM server. Once the device hits this rule, it will be forwarded to ISE MDM landing page on ISE, which will present user with information on registering the device with MDM. Registered with ISE AND MDM Non_Compliant = This Authorization Rule is added for devices which are registered with ISE and MDM server but are not in compliant to policies configured on MDM Server. As an example once the user on Apple ipad hits the Register button during device registration, ISE will forward the device to the APP to download the MDM client and proceed with the MDM registration process. Upon completion of registration, user will click the Continue button and then ISE will send a Re-Auth COA to the controller. Registered with ISE AND MDM Non_Compliant = Once the device is registered with ISE, registered with MDM and is in compliance to ISE and MDM policies it will be granted access to the network. Figure 20. Authorization Policy Configuration View You are done! Please see the HowTo guide: BYOD Using Certificates for Differentiated Access for more information on provisioning certificates along with the supplicant profile. Cisco Systems 2015 Page 15

Note: MDM policies could also be defined in more granular details on Cisco ISE, e.g Demonstrations If interested in looking at the end-user experience for on-boarding i-devices, Android, Windows and MAC OSx, please visit the following website. http://wwwin.cisco.com/tech/snsbu/prod-sols/ise/#sectionname=4 Cisco Systems 2015 Page 16

Appendix A: Zenprise (Citrix) Configuration In this section we will review configuration of the MobileIron Server for the corporate policies. This highlight the following: Verify admin account privileges for REST API, i.e. account used by ISE to send a REST API call to MobileIron Server Review the Default Security Policies Review the ios APP installation configuration (AnyConnect) Step 1 Access the MobileIron administrative web interface. n. On Admin PC, launch Mozilla Firefox web browser. Enter MobileIron URL in the address bar: https://mobileiron.demo.local/admin Note: URL listed here is a sample URL Figure 21. Asset Tracking Tab a. Login with username and password. Once you login, the Asset Tracking tab should display. Step 2 Step 3 Step 4 Navigate to Menu > Accounts > Administrators. From there, click the user account (for API access) and the click EDIT. Click Roles, then Add Role. Select REST API MDM, name the Role, add Description and click SAVE. Cisco Systems 2015 Page 17

Figure 22. Add Role Step 5 Step 6 Step 7 Step 8 Click on Admin Accounts and then Add User. Fill out the basic information and then click Roles to assign the role created. Click Save. Configure MDM policies on Airwatch Server as per corporate requirements using Airwatch documentation. Please also refer to documentation from Cisco Validated Designs for best practices. http://www.cisco.com/en/us/solutions/ns340/ns414/ns742/ns743/ns1050/own_device.html Cisco Systems 2015 Page 18

Appendix B: References Cisco TrustSec System: http://www.cisco.com/go/trustsec http://www.cisco.com/en/us/solutions/ns340/ns414/ns742/ns744/landing_designzone_trustsec.html Device Configuration Guides: Cisco Identity Services Engine User Guides: http://www.cisco.com/en/us/products/ps11640/products_user_guide_list.html For more information about Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software releases, please refer to following URLs: For Cisco Catalyst 2900 series switches: http://www.cisco.com/en/us/products/ps6406/products_installation_and_configuration_guides_list.html For Cisco Catalyst 3000 series switches: http://www.cisco.com/en/us/products/ps7077/products_installation_and_configuration_guides_list.html For Cisco Catalyst 3000-X series switches: http://www.cisco.com/en/us/products/ps10745/products_installation_and_configuration_guides_list.html For Cisco Catalyst 4500 series switches: http://www.cisco.com/en/us/products/hw/switches/ps4324/products_installation_and_configuration_guides_ list.html For Cisco Catalyst 6500 series switches: http://www.cisco.com/en/us/products/hw/switches/ps708/products_installation_and_configuration_guides_li st.html For Cisco ASR 1000 series routers: http://www.cisco.com/en/us/products/ps9343/products_installation_and_configuration_guides_list.html For Cisco Wireless LAN Controllers: http://www.cisco.com/en/us/docs/wireless/controller/7.2/configuration/guide/cg.html Cisco Systems 2015 Page 19