MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series



Similar documents
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

TrustSec How-To Guide: On-boarding and Provisioning

On-boarding and Provisioning with Cisco Identity Services Engine

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Cisco ISE 1.2 BYOD Lab Guide

Cisco TrustSec Solution Overview

Configure ISE Version 1.4 Posture with Microsoft WSUS

Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Server Software Installation Guide

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Windows XP User guide for wired network v1.1

Cisco Secure BYOD Solution

AVG Business SSO Partner Getting Started Guide

Introduction to Mobile Access Gateway Installation

Virtual Data Centre. User Guide

VoIP Intercom and Cisco Call Manager Server Setup Guide

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Palo Alto Networks User-ID Services. Unified Visitor Management

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Active Directory Self-Service FAQ

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference


Quick Installation Guide

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Preparing for GO!Enterprise MDM On-Demand Service

Integrating Cisco Identity Services Engine with GO!Enterprise MDM

Symantec VIP Integration with ISE

Getting Started - MDM Setup

mystanwell.com Installing Citrix Client Software Information and Business Systems

Mobile Device Management Version 8. Last updated:

Optimum Business SIP Trunk Set-up Guide

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

UP L18 Enhanced MDM and Updated Protection Hands-On Lab

Web Authentication Application Note

vcloud Director User's Guide


VMware Identity Manager Administration

Multi-Factor Authentication Job Aide

Remote Access End User Reference Guide for SHC Portal Access

The BYOD Wave: Policy, Security, and Wireless Infrastructure

Cloud Services MDM. ios User Guide

OneLogin Integration User Guide

Technical Note. ForeScout CounterACT: Virtual Firewall

VPN: Virtual Private Network Setup Instructions

Advanced Configuration Steps

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Manual for configuring NIC VPN in Windows OS

Introduction to Google Apps for Business Integration

IIS, FTP Server and Windows

ClearPass Policy Manager

Copyright 2013, 3CX Ltd.

Snom 720 and Elastix Server

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

This chapter describes the licensing mechanism and schemes that are available for Cisco ISE and how to add and upgrade licenses.

MobileIron Support. Table of Contents. 1. Introduction. 2. Supported Features. Version November 2015

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

QuickStart Guide for Mobile Device Management

Penn State Wireless 2.0 and Related Services for Network Administrators

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

Mac OS X User Manual Version 2.0

Secure Your Mobile Device Access with Cisco BYOD Solutions

Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide

Crestron Electronics, Inc. AirMedia Deployment Guide

Network Security Solutions Implementing Network Access Control (NAC)

Sophos Mobile Control SaaS startup guide. Product version: 6

Defender Token Deployment System Quick Start Guide

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

QuickStart Guide for Mobile Device Management. Version 8.6

V310 Support Note Version 1.0 November, 2011

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

QUICK INSTALLATION GUIDE ACTIVATE

Install and End User Reference Guide for Direct Access to Citrix Applications

Administering Cisco ISE

NAC Guest. Lab Exercises

Cisco EXAM Enterprise Network Unified Access Essentials. Buy Full Product.

Passguide q

Vodafone Secure Device Manager Administration User Guide

Server Installation ZENworks Mobile Management 2.7.x August 2013

Administering Jive Mobile Apps

Bring Your Own Device

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V p13 Configuration Guide

Kaspersky Lab Mobile Device Management Deployment Guide

Introduction to the EIS Guide

Verizon Remote Access User Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

UAG4100 Support Notes

D-Link Central WiFiManager Configuration Guide

WatchDox Administrator's Guide. Application Version 3.7.5

Transcription:

MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012

Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?... 3 About the TrustSec How-To Guides... 3 Mobile Device Management (MDM)... 4 Overview... 4 MDM Integration Use-case... 4 Components... 5 Using MDM Integration Configuration Steps... 7 Cisco ISE and MDM integration configuration... 7 Review the MDM dictionaries... 11 Configure ISE Authorization Policies... 11 Appendix A: MobileIron Configuration... 16 Appendix B: References... 19 Cisco TrustSec System:... 19 Device Configuration Guides:... 19 Cisco Systems 2015 Page 2

Introduction What Is the Cisco TrustSec System? Cisco TrustSec, a core component of the Cisco SecureX Architecture, is an intelligent access control solution. TrustSec mitigates security risks by providing comprehensive visibility into whom and what is connecting across the entire network infrastructure, and exceptional control over what and where they can go. TrustSec builds on your existing identity-aware access layer infrastructure (switches, wireless controllers, and so on). The solution and all the components within the solution are thoroughly vetted and rigorously tested as an integrated system. In addition to combining standards-based identity and enforcement models, such as IEEE 802.1X and VLAN control, the TrustSec system it also includes advanced identity and enforcement capabilities such as flexible authentication, Downloadable Access Control Lists (dacls), Security Group Tagging (SGT), device profiling, posture assessments, and more. Wireless user Ingress Enforcement RADIUS Guest Services Posture Profiler SXP Wired user MACsec Campus Network Security Group Tag Security Group Tag Ingress Enforcement Data Center Egress Enforcement Figure 1. About the TrustSec How-To Guides The TrustSec team is producing this series of How-To documents to describe best practices for TrustSec deployments. The documents in the series build on one another and guide the reader through a successful implementation of the TrustSec system. You can use these documents to follow the prescribed path to deploy, or simply pick the single usecase that meets your specific need. Cisco Systems 2015 Page 3

Mobile Device Management (MDM) Overview Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. A typical MDM product consists of a policy server, a mobile device client and an optional inline enforcement point that controls the use of some applications on a mobile device (like email) in the deployed environment. However the network is the only entity that can provide granular access to endpoints (based on ACL s, TrustSec SGT s etc). It is envisaged that Cisco Identity Services Engine (ISE) would be an additional network based enforcement point while the MDM policy server would serve as the policy decision point. ISE expects specific data from MDM servers to provide a complete solution The following are the high-level use cases in this solution. Device registration- Non registered endpoints accessing the network on-premises will be redirected to registration page on MDM server for registration based on user role, device type, etc Remediation- Non compliant endpoints will be given restricted access based on compliance state Periodic compliance check Periodically check with MDM server for compliance Ability for administrator in ISE to issue remote actions on the device through the MDM server (e.g.: remote wiping of the managed device) Ability for end user to leverage the ISE My Devices Portal to manage personal devices, e.g. Full Wipe, Corporate Wipe and PIN Lock. Sample Network Topology Figure 2. ISE+MDM Integration Topology MDM Integration Use-case 1. User associates device to SSID 2. If user device is not registered, user goes through the BYOD on-boarding flow, details listed in Appendix Cisco Systems 2015 Page 4

3. ISE makes an API call to MDM server 4. This API call returns list of devices for this user and the posture status for the devices Please note that we can pass MAC address of endpoint device as input parameter. 5. If user s device is not in this list, it means device is not registered with the MDM provider. ISE will send an authorization to NAD to redirect to ISE, which will re-direct users to the MDM server (home page or landing page) 6. ISE will know that this device needs to be provisioned using MDM and will present an appropriate page to user to proceed to registration. 7. User will be transferred to the MDM policy engine where registration will be completed by the user. Control will transfer back to ISE either through automatic redirection by MDM server or by user refreshing their browser again. 8. ISE will query MDM again to gain knowledge of posture status 9. If the user device is not in compliant to the posture (compliance) policies configured on MDM, they will be notified that the device is out of compliance, reason for non-compliance and the need to be in compliance to access network resources. 10. Once user s device becomes compliant, MDM server will update the device state in its internal tables. 11. At this stage user can refresh the browser at which point control would transfer back to ISE. 12. ISE would also poll the MDM server periodically to get compliance information and issue COA s appropriately. Components Table 1. Table 1: Components Used in this Document Component Hardware Features Tested Cisco IOS Software Release The Cisco Identity Services Engine (ISE) Any: 1121/3315, 3355, 3395, VMware Integrated AAA, policy server, and services (guest, profiler, and posture) ISE 1.2 MDM Server MDM Certificate Authority Server (Optional) Any per specification of Microsoft (Windows 2008 R2 Enterprise SP2) SCEP, Certificate Authority Server N/A Wireless LAN Controller (WLC) 5500-series 2500-series Profiling and Change of Authorization (CoA) Unified Wireless 7.2.??? WLSM-2 Virtual Controller Test Devices: Apple & Google N/A Apple ios 5.0 Cisco Systems 2015 Page 5

Component Hardware Features Tested Cisco IOS Software Release E.g. Apple ios, Google Android and higher Google Android 2.3 and higher Within this document, we demonstrated MDM configuration only. We recommend using our How-To-Guide to configure ISE and WLC to a recommended state. How-to-Guide: http://www.cisco.com/en/us/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_60_byod_certificate s.pdf More guides are available at: http://www.cisco.com/en/us/solutions/ns340/ns414/ns742/ns744/landing_designzone_trustsec.html Cisco Systems 2015 Page 6

Using MDM Integration Configuration Steps Cisco ISE and MDM integration configuration Figure 3 shows the main steps in configuring MDM Integration. Figure 3. MDM Configuration Flow Add External MDM Server to ISE MDM Servers can be used as a cloud service or installed locally on premises. Once the installation, basic setup and compliance checks are configured on the MDM server, it can then be added to ISE Export MDM Server Certificate Step 1 Step 1: Export MDM Server Certificate and save it on local machine. Cisco Systems 2015 Page 7

Figure 4. Export MDM Certificate Step 2 Import the certificate in to ISE. Navigate to: Administration -> Certificates -> Certificate Store -> Import. Optional: Add a friendly name and then click Submit Figure 5. Import MDM Certificate to Cisco ISE Step 3 Verify that Certificate is in Certificate Store. Cisco Systems 2015 Page 8

Figure 6. Verify MDM Certificate in Cisco ISE Step 4 Add MDM Server. Administration -> MDM Note: Please review Appendix A to ensure that the account used to connect to Airwatch MDM Server has the API role assigned. Figure 7. ADD MDM Server in Cisco ISE Step 5 Click ADD, and then enter MDM Server details. Cisco Systems 2015 Page 9

Figure 8. ADD MDM Server in Cisco ISE Step 6 Click Test Connection, ISE will confirm that connection is working. Figure 9. ADD MDM Server in Cisco ISE Step 7 Click OK on this pop-up and then select the checkbox. Step 8 Click the Submit button, the server will be added, the following success message with the presented to the admin. Figure 10. ADD MDM Server in Cisco ISE Cisco Systems 2015 Page 10

Figure 11. Server Added Review the MDM dictionaries Once the MDM server is added, the supported dictionaries now show-up in ISE, which could be later used in to ISE Authorization Policies. Step 1 Navigate to: Policy -> Policy Elements -> Dictionaries -> MDM -> Dictionary Attribute Figure 12. Review MDM Dictionaries in Cisco ISE Configure ISE Authorization Policies Once MDM server is added in to ISE, we can configure authorization polices in ISE to leverage the new dictionaries added for MDM servers. Note: Within this document, we demonstrated using dictionary attributes MDM:DeviceRegisterStatus EQUALS UnRegistered and MDM:DeviceCompliantStatus EQUALS NonCompliant. Please configure and test additional attributes as well Cisco Systems 2015 Page 11

Step 2 Create an ACL named NSP-ACL in the Wireless LAN Controller, which would be used in the policy later to redirect clients selected for BYOD supplicant provisioning, Certificate provisioning and MDM Quarantine. The Cisco Identity Services Engine IP address = 10.35.50.165 Internal Corporate Networks = 192.168.0.0, 172.16.0.0 (to redirect) MDM Server subnet = 204.8.168.0 Explanation of the NSP-ACL in Figure 13 is as follows Figure 13. Access Control List for re-directing client to BYOD flow 1. Allow all traffic outbound from Server to Client 2. Allow ICMP traffic inbound from Client to Server for trouble shooting, it is optional 3. Allow access to MDM server for un-registered and non-compliant devices to download the MDM agent and proceed with compliance checks 4. Allow all traffic inbound from Client to Server to ISE for Web Portal and supplicant and Certificate provisioning flows 5. Allow DNS traffic inbound from Client to Server for name resolution. 6. Allow DHCP traffic inbound from Client to Server for IP addresses. Cisco Systems 2015 Page 12

7. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 8. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 9. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 10. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 11. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 12. Deny all traffic inbound from Client to Server to corporate resources for redirection to ISE (As per company policy) 13. Permit all the rest of traffic (Optional) Step 3 Step 4 Create an Authorization Profile named MDM_Quarantine for devices which are not in compliant to MDM polices. In this case all non-compliant devices will be redirected to ISE and presented with a message. Click Policy Policy Elements Results, Click Authorization Authorization Profiles ADD Figure 14. Authorization Profiles Navigation Figure 15. Authorization Policy Configuration Cisco Systems 2015 Page 13

Figure 16. Authorization Policy Configuration Figure 17. NSP-ACL Note: NSP-ACL needs to be defined on the Wireless LAN Controller. Step 5 Create Authorization Policy. Click Policy Authorization Authorization Profiles. Click Insert New Rule Below. Cisco Systems 2015 Page 14

Figure 18. Insert New Rule Please add the following Authorization Policy MDM_Un_Registered = This Authorization Rule is added for devices which are not yet registered with an MDM server. Once the device hits this rule, it will be forwarded to ISE MDM landing page, which will present user with information on registering the device with MDM. MDM_Non_Compliant = This Authorization Rule is added for devices which are not in compliant to MDM policies. Once the Android device hits the Register button during device registration, ISE sends a Re-Auth COA to the controller. Once the device hits this rule, it will be forwarded to ISE MDM landing page, which will present user with information on compliance failure. PERMIT = Once the device is registered with ISE, registered with MDM and is in compliance to ISE and MDM policies it will be granted access to the network Figure 19. Authorization Policy Configuration View You are done! Please see the HowTo guide: BYOD Using Certificates for Differentiated Access for more information on provisioning certificates along with the supplicant profile. Note: MDM policies could also be defined in more granular details on Cisco ISE, e.g Demonstrations If interested in looking at the end-user experience for on-boarding i-devices, Android, Windows and MAC OSx, please visit the following website. http://wwwin.cisco.com/tech/snsbu/prod-sols/ise/#sectionname=4 Cisco Systems 2015 Page 15

Appendix A: MobileIron Configuration In this section we will review configuration of the MobileIron Server for the corporate policies. Please refer to MobileIron documentation for configuration specific to the use case and your corporate polices, This section only highlight simple configuration required to get the setup up and running. This highlight the following: Verify admin account privileges for REST API, i.e. account used by ISE to send a REST API call to MobileIron Server Review the Default Security Policies Review the ios APP installation configuration (AnyConnect) Step 6 Access the MobileIron administrative web interface. a. On Admin PC, launch Mozilla Firefox web browser. Enter MobileIron URL in the address bar: https://mobileiron.demo.local/admin Note: URL listed here is a sample URL Figure 20. jjjghgghggugu b. Login with username and password. Once you login, the USER & DEVICES tab should display. Step 7 User Management a. Navigate to USERS & DEVICES > User Management. From there, click the checkbox before admin user and click on Assign Roles. b. Notice that API check box is selected for the user c. Navigate to USERS & DEVICES > User Management. From there, click the checkbox before employee1 user and click on Assign Roles. d. Notice that API check box is NOT selected for the user Cisco Systems 2015 Page 16

Step 1 Security Policies on MobileIron Server a. Navigate to POLICIES > All Policies à Default Security Policy. From there, click the Edit button on the right side of the screen. w Review the Policies e.g. Password, Type, Length, Data Encryption etc. Step 2 Application Policies on MobileIron Server a. Navigate to APPS & CONFIGS > App Distribution. From there, click the dropdown button and select ios b. Cisco AnyConnect application has already been uploaded to the MobileIron server from APP store, Click the Edit button to review the details. c. Notice the configuration where MobileIron server would send a installation request to the endpoint at the time of registration. d. Cisco WebEx application has already been uploaded to the MobileIron server from APP store, Click the Edit button to review the details. e. Click on Yes where MobileIron server would send an installation request to the endpoint at the time of registration. Step 1 Application Control Policies on MobileIron Server a. Navigate to APPS & CONFIGS > App Control. b. Click the Edit button for Anyconnect application. Cisco Systems 2015 Page 17

c. Edit the following as per below diagram. Attribute Value Name AnyConnect Type Required App Name IS App Search String AnyConnect Device Platform ALL Comment AnyConnect d. Click the Edit button for WebEx application e. Edit the following as per below diagram Attribute Name WebEx Type Required App Name IS App Search String WebEx Device Platform ALL Comment WebEx Value Cisco Systems 2015 Page 18

Appendix B: References Cisco TrustSec System: http://www.cisco.com/go/trustsec http://www.cisco.com/en/us/solutions/ns340/ns414/ns742/ns744/landing_designzone_trustsec.html Device Configuration Guides: Cisco Identity Services Engine User Guides: http://www.cisco.com/en/us/products/ps11640/products_user_guide_list.html For more information about Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software releases, please refer to following URLs: For Cisco Catalyst 2900 series switches: http://www.cisco.com/en/us/products/ps6406/products_installation_and_configuration_guides_list.html For Cisco Catalyst 3000 series switches: http://www.cisco.com/en/us/products/ps7077/products_installation_and_configuration_guides_list.html For Cisco Catalyst 3000-X series switches: http://www.cisco.com/en/us/products/ps10745/products_installation_and_configuration_guides_list.html For Cisco Catalyst 4500 series switches: http://www.cisco.com/en/us/products/hw/switches/ps4324/products_installation_and_configuration_guides_ list.html For Cisco Catalyst 6500 series switches: http://www.cisco.com/en/us/products/hw/switches/ps708/products_installation_and_configuration_guides_li st.html For Cisco ASR 1000 series routers: http://www.cisco.com/en/us/products/ps9343/products_installation_and_configuration_guides_list.html For Cisco Wireless LAN Controllers: http://www.cisco.com/en/us/docs/wireless/controller/7.2/configuration/guide/cg.html Cisco Systems 2015 Page 19