ISE Deep Dive

2026. 3. 23. 16:46ใ†CCIE EI/Secure LAN - ISE

Cisco ISE Deep Dive โ€” Expert Level ์™„์ „ ์ •๋ณต
๐Ÿ›ก๏ธ Expert-Level Technical Series

Cisco ISE Deep Dive
์™„์ „ ์ •๋ณต ๊ฐ€์ด๋“œ

Architecture ยท 802.1X ยท Profiling ยท Posture ยท Guest ยท BYOD ยท TrustSec ยท pxGrid ยท TACACS+ ยท Troubleshooting

๐Ÿ“… 2026.03.23 โฑ๏ธ ์•ฝ 45๋ถ„ ์ฝ๊ธฐ ๐Ÿท๏ธ ISE 3.x / CCIE Security

01 ISE ๊ฐœ์š” ๋ฐ Zero Trust์—์„œ์˜ ์—ญํ• 

Cisco Identity Services Engine(ISE)์€ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋„คํŠธ์›Œํฌ์—์„œ ์ •์ฑ… ๊ฒฐ์ • ํฌ์ธํŠธ(Policy Decision Point, PDP)๋กœ ๊ธฐ๋Šฅํ•˜๋Š” ์ฐจ์„ธ๋Œ€ NAC(Network Access Control) ํ”Œ๋žซํผ์ด๋‹ค. ๋‹จ์ˆœํ•œ AAA ์„œ๋ฒ„๋ฅผ ๋„˜์–ด, ์‚ฌ์šฉ์žยท๋””๋ฐ”์ด์Šคยท์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ปจํ…์ŠคํŠธ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ , ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ ‘๊ทผ ์ •์ฑ…์„ ๋™์ ์œผ๋กœ ์ ์šฉํ•˜๋ฉฐ, ์œ„ํ˜‘์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๊ฒฉ๋ฆฌํ•˜๋Š” Zero Trust Architecture์˜ ํ•ต์‹ฌ ์—”์ง„์ด๋‹ค.

ISE๊ฐ€ ํ•ด๊ฒฐํ•˜๋Š” ํ•ต์‹ฌ ๋ฌธ์ œ

  • Visibility Gap: ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋œ ๋ชจ๋“  ์—”๋“œํฌ์ธํŠธ(์‚ฌ์šฉ์ž, IoT, OT ์žฅ๋น„)์˜ ์ •์ฒด๋ฅผ ํŒŒ์•…ํ•˜์ง€ ๋ชปํ•˜๋ฉด ์ •์ฑ…์„ ์„ธ์šธ ์ˆ˜ ์—†๋‹ค.
  • Policy Fragmentation: Wired, Wireless, VPN, DC, Cloud ๊ฐ ๋„๋ฉ”์ธ๋งˆ๋‹ค ๋ณ„๋„ ์ •์ฑ… ์ปจํŠธ๋กค๋Ÿฌ๊ฐ€ ์กด์žฌํ•˜์—ฌ ์ผ๊ด€๋œ ๋ณด์•ˆ์ด ์–ด๋ ต๋‹ค.
  • Static ACL ํ•œ๊ณ„: IP ๊ธฐ๋ฐ˜ ACL์€ ์‚ฌ์šฉ์ž ๋กœ๋ฐ, DHCP ํ™˜๊ฒฝ์—์„œ ๋ฌด๋ ฅํ•˜๋ฉฐ, ์ˆ˜์ฒœ ์ค„์˜ ACE ๊ด€๋ฆฌ๋Š” ์šด์˜ ์•…๋ชฝ์ด๋‹ค.
  • Compliance Enforcement: ์—”๋“œํฌ์ธํŠธ์˜ ๋ณด์•ˆ ์ƒํƒœ(ํŒจ์น˜, AV, ์•”ํ˜ธํ™”) ๋ฏธํ™•์ธ ์‹œ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•˜๋Š” ๊ฒƒ์€ Zero Trust ์œ„๋ฐ˜์ด๋‹ค.

๐Ÿ’ก ISE์˜ 3๋Œ€ ์ถ• (Three Pillars)

โ‘  Visibility โ€” ํ”„๋กœํŒŒ์ผ๋ง + AI Endpoint Analytics๋กœ "Who/What is on the network" ํ™•๋ณด
โ‘ก Control โ€” 802.1X, MAB, WebAuth, Posture๋ฅผ ํ†ตํ•œ ์ธ์ฆยท์ธ๊ฐ€ยท์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ฐ•์ œ
โ‘ข Segmentation โ€” TrustSec SGT ๊ธฐ๋ฐ˜ ๋งˆ์ดํฌ๋กœ์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜์œผ๋กœ lateral movement ์ฐจ๋‹จ

ISE๋Š” RADIUS/TACACS+ ํ”„๋กœํ† ์ฝœ์„ ์ฒ˜๋ฆฌํ•˜๋Š” ๋™์‹œ์—, DHCP, CDP, LLDP, NetFlow, HTTP, SNMP ๋“ฑ ๋‹ค์–‘ํ•œ ํ”„๋กœํ† ์ฝœ์˜ ์ปจํ…์ŠคํŠธ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•œ๋‹ค. ์ˆ˜์ง‘๋œ ์ปจํ…์ŠคํŠธ๋Š” Security Group Tag(SGT)๋ผ๋Š” ๋ ˆ์ด๋ธ”๋กœ ์ถ”์ƒํ™”๋˜์–ด, ๋„คํŠธ์›Œํฌยท๋ณด์•ˆ ๋„๋ฉ”์ธ ์ „์ฒด์— ์ผ๊ด€๋œ ์ •์ฑ… ์‹๋ณ„์ž๋กœ ๋ฐฐํฌ๋œ๋‹ค.

02 Architecture Deep Dive โ€” Persona ยท Node ยท Deployment

2.1 ISE Persona (์—ญํ•  ๋ถ„๋ฆฌ)

ISE ์•„ํ‚คํ…์ฒ˜์˜ ํ•ต์‹ฌ์€ Persona ๊ธฐ๋ฐ˜ ์—ญํ•  ๋ถ„๋ฆฌ์ด๋‹ค. ๊ฐ ISE ๋…ธ๋“œ๋Š” ํ•˜๋‚˜ ์ด์ƒ์˜ Persona๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์†Œ๊ทœ๋ชจ ํ™˜๊ฒฝ์—์„œ๋Š” ๋ชจ๋“  Persona๋ฅผ ๋‹จ์ผ ๋…ธ๋“œ์— ํ†ตํ•ฉ(Standalone), ๋Œ€๊ทœ๋ชจ ํ™˜๊ฒฝ์—์„œ๋Š” ์ „์šฉ ๋…ธ๋“œ๋กœ ๋ถ„์‚ฐ(Distributed) ๋ฐฐํฌํ•œ๋‹ค.

Persona ์•ฝ์นญ ํ•ต์‹ฌ ๊ธฐ๋Šฅ HA ๊ตฌ์„ฑ
Administration PAN ์ •์ฑ… ๊ตฌ์„ฑ, ๋ผ์ด์„ ์Šค ๊ด€๋ฆฌ, DB Replication Master, GUI ์ œ๊ณต Active/Standby (์ตœ๋Œ€ 2๋…ธ๋“œ)
Policy Service PSN RADIUS/TACACS+ ์ฒ˜๋ฆฌ, Profiling Probe, Posture, Guest, BYOD Active/Active (LB VIP ์‚ฌ์šฉ), ์ตœ๋Œ€ 50 PSN
Monitoring MnT ๋กœ๊ทธ ์ˆ˜์ง‘ยท์ƒ๊ด€๋ถ„์„, ๋ฆฌํฌํŠธ, ์•Œ๋žŒ Active/Standby (์ตœ๋Œ€ 2๋…ธ๋“œ)
pxGrid PXG ์ปจํ…์ŠคํŠธ ๊ณต์œ  ํ—ˆ๋ธŒ (WebSocket/STOMP) Active/Active (์ตœ๋Œ€ 4๋…ธ๋“œ)

2.2 Distributed Deployment ์•„ํ‚คํ…์ฒ˜

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ DATA CENTER 1 โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Primary โ”‚ โ”‚ Primary โ”‚ โ”‚ PSN-1 โ”‚ โ”‚ PXG-1 โ”‚ โ”‚ โ”‚ โ”‚ PAN โ”‚โ—„โ”€โ–บโ”‚ MnT โ”‚ โ”‚(RADIUS) โ”‚ โ”‚ (pxGrid) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ–ฒ โ–ฒ โ–ฒ โ”‚ โ”‚ โ”‚ DB Repl โ”‚ Syslog โ”‚ RADIUS โ”‚ โ”‚========โ”‚==============โ”‚==============โ”‚=======================โ”‚ โ”‚ โ–ผ โ–ผ โ–ผ โ”‚ โ”‚ WAN / MPLS / SD-WAN โ”‚ โ”‚========โ”‚==============โ”‚==============โ”‚=======================โ”‚ โ”‚ โ–ผ โ–ผ โ–ผ โ”‚ โ”‚ DATA CENTER 2 โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚Secondary โ”‚ โ”‚Secondary โ”‚ โ”‚ PSN-2 โ”‚ โ”‚ PXG-2 โ”‚ โ”‚ โ”‚ โ”‚ PAN โ”‚โ—„โ”€โ–บโ”‚ MnT โ”‚ โ”‚(RADIUS) โ”‚ โ”‚ (pxGrid) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ PSN์€ ์ง€์—ญ๋ณ„ AD์™€ co-locate | PANโ†”PSN ๊ฐ„ latency โ‰ค 300ms RTT

2.3 ์„ค๊ณ„ ํ•ต์‹ฌ ์›์น™

  • PAN-PSN ๊ฐ„ ์ง€์—ฐ: Round-trip 300ms ์ด๋‚ด. DB Replication๊ณผ ์ •์ฑ… Push๊ฐ€ ์ด ๋งํฌ๋ฅผ ์‚ฌ์šฉํ•œ๋‹ค.
  • PSN-MnT ๊ฐ„ ๋Œ€์—ญํญ: Audit Log๊ฐ€ ๋Œ€๋Ÿ‰ ์ „์†ก๋˜๋ฏ€๋กœ ์ถฉ๋ถ„ํ•œ bandwidth ํ™•๋ณด ํ•„์ˆ˜.
  • PSN-AD Co-location: RADIUS ์ธ์ฆ ์‹œ AD Lookup์ด ๋ฐœ์ƒํ•˜๋ฏ€๋กœ, PSN๊ณผ AD DC๋ฅผ ๊ฐ™์€ ์‚ฌ์ดํŠธ์— ๋ฐฐ์น˜ํ•œ๋‹ค.
  • Load Balancer: Calling-Station-ID(MAC) ๊ธฐ๋ฐ˜ Sticky Session์œผ๋กœ PSN ๋ถ„์‚ฐ. URL Redirect ์„œ๋น„์Šค(Guest, Posture) ์‚ฌ์šฉ ์‹œ PSN Node Group ๊ตฌ์„ฑ ํ•„์ˆ˜.
  • N+1 ๋˜๋Š” N+2 Redundancy: PSN ๊ทธ๋ฃน ๋‚ด ์˜ˆ๋น„ ๋…ธ๋“œ๋ฅผ ํ™•๋ณดํ•˜์—ฌ, ๋‹จ์ผ PSN ์žฅ์•  ์‹œ์—๋„ ์ธ์ฆ ์ฒ˜๋ฆฌ๋Ÿ‰ ์œ ์ง€.
๐Ÿ’ก Expert Tip
ISE 3.3๋ถ€ํ„ฐ Very Small Deployment Node(8 vCPU)๊ฐ€ ์ง€์›๋œ๋‹ค. ์›๊ฒฉ์ง€ ์ž„์‹œ ๋ฐฐํฌ๋‚˜ Lab ํ™˜๊ฒฝ์—์„œ ๋ฆฌ์†Œ์Šค๋ฅผ ์ ˆ์•ฝํ•  ์ˆ˜ ์žˆ๋‹ค. ๋‹จ, Production ํ™˜๊ฒฝ์—์„œ๋Š” SNS 3615/3655/3795 ๊ธ‰ ํ•˜๋“œ์›จ์–ด๋ฅผ ๊ถŒ์žฅํ•œ๋‹ค.

03 Authentication ๋ฉ”์ปค๋‹ˆ์ฆ˜

3.1 802.1X (EAP ๊ธฐ๋ฐ˜ ์ธ์ฆ)

802.1X๋Š” ISE์—์„œ ๊ฐ€์žฅ ๊ฐ•๋ ฅํ•œ ์ธ์ฆ ๋ฐฉ์‹์ด๋‹ค. Supplicant โ†” Authenticator(Switch/WLC) โ†” Authentication Server(ISE) 3์ž ๊ตฌ์กฐ๋กœ ๋™์ž‘ํ•˜๋ฉฐ, EAPoL(EAP over LAN)๋กœ ์บก์Аํ™”๋œ ์ธ์ฆ ํ”„๋ ˆ์ž„์ด ๊ตํ™˜๋œ๋‹ค.

์ฃผ์š” EAP ๋ฐฉ์‹ ๋น„๊ต

EAP ๋ฐฉ์‹์ธ์ฆ ์š”์†ŒInner MethodํŠน์ง•
EAP-TLS์ธ์ฆ์„œ (Mutual TLS)์—†์Œ์ตœ๊ณ  ๋ณด์•ˆ, ์ธ์ฆ์„œ ์ธํ”„๋ผ(PKI) ํ•„์ˆ˜
PEAP-MSCHAPv2์„œ๋ฒ„ ์ธ์ฆ์„œ + ์‚ฌ์šฉ์ž ID/PWMSCHAPv2๊ฐ€์žฅ ์ผ๋ฐ˜์ , AD ํ†ตํ•ฉ ์šฉ์ด
EAP-FASTPAC ๋˜๋Š” ์ธ์ฆ์„œMSCHAPv2/GTCCisco ๋…์ž, EAP Chaining ์ง€์›
TEAP์ธ์ฆ์„œ + ID/PWEAP-TLS + MSCHAPv2RFC 7170 ํ‘œ์ค€, Machine+User Chaining
โ„น๏ธ EAP Chaining์ด๋ž€?
๋‹จ์ผ EAP ์„ธ์…˜ ๋‚ด์—์„œ Machine Authentication + User Authentication์„ ์ˆœ์ฐจ ์ˆ˜ํ–‰ํ•˜๋Š” ๊ธฐ๋ฒ•์ด๋‹ค. TEAP ๋˜๋Š” EAP-FAST์—์„œ ์ง€์›ํ•˜๋ฉฐ, "์ด ์žฅ๋น„๊ฐ€ ํšŒ์‚ฌ ์†Œ์œ ์ด๊ณ  + ์ด ์‚ฌ์šฉ์ž๊ฐ€ ์ธ์ฆ๋œ ์ง์›"์ž„์„ ๋™์‹œ์— ๊ฒ€์ฆํ•œ๋‹ค. ISE Authorization Policy์—์„œ Network Access:EAPChainingResult = User and Machine Both Succeeded ์กฐ๊ฑด์œผ๋กœ ์ •๋ฐ€ ์ •์ฑ…์„ ๊ตฌ์„ฑํ•  ์ˆ˜ ์žˆ๋‹ค.

3.2 MAB (MAC Authentication Bypass)

802.1X Supplicant๊ฐ€ ์—†๋Š” ๋””๋ฐ”์ด์Šค(ํ”„๋ฆฐํ„ฐ, IP Phone, IoT, OT ์žฅ๋น„)์— ๋Œ€ํ•ด MAC ์ฃผ์†Œ๋ฅผ ID๋กœ ์‚ฌ์šฉํ•˜๋Š” Fallback ์ธ์ฆ์ด๋‹ค.

! Switch Configuration โ€” 802.1X + MAB Fallback
interface GigabitEthernet1/0/1
 switchport mode access
 switchport access vlan 100
 authentication port-control auto
 authentication order dot1x mab
 authentication priority dot1x mab
 mab
 dot1x pae authenticator
 dot1x timeout tx-period 10
 authentication timer reauthenticate 3600
 authentication event fail action next-method
 authentication event server dead action authorize vlan 999
 authentication event server alive action reinitialize
IOS-XE 802.1X + MAB
โš ๏ธ MAB ๋ณด์•ˆ ํ•œ๊ณ„
MAC ์ฃผ์†Œ๋Š” ์Šคํ‘ธํ•‘์ด ๊ฐ€๋Šฅํ•˜๋ฏ€๋กœ, MAB ๋‹จ๋…์œผ๋กœ๋Š” ๋ณด์•ˆ์„ฑ์ด ๋‚ฎ๋‹ค. ๋ฐ˜๋“œ์‹œ Profiling๊ณผ ๊ฒฐํ•ฉํ•˜์—ฌ ๋””๋ฐ”์ด์Šค ์ข…๋ฅ˜๋ฅผ ํ™•์ธํ•˜๊ณ , ์ตœ์†Œ ๊ถŒํ•œ ์›์น™์— ๋”ฐ๋ผ ์ œํ•œ๋œ DACL/SGT๋ฅผ ๋ถ€์—ฌํ•ด์•ผ ํ•œ๋‹ค.

3.3 Web Authentication (CWA / LWA)

  • CWA (Central Web Authentication): ISE๊ฐ€ ์ง์ ‘ Web Portal์„ ํ˜ธ์ŠคํŒ…. Switch/WLC๊ฐ€ HTTP Redirect ACL์„ ์ ์šฉํ•˜์—ฌ ํŠธ๋ž˜ํ”ฝ์„ ISE๋กœ ๋ฆฌ๋‹ค์ด๋ ‰ํŠธ. Guest, BYOD ์˜จ๋ณด๋”ฉ์— ์‚ฌ์šฉ.
  • LWA (Local Web Authentication): Switch/WLC ์ž์ฒด Portal. ISE๋Š” ๋’ท๋‹จ RADIUS ์„œ๋ฒ„ ์—ญํ• ๋งŒ ์ˆ˜ํ–‰. ๊ธฐ๋Šฅ์ด ์ œํ•œ์ ์ด๋ผ CWA ๊ถŒ์žฅ.

3.4 Authentication Flow (802.1X ๊ธฐ์ค€)

Endpoint Switch (NAD) ISE (PSN) AD/LDAP โ”‚ โ”‚ โ”‚ โ”‚ โ”‚โ”€โ”€EAPoL-Startโ”€โ”€โ”€โ”€โ”€โ”€โ–บโ”‚ โ”‚ โ”‚ โ”‚โ—„โ”€EAP-Request/IDโ”€โ”€โ”€โ”‚ โ”‚ โ”‚ โ”‚โ”€โ”€EAP-Response/IDโ”€โ”€โ–บโ”‚ โ”‚ โ”‚ โ”‚ โ”‚โ”€โ”€RADIUS Access-Reqโ”€โ–บโ”‚ โ”‚ โ”‚ โ”‚ โ”‚โ”€โ”€LDAP/Kerberosโ”€โ”€โ”€โ–บโ”‚ โ”‚ โ”‚ โ”‚โ—„โ”€Auth Resultโ”€โ”€โ”€โ”€โ”€โ”€โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚โ—„โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ EAP Challenge/Response (TLS Tunnel) โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–บโ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚โ—„โ”€RADIUS Acceptโ”€โ”€โ”€โ”€โ”€โ”€โ”‚ โ”‚ โ”‚ โ”‚ (VLAN, DACL, SGT) โ”‚ โ”‚ โ”‚โ—„โ”€EAPoL-Successโ”€โ”€โ”€โ”€โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ•โ•โ• DATA FLOW (Authorized) โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ”‚

04 Authorization Policy & Policy Sets ์„ค๊ณ„

4.1 Policy Set ๊ณ„์ธต ๊ตฌ์กฐ

ISE์˜ ์ •์ฑ… ์—”์ง„์€ ๊ณ„์ธต์  Policy Set ๊ตฌ์กฐ๋กœ ๋™์ž‘ํ•œ๋‹ค. ์ตœ์ƒ์œ„์— Policy Set ๋งค์นญ ์กฐ๊ฑด์ด ์žˆ๊ณ , ๊ฐ Set ๋‚ด๋ถ€์— Authentication Policy โ†’ Authorization Policy โ†’ Exception Policy๊ฐ€ ์ˆœ์„œ๋Œ€๋กœ ํ‰๊ฐ€๋œ๋‹ค.

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ POLICY SET: "Wired_Access" โ”‚ โ”‚ Condition: RADIUS:NAS-Port-Type = Ethernet โ”‚ โ”‚ Allowed Protocols: Default Network Access โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ โ”Œโ”€โ”€โ”€ AUTHENTICATION POLICY โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Rule 1: Dot1X โ†’ AD (Primary) โ”‚ โ”‚ โ”‚ โ”‚ Rule 2: MAB โ†’ Internal Endpoints โ”‚ โ”‚ โ”‚ โ”‚ Default: Deny Access โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€ AUTHORIZATION POLICY โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Rule 1: AD:Group=IT_Admin โ”‚ โ”‚ โ”‚ โ”‚ โ†’ Full_Access + SGT:IT(10) โ”‚ โ”‚ โ”‚ โ”‚ Rule 2: AD:Group=HR โ”‚ โ”‚ โ”‚ โ”‚ โ†’ HR_DACL + SGT:HR(20) โ”‚ โ”‚ โ”‚ โ”‚ Rule 3: EndpointProfile=Cisco-IP-Phone โ”‚ โ”‚ โ”‚ โ”‚ โ†’ Voice_VLAN + SGT:Voice(30) โ”‚ โ”‚ โ”‚ โ”‚ Rule 4: EAPChaining=Both_Succeeded โ”‚ โ”‚ โ”‚ โ”‚ โ†’ Employee_Full + SGT:Emp(40) โ”‚ โ”‚ โ”‚ โ”‚ Default: Guest_Redirect โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€ EXCEPTION POLICY โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Quarantine Rule: Threat Detected โ”‚ โ”‚ โ”‚ โ”‚ โ†’ Quarantine_VLAN โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

4.2 Authorization Profile ํ•ต์‹ฌ ์š”์†Œ

  • VLAN Assignment: Tunnel-Private-Group-ID RADIUS ์†์„ฑ์œผ๋กœ ๋™์  VLAN ํ• ๋‹น
  • Downloadable ACL (DACL): ISE์—์„œ Switch๋กœ ACL์„ Push. Per-session granularity ์ œ๊ณต
  • Security Group Tag (SGT): cisco-av-pair: cts:security-group-tag=XXXX๋กœ SGT ํ• ๋‹น
  • URL Redirect: Guest Portal, BYOD Portal, Posture Portal๋กœ์˜ CWA ๋ฆฌ๋‹ค์ด๋ ‰ํŠธ
  • Reauthentication Timer: Session Timeout + CoA๋ฅผ ํ†ตํ•œ ์ฃผ๊ธฐ์  ์žฌ์ธ์ฆ
  • Voice Domain Permission: device-traffic-class=voice VSA๋กœ IP Phone ์Œ์„ฑ VLAN ์ธ๊ฐ€

4.3 Condition Dictionary ํ™œ์šฉ

ISE๋Š” ์ˆ˜์‹ญ ๊ฐœ์˜ Dictionary๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, Authorization ์กฐ๊ฑด์—์„œ ๋‹ค์–‘ํ•œ ์†์„ฑ ์กฐํ•ฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค:

/* Expert-Level Authorization Condition ์˜ˆ์‹œ */

Condition:
  IdentityGroup:Name EQUALS "Employee"
  AND
  Network Access:EAPChainingResult EQUALS "User and machine both succeeded"
  AND
  Session:PostureStatus EQUALS "Compliant"
  AND
  DEVICE:Location EQUALS "Seoul_HQ"

Result:
  Profile: Full_Network_Access
  SGT: Employee_Trusted (0010)
ISE Policy Condition
๐Ÿ’ก ์„ค๊ณ„ ์›์น™: Deny by Default
Authorization Policy์˜ Default Rule์€ ๋ฐ˜๋“œ์‹œ Deny ๋˜๋Š” ์ตœ์†Œ ์ ‘๊ทผ(Guest Redirect)์œผ๋กœ ์„ค์ •ํ•œ๋‹ค. "Permit Access"๊ฐ€ Default์ธ ํ™˜๊ฒฝ์€ ๋ณด์•ˆ ๊ตฌ๋ฉ์ด๋‹ค. ๋ช…์‹œ์ ์œผ๋กœ ๋งค์นญ๋˜์ง€ ์•Š๋Š” ๋ชจ๋“  ์„ธ์…˜์€ ์ฐจ๋‹จํ•˜๋Š” ๊ฒƒ์ด Zero Trust ์›์น™์ด๋‹ค.

05 Profiling โ€” ์—”๋“œํฌ์ธํŠธ ์‹๋ณ„๊ณผ ๋ถ„๋ฅ˜

5.1 ํ”„๋กœํŒŒ์ผ๋ง์ด ํ•„์š”ํ•œ ์ด์œ 

"๋ˆ„๊ฐ€ ๋„คํŠธ์›Œํฌ์— ์—ฐ๊ฒฐ๋˜์–ด ์žˆ๋Š”๊ฐ€?"๋Š” ์ ˆ๋ฐ˜์˜ ์งˆ๋ฌธ์ด๋‹ค. "๋ฌด์—‡์ด ์—ฐ๊ฒฐ๋˜์–ด ์žˆ๋Š”๊ฐ€?"๊ฐ€ ๋” ์ค‘์š”ํ•˜๋‹ค. ํ”„๋ฆฐํ„ฐ, IP Phone, IoT ์„ผ์„œ, CCTV, ์˜๋ฃŒ ์žฅ๋น„ ๋“ฑ 802.1X๋ฅผ ์ง€์›ํ•˜์ง€ ์•Š๋Š” ๋””๋ฐ”์ด์Šค๊ฐ€ ๊ธฐ์—… ๋„คํŠธ์›Œํฌ์˜ ์ƒ๋‹น ๋ถ€๋ถ„์„ ์ฐจ์ง€ํ•œ๋‹ค. ISE Profiler๋Š” ๋‹ค์–‘ํ•œ ์†Œ์Šค์˜ ์‹œ๊ทธ๋„์„ ์ˆ˜์ง‘ํ•˜์—ฌ ์—”๋“œํฌ์ธํŠธ๋ฅผ ์ •๋ฐ€ํ•˜๊ฒŒ ๋ถ„๋ฅ˜ํ•œ๋‹ค.

5.2 Profiling Probes

Probe์ˆ˜์ง‘ ๋ฐ์ดํ„ฐ์ •๋ฐ€๋„๋น„๊ณ 
RADIUSCalling-Station-ID, NAS-Port, Framed-IP๋‚ฎ์Œ๊ธฐ๋ณธ ํ™œ์„ฑํ™”
DHCPhostname, class-identifier, vendor-class์ค‘๊ฐ„ip helper-address ๋˜๋Š” SPAN
Device SensorCDP/LLDP/DHCP attributes (Switch์—์„œ ์ˆ˜์ง‘)๋†’์ŒIOS 15.x+, RADIUS accounting์œผ๋กœ ์ „์†ก
SNMPsysObjectID, sysDescr, cdpCacheDeviceId๋งค์šฐ ๋†’์ŒISE 3.5๋ถ€ํ„ฐ SNMPv3 ์ง€์›
HTTPUser-Agent string์ค‘๊ฐ„SPAN ๋˜๋Š” WLC
NetFlowTraffic pattern๋‚ฎ์Œํ–‰์œ„ ๊ธฐ๋ฐ˜ ๋ถ„๋ฅ˜ ๋ณด์กฐ
pxGrid / MDMMDM compliance, device model, OS๋งค์šฐ ๋†’์ŒJamf, Intune, WS1 ์—ฐ๋™
Wi-Fi Edge AnalyticsApple/Intel/Samsung ๋””๋ฐ”์ด์Šค ์†์„ฑ๋†’์ŒCatalyst 9800 WLC โ†’ RADIUS

5.3 Certainty Factor (CF) ๋งค์นญ ๋กœ์ง

ISE Profiler๋Š” Certainty Factor ๊ฐ€์ค‘์น˜ ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•œ๋‹ค. ๊ฐ Profiling Rule์ด ๋งค์นญ๋˜๋ฉด ์ •ํ•ด์ง„ CF ๊ฐ’์ด ๋ˆ„์ ๋˜๊ณ , Minimum Certainty Factor(MCF) ์ž„๊ณ„๊ฐ’์„ ์ดˆ๊ณผํ•˜๋ฉด ํ•ด๋‹น ํ”„๋กœํŒŒ์ผ๋กœ ๋ถ„๋ฅ˜๋œ๋‹ค.

/* Custom Profiling Policy ์˜ˆ์‹œ โ€” Axis IP Camera */

Profile: Custom_Axis_Camera
MCF: 30

Rule 1: DHCP:vendor-class CONTAINS "AXIS"          โ†’ CF +20
Rule 2: SNMP:sysObjectID EQUALS "1.3.6.1.4.1.368"  โ†’ CF +30
Rule 3: HTTP:User-Agent CONTAINS "AXIS"           โ†’ CF +10
Rule 4: OUI EQUALS "00:40:8C" (AXIS OUI)          โ†’ CF +10

/* Rule 2๋งŒ ๋งค์นญ๋˜์–ด๋„ CF=30 โ‰ฅ MCF=30 โ†’ ๋ถ„๋ฅ˜ ํ™•์ • */
/* Rule 1+4๋งŒ ๋งค์นญ๋˜์–ด๋„ CF=30 โ‰ฅ MCF=30 โ†’ ๋ถ„๋ฅ˜ ํ™•์ • */
ISE Profiling Policy

5.4 ISE 3.x: AI Endpoint Analytics

ISE 3.0๋ถ€ํ„ฐ ๋„์ž…๋œ AI Endpoint Analytics๋Š” ๋จธ์‹ ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜์œผ๋กœ ์—”๋“œํฌ์ธํŠธ๋ฅผ ์ž๋™ ๋ถ„๋ฅ˜ํ•œ๋‹ค. ๊ธฐ์กด Rule ๊ธฐ๋ฐ˜ ํ”„๋กœํŒŒ์ผ๋ง์„ ๋ณด์™„ํ•˜์—ฌ, ์•Œ๋ ค์ง€์ง€ ์•Š์€(Unknown) ๋””๋ฐ”์ด์Šค๋„ ํ–‰์œ„ ํŒจํ„ด๊ณผ ์†์„ฑ ์œ ์‚ฌ๋„๋ฅผ ๋ถ„์„ํ•ด ๊ทธ๋ฃนํ•‘ํ•œ๋‹ค. ISE 3.5์—์„œ๋Š” Authoritative Source ๊ธฐ๋Šฅ์ด ์ถ”๊ฐ€๋˜์–ด, MDM(Jamf ๋“ฑ)์ด ํŠน์ • ์†์„ฑ์— ๋Œ€ํ•ด ISE ์ž์ฒด ํ”„๋กœํŒŒ์ผ๋ง๋ณด๋‹ค ์šฐ์„ ์‹œ๋˜๋„๋ก ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค.

๐Ÿšจ Randomized MAC Address ๋Œ€์‘
iOS 14+, Android 10+, Windows 10+์—์„œ Private(Randomized) MAC์ด ๊ธฐ๋ณธ ํ™œ์„ฑํ™”๋˜์—ˆ๋‹ค. MAC ๊ธฐ๋ฐ˜ ํ”„๋กœํŒŒ์ผ๋ง๊ณผ MAB ์ธ์ฆ์— ์‹ฌ๊ฐํ•œ ์˜ํ–ฅ์„ ์ค€๋‹ค. ๋Œ€์‘ ๋ฐฉ์•ˆ: DHCP hostname, HTTP User-Agent, Device Sensor ๋ฐ์ดํ„ฐ๋ฅผ ์ ๊ทน ํ™œ์šฉํ•˜๊ณ , ๊ฐ€๋Šฅํ•˜๋ฉด 802.1X ์ธ์ฆ์„œ ๊ธฐ๋ฐ˜์œผ๋กœ ์ „ํ™˜ํ•œ๋‹ค.

06 Posture Assessment โ€” Compliance ์—”์ง„

6.1 Posture ๊ฐœ๋…

Posture(์ž์„ธ ํ‰๊ฐ€)๋Š” ์—”๋“œํฌ์ธํŠธ๊ฐ€ ๋„คํŠธ์›Œํฌ์— ์ ‘๊ทผํ•˜๊ธฐ ์ „์— ๋ณด์•ˆ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ์ƒํƒœ๋ฅผ ๊ฒ€์ฆํ•˜๋Š” ๋ฉ”์ปค๋‹ˆ์ฆ˜์ด๋‹ค. AV ์„ค์น˜ ์—ฌ๋ถ€, OS ํŒจ์น˜ ์ˆ˜์ค€, ๋””์Šคํฌ ์•”ํ˜ธํ™”, ๋ฐฉํ™”๋ฒฝ ์ƒํƒœ, ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ํ‚ค ์กด์žฌ ๋“ฑ์„ ์ ๊ฒ€ํ•œ๋‹ค.

6.2 Posture Agent vs Agentless

๋ฐฉ์‹Agent์ง€์› OS์ ๊ฒ€ ๋ฒ”์œ„
Cisco Secure Client (๊ตฌ AnyConnect)Agent ์„ค์น˜Windows, macOS, Linux์ „์ฒด (AV, Patch, Firewall, ์•”ํ˜ธํ™”, ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๋“ฑ)
Agentless Posture์—์ด์ „ํŠธ ์—†์ŒWindows, macOS์ œํ•œ์  (๊ด€๋ฆฌ์ž ๊ถŒํ•œ์œผ๋กœ WMI/SSH ์›๊ฒฉ ์กฐํšŒ)
Temporal Agent์ž„์‹œ ์‹คํ–‰Windows, macOS์ค‘๊ฐ„ (์‹คํ–‰ ํ›„ ์ž๋™ ์‚ญ์ œ)

6.3 Posture Flow

1
์ดˆ๊ธฐ ์ธ์ฆ: 802.1X/MAB ์ธ์ฆ ์„ฑ๊ณต โ†’ ISE Authorization์—์„œ Posture Status = Unknown ์กฐ๊ฑด ๋งค์นญ โ†’ Redirect to Client Provisioning Portal ํ”„๋กœํŒŒ์ผ ์ ์šฉ
2
Agent Provisioning: ์—”๋“œํฌ์ธํŠธ๊ฐ€ Portal์— ์ ‘๊ทผ โ†’ Cisco Secure Client + Compliance Module ๋‹ค์šด๋กœ๋“œ/์„ค์น˜
3
Posture Check: Agent๊ฐ€ ISE์— ๋“ฑ๋ก๋œ Posture Policy ๊ธฐ๋ฐ˜์œผ๋กœ ์—”๋“œํฌ์ธํŠธ ์ƒํƒœ ์ ๊ฒ€
4
Compliant: ๋ชจ๋“  ํ•„์ˆ˜ ์š”๊ฑด ์ถฉ์กฑ โ†’ ISE๊ฐ€ CoA (Change of Authorization) ๋ฐœํ–‰ โ†’ Switch/WLC๊ฐ€ ์„ธ์…˜ ์žฌ์ธ๊ฐ€ โ†’ Full Access ํ”„๋กœํŒŒ์ผ ์ ์šฉ
5
Non-Compliant: ์š”๊ฑด ๋ฏธ์ถฉ์กฑ โ†’ Remediation ์‹œ๊ฐ„ ๋ถ€์—ฌ โ†’ ์‹คํŒจ ์‹œ Quarantine VLAN์œผ๋กœ ์ด๋™ ๋˜๋Š” ์ ‘๊ทผ ์ฐจ๋‹จ
/* Posture Condition ์˜ˆ์‹œ */
Condition: AV_Definition_Check
  Type: Anti-Virus Definition
  Vendor: CrowdStrike Falcon
  Check: Definition Date within 3 days

Condition: OS_Patch_Check
  Type: Patch Management
  OS: Windows All
  Severity: Critical patches installed

Condition: Disk_Encryption_Check
  Type: Disk Encryption
  Vendor: BitLocker
  Status: Encrypted

Requirement: Corporate_Compliance
  Conditions: AV_Definition_Check AND OS_Patch_Check AND Disk_Encryption_Check
  Remediation: Message + Auto-Remediation (Force Windows Update)
ISE Posture Policy
๐Ÿ’ก ISE 3.3+: ARM64 Posture ์ง€์›
ISE 3.3๋ถ€ํ„ฐ ARM64 ์•„ํ‚คํ…์ฒ˜(Apple Silicon M1/M2/M3, Qualcomm Snapdragon) ์—”๋“œํฌ์ธํŠธ์— ๋Œ€ํ•œ Posture ์ •์ฑ…์ด ์ง€์›๋œ๋‹ค. Windows ARM64์™€ macOS ARM64 ๋ชจ๋‘ ๋ณ„๋„ ํŒจํ‚ค์ง€๋ฅผ ์—…๋กœ๋“œํ•˜์—ฌ ๋ฐฐํฌ ๊ฐ€๋Šฅํ•˜๋‹ค.

07 Guest Access โ€” Hotspot ยท Self-Reg ยท Sponsored

7.1 Guest Access ์œ ํ˜•

  • Hotspot: ๋ณ„๋„ ๊ณ„์ • ์—†์ด ์•ฝ๊ด€ ๋™์˜๋งŒ์œผ๋กœ ์ ‘์†. ๊ณต๊ณต WiFi, ์„ธ๋ฏธ๋‚˜์‹ค์— ์ ํ•ฉ.
  • Self-Registration: ๋ฐฉ๋ฌธ์ž๊ฐ€ ์ง์ ‘ ์ •๋ณด(์ด๋ฆ„, ์ด๋ฉ”์ผ, ์ „ํ™”๋ฒˆํ˜ธ) ์ž…๋ ฅ ํ›„ ์ž„์‹œ ๊ณ„์ • ์ƒ์„ฑ. SMS/Email ์ธ์ฆ ๊ฐ€๋Šฅ.
  • Sponsored Guest: ์‚ฌ๋‚ด Sponsor(์ง์›)๊ฐ€ Guest ๊ณ„์ •์„ ์ƒ์„ฑํ•˜์—ฌ ๋ฐฉ๋ฌธ์ž์—๊ฒŒ ์ œ๊ณต. ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ ํฌํ•จ.

7.2 CWA ๊ธฐ๋ฐ˜ Guest Flow

Guest Device โ”€โ”€(Connect WiFi/Wired)โ”€โ”€โ–บ Switch/WLC โ”‚ โ”‚ MAB ์ธ์ฆ โ†’ ISE Authorization โ”‚ ๊ฒฐ๊ณผ: Guest_Redirect (ACL + URL Redirect) โ”‚ โ–ผ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ ISE Guest โ”‚ โ† HTTP ์š”์ฒญ์ด ISE Portal๋กœ Redirect โ”‚ Portal โ”‚ โ”‚ (Self-Reg) โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ ๊ณ„์ • ์ƒ์„ฑ + ์ธ์ฆ ์„ฑ๊ณต โ–ผ ISE โ†’ CoA (RADIUS Change of Authorization) โ†’ Switch/WLC โ”‚ โ–ผ ์ƒˆ๋กœ์šด Authorization Profile ์ ์šฉ (Guest VLAN + Internet-Only DACL + SGT:Guest)

7.3 Guest Portal ์ปค์Šคํ„ฐ๋งˆ์ด์ง•

ISE Guest Portal์€ CSS/HTML ์ˆ˜์ค€์—์„œ ๋ธŒ๋žœ๋”ฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ๋กœ๊ณ , ์ƒ‰์ƒ, ์•ฝ๊ด€ ๋ฌธ๊ตฌ, ์–ธ์–ด ํŒฉ์„ ์ปค์Šคํ„ฐ๋งˆ์ด์ฆˆํ•˜์—ฌ ๊ธฐ์—… CI์— ๋งž์ถ˜ Portal์„ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋‹ค. Portal์—์„œ ์ˆ˜์ง‘๋œ Guest ์ •๋ณด๋Š” ISE์˜ Guest Endpoints DB์— ์ €์žฅ๋˜๋ฉฐ, ๋งŒ๋ฃŒ ์‹œ๊ฐ„, ์ ‘์† ์‹œ๊ฐ„ ์ œํ•œ, ์ ‘์† ํšŸ์ˆ˜ ์ œํ•œ์„ ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋‹ค.

โš ๏ธ Guest 50๋งŒ ๊ณ„์ • ์ฃผ์˜
Guest ๊ณ„์ •์ด 50๋งŒ ๊ฐœ๋ฅผ ์ดˆ๊ณผํ•˜๋ฉด ์ธ์ฆ ์ง€์—ฐ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ์ •๊ธฐ์ ์ธ Guest Endpoint Purge๋ฅผ ์Šค์ผ€์ค„๋งํ•˜์—ฌ ๋ถˆํ•„์š”ํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์ •๋ฆฌํ•ด์•ผ ํ•œ๋‹ค.

08 BYOD Onboarding Pipeline

8.1 BYOD ํ๋ฆ„ ๊ฐœ์š”

BYOD(Bring Your Own Device) ์˜จ๋ณด๋”ฉ์€ ์ง์›์˜ ๊ฐœ์ธ ๋””๋ฐ”์ด์Šค๋ฅผ ๊ธฐ์—… ๋„คํŠธ์›Œํฌ์— ์•ˆ์ „ํ•˜๊ฒŒ ๋“ฑ๋กํ•˜๋Š” ํ”„๋กœ์„ธ์Šค์ด๋‹ค. ISE๋Š” ์ธ์ฆ์„œ ๊ธฐ๋ฐ˜ BYOD๋ฅผ ์ง€์›ํ•˜๋ฉฐ, ๋‚ด์žฅ CA(Certificate Authority)๋ฅผ ํ†ตํ•ด ๋””๋ฐ”์ด์Šค๋ณ„ ๊ณ ์œ  ์ธ์ฆ์„œ๋ฅผ ๋ฐœ๊ธ‰ํ•œ๋‹ค.

1
Single SSID ๋ฐฉ์‹: ์ง์›์ด Corporate SSID์— ID/PW๋กœ ์ตœ์ดˆ ์ ‘์† โ†’ ISE๊ฐ€ "๋“ฑ๋ก๋˜์ง€ ์•Š์€ ๋””๋ฐ”์ด์Šค" ๊ฐ์ง€
2
BYOD Portal Redirect: ISE๊ฐ€ BYOD Portal๋กœ ๋ฆฌ๋‹ค์ด๋ ‰ํŠธ โ†’ ๋””๋ฐ”์ด์Šค ๋“ฑ๋ก ๋™์˜
3
Supplicant Provisioning: ISE Network Setup Assistant(NSA)๊ฐ€ ๋””๋ฐ”์ด์Šค ์œ ํ˜•์— ๋งž๋Š” ํ”„๋กœํŒŒ์ผ ์„ค์น˜ (WiFi ํ”„๋กœํŒŒ์ผ + ์ธ์ฆ์„œ)
4
Certificate Enrollment: ISE ๋‚ด์žฅ CA์—์„œ SCEP๋ฅผ ํ†ตํ•ด ๋””๋ฐ”์ด์Šค ์ธ์ฆ์„œ ๋ฐœ๊ธ‰
5
EAP-TLS ์žฌ์—ฐ๊ฒฐ: ๋””๋ฐ”์ด์Šค๊ฐ€ ์ƒˆ ์ธ์ฆ์„œ๋กœ EAP-TLS ์ธ์ฆ โ†’ Full BYOD Access ๋ถ€์—ฌ

8.2 My Devices Portal

์˜จ๋ณด๋”ฉ ์™„๋ฃŒ ํ›„, ์ง์›์€ My Devices Portal์„ ํ†ตํ•ด ๋“ฑ๋ก๋œ ๊ฐœ์ธ ๋””๋ฐ”์ด์Šค๋ฅผ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ถ„์‹ค/๋„๋‚œ ์‹œ ์ธ์ฆ์„œ๋ฅผ ์ง์ ‘ Revokeํ•˜์—ฌ ์ฆ‰์‹œ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์„ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ๋‹ค.

8.3 Dual SSID vs Single SSID

๋ฐฉ์‹์žฅ์ ๋‹จ์ 
Single SSID์‚ฌ์šฉ์ž ๊ฒฝํ—˜ ์šฐ์ˆ˜ (ํ•˜๋‚˜์˜ SSID๋งŒ ์‚ฌ์šฉ)CoA ์˜์กด, WLC ๊ตฌ์„ฑ ๋ณต์žก
Dual SSID๊ตฌํ˜„ ๋‹จ์ˆœ, CoA ๋ถˆํ•„์š”์‚ฌ์šฉ์ž๊ฐ€ SSID ์ „ํ™˜ ํ•„์š”

09 TrustSec & SGT ๊ธฐ๋ฐ˜ Micro-Segmentation

9.1 TrustSec ๊ฐœ๋…

Cisco TrustSec์€ IP ์ฃผ์†Œ๊ฐ€ ์•„๋‹Œ Security Group Tag(SGT)๋ผ๋Š” ๋…ผ๋ฆฌ์  ๋ ˆ์ด๋ธ”๋กœ ๋„คํŠธ์›Œํฌ ์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜์„ ๊ตฌํ˜„ํ•˜๋Š” ์•„ํ‚คํ…์ฒ˜์ด๋‹ค. ์‚ฌ์šฉ์ž/๋””๋ฐ”์ด์Šค๊ฐ€ ์ธ์ฆ๋˜๋ฉด ISE๊ฐ€ SGT๋ฅผ ํ• ๋‹นํ•˜๊ณ , ์ด ํƒœ๊ทธ๋Š” ํŒจํ‚ท์— ์ธ๋ผ์ธ์œผ๋กœ ์‚ฝ์ž…๋˜๊ฑฐ๋‚˜ SXP ํ”„๋กœํ† ์ฝœ์„ ํ†ตํ•ด ์ „ํŒŒ๋œ๋‹ค.

9.2 SGT ํ• ๋‹น ๋ฐฉ์‹

  • Dynamic Classification (๋™์ ): 802.1X/MAB ์ธ์ฆ ์‹œ ISE Authorization Profile์—์„œ SGT ์ž๋™ ํ• ๋‹น. RADIUS cisco-av-pair: cts:security-group-tag=XXXX
  • Static Classification (์ •์ ): ์ธ์ฆ์„ ๊ฑฐ์น˜์ง€ ์•Š๋Š” ์„œ๋ฒ„/์ธํ”„๋ผ ์žฅ๋น„์— ๋Œ€ํ•ด ISE์—์„œ IP-to-SGT ๋งคํ•‘์„ ์ˆ˜๋™ ๋“ฑ๋ก
  • Subnet-to-SGT: ์„œ๋ธŒ๋„ท ๋‹จ์œ„๋กœ SGT๋ฅผ ์ผ๊ด„ ๋งคํ•‘

9.3 SGT Propagation

์ „ํŒŒ ๋ฐฉ์‹๋™์ž‘์š”๊ตฌ ์‚ฌํ•ญ
Inline Tagging (802.1AE)์ด๋”๋„ท ํ”„๋ ˆ์ž„์— SGT๋ฅผ CMD(Cisco Meta Data) ํ—ค๋”๋กœ ์‚ฝ์ž…CTS ์ง€์› ์Šค์œ„์น˜, MACsec ๊ฐ€๋Šฅ
SXP (SGT Exchange Protocol)Control Plane์œผ๋กœ IP:SGT ๋ฐ”์ธ๋”ฉ ํ…Œ์ด๋ธ” ์ „ํŒŒ์ธ๋ผ์ธ ๋ฏธ์ง€์› ์žฅ๋น„, ๋ฐฉํ™”๋ฒฝ ์—ฐ๋™ ์‹œ
pxGridISE โ†’ FMC/Stealthwatch ๋“ฑ์— SGT ์ปจํ…์ŠคํŠธ ๊ณต์œ pxGrid 2.0 (WebSocket)

9.4 SGACL (Security Group ACL) ์ •์ฑ…

SGACL์€ Source SGT โ†’ Destination SGT ๋งคํŠธ๋ฆญ์Šค ๊ธฐ๋ฐ˜์˜ ์ ‘๊ทผ ์ œ์–ด ์ •์ฑ…์ด๋‹ค. ISE์˜ Work Centers > TrustSec > Policy Matrix์—์„œ ๊ตฌ์„ฑํ•œ๋‹ค.

! SGACL ์˜ˆ์‹œ: HR(20) โ†’ Finance_Servers(60) = Deny
permit tcp dst eq 443   ! HTTPS๋งŒ ํ—ˆ์šฉ
permit tcp dst eq 80    ! HTTP ํ—ˆ์šฉ
deny ip                   ! ๋‚˜๋จธ์ง€ ์ „๋ถ€ ์ฐจ๋‹จ

! ์Šค์œ„์น˜์—์„œ ํ™•์ธ
show cts role-based permissions
show cts role-based sgt-map all
show cts role-based counters
SGACL Configuration

๐Ÿ—๏ธ TrustSec ์„ค๊ณ„ ๋ฒ ์ŠคํŠธ ํ”„๋ž™ํ‹ฐ์Šค

โ‘  Egress Enforcement: SGACL์€ Egress ์Šค์œ„์น˜์—์„œ ์ ์šฉํ•œ๋‹ค. Ingress ์Šค์œ„์น˜๋Š” Source SGT๋งŒ ํƒœ๊น…ํ•˜๋ฉด ๋œ๋‹ค.
โ‘ก SGT ๋„ค์ด๋ฐ: ๋น„์ฆˆ๋‹ˆ์Šค ์—ญํ•  ๊ธฐ๋ฐ˜ (HR, Finance, IT, Guest, IoT, Servers ๋“ฑ). ๋ฒˆํ˜ธ๋Š” 10 ๋‹จ์œ„๋กœ ํ• ๋‹นํ•˜์—ฌ ํ™•์žฅ ์—ฌ์ง€๋ฅผ ๋‚จ๊ธด๋‹ค.
โ‘ข Default Policy: Unknown SGT ๊ฐ„ ํ†ต์‹ ์€ ๊ธฐ๋ณธ Deny. ๋ช…์‹œ์ ์œผ๋กœ ํ—ˆ์šฉ๋œ ํ๋ฆ„๋งŒ Permit.
โ‘ฃ ์ ์ง„์  ๋ฐฐํฌ: Monitor Mode โ†’ Low-Impact โ†’ Closed Mode ์ˆœ์„œ๋กœ SGACL ์ ์šฉ.

10 pxGrid โ€” Context Sharing Ecosystem

10.1 pxGrid ์•„ํ‚คํ…์ฒ˜

Cisco pxGrid(Platform Exchange Grid)๋Š” ISE๊ฐ€ ์ˆ˜์ง‘ํ•œ ์ปจํ…์ŠคํŠธ ๋ฐ์ดํ„ฐ(์‚ฌ์šฉ์ž, ๋””๋ฐ”์ด์Šค, SGT, ์œ„ํ˜‘ ์ •๋ณด)๋ฅผ ์„œ๋“œํŒŒํ‹ฐ ๋ณด์•ˆ ์ œํ’ˆ๊ณผ ์–‘๋ฐฉํ–ฅ์œผ๋กœ ๊ณต์œ ํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ์ด๋‹ค. ISE 2.4๋ถ€ํ„ฐ ๋„์ž…๋œ pxGrid 2.0์€ WebSocket/STOMP ๊ธฐ๋ฐ˜์œผ๋กœ ๋™์ž‘ํ•˜๋ฉฐ, REST API๋ฅผ ํ†ตํ•ด ํ”Œ๋žซํผ ๋…๋ฆฝ์  ์—ฐ๋™์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

10.2 pxGrid ๊ตฌ์„ฑ ์š”์†Œ

  • Controller: ISE pxGrid ๋…ธ๋“œ. Topic ๊ด€๋ฆฌ, ์ฐธ๊ฐ€์ž ์ธ์ฆ, Publisher-Subscriber ๋งค์นญ
  • Publisher: ๋ฐ์ดํ„ฐ๋ฅผ ๋ฐœํ–‰ํ•˜๋Š” ์ฃผ์ฒด (ISE MnT๊ฐ€ Session Directory ๋ฐœํ–‰)
  • Subscriber: ๋ฐ์ดํ„ฐ๋ฅผ ๊ตฌ๋…ํ•˜๋Š” ์ฃผ์ฒด (FMC, Stealthwatch, Splunk, SIEM ๋“ฑ)

10.3 ์ฃผ์š” pxGrid ํ†ตํ•ฉ ์‹œ๋‚˜๋ฆฌ์˜ค

์—ฐ๋™ ์ œํ’ˆ๊ณต์œ  ๋ฐ์ดํ„ฐํ™œ์šฉ
Cisco FMC (Firepower)User-IP ๋งคํ•‘, SGTNGFW์—์„œ ์‚ฌ์šฉ์ž/SGT ๊ธฐ๋ฐ˜ ์ •์ฑ… ์ ์šฉ
Cisco StealthwatchSession contextNetFlow ๋ถ„์„์— ์‚ฌ์šฉ์ž ์ปจํ…์ŠคํŠธ ๊ฒฐํ•ฉ, ์ด์ƒ ํ–‰์œ„ ํƒ์ง€
Splunk / SIEMAuthentication logs, SGT๋ณด์•ˆ ์ด๋ฒคํŠธ ์ƒ๊ด€๋ถ„์„
Cisco DNA CenterSGT, PolicyIntent-based ๋„คํŠธ์›Œํฌ ์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜ ์ž๋™ํ™”
ServiceNowEndpoint attributes (pxGrid Direct)CMDB ์—ฐ๋™, ์ž์‚ฐ ๊ด€๋ฆฌ

10.4 pxGrid Direct (ISE 3.2+)

pxGrid Direct๋Š” pxGrid 2.0์„ ๋ณด์™„ํ•˜๋Š” ๊ธฐ๋Šฅ์œผ๋กœ, ์™ธ๋ถ€ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค(ServiceNow, CMDB ๋“ฑ)์˜ ์—”๋“œํฌ์ธํŠธ ์†์„ฑ์„ ISE๋กœ ์ง์ ‘ ๊ฐ€์ ธ์˜ค๊ฑฐ๋‚˜(URL Fetch), ๋ณ€๊ฒฝ ์‚ฌํ•ญ์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ISE์— Push(Direct Push)ํ•  ์ˆ˜ ์žˆ๋‹ค.

โ„น๏ธ ์ธ์ฆ์„œ ๊ด€๋ฆฌ๊ฐ€ ํ•ต์‹ฌ
pxGrid ์ฐธ๊ฐ€์ž ๊ฐ„์˜ ๋ชจ๋“  ํ†ต์‹ ์€ TLS๋กœ ์•”ํ˜ธํ™”๋œ๋‹ค. ๋ฐฐํฌ ๊ฒฝํ—˜์ƒ, ISE ๋‚ด์žฅ CA๋ฅผ pxGrid ์ธ์ฆ์„œ ๋ฐœ๊ธ‰ ๊ธฐ๊ด€์œผ๋กœ ํ†ต์ผํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€์žฅ ์•ˆ์ •์ ์ด๋‹ค. ์„œ๋กœ ๋‹ค๋ฅธ CA์—์„œ ๋ฐœ๊ธ‰๋œ ์ธ์ฆ์„œ๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด ์‹ ๋ขฐ ์ฒด์ธ ๋ฌธ์ œ๋กœ ์—ฐ๋™์ด ์‹คํŒจํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋นˆ๋ฒˆํ•˜๋‹ค.

11 TACACS+ Device Administration

11.1 RADIUS vs TACACS+

ํ•ญ๋ชฉRADIUSTACACS+
์ฃผ์š” ์šฉ๋„Network Access (์‚ฌ์šฉ์ž/๋””๋ฐ”์ด์Šค ์ธ์ฆ)Device Administration (์žฅ๋น„ ๊ด€๋ฆฌ์ž ์ธ์ฆ)
ํ”„๋กœํ† ์ฝœUDP 1812/1813TCP 49
์•”ํ˜ธํ™”๋น„๋ฐ€๋ฒˆํ˜ธ๋งŒ ์•”ํ˜ธํ™”์ „์ฒด Payload ์•”ํ˜ธํ™”
AAA ๋ถ„๋ฆฌAuthentication + Authorization ๊ฒฐํ•ฉAuthentication, Authorization, Accounting ์™„์ „ ๋ถ„๋ฆฌ
Command Authorization๋ฏธ์ง€์›์ง€์› (๋ช…๋ น์–ด๋ณ„ ํ—ˆ์šฉ/์ฐจ๋‹จ)

11.2 TACACS+ Policy ๊ตฌ์„ฑ

/* ISE TACACS+ Device Admin Policy Set ์˜ˆ์‹œ */

Policy Set: Network_Device_Admin
  Condition: DEVICE:Device Type = "Switches"

Authentication:
  Rule 1: Default โ†’ AD (Network_Admins OU)

Authorization:
  Rule 1: AD:Group = "Senior_Network_Engineers"
    โ†’ Shell Profile: Priv15
    โ†’ Command Set: Permit_All

  Rule 2: AD:Group = "Junior_Network_Engineers"
    โ†’ Shell Profile: Priv1
    โ†’ Command Set: Show_Only
    /* show, ping, traceroute๋งŒ ํ—ˆ์šฉ, config ๋ช…๋ น ์ฐจ๋‹จ */

  Rule 3: AD:Group = "NOC_Operators"
    โ†’ Shell Profile: Priv1
    โ†’ Command Set: Monitor_Only

  Default: DenyAllCommands
ISE TACACS+ Policy
! Switch-side TACACS+ Configuration
aaa new-model
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+

tacacs server ISE-PSN-1
 address ipv4 10.10.10.100
 key Cisco!SecretKey#2026
 timeout 5
IOS-XE TACACS+
๐Ÿ’ก ISE 3.5: TACACS+ AD Lockout Prevention
TACACS+ ์ธ์ฆ์—์„œ๋„ AD ๊ณ„์ • ์ž ๊ธˆ ๋ฐฉ์ง€ ๊ธฐ๋Šฅ์ด ์ง€์›๋œ๋‹ค. AD์˜ ์ž ๊ธˆ ์ž„๊ณ„๊ฐ’์ด 6ํšŒ๋ผ๋ฉด, ISE๋ฅผ 5ํšŒ์—์„œ ์ฐจ๋‹จํ•˜๋„๋ก ์„ค์ •ํ•˜์—ฌ AD๋กœ ์š”์ฒญ์„ ๋ณด๋‚ด์ง€ ์•Š๊ณ  ๋กœ์ปฌ์—์„œ ๊ฑฐ๋ถ€ํ•œ๋‹ค.

12 ISE 3.x ์‹ ๊ทœ ๊ธฐ๋Šฅ & ๋ผ์ด์„ ์‹ฑ

12.1 ๋ฒ„์ „๋ณ„ ์ฃผ์š” ๊ธฐ๋Šฅ

๋ฒ„์ „ํ•ต์‹ฌ ๊ธฐ๋Šฅ
3.0AI Endpoint Analytics, Agentless Posture, AWS ๋ฐฐํฌ, ๋ผ์ด์„ ์Šค ์ฒด๊ณ„ ๊ฐœํŽธ
3.1pxGrid 1.0 Deprecated, API Gateway ํ†ตํ•ฉ, GUI ๊ฐœ์„ 
3.2pxGrid Direct, SGT + Virtual Network ์กฐํ•ฉ, Dashboard ๊ฐœ์„ 
3.3ARM64 Posture, Very Small Node(8 vCPU), Tenable API Key ์ธ์ฆ, AD Join Point ๋ฆฌ์†Œ์Šค ๋ถ„๋ฆฌ
3.4Operational Intelligence, ํ–ฅ์ƒ๋œ Health Check, ํ˜„์žฌ Suggested Release
3.5SNMPv3 Profiling, Authoritative Source, 200K Network Devices, Entra Device AuthZ, Full IPv6 Single-Stack, TACACS+ AD Lockout Prevention

12.2 ๋ผ์ด์„ ์Šค ์ฒด๊ณ„ (Nested Doll Model)

ISE 3.x๋Š” Essentials โŠ‚ Advantage โŠ‚ Premier ๊ตฌ์กฐ๋ฅผ ์ฑ„ํƒํ•˜์˜€๋‹ค. ์ƒ์œ„ ํ‹ฐ์–ด๊ฐ€ ํ•˜์œ„ ํ‹ฐ์–ด์˜ ๋ชจ๋“  ๊ธฐ๋Šฅ์„ ํฌํ•จํ•œ๋‹ค.

๋ผ์ด์„ ์Šคํฌํ•จ ๊ธฐ๋Šฅ
Essentials802.1X/MAB, Guest Access, Basic Profiling, Posture (Agent/Agentless)
AdvantageEssentials + AI Endpoint Analytics, BYOD, pxGrid, TrustSec SGT, Context Sharing
PremierAdvantage + TC-NAC, Compliance (์ง€์†์  Posture), Threat Intelligence ์—ฐ๋™, Entra Device AuthZ
โ„น๏ธ ๋ผ์ด์„ ์Šค ์นด์šดํŒ…
ISE ๋ผ์ด์„ ์Šค๋Š” Active Concurrent Endpoint(๋™์‹œ ์ ‘์† ์—”๋“œํฌ์ธํŠธ) ๊ธฐ์ค€์ด๋‹ค. ํ•˜๋‚˜์˜ ์—”๋“œํฌ์ธํŠธ๋Š” ๊ณ ์œ  MAC ์ฃผ์†Œ ํ•˜๋‚˜์— ํ•ด๋‹นํ•œ๋‹ค. RADIUS Accounting์˜ Start/Stop์œผ๋กœ ์„ธ์…˜ ์ˆ˜๋ช…์ด ๊ด€๋ฆฌ๋œ๋‹ค.

13 Scalability & High Availability ์„ค๊ณ„

13.1 ๋ฐฐํฌ ๊ทœ๋ชจ๋ณ„ ์ตœ๋Œ€ ์—”๋“œํฌ์ธํŠธ

๋ฐฐํฌ ๊ทœ๋ชจMax Active EndpointsMax PSN ์ˆ˜Max Network Devices
Small50,000510,000
Medium150,0001550,000
Large (SNS 3795)2,000,00050200,000 (ISE 3.5)

13.2 HA ์ „๋žต

  • PAN HA: Primary/Secondary Active-Standby. Auto Promotion์œผ๋กœ ์žฅ์•  ์‹œ Secondary๊ฐ€ Primary ์Šน๊ฒฉ.
  • PSN HA: Load Balancer VIP ๋’ค์— Active-Active ๊ตฌ์„ฑ. NAD์—์„œ Primary/Secondary/Tertiary RADIUS ์„œ๋ฒ„๋กœ ์„ค์ •.
  • MnT HA: Primary/Secondary. ๋กœ๊ทธ ์ˆ˜์ง‘ ์ด์ค‘ํ™”.
  • pxGrid HA: ์ตœ๋Œ€ 4๋…ธ๋“œ Active-Active. ํด๋ผ์ด์–ธํŠธ๋Š” ์•„๋ฌด ๋…ธ๋“œ์—๋‚˜ ์—ฐ๊ฒฐ ๊ฐ€๋Šฅ.

13.3 PSN Node Group

URL Redirect ์„œ๋น„์Šค(Guest, Posture, BYOD)๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ, Redirect URL์— ํŠน์ • PSN์˜ FQDN์ด ํฌํ•จ๋œ๋‹ค. ์ด PSN์ด ๋‹ค์šด๋˜๋ฉด Redirect๊ฐ€ ์‹คํŒจํ•œ๋‹ค. PSN Node Group์„ ๊ตฌ์„ฑํ•˜๋ฉด, ๊ฐ™์€ ๊ทธ๋ฃน์˜ ๋‹ค๋ฅธ PSN์ด Redirect ์ฒ˜๋ฆฌ๋ฅผ ๋Œ€ํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค.

13.4 Multi-DC ์žฅ์•  ์‹œ๋‚˜๋ฆฌ์˜ค

/* DC-A ์ „์ฒด ์žฅ์•  ์‹œ NAD Failover ์˜ˆ์‹œ */

NAD Config:
  Primary RADIUS:   PSN-DC-A-1 (10.1.1.10)
  Secondary RADIUS: PSN-DC-B-1 (10.2.1.10)
  Tertiary RADIUS:  PSN-DC-C-1 (10.3.1.10)
  Deadtime: 5 minutes

/* DC-A ์žฅ์•  โ†’ NAD๊ฐ€ ์ž๋™์œผ๋กœ DC-B PSN์œผ๋กœ Failover */
/* 5๋ถ„ Deadtime ํ›„ DC-A ๋ณต๊ตฌ๋˜๋ฉด ๋‹ค์‹œ Primary๋กœ ๋ณต๊ท€ */
RADIUS Failover
๐Ÿšจ Critical: Server Dead Action
authentication event server dead action authorize vlan 999 โ€” ๋ชจ๋“  RADIUS ์„œ๋ฒ„๊ฐ€ ๋„๋‹ฌ ๋ถˆ๊ฐ€๋Šฅํ•  ๋•Œ, ์—”๋“œํฌ์ธํŠธ๋ฅผ Critical VLAN์œผ๋กœ ํ• ๋‹นํ•˜์—ฌ ์ตœ์†Œํ•œ์˜ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์„ ๋ณด์žฅํ•œ๋‹ค. ์ด ์„ค์ • ์—†์ด ์„œ๋ฒ„ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•˜๋ฉด ์ „์ฒด ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ ์ฐจ๋‹จ์ด๋ผ๋Š” ์žฌ์•™์ด ๋ฐœ์ƒํ•œ๋‹ค.

14 Troubleshooting Methodology

14.1 ISE ์ธก ์ง„๋‹จ ๋„๊ตฌ

  • Operations โ†’ RADIUS โ†’ Live Logs: ์‹ค์‹œ๊ฐ„ ์ธ์ฆ/์ธ๊ฐ€ ๊ฒฐ๊ณผ ํ™•์ธ. ๊ฐ€์žฅ ๋จผ์ € ํ™•์ธํ•ด์•ผ ํ•  ๊ณณ.
  • Operations โ†’ RADIUS โ†’ Live Sessions: ํ˜„์žฌ ํ™œ์„ฑ ์„ธ์…˜์˜ ์ƒ์„ธ ์ •๋ณด (IP, MAC, Profile, SGT, Posture Status)
  • Operations โ†’ Reports: Authentication Summary, Failed Attempts, RADIUS Accounting ๋“ฑ
  • Operations โ†’ Troubleshoot โ†’ Diagnostic Tools โ†’ Execute Network Device Command: ISE์—์„œ ์ง์ ‘ NAD์— ๋ช…๋ น ์‹คํ–‰
  • Administration โ†’ System โ†’ Logging โ†’ Debug Log Configuration: ์ปดํฌ๋„ŒํŠธ๋ณ„ Debug Level ์กฐ์ •

14.2 Switch/WLC ์ธก ์ง„๋‹จ ๋ช…๋ น์–ด

! ์ธ์ฆ ์„ธ์…˜ ์ƒํƒœ ํ™•์ธ
show authentication sessions interface Gi1/0/1 details
show authentication sessions mac 00:11:22:33:44:55 details

! RADIUS ํ†ต์‹  ํ™•์ธ
debug radius authentication
debug radius accounting
debug dot1x all

! DACL/ACL ํ™•์ธ
show ip access-lists interface Gi1/0/1

! TrustSec SGT ํ™•์ธ
show cts role-based sgt-map all
show cts role-based permissions
show cts role-based counters

! Device Sensor ํ™•์ธ
show device-sensor cache interface Gi1/0/1
show ip device tracking all

! AAA ์ƒํƒœ
show aaa servers
test aaa group ISE-RADIUS testuser testpass new-code
IOS-XE Troubleshooting

14.3 ์ผ๋ฐ˜์  ๋ฌธ์ œ โ†’ ์›์ธ โ†’ ํ•ด๊ฒฐ

์ฆ์ƒ๊ฐ€๋Šฅํ•œ ์›์ธํ•ด๊ฒฐ ๋ฐฉ๋ฒ•
802.1X ์ธ์ฆ ์‹คํŒจ์ธ์ฆ์„œ ๋งŒ๋ฃŒ, EAP ํƒ€์ž… ๋ถˆ์ผ์น˜, AD ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ถˆ์ผ์น˜ISE Live Logs์—์„œ Failure Reason ํ™•์ธ, Allowed Protocols ์ ๊ฒ€
MAB ํ›„ ํ”„๋กœํŒŒ์ผ ๋ฏธ๋ถ„๋ฅ˜DHCP Helper ๋ฏธ์„ค์ •, Device Sensor ๋ฏธํ™œ์„ฑํ™”Profiling Probe ์ƒํƒœ ํ™•์ธ, SPAN ๊ตฌ์„ฑ ์ ๊ฒ€
Guest Portal ๋ฆฌ๋‹ค์ด๋ ‰ํŠธ ์•ˆ ๋จRedirect ACL ๋ฏธ์ ์šฉ, DNS ๋ฏธํ•ด์„, HTTP๊ฐ€ ์•„๋‹Œ HTTPS ์ ‘์†ACL ๋งค์นญ ํ™•์ธ, DNS Redirect ์„ค์ •, HTTP ํŠธ๋ž˜ํ”ฝ ํ—ˆ์šฉ
Posture ์ƒํƒœ Unknown ์œ ์ง€Client Provisioning ์‹คํŒจ, Agent ๋ฏธ์„ค์น˜CP Policy ํ™•์ธ, ํฌํƒˆ ์ ‘๊ทผ ACL ์ ๊ฒ€
CoA ๋ฏธ๋™์ž‘CoA Port(3799) ์ฐจ๋‹จ, NAD์—์„œ CoA ๋น„ํ™œ์„ฑaaa server radius dynamic-author ์„ค์ • ํ™•์ธ, ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™ ์ ๊ฒ€
SGT ๋ฏธํ• ๋‹นAuthorization Profile์— SGT ๋ฏธ์„ค์ •, CTS ๋ฏธํ™œ์„ฑISE AuthZ Profile ํ™•์ธ, ์Šค์œ„์น˜ cts ๊ด€๋ จ ์„ค์ • ์ ๊ฒ€
๐Ÿ’ก TCPDump on ISE
ISE CLI์—์„œ tcpdump์„ ์‹คํ–‰ํ•˜์—ฌ RADIUS ํŒจํ‚ท์„ ์บก์ฒ˜ํ•  ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ EAP ํ•ธ๋“œ์…ฐ์ดํฌ ๋ฌธ์ œ ๋ถ„์„ ์‹œ ๊ฐ•๋ ฅํ•œ ๋„๊ตฌ์ด๋‹ค:
ise/admin# tcpdump -i eth0 -s 0 -w /tmp/radius.pcap port 1812

15 ์‹ค์ „ ๋ฐฐํฌ ์ „๋žต โ€” Phased Deployment

Phase 1: Monitor Mode (๊ฐ€์‹œ์„ฑ ํ™•๋ณด)

802.1X + MAB๋ฅผ ํ™œ์„ฑํ™”ํ•˜๋˜, ์ธ์ฆ ์‹คํŒจ ์‹œ์—๋„ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์„ ์ฐจ๋‹จํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋ชฉ์ ์€ ๊ธฐ์กด ๋„คํŠธ์›Œํฌ์— ์˜ํ–ฅ ์—†์ด ์–ด๋–ค ๋””๋ฐ”์ด์Šค๊ฐ€ ์ธ์ฆ์„ ์‹œ๋„ํ•˜๊ณ , ์–ด๋–ค ํ”„๋กœํŒŒ์ผ๋กœ ๋ถ„๋ฅ˜๋˜๋Š”์ง€ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๋Š” ๊ฒƒ์ด๋‹ค.

  • Switch: authentication open + authentication port-control auto
  • ISE: Authentication Rule โ†’ Continue on Failure / User Not Found
  • ISE: Authorization โ†’ Access-Accept only (DACL/VLAN/SGT ์—†์ด ๊ธฐ๋ณธ ํ—ˆ์šฉ)
  • ๋ชฉํ‘œ: ์ตœ์†Œ 2-4์ฃผ๊ฐ„ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘. Profiling ์ •ํ™•๋„ ๊ฒ€์ฆ.

Phase 2: Low-Impact Mode (์ ์ง„์  ์ œ์–ด)

Pre-Auth ACL(Pre-Authentication Open ACL)์„ ์‚ฌ์šฉํ•˜์—ฌ, ์ธ์ฆ ์ „์—๋„ DHCP, DNS, TFTP ๋“ฑ ๊ธฐ๋ณธ ์„œ๋น„์Šค ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•˜๋˜, ์ธ์ฆ ํ›„ ๋” ๋„“์€ ์ ‘๊ทผ ๊ถŒํ•œ์„ ๋ถ€์—ฌํ•œ๋‹ค.

  • Switch: ip access-group ACL-DEFAULT in (DHCP, DNS, ISE Portal ํ—ˆ์šฉ)
  • ISE: Authorization์—์„œ DACL ์ ์šฉ ์‹œ์ž‘ (์ œํ•œ๋œ ๋ฒ”์œ„)
  • ๋ชฉํ‘œ: ์ธ์ฆ ์‹คํŒจ ๋””๋ฐ”์ด์Šค ์‹๋ณ„ ๋ฐ ์˜ˆ์™ธ ์ฒ˜๋ฆฌ ๊ตฌ์ถ•

Phase 3: Closed Mode (์™„์ „ ์ œ์–ด)

์ธ์ฆ๋˜์ง€ ์•Š์€ ํŠธ๋ž˜ํ”ฝ์„ ์™„์ „ ์ฐจ๋‹จํ•œ๋‹ค. 802.1X ๋˜๋Š” MAB ์ธ์ฆ์— ์„ฑ๊ณตํ•ด์•ผ๋งŒ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ์ด ๊ฐ€๋Šฅํ•˜๋‹ค.

  • Switch: authentication port-control auto (open ์ œ๊ฑฐ)
  • ISE: Full Authorization Profile (VLAN + DACL + SGT)
  • Critical VLAN, Server Dead Action ๋“ฑ Failsafe ๋ฐ˜๋“œ์‹œ ๊ตฌ์„ฑ

Phase 4: TrustSec Enforcement (์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜)

SGT ํ• ๋‹น์ด ์•ˆ์ •ํ™”๋œ ํ›„, SGACL์„ ์ ์ง„์ ์œผ๋กœ ํ™œ์„ฑํ™”ํ•˜์—ฌ ๋งˆ์ดํฌ๋กœ์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜์„ ์™„์„ฑํ•œ๋‹ค.

  • TrustSec Policy Matrix์—์„œ Monitor Mode๋กœ SGACL ์ ์šฉ (๋กœ๊ทธ๋งŒ ์ˆ˜์ง‘)
  • ํŠธ๋ž˜ํ”ฝ ํŒจํ„ด ๋ถ„์„ ํ›„ Enforce Mode๋กœ ์ „ํ™˜
  • ์ตœ์ข… ๋ชฉํ‘œ: IP ๊ธฐ๋ฐ˜ ACL์„ SGT ๊ธฐ๋ฐ˜ ์ •์ฑ…์œผ๋กœ ์™„์ „ ๋Œ€์ฒด
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ Phase 1 โ”‚โ”€โ”€โ”€โ–บโ”‚ Phase 2 โ”‚โ”€โ”€โ”€โ–บโ”‚ Phase 3 โ”‚โ”€โ”€โ”€โ–บโ”‚ Phase 4 โ”‚ โ”‚ Monitor โ”‚ โ”‚Low-Impactโ”‚ โ”‚ Closed โ”‚ โ”‚ TrustSec โ”‚ โ”‚ Mode โ”‚ โ”‚ Mode โ”‚ โ”‚ Mode โ”‚ โ”‚Enforcementโ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ ๊ฐ€์‹œ์„ฑ โ”‚ โ”‚ ์ ์ง„ ์ œ์–ดโ”‚ โ”‚ ์™„์ „ ์ œ์–ดโ”‚ โ”‚ ์„ธ๊ทธ๋ฉ˜ํŠธ โ”‚ โ”‚ ๋ฐ์ดํ„ฐ โ”‚ โ”‚ Pre-Auth โ”‚ โ”‚ Full AuthZโ”‚ โ”‚ SGACL โ”‚ โ”‚ ์ˆ˜์ง‘ โ”‚ โ”‚ ACL ์ ์šฉ โ”‚ โ”‚ VLAN+DACLโ”‚ โ”‚ Matrix โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ +SGT โ”‚ โ”‚ Enforce โ”‚ โ”‚ 2-4์ฃผ โ”‚ โ”‚ 4-8์ฃผ โ”‚ โ”‚ ์ง€์† โ”‚ โ”‚ ์ง€์† โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐ŸŽฏ Expert's Final Advice

ISE ๋ฐฐํฌ์—์„œ ๊ฐ€์žฅ ์ค‘์š”ํ•œ ๊ฒƒ์€ ๊ธฐ์ˆ ์ด ์•„๋‹ˆ๋ผ ํ”„๋กœ์„ธ์Šค์ด๋‹ค. ์‚ฌ์ „์— ์—”๋“œํฌ์ธํŠธ ์ธ๋ฒคํ† ๋ฆฌ๋ฅผ ํ™•๋ณดํ•˜๊ณ , ๋ถ€์„œ๋ณ„ ์Šคํ…Œ์ดํฌํ™€๋”์™€ ์ •์ฑ… ์š”๊ตฌ์‚ฌํ•ญ์„ ํ•ฉ์˜ํ•˜๋ฉฐ, ์˜ˆ์™ธ ์ฒ˜๋ฆฌ ํ”„๋กœ์„ธ์Šค(MAC ํ™”์ดํŠธ๋ฆฌ์ŠคํŠธ, ์ž„์‹œ Guest ๋“ฑ)๋ฅผ ๋ฌธ์„œํ™”ํ•ด์•ผ ํ•œ๋‹ค. ๊ธฐ์ˆ ์ ์œผ๋กœ ์™„๋ฒฝํ•œ ISE ๊ตฌ์„ฑ๋„, ์‚ฌ์ „ ์ค€๋น„ ์—†์ด ๋ฐฐํฌํ•˜๋ฉด "ํ”„๋ฆฐํ„ฐ๊ฐ€ ์•ˆ ๋ฉ๋‹ˆ๋‹ค" ํ•œ ํ†ต์˜ ์ „ํ™”๋กœ ํ”„๋กœ์ ํŠธ๊ฐ€ ๋กค๋ฐฑ๋œ๋‹ค.

๋˜ํ•œ, Change of Authorization(CoA)๊ฐ€ ๋ชจ๋“  ๋™์  ์ •์ฑ…์˜ ํ•ต์‹ฌ์ด๋ฏ€๋กœ, NAD์˜ CoA ์ง€์› ์—ฌ๋ถ€์™€ ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™(UDP 3799)์„ ๋ฐ˜๋“œ์‹œ ์‚ฌ์ „ ๊ฒ€์ฆํ•ด์•ผ ํ•œ๋‹ค.

Cisco ISE Deep Dive โ€” Expert Level ์™„์ „ ์ •๋ณต ๊ฐ€์ด๋“œ

์ด ๋ฌธ์„œ๋Š” CCIE Security ์ˆ˜์ค€์˜ ISE ์ „๋ฌธ ์ง€์‹์„ ๋‹ค๋ฃจ๋ฉฐ, ์‹ค๋ฌด ๋ฐฐํฌยท์šด์˜ยทํŠธ๋Ÿฌ๋ธ”์ŠˆํŒ…์— ์ง์ ‘ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ตฌ์„ฑ๋˜์—ˆ์Šต๋‹ˆ๋‹ค.

Cisco ISE 802.1X TrustSec SGT Profiling Posture pxGrid TACACS+ NAC Zero Trust CCIE Security BYOD Guest Access Network Security

ยฉ 2026 โ€” ISE Expert Series | Tistory Blog Format