ISE Deep Dive
Cisco ISE Deep Dive
ìì ì ë³µ ê°ìŽë
Architecture · 802.1X · Profiling · Posture · Guest · BYOD · TrustSec · pxGrid · TACACS+ · Troubleshooting
01 ISE ê°ì ë° Zero Trustììì ìí
Cisco Identity Services Engine(ISE)ì ìí°íëŒìŽìŠ ë€ížìí¬ìì ì ì± ê²°ì í¬ìžíž(Policy Decision Point, PDP)ë¡ êž°ë¥íë ì°šìžë NAC(Network Access Control) íë«íŒìŽë€. ëšìí AAA ìë²ë¥Œ ëìŽ, ì¬ì©ì·ëë°ìŽì€Â·ì í늬ìŒìŽì 컚í ì€ížë¥Œ ìì§íê³ , ìŽë¥Œ êž°ë°ìŒë¡ ì ê·Œ ì ì± ì ëì ìŒë¡ ì ì©íë©°, ìíì ì€ìê°ìŒë¡ 격늬íë Zero Trust Architectureì íµì¬ ìì§ìŽë€.
ISEê° íŽê²°íë íµì¬ 묞ì
- Visibility Gap: ë€ížìí¬ì ì°ê²°ë 몚ë ìëí¬ìžíž(ì¬ì©ì, IoT, OT ì¥ë¹)ì ì 첎륌 íì íì§ ëª»í멎 ì ì± ì ìžìž ì ìë€.
- Policy Fragmentation: Wired, Wireless, VPN, DC, Cloud ê° ëë©ìžë§ë€ ë³ë ì ì± ì»šížë¡€ë¬ê° 졎ì¬íì¬ ìŒêŽë 볎ììŽ ìŽë µë€.
- Static ACL íê³: IP êž°ë° ACLì ì¬ì©ì ë¡ë°, DHCP í겜ìì ë¬Žë ¥íë©°, ìì² ì€ì ACE êŽëЬë ìŽì ì 몜ìŽë€.
- Compliance Enforcement: ìëí¬ìžížì 볎ì ìí(íšì¹, AV, ìíží) 믞íìž ì ë€ížìí¬ ì ê·Œì íì©íë ê²ì Zero Trust ìë°ìŽë€.
ð¡ ISEì 3ë ì¶ (Three Pillars)
â Visibility â íë¡íìŒë§ + AI Endpoint Analyticsë¡ "Who/What is on the network" í볎
â¡ Control â 802.1X, MAB, WebAuth, Posture륌 íµí ìžìŠÂ·ìžê°Â·ì»ŽíëŒìŽìžì€ ê°ì
⢠Segmentation â TrustSec SGT êž°ë° ë§ìŽí¬ë¡ìžê·žë©í
ìŽì
ìŒë¡ lateral movement ì°šëš
ISEë RADIUS/TACACS+ íë¡í ìœì ì²ëЬíë ëìì, DHCP, CDP, LLDP, NetFlow, HTTP, SNMP ë± ë€ìí íë¡í ìœì 컚í ì€íž ë°ìŽí°ë¥Œ ìì§íë€. ìì§ë 컚í ì€ížë Security Group Tag(SGT)ëŒë ë ìŽëžë¡ ì¶ìíëìŽ, ë€ížìí¬Â·ë³Žì ëë©ìž ì 첎ì ìŒêŽë ì ì± ìë³ìë¡ ë°°í¬ëë€.
02 Architecture Deep Dive â Persona · Node · Deployment
2.1 ISE Persona (ìí ë¶ëЬ)
ISE ìí€í ì²ì íµì¬ì Persona êž°ë° ìí ë¶ëЬìŽë€. ê° ISE ë žëë íë ìŽìì Persona륌 ì€íí ì ììŒë©°, ìê·ëªš í겜ììë 몚ë Persona륌 ëšìŒ ë žëì íµí©(Standalone), ëê·ëªš í겜ììë ì ì© ë žëë¡ ë¶ì°(Distributed) ë°°í¬íë€.
| Persona | ìœì¹ | íµì¬ êž°ë¥ | HA êµ¬ì± |
|---|---|---|---|
| Administration | PAN | ì ì± êµ¬ì±, ëŒìŽì ì€ êŽëЬ, DB Replication Master, GUI ì ê³µ | Active/Standby (ìµë 2ë žë) |
| Policy Service | PSN | RADIUS/TACACS+ ì²ëЬ, Profiling Probe, Posture, Guest, BYOD | Active/Active (LB VIP ì¬ì©), ìµë 50 PSN |
| Monitoring | MnT | ë¡ê·ž ìì§Â·ìêŽë¶ì, 늬í¬íž, ìë | Active/Standby (ìµë 2ë žë) |
| pxGrid | PXG | 컚í ì€íž ê³µì íëž (WebSocket/STOMP) | Active/Active (ìµë 4ë žë) |
2.2 Distributed Deployment ìí€í ì²
2.3 ì€ê³ íµì¬ ìì¹
- PAN-PSN ê° ì§ì°: Round-trip 300ms ìŽëŽ. DB Replication곌 ì ì± Pushê° ìŽ ë§í¬ë¥Œ ì¬ì©íë€.
- PSN-MnT ê° ëìí: Audit Logê° ëë ì ì¡ëë¯ë¡ ì¶©ë¶í bandwidth í볎 íì.
- PSN-AD Co-location: RADIUS ìžìŠ ì AD LookupìŽ ë°ìíë¯ë¡, PSN곌 AD DC륌 ê°ì ì¬ìŽížì ë°°ì¹íë€.
- Load Balancer: Calling-Station-ID(MAC) êž°ë° Sticky SessionìŒë¡ PSN ë¶ì°. URL Redirect ìë¹ì€(Guest, Posture) ì¬ì© ì PSN Node Group êµ¬ì± íì.
- N+1 ëë N+2 Redundancy: PSN 귞룹 ëŽ ìë¹ ë žë륌 í볎íì¬, ëšìŒ PSN ì¥ì ììë ìžìŠ ì²ëЬë ì ì§.
03 Authentication ë©ì»€ëìŠ
3.1 802.1X (EAP êž°ë° ìžìŠ)
802.1Xë ISEìì ê°ì¥ ê°ë ¥í ìžìŠ ë°©ììŽë€. Supplicant â Authenticator(Switch/WLC) â Authentication Server(ISE) 3ì êµ¬ì¡°ë¡ ëìíë©°, EAPoL(EAP over LAN)ë¡ ìº¡ìíë ìžìŠ íë ììŽ êµíëë€.
죌ì EAP ë°©ì ë¹êµ
| EAP ë°©ì | ìžìŠ ìì | Inner Method | í¹ì§ |
|---|---|---|---|
| EAP-TLS | ìžìŠì (Mutual TLS) | ìì | ìµê³ 볎ì, ìžìŠì ìžíëŒ(PKI) íì |
| PEAP-MSCHAPv2 | ìë² ìžìŠì + ì¬ì©ì ID/PW | MSCHAPv2 | ê°ì¥ ìŒë°ì , AD íµí© ì©ìŽ |
| EAP-FAST | PAC ëë ìžìŠì | MSCHAPv2/GTC | Cisco ë ì, EAP Chaining ì§ì |
| TEAP | ìžìŠì + ID/PW | EAP-TLS + MSCHAPv2 | RFC 7170 íì€, Machine+User Chaining |
Network Access:EAPChainingResult = User and Machine Both Succeeded 조걎ìŒë¡ ì ë° ì ì±
ì 구ì±í ì ìë€.
3.2 MAB (MAC Authentication Bypass)
802.1X Supplicantê° ìë ëë°ìŽì€(í늰í°, IP Phone, IoT, OT ì¥ë¹)ì ëíŽ MAC 죌ì륌 IDë¡ ì¬ì©íë Fallback ìžìŠìŽë€.
! Switch Configuration â 802.1X + MAB Fallback
interface GigabitEthernet1/0/1
switchport mode access
switchport access vlan 100
authentication port-control auto
authentication order dot1x mab
authentication priority dot1x mab
mab
dot1x pae authenticator
dot1x timeout tx-period 10
authentication timer reauthenticate 3600
authentication event fail action next-method
authentication event server dead action authorize vlan 999
authentication event server alive action reinitialize
IOS-XE 802.1X + MAB
3.3 Web Authentication (CWA / LWA)
- CWA (Central Web Authentication): ISEê° ì§ì Web Portalì ížì€í . Switch/WLCê° HTTP Redirect ACLì ì ì©íì¬ ížëíœì ISEë¡ ëŠ¬ë€ìŽë íž. Guest, BYOD ìšë³Žë©ì ì¬ì©.
- LWA (Local Web Authentication): Switch/WLC ì첎 Portal. ISEë ë·ëš RADIUS ìë² ìí ë§ ìí. êž°ë¥ìŽ ì íì ìŽëŒ CWA ê¶ì¥.
3.4 Authentication Flow (802.1X êž°ì€)
04 Authorization Policy & Policy Sets ì€ê³
4.1 Policy Set ê³ìžµ 구조
ISEì ì ì± ìì§ì ê³ìžµì Policy Set êµ¬ì¡°ë¡ ëìíë€. ìµììì Policy Set ë§€ì¹ ì¡°ê±ŽìŽ ìê³ , ê° Set ëŽë¶ì Authentication Policy â Authorization Policy â Exception Policyê° ììëë¡ íê°ëë€.
4.2 Authorization Profile íµì¬ ìì
- VLAN Assignment:
Tunnel-Private-Group-IDRADIUS ìì±ìŒë¡ ëì VLAN í ë¹ - Downloadable ACL (DACL): ISEìì Switchë¡ ACLì Push. Per-session granularity ì ê³µ
- Security Group Tag (SGT):
cisco-av-pair: cts:security-group-tag=XXXXë¡ SGT í ë¹ - URL Redirect: Guest Portal, BYOD Portal, Posture Portalë¡ì CWA 늬ë€ìŽë íž
- Reauthentication Timer: Session Timeout + CoA륌 íµí 죌Ʞì ì¬ìžìŠ
- Voice Domain Permission:
device-traffic-class=voiceVSAë¡ IP Phone ìì± VLAN ìžê°
4.3 Condition Dictionary íì©
ISEë ìì ê°ì Dictionary륌 ì ê³µíë©°, Authorization 조걎ìì ë€ìí ìì± ì¡°í©ìŽ ê°ë¥íë€:
/* Expert-Level Authorization Condition ìì */
Condition:
IdentityGroup:Name EQUALS "Employee"
AND
Network Access:EAPChainingResult EQUALS "User and machine both succeeded"
AND
Session:PostureStatus EQUALS "Compliant"
AND
DEVICE:Location EQUALS "Seoul_HQ"
Result:
Profile: Full_Network_Access
SGT: Employee_Trusted (0010)
ISE Policy Condition
05 Profiling â ìëí¬ìžíž ìë³ê³Œ ë¶ë¥
5.1 íë¡íìŒë§ìŽ íìí ìŽì
"ëê° ë€ížìí¬ì ì°ê²°ëìŽ ìëê°?"ë ì ë°ì ì§ë¬žìŽë€. "묎ììŽ ì°ê²°ëìŽ ìëê°?"ê° ë ì€ìíë€. í늰í°, IP Phone, IoT ìŒì, CCTV, ìë£ ì¥ë¹ ë± 802.1X륌 ì§ìíì§ ìë ëë°ìŽì€ê° êž°ì ë€ížìí¬ì ìë¹ ë¶ë¶ì ì°šì§íë€. ISE Profilerë ë€ìí ìì€ì ìê·žëì ìì§íì¬ ìëí¬ìžížë¥Œ ì ë°íê² ë¶ë¥íë€.
5.2 Profiling Probes
| Probe | ìì§ ë°ìŽí° | ì ë°ë | ë¹ê³ |
|---|---|---|---|
| RADIUS | Calling-Station-ID, NAS-Port, Framed-IP | ë®ì | Ʞ볞 íì±í |
| DHCP | hostname, class-identifier, vendor-class | ì€ê° | ip helper-address ëë SPAN |
| Device Sensor | CDP/LLDP/DHCP attributes (Switchìì ìì§) | ëì | IOS 15.x+, RADIUS accountingìŒë¡ ì ì¡ |
| SNMP | sysObjectID, sysDescr, cdpCacheDeviceId | ë§€ì° ëì | ISE 3.5ë¶í° SNMPv3 ì§ì |
| HTTP | User-Agent string | ì€ê° | SPAN ëë WLC |
| NetFlow | Traffic pattern | ë®ì | íì êž°ë° ë¶ë¥ 볎조 |
| pxGrid / MDM | MDM compliance, device model, OS | ë§€ì° ëì | Jamf, Intune, WS1 ì°ë |
| Wi-Fi Edge Analytics | Apple/Intel/Samsung ëë°ìŽì€ ìì± | ëì | Catalyst 9800 WLC â RADIUS |
5.3 Certainty Factor (CF) ë§€ì¹ ë¡ì§
ISE Profilerë Certainty Factor ê°ì€ì¹ ìì€í ì ì¬ì©íë€. ê° Profiling RuleìŽ ë§€ì¹ë멎 ì íŽì§ CF ê°ìŽ ëì ëê³ , Minimum Certainty Factor(MCF) ìê³ê°ì ìŽê³Œí멎 íŽë¹ íë¡íìŒë¡ ë¶ë¥ëë€.
/* Custom Profiling Policy ìì â Axis IP Camera */
Profile: Custom_Axis_Camera
MCF: 30
Rule 1: DHCP:vendor-class CONTAINS "AXIS" â CF +20
Rule 2: SNMP:sysObjectID EQUALS "1.3.6.1.4.1.368" â CF +30
Rule 3: HTTP:User-Agent CONTAINS "AXIS" â CF +10
Rule 4: OUI EQUALS "00:40:8C" (AXIS OUI) â CF +10
/* Rule 2ë§ ë§€ì¹ëìŽë CF=30 ⥠MCF=30 â ë¶ë¥ íì */
/* Rule 1+4ë§ ë§€ì¹ëìŽë CF=30 ⥠MCF=30 â ë¶ë¥ íì */
ISE Profiling Policy
5.4 ISE 3.x: AI Endpoint Analytics
ISE 3.0ë¶í° ëì ë AI Endpoint Analyticsë ëšžì ë¬ë êž°ë°ìŒë¡ ìëí¬ìžížë¥Œ ìë ë¶ë¥íë€. Ʞ졎 Rule êž°ë° íë¡íìŒë§ì 볎ìíì¬, ìë €ì§ì§ ìì(Unknown) ëë°ìŽì€ë íì íšíŽê³Œ ìì± ì ì¬ë륌 ë¶ìíŽ ê·žë£¹ííë€. ISE 3.5ììë Authoritative Source êž°ë¥ìŽ ì¶ê°ëìŽ, MDM(Jamf ë±)ìŽ í¹ì ìì±ì ëíŽ ISE ì첎 íë¡íìŒë§ë³Žë€ ì°ì ìëëë¡ ì€ì í ì ìë€.
06 Posture Assessment â Compliance ìì§
6.1 Posture ê°ë
Posture(ììž íê°)ë ìëí¬ìžížê° ë€ížìí¬ì ì ê·Œíêž° ì ì 볎ì 컎íëŒìŽìžì€ ìí륌 ê²ìŠíë ë©ì»€ëìŠìŽë€. AV ì€ì¹ ì¬ë¶, OS íšì¹ ìì€, ëì€í¬ ìíží, ë°©í벜 ìí, ë ì§ì€ížëЬ í€ ì¡Žì¬ ë±ì ì ê²íë€.
6.2 Posture Agent vs Agentless
| ë°©ì | Agent | ì§ì OS | ì ê² ë²ì |
|---|---|---|---|
| Cisco Secure Client (구 AnyConnect) | Agent ì€ì¹ | Windows, macOS, Linux | ì 첎 (AV, Patch, Firewall, ìíží, ë ì§ì€ížëЬ ë±) |
| Agentless Posture | ììŽì íž ìì | Windows, macOS | ì íì (êŽëЬì ê¶íìŒë¡ WMI/SSH ì격 ì¡°í) |
| Temporal Agent | ìì ì€í | Windows, macOS | ì€ê° (ì€í í ìë ìì ) |
6.3 Posture Flow
Posture Status = Unknown 조걎 ë§€ì¹ â Redirect to Client Provisioning Portal íë¡íìŒ ì ì©/* Posture Condition ìì */
Condition: AV_Definition_Check
Type: Anti-Virus Definition
Vendor: CrowdStrike Falcon
Check: Definition Date within 3 days
Condition: OS_Patch_Check
Type: Patch Management
OS: Windows All
Severity: Critical patches installed
Condition: Disk_Encryption_Check
Type: Disk Encryption
Vendor: BitLocker
Status: Encrypted
Requirement: Corporate_Compliance
Conditions: AV_Definition_Check AND OS_Patch_Check AND Disk_Encryption_Check
Remediation: Message + Auto-Remediation (Force Windows Update)
ISE Posture Policy
07 Guest Access â Hotspot · Self-Reg · Sponsored
7.1 Guest Access ì í
- Hotspot: ë³ë ê³ì ììŽ ìœêŽ ëìë§ìŒë¡ ì ì. 공공 WiFi, ìžë¯žëì€ì ì í©.
- Self-Registration: 방묞ìê° ì§ì ì 볎(ìŽëŠ, ìŽë©ìŒ, ì íë²íž) ì ë ¥ í ìì ê³ì ìì±. SMS/Email ìžìŠ ê°ë¥.
- Sponsored Guest: ì¬ëŽ Sponsor(ì§ì)ê° Guest ê³ì ì ìì±íì¬ ë°©ë¬žììê² ì ê³µ. ì¹ìž ìí¬íë¡ì° í¬íš.
7.2 CWA êž°ë° Guest Flow
7.3 Guest Portal 컀ì€í°ë§ìŽì§
ISE Guest Portalì CSS/HTML ìì€ìì ëžëë©ìŽ ê°ë¥íë€. ë¡ê³ , ìì, ìœêŽ ë¬žêµ¬, ìžìŽ í©ì 컀ì€í°ë§ìŽìŠíì¬ êž°ì CIì ë§ì¶ Portalì ì ê³µí ì ìë€. Portalìì ìì§ë Guest ì 볎ë ISEì Guest Endpoints DBì ì ì¥ëë©°, ë§ë£ ìê°, ì ì ìê° ì í, ì ì íì ì íì ì€ì í ì ìë€.
08 BYOD Onboarding Pipeline
8.1 BYOD íëŠ ê°ì
BYOD(Bring Your Own Device) ìšë³Žë©ì ì§ìì ê°ìž ëë°ìŽì€ë¥Œ êž°ì ë€ížìí¬ì ìì íê² ë±ë¡íë íë¡ìžì€ìŽë€. ISEë ìžìŠì êž°ë° BYOD륌 ì§ìíë©°, ëŽì¥ CA(Certificate Authority)륌 íµíŽ ëë°ìŽì€ë³ ê³ ì ìžìŠì륌 ë°êžíë€.
8.2 My Devices Portal
ìšë³Žë© ìë£ í, ì§ìì My Devices Portalì íµíŽ ë±ë¡ë ê°ìž ëë°ìŽì€ë¥Œ êŽëЬí ì ìë€. ë¶ì€/ëë ì ìžìŠì륌 ì§ì Revokeíì¬ ìŠì ë€ížìí¬ ì ê·Œì ì°šëší ì ìë€.
8.3 Dual SSID vs Single SSID
| ë°©ì | ì¥ì | ëšì |
|---|---|---|
| Single SSID | ì¬ì©ì 겜í ì°ì (íëì SSIDë§ ì¬ì©) | CoA ì졎, WLC êµ¬ì± ë³µì¡ |
| Dual SSID | 구í ëšì, CoA ë¶íì | ì¬ì©ìê° SSID ì í íì |
09 TrustSec & SGT êž°ë° Micro-Segmentation
9.1 TrustSec ê°ë
Cisco TrustSecì IP 죌ìê° ìë Security Group Tag(SGT)ëŒë ë ŒëŠ¬ì ë ìŽëžë¡ ë€ížìí¬ ìžê·žë©í ìŽì ì 구ííë ìí€í ì²ìŽë€. ì¬ì©ì/ëë°ìŽì€ê° ìžìŠë멎 ISEê° SGT륌 í ë¹íê³ , ìŽ íê·žë íší·ì ìžëŒìžìŒë¡ ìœì ëê±°ë SXP íë¡í ìœì íµíŽ ì íëë€.
9.2 SGT í ë¹ ë°©ì
- Dynamic Classification (ëì ): 802.1X/MAB ìžìŠ ì ISE Authorization Profileìì SGT ìë í ë¹. RADIUS
cisco-av-pair: cts:security-group-tag=XXXX - Static Classification (ì ì ): ìžìŠì ê±°ì¹ì§ ìë ìë²/ìžíëŒ ì¥ë¹ì ëíŽ ISEìì IP-to-SGT ë§€íì ìë ë±ë¡
- Subnet-to-SGT: ìëžë· ëšìë¡ SGT륌 ìŒêŽ ë§€í
9.3 SGT Propagation
| ì í ë°©ì | ëì | ì구 ì¬í |
|---|---|---|
| Inline Tagging (802.1AE) | ìŽëë· íë ìì SGT륌 CMD(Cisco Meta Data) í€ëë¡ ìœì | CTS ì§ì ì€ìì¹, MACsec ê°ë¥ |
| SXP (SGT Exchange Protocol) | Control PlaneìŒë¡ IP:SGT ë°ìžë© í ìŽëž ì í | ìžëŒìž 믞ì§ì ì¥ë¹, ë°©í벜 ì°ë ì |
| pxGrid | ISE â FMC/Stealthwatch ë±ì SGT 컚í ì€íž ê³µì | pxGrid 2.0 (WebSocket) |
9.4 SGACL (Security Group ACL) ì ì±
SGACLì Source SGT â Destination SGT ë§€ížëŠì€ êž°ë°ì ì ê·Œ ì ìŽ ì ì±
ìŽë€. ISEì Work Centers > TrustSec > Policy Matrixìì 구ì±íë€.
! SGACL ìì: HR(20) â Finance_Servers(60) = Deny
permit tcp dst eq 443 ! HTTPSë§ íì©
permit tcp dst eq 80 ! HTTP íì©
deny ip ! ëëšžì§ ì ë¶ ì°šëš
! ì€ìì¹ìì íìž
show cts role-based permissions
show cts role-based sgt-map all
show cts role-based counters
SGACL Configuration
ðïž TrustSec ì€ê³ ë² ì€íž íëí°ì€
â Egress Enforcement: SGACLì Egress ì€ìì¹ìì ì ì©íë€. Ingress ì€ìì¹ë Source SGTë§ íê¹
í멎 ëë€.
â¡ SGT ë€ìŽë°: ë¹ìŠëì€ ìí êž°ë° (HR, Finance, IT, Guest, IoT, Servers ë±). ë²ížë 10 ëšìë¡ í ë¹íì¬ íì¥ ì¬ì§ë¥Œ ëšêžŽë€.
⢠Default Policy: Unknown SGT ê° íµì ì Ʞ볞 Deny. ëª
ìì ìŒë¡ íì©ë íëŠë§ Permit.
⣠ì ì§ì ë°°í¬: Monitor Mode â Low-Impact â Closed Mode ììë¡ SGACL ì ì©.
10 pxGrid â Context Sharing Ecosystem
10.1 pxGrid ìí€í ì²
Cisco pxGrid(Platform Exchange Grid)ë ISEê° ìì§í 컚í ì€íž ë°ìŽí°(ì¬ì©ì, ëë°ìŽì€, SGT, ìí ì 볎)륌 ìëíí° ë³Žì ì í곌 ìë°©í¥ìŒë¡ ê³µì íë íë ììí¬ìŽë€. ISE 2.4ë¶í° ëì ë pxGrid 2.0ì WebSocket/STOMP êž°ë°ìŒë¡ ëìíë©°, REST API륌 íµíŽ íë«íŒ ë 늜ì ì°ëìŽ ê°ë¥íë€.
10.2 pxGrid êµ¬ì± ìì
- Controller: ISE pxGrid ë žë. Topic êŽëЬ, ì°žê°ì ìžìŠ, Publisher-Subscriber ë§€ì¹
- Publisher: ë°ìŽí°ë¥Œ ë°ííë 죌첎 (ISE MnTê° Session Directory ë°í)
- Subscriber: ë°ìŽí°ë¥Œ 구ë íë 죌첎 (FMC, Stealthwatch, Splunk, SIEM ë±)
10.3 죌ì pxGrid íµí© ìë늬ì€
| ì°ë ì í | ê³µì ë°ìŽí° | íì© |
|---|---|---|
| Cisco FMC (Firepower) | User-IP ë§€í, SGT | NGFWìì ì¬ì©ì/SGT êž°ë° ì ì± ì ì© |
| Cisco Stealthwatch | Session context | NetFlow ë¶ìì ì¬ì©ì 컚í ì€íž ê²°í©, ìŽì íì íì§ |
| Splunk / SIEM | Authentication logs, SGT | 볎ì ìŽë²€íž ìêŽë¶ì |
| Cisco DNA Center | SGT, Policy | Intent-based ë€ížìí¬ ìžê·žë©í ìŽì ìëí |
| ServiceNow | Endpoint attributes (pxGrid Direct) | CMDB ì°ë, ìì° êŽëЬ |
10.4 pxGrid Direct (ISE 3.2+)
pxGrid Directë pxGrid 2.0ì 볎ìíë êž°ë¥ìŒë¡, ìžë¶ ë°ìŽí°ë² ìŽì€(ServiceNow, CMDB ë±)ì ìëí¬ìžíž ìì±ì ISEë¡ ì§ì ê°ì žì€ê±°ë(URL Fetch), ë³ê²œ ì¬íì ì€ìê°ìŒë¡ ISEì Push(Direct Push)í ì ìë€.
11 TACACS+ Device Administration
11.1 RADIUS vs TACACS+
| í목 | RADIUS | TACACS+ |
|---|---|---|
| 죌ì ì©ë | Network Access (ì¬ì©ì/ëë°ìŽì€ ìžìŠ) | Device Administration (ì¥ë¹ êŽëЬì ìžìŠ) |
| íë¡í ìœ | UDP 1812/1813 | TCP 49 |
| ìíží | ë¹ë°ë²ížë§ ìíží | ì 첎 Payload ìíží |
| AAA ë¶ëЬ | Authentication + Authorization ê²°í© | Authentication, Authorization, Accounting ìì ë¶ëЬ |
| Command Authorization | 믞ì§ì | ì§ì (ëª ë ¹ìŽë³ íì©/ì°šëš) |
11.2 TACACS+ Policy 구ì±
/* ISE TACACS+ Device Admin Policy Set ìì */
Policy Set: Network_Device_Admin
Condition: DEVICE:Device Type = "Switches"
Authentication:
Rule 1: Default â AD (Network_Admins OU)
Authorization:
Rule 1: AD:Group = "Senior_Network_Engineers"
â Shell Profile: Priv15
â Command Set: Permit_All
Rule 2: AD:Group = "Junior_Network_Engineers"
â Shell Profile: Priv1
â Command Set: Show_Only
/* show, ping, tracerouteë§ íì©, config ëª
ë ¹ ì°šëš */
Rule 3: AD:Group = "NOC_Operators"
â Shell Profile: Priv1
â Command Set: Monitor_Only
Default: DenyAllCommands
ISE TACACS+ Policy
! Switch-side TACACS+ Configuration
aaa new-model
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
tacacs server ISE-PSN-1
address ipv4 10.10.10.100
key Cisco!SecretKey#2026
timeout 5
IOS-XE TACACS+
12 ISE 3.x ì ê· êž°ë¥ & ëŒìŽì ì±
12.1 ë²ì ë³ ì£Œì êž°ë¥
| ë²ì | íµì¬ êž°ë¥ |
|---|---|
| 3.0 | AI Endpoint Analytics, Agentless Posture, AWS ë°°í¬, ëŒìŽì ì€ ì²Žê³ ê°íž |
| 3.1 | pxGrid 1.0 Deprecated, API Gateway íµí©, GUI ê°ì |
| 3.2 | pxGrid Direct, SGT + Virtual Network ì¡°í©, Dashboard ê°ì |
| 3.3 | ARM64 Posture, Very Small Node(8 vCPU), Tenable API Key ìžìŠ, AD Join Point 늬ìì€ ë¶ëЬ |
| 3.4 | Operational Intelligence, í¥ìë Health Check, íì¬ Suggested Release |
| 3.5 | SNMPv3 Profiling, Authoritative Source, 200K Network Devices, Entra Device AuthZ, Full IPv6 Single-Stack, TACACS+ AD Lockout Prevention |
12.2 ëŒìŽì ì€ ì²Žê³ (Nested Doll Model)
ISE 3.xë Essentials â Advantage â Premier 구조륌 ì±ííìë€. ìì í°ìŽê° íì í°ìŽì 몚ë êž°ë¥ì í¬íšíë€.
| ëŒìŽì ì€ | í¬íš êž°ë¥ |
|---|---|
| Essentials | 802.1X/MAB, Guest Access, Basic Profiling, Posture (Agent/Agentless) |
| Advantage | Essentials + AI Endpoint Analytics, BYOD, pxGrid, TrustSec SGT, Context Sharing |
| Premier | Advantage + TC-NAC, Compliance (ì§ìì Posture), Threat Intelligence ì°ë, Entra Device AuthZ |
13 Scalability & High Availability ì€ê³
13.1 ë°°í¬ ê·ëªšë³ ìµë ìëí¬ìžíž
| ë°°í¬ ê·ëªš | Max Active Endpoints | Max PSN ì | Max Network Devices |
|---|---|---|---|
| Small | 50,000 | 5 | 10,000 |
| Medium | 150,000 | 15 | 50,000 |
| Large (SNS 3795) | 2,000,000 | 50 | 200,000 (ISE 3.5) |
13.2 HA ì ëµ
- PAN HA: Primary/Secondary Active-Standby. Auto PromotionìŒë¡ ì¥ì ì Secondaryê° Primary ì¹ê²©.
- PSN HA: Load Balancer VIP ë€ì Active-Active 구ì±. NADìì Primary/Secondary/Tertiary RADIUS ìë²ë¡ ì€ì .
- MnT HA: Primary/Secondary. ë¡ê·ž ìì§ ìŽì€í.
- pxGrid HA: ìµë 4ë žë Active-Active. íŽëŒìŽìžížë ì묎 ë žëìë ì°ê²° ê°ë¥.
13.3 PSN Node Group
URL Redirect ìë¹ì€(Guest, Posture, BYOD)륌 ì¬ì©íë 겜ì°, Redirect URLì í¹ì PSNì FQDNìŽ í¬íšëë€. ìŽ PSNìŽ ë€ìŽë멎 Redirectê° ì€íšíë€. PSN Node Groupì 구ì±í멎, ê°ì 귞룹ì ë€ë¥ž PSNìŽ Redirect ì²ëŠ¬ë¥Œ ëíí ì ìë€.
13.4 Multi-DC ì¥ì ìë늬ì€
/* DC-A ì 첎 ì¥ì ì NAD Failover ìì */
NAD Config:
Primary RADIUS: PSN-DC-A-1 (10.1.1.10)
Secondary RADIUS: PSN-DC-B-1 (10.2.1.10)
Tertiary RADIUS: PSN-DC-C-1 (10.3.1.10)
Deadtime: 5 minutes
/* DC-A ì¥ì â NADê° ìëìŒë¡ DC-B PSNìŒë¡ Failover */
/* 5ë¶ Deadtime í DC-A 복구ë멎 ë€ì Primaryë¡ ë³µê· */
RADIUS Failover
authentication event server dead action authorize vlan 999 â 몚ë RADIUS ìë²ê° ëë¬ ë¶ê°ë¥í ë, ìëí¬ìžížë¥Œ Critical VLANìŒë¡ í ë¹íì¬ ìµìíì ë€ížìí¬ ì ê·Œì 볎ì¥íë€. ìŽ ì€ì ììŽ ìë² ì¥ì ê° ë°ìí멎 ì 첎 ë€ížìí¬ ì ê·Œ ì°šëšìŽëŒë ì¬ììŽ ë°ìíë€.
14 Troubleshooting Methodology
14.1 ISE ìž¡ ì§ëš ë구
- Operations â RADIUS â Live Logs: ì€ìê° ìžìŠ/ìžê° 결곌 íìž. ê°ì¥ 뚌ì íìžíŽìŒ í ê³³.
- Operations â RADIUS â Live Sessions: íì¬ íì± ìžì ì ììž ì 볎 (IP, MAC, Profile, SGT, Posture Status)
- Operations â Reports: Authentication Summary, Failed Attempts, RADIUS Accounting ë±
- Operations â Troubleshoot â Diagnostic Tools â Execute Network Device Command: ISEìì ì§ì NADì ëª ë ¹ ì€í
- Administration â System â Logging â Debug Log Configuration: 컎í¬ëížë³ Debug Level ì¡°ì
14.2 Switch/WLC ìž¡ ì§ëš ëª ë ¹ìŽ
! ìžìŠ ìžì
ìí íìž
show authentication sessions interface Gi1/0/1 details
show authentication sessions mac 00:11:22:33:44:55 details
! RADIUS íµì íìž
debug radius authentication
debug radius accounting
debug dot1x all
! DACL/ACL íìž
show ip access-lists interface Gi1/0/1
! TrustSec SGT íìž
show cts role-based sgt-map all
show cts role-based permissions
show cts role-based counters
! Device Sensor íìž
show device-sensor cache interface Gi1/0/1
show ip device tracking all
! AAA ìí
show aaa servers
test aaa group ISE-RADIUS testuser testpass new-code
IOS-XE Troubleshooting
14.3 ìŒë°ì 묞ì â ììž â íŽê²°
| ìŠì | ê°ë¥í ììž | íŽê²° ë°©ë² |
|---|---|---|
| 802.1X ìžìŠ ì€íš | ìžìŠì ë§ë£, EAP íì ë¶ìŒì¹, AD ë¹ë°ë²íž ë¶ìŒì¹ | ISE Live Logsìì Failure Reason íìž, Allowed Protocols ì ê² |
| MAB í íë¡íìŒ ë¯žë¶ë¥ | DHCP Helper 믞ì€ì , Device Sensor 믞íì±í | Profiling Probe ìí íìž, SPAN êµ¬ì± ì ê² |
| Guest Portal 늬ë€ìŽë íž ì ëš | Redirect ACL 믞ì ì©, DNS 믞íŽì, HTTPê° ìë HTTPS ì ì | ACL ë§€ì¹ íìž, DNS Redirect ì€ì , HTTP ížëíœ íì© |
| Posture ìí Unknown ì ì§ | Client Provisioning ì€íš, Agent 믞ì€ì¹ | CP Policy íìž, í¬í ì ê·Œ ACL ì ê² |
| CoA 믞ëì | CoA Port(3799) ì°šëš, NADìì CoA ë¹íì± | aaa server radius dynamic-author ì€ì íìž, ë°©í벜 ê·ì¹ ì ê² |
| SGT 믞í ë¹ | Authorization Profileì SGT 믞ì€ì , CTS 믞íì± | ISE AuthZ Profile íìž, ì€ìì¹ cts êŽë š ì€ì ì ê² |
tcpdumpì ì€ííì¬ RADIUS íší·ì 캡ì²í ì ìë€. í¹í EAP ížëì
°ìŽí¬ 묞ì ë¶ì ì ê°ë ¥í ë구ìŽë€:
ise/admin# tcpdump -i eth0 -s 0 -w /tmp/radius.pcap port 1812
15 ì€ì ë°°í¬ ì ëµ â Phased Deployment
Phase 1: Monitor Mode (ê°ìì± í볎)
802.1X + MAB륌 íì±ííë, ìžìŠ ì€íš ììë ë€ížìí¬ ì ê·Œì ì°šëšíì§ ìëë€. 목ì ì Ʞ졎 ë€ížìí¬ì ìí¥ ììŽ ìŽë€ ëë°ìŽì€ê° ìžìŠì ìëíê³ , ìŽë€ íë¡íìŒë¡ ë¶ë¥ëëì§ ë°ìŽí°ë¥Œ ìì§íë ê²ìŽë€.
- Switch:
authentication open+authentication port-control auto - ISE: Authentication Rule â Continue on Failure / User Not Found
- ISE: Authorization â Access-Accept only (DACL/VLAN/SGT ììŽ êž°ë³ž íì©)
- 목í: ìµì 2-4ì£Œê° ë°ìŽí° ìì§. Profiling ì íë ê²ìŠ.
Phase 2: Low-Impact Mode (ì ì§ì ì ìŽ)
Pre-Auth ACL(Pre-Authentication Open ACL)ì ì¬ì©íì¬, ìžìŠ ì ìë DHCP, DNS, TFTP ë± êž°ë³ž ìë¹ì€ ì ê·Œì íì©íë, ìžìŠ í ë ëì ì ê·Œ ê¶íì ë¶ì¬íë€.
- Switch:
ip access-group ACL-DEFAULT in(DHCP, DNS, ISE Portal íì©) - ISE: Authorizationìì DACL ì ì© ìì (ì íë ë²ì)
- 목í: ìžìŠ ì€íš ëë°ìŽì€ ìë³ ë° ììž ì²ëЬ 구ì¶
Phase 3: Closed Mode (ìì ì ìŽ)
ìžìŠëì§ ìì ížëíœì ìì ì°šëšíë€. 802.1X ëë MAB ìžìŠì ì±ê³µíŽìŒë§ ë€ížìí¬ ì ê·ŒìŽ ê°ë¥íë€.
- Switch:
authentication port-control auto(open ì ê±°) - ISE: Full Authorization Profile (VLAN + DACL + SGT)
- Critical VLAN, Server Dead Action ë± Failsafe ë°ëì 구ì±
Phase 4: TrustSec Enforcement (ìžê·žë©í ìŽì )
SGT í ë¹ìŽ ìì íë í, SGACLì ì ì§ì ìŒë¡ íì±ííì¬ ë§ìŽí¬ë¡ìžê·žë©í ìŽì ì ìì±íë€.
- TrustSec Policy Matrixìì Monitor Modeë¡ SGACL ì ì© (ë¡ê·žë§ ìì§)
- ížëíœ íšíŽ ë¶ì í Enforce Modeë¡ ì í
- ìµì¢ 목í: IP êž°ë° ACLì SGT êž°ë° ì ì± ìŒë¡ ìì ë첎
ð¯ Expert's Final Advice
ISE ë°°í¬ìì ê°ì¥ ì€ìí ê²ì êž°ì ìŽ ìëëŒ íë¡ìžì€ìŽë€. ì¬ì ì ìëí¬ìžíž ìžë²€í 늬륌 í볎íê³ , ë¶ìë³ ì€í ìŽí¬íëì ì ì± ì구ì¬íì í©ìíë©°, ììž ì²ëЬ íë¡ìžì€(MAC íìŽížëЬì€íž, ìì Guest ë±)륌 묞ìííŽìŒ íë€. êž°ì ì ìŒë¡ ì벜í ISE 구ì±ë, ì¬ì ì€ë¹ ììŽ ë°°í¬í멎 "í늰í°ê° ì ë©ëë€" í íµì ì íë¡ íë¡ì ížê° 례백ëë€.
ëí, Change of Authorization(CoA)ê° ëªšë ëì ì ì± ì íµì¬ìŽë¯ë¡, NADì CoA ì§ì ì¬ë¶ì ë°©í벜 ê·ì¹(UDP 3799)ì ë°ëì ì¬ì ê²ìŠíŽìŒ íë€.