EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

Client Posture Assessment

Client Posture Assessment

With the help of ISE posture assessment method, we can check and know whether our clients are in compliance with organization Host security policy. It check the security health of PC, and Mac Clients

Below are some example that ISE posturing feature check for clients.

  • OS Installation Status
  • Machine running state
  • Security Software last update
  • Anti-Virus Status
  • Anti-Malware Status
  • Personal FW state
  • Host OS patch status
  • Checks for custom attributes like Files , Processes , Registry , Setting & Applications

ISE has design specific Work center for configuring various components of Posturing Solutions in its WorkCentre.

Below are following three steps which are required to configure Posturing in ISE.

  • Prepare
  • Define
  • Go-Live & Monitor

Below are some high-Level steps required to setup ISE posturing assessment feature

  1. Configure global posture and client provisioning settings:
    • Download to ISE the latest posture updates and the client provisioning packages.
    • Verify the default global posture settings meet your needs.
  2. Configure the posture client provisioning policy.
  3. Configure the Client Provisioning Portal.
  4. Configure posture elements:
    • Configure posture conditions.
    • Configure posture remediation.
    • Configure posture requirements.
  5. Configure posture policy.
  6. Optionally, configure host application visibility and context collection.
  7. Enable posture client provisioning and assessment in your ISE authorization policies.
  8. Enable posture assessment on the network devices.

ISE Posture Assessment Flow

In order to understand the IE posturing, we need to understand the ISE flow that ISE undergoes when Posturing Assessment is enabled.

Below figure describes the ISE Flow when Posturing is enabled.

Below are steps description

AT first 802.1X Suppliant Client talks to access layer switch to start 802.1X. EAP transaction starts between Clint and ISE and switch is acting as Proxy here. If Authentication is successful posture status is set to unknown.

ISE instruct Switch to redirect client to ISE URL. Which will help client to download the Posture NAC agent or dissolvable NAC agent software on client based on policy.

Once NAC agent is downloaded to Client, It will use SWISS protocol to communicate with ISE and at end, Posture result is created.

ISE will send the CoA request to switch, which will starts the 802.1X re-authentication , and a New authorization rule is matched to provide new result about client , which says that cline is compliant or non-Compliant. Now here new access rights of match authorization rule are downloaded to switch.

If Periodic re-assessment is enabled, Client will be checked for regular posture assessment in any changes is done. If any status changes then CoA is issued again same steps will be followed.

Configuring Global Posturing & Client Provisioning Setting

Here global setting is to be enabled in order to turn on Posture assessment. It is done by two parts.

  • Client Provisioning Setup: which deals with NAC agent software, its delivery and other setting.
  • Posture setup: It helps in downloading posture condition DB and Clients, Keeping it Up to date, Posture reassessment, and general setting.

Client posturing global Setup

To configure and setup Client posturing global Setup, you should download and enable your posture resources. Below are three type of agents required for posture assessment, and each of which supports windows, Mac OS systems.

  • Cisco AnyConnect with the compliance module
  • Cisco NAC Agent
  • NAC Web Agent

Below are the list of all client provisioning resource type

  • Persistent and temporal posture agents:
  • Windows and Mac OS X Cisco AnyConnect Agents with the ISE compliance module installed
  • Windows and Mac OS X Cisco NAC Agents
  • Cisco NAC Web Agent
  • Agent compliance modules
  • Agent customization packages

To enable and download the posture resources: Administration | System | Settings | Client Provisioning, Make sure that ISE proxy setting are enabled before doing any configuration.

In the above figure, follow below steps:

  • Enable Client Provisioning
  • Enable automatic downloads which is optional. Enabling it will enable any or all client files from Cisco.com. You can select the exact files which is required. In this use the default feed URL or set up your own client repository site.
  • Keep the default setting of Allow Network Access for native suppliant provisioning field.
  • Click Save.

In order to select the Client files, go to Policy | Policy Elements | Results | Client Provisioning | Resources.

Above figure show you all the agents and other ISE resources that has been downloaded already. If you need to add more, Click on ADD and choose to add them from Cisco.com. or from local PC and then click Save.

Now see the below figure , it will tell you that you can only download the Any connect compliance Module that fits inside the full Any Connect Client and you cannot download the full AnyConenct Agent from ISE ( On ISE Version 2.2). If you still want to download the full version, go to Cisco.com/go/AnyConnect. Below fig correctly describes what to download. (AnyConnect Headend Deployment Package (.pkg) files.

 

GENERAL FAQ

Client posture in Cisco ISE is a way to check if a device meets your organization’s security requirements before it’s allowed full network access. It looks at things like antivirus status, OS updates, and whether the firewall is active. If the device passes the check, it’s marked as compliant. If not, ISE can limit its access or guide the user to fix the issues.

The posture service is an optional function of Cisco ISE that may or may not be deployed in a Cisco ISE environment. Clients interact with the ISE posture service through posture agents on the endpoint to enforce security policies, meet compliance standards, and allow the endpoint to gain access to protected resources.

The three main security posture components are client provisioning, assessment, and remediation. These components interoperate with the authorization policy to assess compliance and to enforce an appropriate access privilege for compliant and noncompliant endpoints.

Immediately after authentication, the posture status of the endpoint is unknown. The posture service interacts with the Cisco ISE authorization function via the change of authorization (CoA). When the posture service is invoked and the endpoint status is assessed, the status will change to noncompliant or compliant:

It assists in allowing only compliant and secure devices to connect to the network. It also removes the possibility of compromised machines, data leaks, or malware accessing it, making your other network safe. The Cisco Identity Services Engine (ISE) Posture Service is a service that allows you to check the state, or posture, of all the endpoints that are connecting to a network for compliance with corporate security policies to determine which clients get access to protected areas of a network.

Upon device connect, ISE authenticates the device with 802.1X, and if successful, checks the posture status of the device. The client downloads a posture agent (e.g., Cisco AnyConnect or NAC Agent) that talks to ISE to prove it is compliant. According to the results, ISE either grants full access or implements some restrictions until the problems are resolved.

There are many posture agents supported in ISE, namely: Cisco AnyConnect with the compliance module, the Cisco NAC Agent, and the NAC Web Agent. These agents assist in assessing the health of a device and report their findings to ISE so that ISE can make decisions on access.

If a device does not pass the posture check, ISE can put the device in a limited network. You could see a request to install updates, enable an antivirus program, or whatever. When the device complies, ISE performs reauthentication, and then access is flipped to normal for this.

When the noncompliant status is returned by the posture service, a CoA is issued, and Cisco ISE applies the appropriate authorization policy to the endpoint. This authorization policy typically enables the endpoint to access necessary remediation resources. After successful remediation, the endpoint is assessed again, and its status is changed to compliant.

Yes. ISE can conduct periodic (e.g., “every hour”) reassessments to ensure devices remain compliant at all times. ISE can already recommend and automate policy changes to the network if a security status has changed, such as if users are running out-of-date antivirus software with known vulnerabilities, it could initiate reauthorization and implement new access rules.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.