3972 L16 Pxgrid Wsa Intergration
3972 L16 Pxgrid Wsa Intergration
3972 L16 Pxgrid Wsa Intergration
Lab Overview
This lab covers integration between Cisco Web Security Appliance (WSA) and Cisco Platform Exchange Grid
(pxGrid). In this lab, you will generate Certificate Signing Requests (CSR) on all the digital certificates required for
ISE, pxGrid, and HTTPS proxy. You will also perform configuration tasks on the Cisco Web Security Appliance (WSA)
and register the WSA as a pxGrid client to Cisco ISE. Additionally, you will download the Security Group Tag (SGT)
information. You will create a decryption policy and a web access policy.
Lab Procedures
• Configure ISE Certificates for REST and pxGrid
If you have performed a reset to this lab or are using the Global Knowledge e-Labs (meaning that you are
accessing the system after you have attended the 5 day course), you will need to prepare or verify the
environment. Perform the following:
Access the module in the lab guide titled Post Reset and follow the directions there.
A Cisco ISE deployment needs system certificates without wildcards in the subject or the subject alternative name
(SAN) to support REST API and pxGrid. In this exercise, you will generate a Certificate Signing Request and obtain a
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 2 of 22
certificate signed by an enterprise CA. Since both the pxGrid controller and clients in ISE, and the pxGrid client in
WSA are maintaining their own trust stores, there is no need to obtain certificates signed by a well-known CA.
1.2. Inspect the existing system certificate. Navigate to Administration > System > Certificates > System
Certificates. Select ise Admin Wildcart Cert and then Edit.
Note: The certificate has a wildcard SAN - DNS:*.gklabs.com. Wildcard certificates cannot be used for pxGrid and
REST API operations.
1.3. Navigate to Certificate Signing Requests from the left Certificate Management panel and click Generate
Certificate Signing Requests (CSR). Configure as follows.
Attribute Value
Node ise
State (ST) NC
Country (C) US
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 3 of 22
1.7. Select ise#pxGrid then click View and select CSR Contents.
1.8. Select all contents and copy to clipboard, then click Close.
1.9.
In Firefox, open another tab and use the GK Certs bookmark to navigate to http://data-
srv.gklabs.com/certsrv and log in as admin/admin$Pwd.
1.10. Select Request a certificate > Advanced Certificate Request, and paste (Ctrl+V) the copied text from the
CSR into the text box for Base-64-encoded certificate request.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 4 of 22
1.12. On the Certificate Issued page, select Base 64 encoded and then click Download certificate.
1.13. Choose Save. Take note of the filename as in the figure below. Here it is certnew.cer; your file name may
be different.
1.14. After the file downloads, navigate to the Downloads folder and rename the file as ise-pxgrid.cer.
Note: The root CA certificate that signed this certificate was previously imported for this ISE deployment. In case
your deployment has not yet imported the certificates of the CA chain previously, you should do so prior to
binding the system certificate in next step.
1.16. Return to ISE, select (check) the ise#pxGrid certificate, and then select Bind Certificate > Browse >
Downloads > ise-pxgrid.cer.
Attribute Value
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 5 of 22
Usage pxGrid
The Cisco WSA has been configured for network operation. The HTTPS is enabled and will be configured for web
site decryption to deny employees from accessing Facebook.
2.1. From the topology diagram, power on the WSA VM by right clicking it and choosing Play This VM. The VM
will take some time to boot.
2.2. From the Admin-PC, open another tab in Firefox and use the WSA bookmark to browse to
http://10.10.0.3:8080.
2.4. Navigate to System Administration > Configuration Summary. Security Services should look as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 6 of 22
Note: Web Proxy is enabled and set to Transparent. For the sake of simplicity, you will configure the endpoint for
explicit redirect. Transparent Mode supports explicit redirect. Also HTTPS Proxy is enabled to allow for SSL
Decrypt.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 7 of 22
Note: The configured hostname is wsa.gklabs.com, DNS is set to 10.10.1.25 (Data-Srv). The WSA is configured to
use a single interface: M1 for management and data using IP address 10.10.0.3 and default gateway 10.10.0.2
(L3-Switch).
2.7. Navigate to Security Services > Web Proxy and verify the default HTTP Ports to proxy are 80 and 3128.
2.8. Navigate to Security Services > HTTPS Proxy and verify the settings appear as below.
Note: The Root Certificate and Key for Signing have already been imported from the GKLABS CA. All Decryption
options are enabled and the default Invalid Certificate Options are set.
2.9. Navigate to Network > Certificate Management > Manage Trusted Root Certificates.
Cisco TrustSec Security Groups can be used to enforce network access. Two Security Groups (Employees and
Guests) will be used and assigned to ISE authorization rules. They will differentiate between 802.1X authenticated
employees and unauthenticated guests.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 8 of 22
In the later exercises, the WSA will subscribe to the TrustsecMetaData pxGrid capability and download the SGT
information. WSA identification profiles and web security access policies will be created to deny Social Media
access for users tagged with Employees and allow non-restricted Internet access for Admins.
3.2. Navigate to Work Centers > TrustSec> Components > Security Groups.
3.3. The right-hand pane shows a list of built-in entries. You will use one security group from the list,
Employees, and you will create another called Admins.
Attribute Value
Name Admins
Attribute Value
Name Employee-Compliant
Conditions Leave as is
3.9. To the right of Employee-Compliant, select and duplicate above. Then configure the new rule as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 9 of 22
Attribute Value
Name Admin-Compliant
4. Enable pxGrid.
4.1. Navigate to Administration > System> Deployment. Then select the ise node. Scroll down and enable the
pxGrid service.
4.3. Navigate to Administration > pxGrid Services and verify it shows Connected to pxGrid at the lower left
corner. The admin and mnt personas should also show as registered clients.
Note: It takes a several minutes to see Connected to pxGrid. You may monitor the progress via the ISE admin CLI
using the command show application status ise, and verifying the four pxGrid services are running. After the
services show as running, it will still be several minutes before the personas show as clients. Be patient, in
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 10 of 22
production this would be a onetime change. Refresh every two minutes; in development the Clients showed up
in about 5 minutes.
4.4. Click the Settings tab and verify Automatically approve new accounts is selected.
Cisco pxGrid requires that a pxGrid client, such as WSA, present a client digital certificate to secure connections to
the ISE pxGrid controller. It is best practice to use an enterprise CA to sign certificates for both the pxGrid client
and the ISE pxGrid node. In previous section, ISE pxGrid controller has been configured with a CA-signed pxGrid
certificate.
Note: pxGrid certificates use a customized template containing an EKU for both client authentication and server
authentication.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 11 of 22
Note: %m is used to troubleshoot authentication issues as it indicates the authentication mechanism used on the
transaction.
6.1. Navigate to Network > Identification Services > Identity Service Engine > Enable and Edit Settings.
6.3. Scroll down and, under WSA Client Certificate, select Use Generated Certificate and Key.
◾ Organization: GKLABS
◾ Country: US
◾ Duration: 12 months
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 12 of 22
Note: The common name is chosen to be descriptive, and a short expiration (12 months) is used here for the self-
signed cert.
6.10. Under WSA Client Certificate, Use Generated Certificate and Key, click Download Certificate Signing
Request.
6.11. Download and save the file; you should see WSA_ISE_csr.pem.
6.12. Edit with Notepad++, and highlight and copy everything in between starting from -----BEGIN CERTIFICATE
REQUEST---- to the end of -----END CERTIFICATE REQUEST---- .
6.13. In Firefox, open a new tab and use the GK Certs bookmark to go to http://data-srv.gklabs.com/certsrv and
log in as admin/admin$Pwd.
6.15. Paste into the Base-64 encoded certificate request. Select Certificate Template > pxGrid.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 13 of 22
6.18. Save the file. (Make sure to take note of the file name on download. Most likely it is certnew.csr.)
6.20. Open the certificate, click Details and verify that the Enhanced Key Usage shows Client Authentication and
Server Authentication.
6.22. Go back to the WSA and under WSA Client Certificate > Use Generated Certificate and Key > Signed
certificate, browse for the new signed certificate, WSA_pxgrid.cer.
6.23. Click Upload File. Notice that the Expiration Date changed to about 5 years from now. (This is based on the
pxGrid Template used to request the cert from the CA.)
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 14 of 22
6.24. Under Primary ISE pxGrid Node: > Certificate: click Browse… Navigate to Desktop\ISE\GKLABS CA\Data-
Srv Root Cert.cer and click Upload File.
6.25. Under ISE Monitoring Node Admin Certificate: > Certificate: click Browse… Navigate to
Desktop\ISE\GKLABS CA\Data-Srv Root Cert.cer and click Upload File.
6.26. Scroll to the bottom and under Test Communication with ISE Nodes, select Start Test; you should see that
all tests were completed successfully.
Note: If the connection to the ISE pxGrid server timed out, check ISE pxGrid Services page to see whether it is
waiting for approval on the pxGrid client registration.
6.30. Navigate to Administration > pxGrid Services. Verify that the WSA has registered as a pxGrid client, and
has subscribed to the SessionDirectory and TrustSecMetadata Capabilities.
Note: This may take a moment to show. Click Refresh to monitor the progress. If it has been longer than five
minutes without success, reboot the WSA by accessing the CLI and issuing the reboot command.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 15 of 22
The WSA will use the Identification profiles to identify users authenticated with ISE and associate them to the
Security Group Tags (SGT). The WSA access policies then determine the corporate web security profiles based on
these SGTs. In this task, an identification profile will be created for ISE. A WSA access policy will be created to deny
802.1X authenticated users tagged with Employees from accessing Facebook.
Attribute Value
Name ID by ISE
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 16 of 22
7.5. Navigate to Web Security Manager > Web Policies > Access Policies.
Attribute Value
Policy Settings
7.8. Under Secure Group Tags > Secure Group Tag Search, check Employees.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 17 of 22
7.10. You should see that Employees has been included in the Authorized Secure Group Tags policy.
7.12. Click (global policy) to override the default URL Filtering for ISE Corp Access.
7.15. Select Commit Changes > Commit Changes. Your access policy should look as follows.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 18 of 22
Organizations may have certain corporate security policies that they must observe. Among them would be for
corporate employees not to use social applications such as Facebook.
8.2. It will take some time, but wait for AnyConnect to run the System Scan and verify that the endpoint is
compliant and you have Network Access.
8.3. Access the L3-Switch and issue the command to verify the session.
Local Policies:
Service Template: DEFAULT_LINKSEC_POLICY_SHOULD_SECURE (priority 150)
Security Policy: Should Secure
Security Status: Link Unsecure
Server Policies:
ACS ACL: xACSACLx-IP-EMPLOYEE_ACL-5818b1de
mab Stopped
dot1x Authc Success
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 19 of 22
Note: The user has successfully logged on and has authenticated via 802.1X, and the session has been assigned
the SGT value of 4.
9. Configure browsing for explicit proxy and test the WSA pxGrid integration.
9.1.
On the User-PC, open Chrome and select Configure > Settings.
9.2. Click Show advanced settings and navigate to Network > Change proxy settings…
9.3. On the Connections tab, click LAN Settings and configure as follows.
Attribute Value
Address 10.10.0.3
Port 3128
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 20 of 22
9.6. Also note that the site certificate is wildcard and issued by WSA HTTPS Proxy.
9.7. On the Admin-PC, use SecureCRT to log in to the WSA (10.10.0.3) as admin/admin$Pwd.
9.8. Issue in turn the commands: isedata, cache, and show. Note the IP-Name-SGT mapping.
wsa.gklabs.com> isedata
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 21 of 22
[]> show
IP Name SGT#
10.10.10.20 [email protected],host/User-PC.gklabs.com 4
10.10.10.50 00:50:56:00:00:24 0
9.9. Press Enter until you are placed back at the WSA prompt. Then tail the access log to view latest network
access activity by issuing the tail command followed by the number 1.
wsa.gklabs.com> tail
…<Output Omitted>…
…<Output Omitted>…
Note: You should see entries like the ones above. You may need to attempt to access Facebook again if other
sites have been browsed. The output to the access log will not be real time, rather, expect several seconds of
delay.
Use Ctrl-C to exit the log. Also of interest is log number 18, the ise service log.
9.11. Navigate to Reporting > Users. Scroll Down and select employee1. Note the blocked transactions under
Policies matched.
9.12. Scroll down and note the Policies matched indicates the ISE Corp Access policy.
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017
Page 22 of 22
Note: It is left to you to test the User-PC as admin/admin$Pwd. If you do, remember to configure Chrome for
explicit proxy on 10.10.0.3 port 3128. You should be able to get to Facebook and your results will look as follows
from the WSA CLI.
IP Name SGT#
10.10.10.20 [email protected],host/User-PC.gklabs.com 16
10.10.10.200 [email protected] 0
10.1. Navigate to Administration > System> Deployment. Then select the ise node. Scroll down and disable the
pxGrid service.
Lab Complete
https://www.remotelabs.com/ldhtm/Gb/cisco/3972/3972_L16.htm 20/09/2017