Integrate Meraki Networks with ISE

 

https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-meraki-networks-with-ise/ta-p/3618650


VLAN1 Management 172.16.10.0/24
VLAN10 Guest  192.168.10.0/24
VLAN11 Workstation  172.16.11.0/24
VLAN12 MAB      172.16.12.0/24



Wireless 802.1x

Meraki Configuration

   Group Policy:
     Employee
     Contractor: L3 FW rules Deny Youtube and Facebook
   SSID: corp
     Security:
my RADIUS server
     Splash: Cisco Identity Services Engine (ISE) Authentication.
RADIUS attribute specifying group policy name: Airespace-ACL-Name
Client IP: Bridge
VLAN tagging: VLAN 11

ISE Configuration:

  Create device group type: Meraki Wireless, add Meraki AP to the group.
  Policy Set: Condition matches Meraki Wireless device group type
    Authorization Profiles:
  MerakiWirelessEmployee
    Airespace ACL Name: Employee
  MerakiWirelessContractor
    Airespace ACL Name: Contractor
    Authentication Policy: 
  Condition: Wireless_802.1x
  Use: AD
    Authorization Policy: 
      Condition: Wireless_802.1x & match AD group Employees or Contractors.
Result: Authorization Profiles MerakiWirelessEmployee or MerakiWirelessContractor
Verification:
  Meraki client has proper Group Policy applied


Wireless MAB

Meraki Configuration

   Group Policy: Workstation
   Security: MAC-based access control (no encryption)
   Splash: Cisco Identity Services Engine (ISE) Authentication
   RADIUS attribute specifying group policy name: Airespace-ACL-Name
Client IP: Bridge
VLAN tagging: VLAN 12

ISE Configuration:

  Create device group type: Meraki Wireless, add Meraki AP to the group.
  Policy Set: Condition matches Meraki Wireless device group type
    Authorization Profiles:
  MerakiWirelessWorkstation: 
    Airespace ACL Name: Workstation
    Authentication Policy: 
  Condition: Wireless_MAB, Under Options: If user not found, select Continue
  Use: Internal Endpoints
    Authorization Policy: 
      Condition: Wireless_MAB 
  Result: Authorization Profiles MerakiWirelessworkstation



https://documentation.meraki.com/MS/Access_Control/Meraki_MS_Group_Policy_Access_Control_Lists



Wired 802.1x (MAB)

Meraki Configuraiton:

   Access-policy: ISE-HYBRID
   Radius server: ISE  
       Accounting enabled, CoA enabled   
    RADIUS attribute specifying group policy name: Filter-ID
Host mode:
Access policy type: Hybrid authentication
    Optional Guest VLAN 10
Assign Access Policy to a switch port.

ISE Configuration

      Create device group type: Meraki Switches, add Meraki switches to the group.
  Policy Set: Condition matches Meraki Switches device group type
    Authentication Policy: 
  Wired Dot1X: 
      condiction: Wired_802.1x
use: AD
  Wired MAB:
        condition:Wired_MAB
use: Internal Endpoints
    Authorization Policy: 
     Domain PC Dot1x:
  Condition:Wired_802.1x & AD group Domain Computer
  Result: MerakiWiredDomainPC, contains Filter-ID to match Group Policy on Meraki 
Employee Dot1X:
  Condition:Wired_802.1x & AD group Employees
  Result: MerakiWiredEmployee, contains Filter-ID to match Group Policy on Meraki 
Wired Guest:  --for non-employee PC with 802.1x enabed. For example, contractor
  Condition:Wired_802.1x
  Result: MerakiWiredGuest, which assign guest VLAN 10

   


Wireless  LWA Guest 

Local Web Authentication - LWA: Meraki cloud serves the login page, then send Radius request to ISE for AAA. 

Meraki Configuraiton:

   Security:Open
   Splash: Sign-on with my RADIUS server
        RADIUS for splash page, enter the publicly reachable IP address.
        Radius request is from Meraki cloud,, not from local Meraki devices,  Meraki cloud IPs can be found from Help > Firewall info 
   209.206.48.0/20209.206.48.0/20, 216.157.128.0/20, 158.115.128.0/19
          MX should have port forwarding, no Inbound L3 rule is required.




the Test button in Radius configuration section won't work, it doesn't generate Radius request from Meraki could.

ISE Configuration

For this type of Guest WiFi, ISE receives the Service-Type is Login

  • Policy Set:




 

  • Authentication Policy:
      use ISE local user account in this lab 




  • Authorization Policy
    Simple PermitAccess, no additional Attribute.





Wireless MAB Guest

Meraki Configuration

   Group Policy: Guest
   Security: MAC-based access control (no encryption)
   Splash: Cisco Identity Services Engine (ISE) Authentication
   RADIUS attribute specifying group policy name: Airespace-ACL-Name
 Client IP: Bridge
 VLAN tagging: VLAN 10

ISE Configuration:

  • Policy Set



   
  • Authorization Profiles:

  1.                 Hotspot Profile









2. Self Registration Profile





   3. Sponsored Profile





  MerakiWirelessWorkstation: 
    Airespace ACL Name: Workstation

 4. Wireless Guest Profile








  •     Authentication Policy: 



  Under Options: If user not found, select Continue

  •     Authorization Policy: 
     Only one of portal policies should be enabled, client first connects to the portal, then new radius request will hit "Guest Access" rule






Client VPN:



209.206.48.0/20209.206.48.0/20, 216.157.128.0/20, 158.115.128.0/19, Your network(s)


Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.