{"id":2860,"date":"2026-01-14T21:17:00","date_gmt":"2026-01-14T21:17:00","guid":{"rendered":"https:\/\/www.balajibandi.com\/?p=2860"},"modified":"2026-02-05T18:37:25","modified_gmt":"2026-02-05T18:37:25","slug":"89-days-to-ccie-sec-v6-1-lab","status":"publish","type":"post","link":"https:\/\/www.balajibandi.com\/?p=2860","title":{"rendered":"89 Days to CCIE SEC v6.1 Lab"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Identity Services Engine (ISE) &amp; 802.1X<\/mark><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.balajibandi.com\/?p=1239\" data-type=\"link\" data-id=\"https:\/\/www.balajibandi.com\/?p=1239\">ISE Feature<\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.balajibandi.com\/?p=1556\" data-type=\"link\" data-id=\"https:\/\/www.balajibandi.com\/?p=1556\">New Certificate with ISE<\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.balajibandi.com\/?p=1578\" data-type=\"link\" data-id=\"https:\/\/www.balajibandi.com\/?p=1578\">ISE 2.4 AD Join <\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.balajibandi.com\/?p=179\" data-type=\"link\" data-id=\"https:\/\/www.balajibandi.com\/?p=179\">Installing Cisco ISE 3.0 in VMware ESXi<\/a><\/h2>\n\n\n\n<p><strong>Cisco ISE<\/strong>\u00a0and the\u00a0<strong>IEEE 802.1X<\/strong>\u00a0standard. While the theory is straightforward, the &#8220;real-world&#8221; implementation involves a complex dance of protocols and certificates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">The Architecture: The Three Pillars<\/mark><\/h2>\n\n\n\n<p>802.1X is not a single protocol; it is a framework involving three distinct roles:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>The Supplicant:<\/strong>\u00a0The endpoint (Laptop, IP Phone, IoT device) running software that supports 802.1X.<\/li>\n\n\n\n<li><strong>The Authenticator:<\/strong>\u00a0The network access device (NAD)\u2014usually a Switch or Wireless LAN Controller (WLC). It acts as a &#8220;gatekeeper.&#8221;<\/li>\n\n\n\n<li><strong>The Authentication Server (ISE):<\/strong>\u00a0The &#8220;brain&#8221; that validates credentials and pushes down policies.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"267\" src=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-5.png\" alt=\"\" class=\"wp-image-2861\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-5.png 400w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-5-300x200.png 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>The 802.1X Flow<\/strong><\/mark><\/h2>\n\n\n\n<p>To understand how this works in a production environment, you have to look at the encapsulation layers. The process moves from&nbsp;<strong>EAPOL<\/strong>&nbsp;(EAP over LAN) between the client and switch, to&nbsp;<strong>RADIUS<\/strong>&nbsp;between the switch and ISE.<\/p>\n\n\n\n<p>1. The Negotiation Phase<\/p>\n\n\n\n<p>When a device connects, the switch port is in an &#8220;unauthorized&#8221; state, allowing only EAPOL, CDP, and STP traffic.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Switch sends an\u00a0<strong>EAP-Request\/Identity<\/strong>\u00a0frame.<\/li>\n\n\n\n<li>The Supplicant responds with an\u00a0<strong>EAP-Response\/Identity<\/strong>\u00a0containing the username or machine certificate.<\/li>\n<\/ul>\n\n\n\n<p>2. The RADIUS Tunnel<\/p>\n\n\n\n<p>The switch takes this EAP response, wraps it in a&nbsp;<strong>RADIUS Access-Request<\/strong>&nbsp;packet, and sends it to ISE. This is crucial:&nbsp;<strong>The switch does not validate the credentials; it simply acts as a proxy.<\/strong><\/p>\n\n\n\n<p>3. EAP Method Selection (The Secure Tunnel)<\/p>\n\n\n\n<p>Most modern enterprises use&nbsp;<strong>EAP-TLS<\/strong>&nbsp;(Certificate-based) or&nbsp;<strong>PEAP-MSCHAPv2<\/strong>&nbsp;(Username\/Password).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>EAP-TLS:<\/strong>\u00a0Provides the highest security. A TLS tunnel is built where both the server and the client exchange digital certificates.<\/li>\n\n\n\n<li><strong>ISE&#8217;s Role:<\/strong>\u00a0ISE checks the certificate&#8217;s validity against the Certificate Authority (CA) and ensures the account is active in Active Directory (AD).<\/li>\n<\/ul>\n\n\n\n<p>4. Authorization &amp; Enforcement<\/p>\n\n\n\n<p>Once authenticated, ISE sends a&nbsp;<strong>RADIUS Access-Accept<\/strong>. This packet isn&#8217;t just a &#8220;Yes&#8221;; it contains&nbsp;<strong>Authorisation Profiles<\/strong>&nbsp;such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>VLAN ID:<\/strong>\u00a0Moving the user from a &#8220;Quarantine&#8221; VLAN to &#8220;Finance.&#8221;<\/li>\n\n\n\n<li><strong>dACL (Downloadable ACL):<\/strong>\u00a0Restricting the user to specific IP addresses.<\/li>\n\n\n\n<li><strong>SGT (Scalable Group Tag):<\/strong>\u00a0For TrustSec-enabled environments.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">To prevent widespread network outages, Cisco recommends a phased approach using specific deployment modes that shift the balance from visibility to strict enforcement.&nbsp;<\/h2>\n\n\n\n<p>1. Monitor Mode (Visibility Phase)<\/p>\n\n\n\n<p>In this initial stage, the network is configured for 802.1X, but access is not restricted.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>How it works:<\/strong>\u00a0The switchport is set to\u00a0<code>authentication open<\/code>. While endpoints are prompted for credentials and ISE processes the request, the port remains open regardless of the authentication result.<\/li>\n\n\n\n<li><strong>Technical Goal:<\/strong>\u00a0Gather data and identify endpoints that lack 802.1X supplicants (e.g., printers, IoT) or have expired certificates.<\/li>\n\n\n\n<li><strong>Real-World Use:<\/strong>\u00a0Used to &#8220;audit&#8221; the network for several weeks to ensure all legitimate devices can authenticate before turning on enforcement.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>2. Low-Impact Mode (Graduated Enforcement)<\/p>\n\n\n\n<p>This mode introduces basic security while still allowing critical services to function pre-authentication.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>How it works:<\/strong>\u00a0A\u00a0<strong>Pre-Authentication ACL (PACL)<\/strong>\u00a0is applied to the switchport. This ACL typically permits only essential traffic\u2014like DHCP, DNS, and PXE boot\u2014to allow a machine to start up and reach the network to authenticate.<\/li>\n\n\n\n<li><strong>Enforcement:<\/strong>\u00a0Once the user authenticates, ISE pushes a\u00a0<strong>Downloadable ACL (dACL)<\/strong>\u00a0or assigns a new VLAN to grant full access.<\/li>\n\n\n\n<li><strong>Real-World Use:<\/strong>\u00a0Ideal for environments with &#8220;thin clients&#8221; or machines that need to download an OS\/updates before the 802.1X service can start.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>3. Closed Mode (High Security)<\/p>\n\n\n\n<p>This is the &#8220;gold standard&#8221; for a secure environment but requires the most preparation.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>How it works:<\/strong>\u00a0The port is completely locked down by default. No traffic is allowed except for\u00a0<strong>EAPoL<\/strong>\u00a0(Extensible Authentication Protocol over LAN).<\/li>\n\n\n\n<li><strong>Enforcement:<\/strong>\u00a0The device receives zero network access\u2014not even an IP address\u2014until it successfully completes authentication.<\/li>\n\n\n\n<li><strong>Real-World Use:<\/strong>\u00a0Used in highly secure areas or\u00a0<strong>SD-Access<\/strong>\u00a0fabrics where you want to ensure no &#8220;rogue&#8221; device can even send a single packet into the network without being identified.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">ISE <strong>Authorization<\/strong>\u00a0is the process that determines the level of access a device receives\u00a0<em>after<\/em>\u00a0it has successfully proven its identity (Authentication).<\/h2>\n\n\n\n<p>Authorization works through a top-down evaluation of rules that result in the delivery of specific network permissions to the access switch or wireless controller.&nbsp;<\/p>\n\n\n\n<p>1. The Authorization Rule Logic<\/p>\n\n\n\n<p>ISE evaluates&nbsp;<strong>Authorization Policies<\/strong>&nbsp;using a &#8220;First Match&#8221; approach. Each rule consists of:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Conditions:<\/strong>\u00a0These are &#8220;If&#8221; statements based on context. For example:\u00a0<em>If (User is in AD-Finance-Group) AND (Device-Type is Windows-Laptop) AND (Location is HQ)<\/em>.<\/li>\n\n\n\n<li><strong>Permissions (Results):<\/strong>\u00a0If the conditions are met, ISE assigns an\u00a0<strong>Authorization Profile<\/strong>\u2014a container of specific access instructions.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>2. The Authorization Profile (What gets pushed?)<\/p>\n\n\n\n<p>When a rule matches, ISE sends a&nbsp;<strong>RADIUS Access-Accept<\/strong>&nbsp;message back to the network device. This message contains &#8220;Attributes&#8221; that tell the hardware how to restrict the port:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>VLAN Assignment:<\/strong>\u00a0Moves the device to a specific segment (e.g., VLAN 20 for HR).<\/li>\n\n\n\n<li><strong>Downloadable ACL (dACL):<\/strong>\u00a0A dynamic access list pushed from ISE to the switch to restrict specific traffic (e.g., allow only SQL server access).<\/li>\n\n\n\n<li><strong>Scalable Group Tag (SGT):<\/strong>\u00a0A tag used in Cisco TrustSec for group-based segmentation instead of traditional IP-based ACLs.<\/li>\n\n\n\n<li><strong>Voice Domain Permission:<\/strong>\u00a0Automatically places IP phones into the voice VLAN.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>3. Change of Authorization (CoA)<\/p>\n\n\n\n<p>Authorization is not always static. If a device&#8217;s status changes (e.g., a &#8220;Posture&#8221; scan finds it is missing an antivirus update), ISE can send a&nbsp;<strong>CoA<\/strong>&nbsp;message.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The switch receives this request and immediately re-evaluates the device&#8217;s access, often moving it to a &#8220;Quarantine&#8221; VLAN without the user having to unplug and replug their cable.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>Summary of the Flow<\/strong><\/mark><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Request:<\/strong>\u00a0Device authenticates successfully.<\/li>\n\n\n\n<li><strong>Match:<\/strong>\u00a0ISE matches the session against Authorization Policy rules.<\/li>\n\n\n\n<li><strong>Instruction:<\/strong>\u00a0ISE sends the selected\u00a0<strong>Authorization Profile<\/strong>\u00a0via RADIUS.<\/li>\n\n\n\n<li><strong>Enforcement:<\/strong>\u00a0The switch applies the VLAN, dACL, or SGT to the physical port.\u00a0<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"463\" src=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-6.png\" alt=\"\" class=\"wp-image-2862\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-6.png 999w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-6-300x139.png 300w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-6-768x356.png 768w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-6-705x327.png 705w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><strong>Guest Access Flows :<\/strong><\/mark><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"555\" src=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-1024x555.png\" alt=\"\" class=\"wp-image-2863\" srcset=\"https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-1024x555.png 1024w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-300x163.png 300w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-768x417.png 768w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-1536x833.png 1536w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-2048x1111.png 2048w, https:\/\/www.balajibandi.com\/wp-content\/uploads\/2026\/02\/image-7-705x382.png 705w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Happy Labingggggggggggggggggggggggggg !<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity Services Engine (ISE) &amp; 802.1X ISE Feature New Certificate with ISE ISE 2.4 AD Join Installing Cisco ISE 3.0 in VMware ESXi Cisco ISE\u00a0and the\u00a0IEEE 802.1X\u00a0standard. While the theory is straightforward, the &#8220;real-world&#8221; implementation involves a complex dance of protocols and certificates. The Architecture: The Three Pillars 802.1X is not a single protocol; it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2,6],"tags":[],"class_list":["post-2860","post","type-post","status-publish","format-standard","hentry","category-ccie-sec","category-cisco","category-security"],"_links":{"self":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2860"}],"version-history":[{"count":1,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2860\/revisions"}],"predecessor-version":[{"id":2864,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2860\/revisions\/2864"}],"wp:attachment":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}