{"id":5115,"date":"2022-08-17T18:44:00","date_gmt":"2022-08-17T16:44:00","guid":{"rendered":"https:\/\/cyber-fi.net\/?p=5115"},"modified":"2023-10-12T18:19:35","modified_gmt":"2023-10-12T16:19:35","slug":"tuning-the-cisco-ise-for-meraki-networks","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2022\/08\/17\/tuning-the-cisco-ise-for-meraki-networks\/","title":{"rendered":"Tuning the Cisco ISE for Meraki Networks"},"content":{"rendered":"\n<p>In general, the Cisco ISE and Meraki devices play nicely together. But when doing 802.1X Authentication, the ISE hides some information and by enabling these, the Logs have a more relevant output.<\/p>\n\n\n\n<p>Let&#8217;s start:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vendor Specific Attributes<\/h3>\n\n\n\n<p>Meraki Devices send four Vendor Specific Attributes (VSA) in the RADIUS requests:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"988\" height=\"396\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Meraki-VSA.png\" alt=\"\" class=\"wp-image-5116\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Meraki-VSA.png 988w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Meraki-VSA-300x120.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Meraki-VSA-768x308.png 768w\" sizes=\"auto, (max-width: 988px) 100vw, 988px\" \/><\/figure>\n\n\n\n<p>To show these correctly in the Logs, we need to import a RADIUS-Dictionry into the ISE:<\/p>\n\n\n\n<p><code>VENDOR Meraki 29671<br>BEGIN-VENDOR Meraki<br>ATTRIBUTE Meraki-Device-Name 1 string BOTH<br>ATTRIBUTE Meraki-Network-Name 2 string BOTH<br>ATTRIBUTE Meraki-Ap-Name 3 string BOTH<br>ATTRIBUTE Meraki-Ap-Tags 4 string BOTH<br>END-VENDOR Meraki<\/code><\/p>\n\n\n\n<p>These lines are copied to a file and can be imported into the ISE:<\/p>\n\n\n\n<p>Policy -&gt; Policy Elements -&gt; Dictionaries -&gt; System -&gt; RADIUS -&gt; RADIUS Vendors<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors-1024x582.png\" alt=\"\" class=\"wp-image-5117\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors-1024x582.png 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors-300x171.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors-768x437.png 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors-1536x873.png 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors.png 1928w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After the import, it should look like this:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"500\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-1024x500.png\" alt=\"\" class=\"wp-image-5118\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-1024x500.png 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-300x147.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-768x375.png 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-1536x750.png 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RADIUS-Vendors2-2048x1000.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">RADIUS Attributes from RFC7268 &#8220;RADIUS Attributes for IEEE 802 Networks&#8221;<\/h3>\n\n\n\n<p>Meraki APs send four Attributes that look like the following in the Log:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"392\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-1.png\" alt=\"\" class=\"wp-image-5119\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-1.png 888w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-1-300x132.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-1-768x339.png 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/><\/figure>\n\n\n\n<p>Not only the ISE has no knowledge of these RADIUS attributes, Wireshark 3.6.7 also shows them as &#8220;Unknown-Attribute&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"844\" height=\"150\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Wireshark-RFC7268.png\" alt=\"\" class=\"wp-image-5120\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Wireshark-RFC7268.png 844w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Wireshark-RFC7268-300x53.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/Wireshark-RFC7268-768x136.png 768w\" sizes=\"auto, (max-width: 844px) 100vw, 844px\" \/><\/figure>\n\n\n\n<p>RFC7268 from July 2014 defines them as the following:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">- <a rel=\"noreferrer noopener\" href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc7268.html#section-2.14\" target=\"_blank\">WLAN-Pairwise-Cipher<\/a>\n- <a rel=\"noreferrer noopener\" href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc7268.html#section-2.15\" target=\"_blank\">WLAN-Group-Cipher<\/a>\n- <a rel=\"noreferrer noopener\" href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc7268.html#section-2.14\" target=\"_blank\">WLAN-AKM-Suite<\/a>\n- <a rel=\"noreferrer noopener\" href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc7268.html#section-2.17\" target=\"_blank\">WLAN-Group-Mgmt-Cipher<\/a>\n\nEDIT: Meraki APs also send the Attribute 177 \"Mobility-Domain-Id\"<\/pre>\n\n\n\n<p>On the ISE, we can easily change the corresponding &#8220;undefined-xyz&#8221; attributes to the real names of the attributes:<\/p>\n\n\n\n<p>Policy -&gt; Policy Elements -&gt; Dictionaries -&gt; System -&gt; RADIUS -&gt; IETF -&gt; undefined-xyz<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"594\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes-1024x594.png\" alt=\"\" class=\"wp-image-5121\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes-1024x594.png 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes-300x174.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes-768x445.png 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes-1536x890.png 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/RFC7268-ISE-Attributes.png 2022w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>And now the ISE-logs are more meaningful:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"282\" src=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1-1024x282.png\" alt=\"\" class=\"wp-image-5122\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1-1024x282.png 1024w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1-300x83.png 300w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1-768x212.png 768w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1-1536x423.png 1536w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2022\/08\/ISE-Logs1.png 1604w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>I still have to find out how I can replace the values with the corresponding names:<\/p>\n\n\n\n<p>00:0f:ac:04 -&gt; CCMP-128<\/p>\n\n\n\n<p>00:0f:ac:05 -&gt; 802.1X (SHA-256)<\/p>\n\n\n\n<p>00:0f:ac:06 -&gt; BIP-CMAC-128<\/p>\n\n\n\n<p>If I figure this out later, or someone has a hint for me, I&#8217;ll add it to this blog-post.<\/p>\n\n\n\n<p><strong>Have fun with your Meraki\/ISE combination!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In general, the Cisco ISE and Meraki devices play nicely together. But when doing 802.1X Authentication, the ISE hides some information and by enabling these, the Logs have a more relevant output. Let&#8217;s start: Vendor Specific Attributes Meraki Devices send four Vendor Specific Attributes (VSA) in the RADIUS requests: To show these correctly in the <\/p>\n<div class=\"read-more-text\"><a href=\"https:\/\/cyber-fi.net\/index.php\/2022\/08\/17\/tuning-the-cisco-ise-for-meraki-networks\/\" class=\"read-more\">continue reading<\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[5,705,7],"tags":[709,137,696,690],"class_list":["post-5115","post","type-post","status-publish","format-standard","hentry","category-cisco","category-meraki","category-cisco-security","tag-802-1x","tag-cisco","tag-ise","tag-meraki"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=5115"}],"version-history":[{"count":4,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5115\/revisions"}],"predecessor-version":[{"id":5341,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/5115\/revisions\/5341"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=5115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=5115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=5115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}