Introduction
This document describes the available options to configure IP access restriction in ISE 3.1, 3.2 and 3.3.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
- Basic knowledge of Cisco Identity Service Engine
Components Used
This document is not restricted to specific software and hardware versions.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Background Information
IP access restriction feature allows administrators to control which IP addresses or ranges can access the ISE admin portal and services.
This feature applies to various ISE interfaces and services, including:
- Admin portal access adn CLI
- ERS API access
- Guest and sponsor portal access
- My Devices portal access
When enabled, ISE only allows connections from the specified IP addresses or ranges. Any attempts to access ISE admin interfaces from non-specified IPs are blocked.
In case of accidental lockout, ISE provides a 'safe mode' startup option that can bypass IP access restrictions. This allows administrators to regain access and correct any misconfigurations.
Behaviour in ISE 3.1 and lower
Navigate to Administration>Admin Access>Settings>Access. You have these options:
- Session
- IP Access
- MnT Access
Configure
- Select "Allow only listed IP addresses to connect"
- Click "Add"
IP Access configuration
- In ISE 3.1 you do not have an option to select bewteen "Admin" and "User" services, enabling IP Access Restriction blocks connections to:
- A dialog box opens where you enter the IP addresses, IPv4 or IPv6, in CIDR format.
- Once the IP is configured, set the mask in CIDR format.
Edit IP CIDR
Note: IP CIDR (Classless Inter-Domain Routing) format is a method of representing IP addresses and their associated routing prefix.
Example:
IP: 10.8.16.32
Mask: /32
Caution: Care must be taken when configuring IP restrictions to avoid accidentally locking out legitimate admin access. Cisco recommends thoroughly testing any IP restriction configuration before fully implementing it.
Tip: For IPv4 addresses:
- Use /32 for specific IP addresses.
- For subnets use any other option. Example: 10.26.192.0/18
Behaviour in ISE 3.2
Navigate to Administration>Admin Access>Settings>Access. You have these options available:
- Session
- IP Access
- MnT Access
Configure
- Select "Allow only listed IP addresses to connect"
- Click "Add"
IP Acess configuration
- A dialog box opens where you enter the IP addresses, IPv4 or IPv6, in CIDR format.
- Once the IP is configured, set the mask in CIDR format.
- These options are available for IP Access restriction
- Admin Services: GUI, CLI (SSH), SNMP, ERS, OpenAPI, UDN,API Gateway, PxGrid (disabled in Patch 2), MnT Analytics
- User Services: Guest, BYOD, Posture, Profiling
- Admin and User Services
Edit IP CIDR
- Click on "Save" button
- "ON" means Admin services are enabled, "OFF" means user services are disabled.
IP Access configuration in 3.2
Behaviour in ISE 3.2 P4 and greater
Navigate to Administration>Admin Access>Settings>Access. You have these options available:
- Session
- Admin GUI&CLI: ISE GUI (TCP 443), ISE CLI (SSH TCP22) and SNMP.
- Admin Services: ERS API, Open API, pxGrid, DataConnect.
- User Services: Guest, BYOD, Posture.
- MNT Access: With this option ISE does not consume Syslog messages sent from external sources.
Configure
- Select "Allow only listed IP addresses to connect"
- Click "Add"
IP Access configuration in 3.3
- A dialog box opens where you enter the IP addresses, IPv4 or IPv6, in CIDR format.
- Once the IP is configured, set the mask in CIDR format.
- Click "Add"
Recover ISE GUI/CLI
- Login with console
- Stop ISE services using application stop ise
- Start ISE services using application start ise safe
- Remove the IP access restriction from the GUI.
Troubleshooting
Take a packet capture to verify if ISE is not responding or it is dropping the traffic.
Check ISE firewall rules
- For 3.1 and lower you can check this only in the show tech.
- You can take a show tech and store it in the localdisk using "show tech-support file <filename>"
- Then you can transfer the file to a repository using "copy disk:/<filename> ftp://<ip_address>/path" the repository url changes depending on the repository type you are using
- You can download the file to your machine so you can read it and look for "Running iptables -nvL"
- The initial rules in the show tech are not included below. In other words, here you can find the last rules appended to the show tech by IP Access restriction feature.
*****************************************
Running iptables -nvL...
*****************************************
.
.
Chain ACCEPT_22_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- eth0 * x.x.x.x/x 0.0.0.0/0 tcp dpt:22 Firewall rule permitting the SSH traffic from segment x.x.x.x/x
461 32052 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
65 4048 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_161_udp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * x.x.x.x/x 0.0.0.0/0 udp dpt:161 Firewall rule permitting the SNMP traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
- For 3.2 and higher you can use the command "show firewall" to check the firewall rules.
- 3.2 and higher provide more control over the services being blocked by IP Access Restriction.
gjuarezo-311/admin#show firewall
.
.
Chain ACCEPT_22_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
170 13492 ACCEPT tcp -- eth0 * x.x.x.x/x 0.0.0.0/0 tcp dpt:22 Firewall rule permitting the SSH traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
13 784 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_161_udp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * x.x.x.x/x 0.0.0.0/0 udp dpt:161 Firewall rule permitting the SNMP traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_8910_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * x.x.x.x/x 0.0.0.0/0 tcp dpt:8910 Firewall rule permitting the PxGrid traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
90 5400 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_8443_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * x.x.x.x/x 0.0.0.0/0 tcp dpt:8443 Firewall rule permitting the HTTPS traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_8444_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * x.x.x.x/x 0.0.0.0/0 tcp dpt:8444 Firewall rule permitting the Block List Portal traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ACCEPT_8445_tcp_ipv4 (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * x.x.x.x/x 0.0.0.0/0 tcp dpt:8445 Firewall rule permitting the Sponsor Portal traffic from segment x.x.x.x/x
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Check debug logs
Warning: Not all the traffic generates logs. IP Access restriction can block the traffic at the application level and using Linux Internal Firewall. SNMP, CLI and SSH is blocked at firewall level so no logs are generated.
- Enable "Infraestructure" component in DEBUG from GUI.
- Use show logging application ise-psc.log tail
The next logs can be see when IP Access restriction is taking action.
2024-07-04 18:19:11,339 DEBUG [admin-http-pool31][] cisco.cpm.infrastructure.systemconfig.CpmIpFilterCache -::::- Low ip address10.31.126.128
2024-07-04 18:19:11,339 DEBUG [admin-http-pool31][] cisco.cpm.infrastructure.systemconfig.CpmIpFilterCache -::::- High ip address10.31.126.255
2024-07-04 18:19:11,339 DEBUG [admin-http-pool31][] cisco.cpm.infrastructure.systemconfig.CpmIpFilterCache -::::- Low ip address10.4.16.0
2024-07-04 18:19:11,339 DEBUG [admin-http-pool31][] cisco.cpm.infrastructure.systemconfig.CpmIpFilterCache -::::- High ip address10.4.23.255
2024-07-04 18:19:11,339 DEBUG [admin-http-pool31][] cisco.cpm.infrastructure.systemconfig.CpmIpFilterCache -::::- Checkin Ip in List returned false
Related Information