Cisco ISE Posture

Cisco ISE Posture is a feature of Cisco Identity Services Engine (ISE) that allows organizations to assess and enforce the security posture of endpoints (e.g., laptops, mobile devices) before or after granting them network access.

What is Cisco ISE Posture?

Cisco ISE Posture is part of Cisco's NAC (Network Access Control) functionality. It evaluates whether an endpoint complies with the organization's security policies (e.g., antivirus status, OS patch level, firewall status). Based on the assessment, ISE can decide to:

  • Grant full access

  • Redirect the device to remediation resources

  • Quarantine it to a restricted VLAN

  • Deny access altogether

 How It Works (Workflow)

  1. User Connects to Network
    The user connects via wired, wireless, or VPN.

  2. Posture Agent Involvement
    The Cisco AnyConnect Secure Mobility Client with the Posture Module checks the endpoint’s compliance status.

  3. Endpoint Assessment
    Checks might include:

    1. OS type and version

    2. Antivirus/antimalware installed and running

    3. Disk encryption enabled

    4. Personal firewall enabled

    5. Presence of specific registry keys, services, files, etc.

  4. ISE Policy Evaluation
    Cisco ISE receives the posture information and compares it against defined posture policies.

  5. Authorization Decision
    Based on the evaluation:

    1. Compliant: Endpoint gets normal access.

    2. Non-compliant: Endpoint is placed in a remediation VLAN or portal.

    3. Unknown/Posture Pending: Limited access until posture check completes.

  1. Remediation (if needed)
    The user may be prompted to update software, enable AV, or apply patches.

Use Cases

  1. Enforcing Security Hygiene

    • Ensure all devices connecting to the network have up-to-date antivirus, patches, etc.

  1. BYOD Control

    • Assess personal devices to ensure they meet minimum security requirements.

  1. VPN Access Control

    • Enforce endpoint compliance before allowing VPN access to internal resources.

  1. Granular Policy Enforcement

    • Grant different access levels based on posture state, user role, and device type.

Benefits -

Benefit

Description

Improved Security

Ensures only secure and compliant devices get access.

Automated Remediation

Users are guided to fix compliance issues.

Visibility

Detailed reports on endpoint health and compliance posture.

Dynamic Access Control

Access changes in real-time based on compliance.

Key Components

  • Cisco ISE – Central policy engine and decision-maker.

  • Cisco AnyConnect Client – Includes the posture module to collect device info.

  • Network Access Devices (NADs) – Switches, wireless controllers, etc., that enforce the policy (e.g., redirect traffic or assign VLANs).

  • Remediation Servers – Hosts software or scripts to fix non-compliant endpoints.

Configure Posture in Cisco ISE 3.1.0

Requirements

Cisco recommends that you have knowledge of these topics:

  • Identity Services Engine (ISE)

  • Domain Name Server

  • Posture

  • Windows 10 or later

Components Used

The information in this document is based on these software and hardware versions:

  • Identity Services Engine (ISE) 3.1.0 or later version.

  • Package Cisco AnyConnectDesktopWindows 4.10.2086.0

  • Package Cisco AnyConnectComplianceModuleWindows 4.3.4390.8192

  • Microsoft Windows 10 Pro 10.0.17763 Build 17763

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

Background Information

ISE Posture performs a client-side evaluation. The client receives the posture requirement policy from ISE, performs the posture data collection, compares the results against the policy, and sends the assessment results back to the ISE.

ISE then determines whether device is complaint or non-compliant based on Posture Report.

image.png

Getting Started 

image.png
Cisco Switch Configuration

hostname SW2

!

!

username cisco privilege 15 password 0 cisco

!

!

aaa new-model

!

!

aaa authentication login NOAU line none

aaa authentication dot1x default group radius

aaa authorization network default group radius

!

!

aaa server radius dynamic-author

 client 192.168.1.212 server-key cisco

!

aaa session-id common

switch 1 provision ws-c3750-48p

system mtu routing 1500

ip routing

ip name-server 192.168.1.200

ip dhcp excluded-address 10.100.8.1

ip dhcp excluded-address 192.168.1.1

ip dhcp excluded-address 192.168.1.2

ip dhcp excluded-address 192.168.1.3

ip dhcp excluded-address 192.168.1.200

ip dhcp excluded-address 192.168.1.212

ip dhcp excluded-address 192.168.1.180

!

ip dhcp pool VLAN8

   network 10.100.8.0 255.255.255.0

   default-router 10.100.8.1

   dns-server 8.8.8.8

!

ip dhcp pool VLAN1

   network 192.168.1.0 255.255.255.0

   default-router 192.168.1.2

   domain-name lab.local

   dns-server 192.168.1.200

!

!

ip device tracking

!

dot1x system-auth-control

!

!

!

spanning-tree mode pvst

spanning-tree portfast default

spanning-tree extend system-id

!

vlan internal allocation policy ascending

!

!

interface G0/0

 description ISE

 switchport mode access

 spanning-tree portfast

!

 

interface G0/1

 description DNS_SERVER

 switchport mode access

 spanning-tree portfast

 

!        

!

interface G0/2

description MGMT_PC

 switchport mode access

 spanning-tree portfast

 

 

!

 

!

Interface Gi0/3

 description SW1-SW2

 switchport trunk encapsulation dot1q

 switchport mode trunk

!

!

interface G1/0

 switchport mode access

 authentication host-mode multi-auth

 authentication port-control auto

 dot1x pae authenticator

 spanning-tree portfast

!

!

interface Vlan1

 ip address 192.168.1.2 255.255.255.0

!

interface Vlan8

 ip address 10.100.8.1 255.255.255.0

!

!        

!

ip http server

ip http secure-server

!

!

 

ip access-list extended redirect-acl

 deny   ip any host 192.168.1.212

 permit udp any eq bootpc any eq bootpc

 permit udp any any eq domain

 permit tcp any any eq www

 permit tcp any any eq 443

 permit tcp any any eq 8443

!

ip radius source-interface Vlan1

!

radius-server attribute 6 on-for-login-auth

radius-server attribute 8 include-in-access-req

radius-server attribute 25 access-request include

radius-server host 192.168.1.212  key cisco

radius-server vsa send accounting

radius-server vsa send authentication

!

!

line con 0

 login authentication NOAU

line vty 0 4

 password cisco

 login authentication NOAU

line vty 5 15

!

End

ISE GUI FROM MGMT-PC

IP 192.168.1.180 /24

image.pngimage.pngimage.pngimage.png

STEP1:-

Configure Posture Conditions

image.png

Configure Application condition

image.pngimage.png

Firewall condition

image.pngimage.png

Cisco ISE Posture Remediation’s

image.pngimage.png

STEP2:-

Cisco ISE Posture Requirements

image.png

STEP3:-

Cisco ISE Posture Policy

image.pngimage.png

STEP4:-

Client Provisioning Configuration Steps

  1. AnyConnect Posture Profile

  2. AnyConnect Compliance Module Download from website or upload from local disk

  3. AnyConnect Agent Module Upload 4.10

  4. AnyConnect Profile Configuration

  5. Client Provisioning Policy

image.pngimage.pngimage.pngimage.png

AnyConnect Compliance Module AnyConnectComplianceModuleWindows 4.3.4390.8192 Download from cisco site or upload from local disk.

image.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.png

STEP5:-

Client Provisioning Policy

image.png

STEP6:-

Configure Downloadable ACLs for Posture_Unknown

image.png

Configure Downloadable ACLs for Posture_Non-Compliant

image.png

Configure Downloadable ACLs for Posture_Compliant

image.png

Configure Authorization Profile

image.pngimage.png

redirect-acl

                          deny ip any host 192.168.1.212

                          permit tcp any any www

                          permit tcp any any eq 443

                          permit tcp any any eq 8443

                          deny udp any any eq domain

                          deny udp any eq bootpc any eq bootpc

image.pngimage.pngimage.pngimage.pngimage.pngimage.png

Configure Authentication Policy Set

image.png

Configure Authorization Policy Set

Unknown: Redirect to client provisioning portal and restrict access

Compliant: Grant controlled access

Noncompliant: Restrict access

image.png

Go to Test PC (DOT1x-PC)

Initiate Dot1x

Installing Cisco AnyConnect on PC

image.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.png

SWITCH

image.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.pngimage.png


Was this article helpful?