Day 59 – Cisco ISE Mastery Training: Android Device Onboarding

[Day 59] Cisco ISE Mastery Training: Android Device Onboarding


Introduction

In modern BYOD environments, Android devices represent a significant share of the wireless client base — from personal smartphones to ruggedized enterprise tablets. Unlike iOS, Android devices vary widely by manufacturer and OS version, which means onboarding is not “one-size-fits-all.”
Cisco ISE’s BYOD onboarding for Android automates the secure enrollment process by provisioning an EAP-TLS certificate, configuring Wi-Fi profiles, and registering the device in ISE’s endpoint database for long-term policy enforcement. This process ensures:

  • Zero manual Wi-Fi configuration errors from end users.
  • Strong mutual authentication using certificates instead of just usernames/passwords.
  • Visibility & control over Android endpoints, even in a diverse device landscape.

Problem Statement

Without proper onboarding:

  • Users manually configure Wi-Fi and may skip important security settings.
  • Credentials can be phished or stored insecurely.
  • Unregistered Android devices can connect without corporate compliance checks.
  • IT teams struggle to enforce device limits, certificate revocation, and per-device policy control.

Android’s fragmentation problem (Samsung, Pixel, Xiaomi, etc., each with different OS behaviors) means that manual configuration becomes support-heavy, time-consuming, and prone to errors.


Solution Overview

Cisco ISE solves this via:

  1. Pre-Authentication Redirection – Unregistered Android devices connecting to the onboarding SSID are redirected to the ISE BYOD portal.
  2. Agent or Agentless Profile Provisioning – ISE uses the Android browser to download a network_setup.apk or .mobileconfig-style installer for Wi-Fi + certificate.
  3. Certificate Enrollment – A SCEP request is sent to the internal CA or external CA integrated with ISE.
  4. Automatic Switch to Secure SSID – Post-onboarding, the device reconnects using EAP-TLS to the corporate SSID.
  5. Device Registration in Endpoint DB – Allows ongoing compliance monitoring, posture checks, and access enforcement.

Sample Lab Topology

Lab Setup Components:

  • Cisco ISE 3.x on VMware ESXi (or EVE-NG)
  • Cisco WLC 9800-CL (VM on EVE-NG) managing lightweight APs
  • Catalyst Switch for trunking & VLAN assignment
  • Android Device (physical or emulator)
  • AD Domain Controller for user authentication
  • Internal CA or ISE SCEP service

Topology Flow:

  1. Android connects to BYOD SSID → WLC applies ACL → Redirect to ISE portal.
  2. User logs in with AD credentials → Downloads provisioning wizard.
  3. ISE pushes certificate + SSID profile.
  4. Device reconnects to secure SSID with EAP-TLS.

Topology Layout:


Step-by-Step GUI Configuration Guide

Step 1 – Configure SSID on WLC for Onboarding

  1. Login to WLC GUI → WLANsCreate New → Name: BYOD-Android → ID: 10 → SSID: BYOD-Android.
  2. Security → Layer 2 → Open Authentication.
  3. Layer 3 → MAC Filtering enabled (for redirect ACL).
  4. Advanced → Enable AAA Override.

[Screenshot: WLC WLAN Creation Screen]


Step 2 – Create Pre-Auth ACL on WLC

(config)# ip access-list extended PRE_AUTH_ACL
(config-ext-nacl)# permit udp any any eq 53
(config-ext-nacl)# permit tcp any host <ISE_IP> eq 8443
(config-ext-nacl)# deny ip any any

Apply this ACL in WLAN → Security → ACL.


Step 3 – Add WLC as Network Device in ISE

  1. ISE GUI → Administration > Network Resources > Network Devices → Add.
  2. Name: WLC9800 → IP: <WLC_Mgmt_IP> → Shared Secret: ISEkey.
  3. Enable RADIUS Authentication and RADIUS Accounting.

[Screenshot: ISE Add Network Device Screen]


Step 4 – Configure BYOD Portal in ISE

  1. ISE → Work Centers > BYOD > Portals & Components.
  2. Create BYOD Portal → Assign name Android BYOD Onboarding.
  3. Enable Certificate Provisioning and choose SCEP CA.
  4. Configure redirection URL: https://<ISE_FQDN>:8443/portal/PortalSetup.action?portal=BYOD.

Step 5 – Create Policy Set in ISE

  1. ISE → Policy > Policy Sets → Add Android BYOD.
  2. Condition: Wireless_MAB AND Device:Profile = Android.
  3. Authorization Rules:
    • Unregistered Android → Redirect to BYOD Portal (using Web Redirection ACL name).
    • Registered Android → PermitAccess with EAP-TLS.

[Screenshot: ISE Policy Set Screen]


Step 6 – Test & Validate

  1. On Android → Connect to BYOD-Android SSID.
  2. Browser auto-redirects to ISE BYOD portal.
  3. Login with AD credentials.
  4. Download network_setup.apk from ISE.
  5. Install & allow certificate installation.
  6. Device automatically switches to Secure SSID.
  7. Check in ISE → Context Visibility > Endpoints → Verify device shows as registered with certificate.

CLI Validation:

# On WLC:
show client summary
show wlan id 10 client detail <client-mac>
debug client <client-mac>

# On ISE:
show logging application ise-psc.log
show logging application ise-acs.log

FAQs – Android Device Onboarding in Cisco ISE

Q1: Why does Cisco ISE treat Android onboarding differently from iOS onboarding?
A: Android has no universal API for Wi-Fi and certificate provisioning across all manufacturers. Unlike iOS, which supports profile delivery via a .mobileconfig file, Android often requires an APK (downloaded from the BYOD portal) to automate EAP-TLS configuration.


Q2: Can we bypass the APK install and still onboard Android devices?
A: In theory, yes — if the user manually installs the certificate and configures the secure SSID with EAP-TLS. However, this increases human error and defeats the automation benefits of ISE onboarding.


Q3: How does ISE detect that a connecting device is Android?
A: ISE uses profiling — gathering attributes such as DHCP option 55 values, HTTP User-Agent strings, and MAC OUI lookups. A matching profiling policy tags the device as Android in Context Visibility.


Q4: What causes APK installation failures during onboarding?
A: Common reasons include:

  • User not enabling “Install from Unknown Sources”
  • Browser blocking APK downloads
  • Antivirus/Play Protect interference
  • Outdated Android version not supporting WPA2-Enterprise with EAP-TLS

Q5: Can a single Android device be onboarded to multiple corporate SSIDs?
A: Yes. If the provisioning profile contains multiple SSIDs or if the process is repeated with different SSID parameters. However, this should be managed carefully to avoid policy conflicts.


Q6: How does ISE handle certificate expiration for onboarded Android devices?
A: Without an MDM, ISE cannot silently renew the cert. When the certificate nears expiry, the device will fail EAP-TLS authentication, and ISE can redirect the user back to the BYOD portal for renewal.


Q7: Is Android onboarding compatible with WPA3-Enterprise?
A: Yes, if the device supports WPA3-Enterprise with EAP-TLS and the SSID/WLC configuration matches. Older Android versions may need WPA2-Enterprise fallback.


Q8: Can posture assessment be done at the same time as onboarding?
A: Yes, if the AnyConnect Network Access Manager (NAM) and posture module are deployed during onboarding. This adds checks for OS patch level, antivirus status, etc., alongside certificate provisioning.


Q9: What are the most common troubleshooting commands for Android onboarding?
A:

  • WLC:
show client detail <MAC>
debug client <MAC>
  • ISE CLI:
show logging application ise-psc.log
show logging application ise-acs.log
  • ISE GUI: Check Operations > Live Logs for RADIUS authentication and web redirection events.

Q10: Can we restrict onboarding to only corporate-issued Android devices?
A: Yes. Combine profiling with endpoint identity groups and MDM compliance status. For example, only allow onboarding if the device MAC is pre-registered in ISE or if the device passes an MDM compliance check.


YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes

Android onboarding in Cisco ISE transforms an unmanaged, potentially insecure device into a fully registered, certificate-authenticated endpoint. It closes the gap between flexibility (BYOD) and corporate security, without burdening the IT team with endless Wi-Fi support tickets.


Fast-Track to Cisco ISE Mastery Pro

If you want to master Cisco ISE end-to-end — from basic NAC to advanced wireless onboarding, posture, and pxGrid integrations — join 4-month Instructor-Led CCIE Security Program.
In this training, you’ll get:

  • Real-world enterprise labs (VMware & EVE-NG)
  • Step-by-step configs for every ISE feature
  • Troubleshooting drills so you can fix issues under pressure

    Enroll now → https://course.networkjourney.com/ccie-security/
    Seats are limited, and early registrants get bonus ISE Deployment Templates.

Enroll Now & Future‑Proof Your Career
Email: info@networkjourney.com
WhatsApp / Call: +91 97395 21088