B ISE Admin 3 0
B ISE Admin 3 0
0
First Published: 2020-08-04
Last Modified: 2024-05-02
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Specify System Time and Network Time Protocol Server Settings 243
Change the System Time Zone 244
Configure SMTP Server to Support Notifications 244
Enable Secure Unlock Client Mechanism 245
Federal Information Processing Standards Mode Support 247
Enable Federal Information Processing Standards Mode in Cisco ISE 248
Configure Cisco ISE for Administrator Common Access Card Authentication 249
Secure SSH Key Exchange Using Diffie-Hellman Algorithm 251
Configure Cisco ISE to Send Secure Syslog 251
Configure Secure Syslog Remote Logging Target 252
Remote Logging Target Settings 252
Enable Logging Categories to Send Auditable Events to the Secure Syslog Target 254
Configure Logging Categories 254
Disable TCP Syslog and UDP Syslog Collectors 255
Recovery of Lost Nodes Using New IP Addresses and Hostnames in a Distributed Deployment 374
Recovery of a Node Using Existing IP Address and Hostname in a Standalone Deployment 375
Recovery of a Node Using New IP Address and Hostname in a Standalone Deployment 375
Configuration Rollback 375
Recovery of Primary Node in Case of Failure in a Distributed Deployment 376
Recovery of Secondary Node in Case of Failure in a Distributed Deployment 376
Cisco ISE Logging Mechanism 377
Configure Syslog Purge Settings 377
Cisco ISE System Logs 378
Configure Remote Syslog Collection Locations 378
Cisco ISE Message Codes 379
Set Severity Levels for Message Codes 380
Cisco ISE Message Catalogs 380
Endpoint Debug Log Collector 380
Download Debug Logs for a Specific Endpoint 380
Collection Filters 381
Configure Collection Filters 381
Event Suppression Bypass Filter 382
Cisco ISE Reports 382
Report Filters 383
Create the Quick Filter Criteria 383
Create the Advanced Filter Criteria 384
Run and View Reports 384
Reports Navigation 385
Export Reports 385
My Reports 386
Scheduling Cisco ISE Reports 386
Use Case: Scheduled Reports 387
Cisco ISE Active RADIUS Sessions 388
Change Authorization for RADIUS Sessions 389
Available Reports 390
RADIUS Live Logs 412
Authentication Latency 415
RADIUS Live Sessions 415
Configure Resource Owner Password Credentials Flow to Authenticate Users with Microsoft Entra
ID 607
Configure an Application for Resource Owner Password Credentials Flow in Microsoft Entra
ID 607
Configure Resource Owner Password Credentials Flow in Cisco ISE 608
Support for Active Directory Multidomain Forests 609
Prerequisites for Integrating Active Directory and Cisco ISE 609
Set Authorization Policy Rules for Endpoints with Anomalous Behavior 798
View Endpoints with Anomalous Behavior 798
Agent Download Issues on Client Machine 799
Endpoints 799
Endpoint Settings 800
Endpoint Import from LDAP Settings 801
Endpoint Profiling Policies Settings 803
Endpoint Context Visibility Using UDID Attribute 806
Endpoint Scripts Wizard for Windows and MacOS Endpoints 806
Endpoint Scripts Provisioning Summary Report 808
IF-MIB 809
SNMPv2-MIB 809
IP-MIB 809
CISCO-CDP-MIB 810
CISCO-VTP-MIB 811
CISCO-STACK-MIB 811
BRIDGE-MIB 811
OLD-CISCO-INTERFACE-MIB 811
CISCO-LWAPP-AP-MIB 812
CISCO-LWAPP-DOT11-CLIENT-MIB 813
CISCO-AUTH-FRAMEWORK-MIB 814
EEE8021-PAE-MIB: RFC IEEE 802.1X 814
HOST-RESOURCES-MIB 814
LLDP-MIB 815
Session Trace for an Endpoint 815
Session Removal from the Directory 817
Global Search for Endpoints 817
Cisco Identity Services Engine (ISE) is an identity-based network access control and policy enforcement
system. It functions as a common policy engine that enables endpoint access control and network device
administration for enterprises.
You can leverage Cisco ISE to ensure compliance, enhance infrastructure security, and streamline service
operations.
A Cisco ISE administrator can gather real-time contextual data for a network, including users and user groups
(who?), device type (what?), access time (when?), access location (where?), access type (wired, wireless, or
VPN) (how?), and network threats and vulnerabilities.
As a Cisco ISE administrator, you can use this information to make network governance decisions. You can
also tie identity data to various network elements to create policies that govern network access and usage.
A CLI administrator can start and stop the Cisco ISE application, apply software patches and upgrades, reload
or shut down the Cisco ISE appliance, and view all the system and application logs. Because of the special
privileges that are granted to a CLI administrator, we recommend that you protect the CLI administrator
credentials and create web-based administrators for configuring and managing Cisco ISE deployments.
The username and password that you configure during setup is intended only for administrative access to the
CLI. This role is considered to be the CLI admin user, also known as CLI administrator. By default, the
username for a CLI admin user is admin, and the password is defined during setup. There is no default
password. This CLI admin user is the default admin user, and this user account cannot be deleted. However,
other administrators can edit it, including options to enable, disable, or change password for the corresponding
account.
You can either create an administrator, or promote an existing user to an administrator role. Administrators
can also be demoted to simple network user status by disabling the corresponding administrative privileges.
Administrators are users who have local privileges to configure and operate the Cisco ISE system.
Administrators are assigned to one or more admin groups.
Note From Cisco ISE Release 2.7, use alphanumeric values while creating user accounts in Cisco ISE.
Related Topics
Cisco ISE Administrator Groups, on page 5
Note If you test the connection, with the test user using either MS-RPC or Kerberos, the status for your Active
Directory connection might show Operational, but error messages are displayed.
3. Verify that you can still log in to the Cisco ISE CLI as the Admin CLI user.
Note We recommend that you configure Active Directory access in the CLI before you join it in the GUI if the
admin user's domain is the same in both the CLI and the GUI. Else, you must rejoin the domain from the GUI
to avoid authentication failures to that domain.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access >
Administrators > Admin Users > Add.
Step 2 From the Add drop-down list, choose one of the following options:
• Create an Admin User
If you choose Create an Admin User, a New Administrator window appears, from where you can configure
account information for the new admin user.
• Select from Network Access Users
If you choose Select from Network Access Users, a list of current users appears, from which you can choose a
user. Subsequently, the Admin User window corresponding to this user appears.
Step 3 Enter values in the fields. The characters supported for the Name field are # $ ’ ( ) * + - . / @ _.
The admin user name must be unique. If you have entered an existing user name, an error pop-up window displays the
following message:
User can't be created. A User with that name already exists.
Step 4 Click Submit to create a new administrator in the Cisco ISE internal database.
Related Topics
Read-Only Admin Policy, on page 143
Customize Menu Access for the Read-Only Administrator, on page 144
Table 1: Cisco ISE Admin Groups, Access Levels, Permissions, and Restrictions
Customization Admin Manage sponsor, guest, • Configure guest and sponsor access. • Cannot perform any policy
and personal device management, identity
portals. • Manage guest access settings. management, or system-level
• Customize end-user web portals. configuration tasks in Cisco
ISE.
• Cannot view any reports.
Helpdesk Admin Query monitoring and • Run all reports. Cannot create, update, or delete
troubleshooting reports, troubleshooting flows, live
operations • Run all troubleshooting flows. authentications, or alarms.
• View the Cisco ISE dashboard and
live logs.
• View alarms.
Identity Admin • Manage user • Add, edit, and delete user accounts Cannot perform any policy
accounts and and endpoints. management or system-level
endpoints. configuration tasks in Cisco ISE.
• Add, edit, and delete identity sources.
• Manage identity
sources. • Add, edit, and delete identity source
sequences.
• Configure general settings for user
accounts (attributes and password
policy).
• View the Cisco ISE dashboard, live
logs, alarms, and reports.
• Run all troubleshooting flows.
MnT Admin Perform all the • Manage all the reports (run, create, Cannot perform any policy
monitoring and and delete). management, identity management,
troubleshooting or system-level configuration tasks
operations. • Run all the troubleshooting flows. in Cisco ISE.
• View the Cisco ISE dashboard and
live logs.
• Manage alarms (create, update, view,
and delete).
Network Device Admin Manage Cisco ISE • Read and write permissions on Cannot perform any policy
network devices and network devices management, identity management,
network device or system-level configuration tasks
repository. • Read and write permissions on in Cisco ISE.
Network Device Groups and all
network resource object types.
• View the Cisco ISE dashboard, live
logs, alarms, and reports.
• Run all the troubleshooting flows.
Policy Admin Create and manage • Read and write permissions on all the Cannot perform any identity
policies for all the Cisco elements that are used in policies, management or system-level
ISE services across the such as authorization profiles, configuration tasks in Cisco ISE.
network, which are Network Device Groups (NDGs), and
Device Administration: Access to
related to authentication, conditions.
the work center does not guarantee
authorization, posture,
• Read and write permissions on access to the subordinate links.
profiler, client
provisioning, and work identities, endpoints, and identity
centers. groups (user identity groups and
endpoint identity groups).
• Read and write permissions on
services policies and settings.
• View the Cisco ISE dashboard, live
logs, alarms, and reports.
• Run all the troubleshooting flows.
• Device Administration: Access to
device administration work centers.
Permission for TACACS policy
conditions and results. Network
device permissions for TACACS
proxy and proxy sequences.
RBAC Admin All the tasks under the • View the authentication details. Cannot perform any identity
Operations menu, except management or system-level
for Adaptive Network • Enable or disable Adaptive Network configuration tasks in Cisco ISE.
Control, and partial Control
access to some menu • Create, edit, and delete alarms;
items under generate and view reports; and use
Administration. Cisco ISE to troubleshoot problems
in your network.
• Read permissions on administrator
account settings and admin group
settings
• View permissions on admin access
and data access permissions in the
RBAC Policy window.
• View the Cisco ISE dashboard, live
logs, alarms, and reports.
• Run all the troubleshooting flows.
Read-Only Admin Read-only access to the • View and use the functions of the • Perform any configuration
ISE GUI. dashboard, reports, and live logs or changes such as create,
sessions, such as filtering data, update, delete, import,
querying, saving options, printing, quarantine, and Mobile
and exporting data. Device Management (MDM)
actions of objects, such as
• Change passwords of their own authorization policies,
accounts. authentication policies,
• Query ISE using global search, posture policies, profiler
reports, and live logs or sessions. policies, endpoints, and users.
Super Admin All Cisco ISE Create, read, update, delete, and eXecute • Device Administration:
administrative functions. (CRUDX) permissions on all Cisco ISE Access to the work center
The default administrator resources. does not guarantee access to
account belongs to this the subordinate links.
A super admin can modify the credentials
group.
of any Cisco ISE local user at any time. • Only an admin user from the
Note The super admin user cannot default Super Admin Group
modify the default can modify or delete other
system-generated RBAC policies admin users. Even an
and permissions. To do this, you externally mapped user who
must create new RBAC policies is part of an Admin Group
with the necessary permissions cloned with the Menu and
based on your needs, and map Data Access privileges of the
these policies to an admin group. Super Admin Group cannot
modify or delete an admin
Device Administration: Access to device user.
administration work centers. Permission
for TACACS policy conditions and results.
Network device permissions for TACACS
proxy and proxy sequences. In addition,
permission to enable TACACS global
protocol settings.
System Admin All Cisco ISE Full access (read and write permissions) to Cannot perform any policy
configuration and perform all the activities under the management or system-level
maintenance tasks. Operations tab and partial access to some configuration tasks in Cisco ISE.
menu items under the Administration tab:
• Read permissions on administrator
account settings and administrator
group settings.
• Read permissions on admin access
and data access permissions along
with the RBAC policy window.
• Read and write permissions for all
options under Administration >
System.
• View authentication details.
• Enable or disable Adaptive Network
Control
• Create, edit, and delete alarms;
generate and view reports; and use
Cisco ISE to troubleshoot problems
in your network.
• Device Administration: Permission to
enable TACACS global protocol
settings.
Elevated System Admin All Cisco ISE In addition to all the privileges of the • Cannot create or delete Super
(available in Cisco ISE, configuration and System Admin, an Elevated System Admin Admin users.
Release 2.6, Patch 2 and maintenance tasks. can create Admin users.
above ) • Cannot manage the Super
Admin groups.
External RESTful Full access to all the ERS • Create, read, update, and delete ERS The role is meant only for ERS
Services (ERS) Admin API requests such as API requests. authorization supporting internal
GET, POST, DELETE, users, identity groups, endpoints,
PUT endpoint groups, and SGT .
External RESTful Read-only access to ERS • Can only read ERS API requests The role is meant only for ERS
Services (ERS) Operator API, only GET authorization supporting internal
users, identity groups, endpoints,
endpoint groups, and SGT.
Related Topics
Cisco ISE Administrators, on page 3
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Administrators
> Admin Groups
Step 2 Click Add, and enter a name and description.
The supported special characters for the Name field are: space, # $ & ‘ ( ) * + - . / @ _ .
Step 3 Check the corresponding check box to specify the Type of administrator group you are configuring:
• Internal: Administrators assigned to this group type authenticate against the credentials that are stored in the Cisco
ISE internal database.
• External: Administrators assigned to this group authenticate against the credentials stored in the external identity
store that you select in the Administration > System > Admin Access > Authentication > Authentication Method
window. You can specify the external groups, if required.
Note If an internal user is configured with an external identity store for authentication, while logging in to the ISE
Admin portal, the internal user must select the external identity store as the Identity Source. Authentication will
fail if Internal Identity Source is selected.
Step 4 Click Add in the Member Users area to add users to this admin group. To delete users from the admin group, check the
check box corresponding to the user that you want to delete, and click Remove.
Step 5 Click Submit.
Note When a Cisco ISE server is added to a network, it is marked to be in Running state after its web interface
comes up. However, it might take some more time for all the services to be fully operational because some
advanced services, such as posture services, might take longer to be available.
Regardless of the level of access, any administrator account can modify or delete objects for which it has
permission, on any window that it can access.
Note Only system-defined admin users with Super Admin or Read Only Admin permissions can see the identity-based
users who are not a part of a user group. Admins you create without these permissions cannot see these users.
Role-Based Permissions
Cisco ISE allows you to configure permissions at the menu and data levels. These are called menu access and
data access permissions.
The menu access permissions allow you to show or hide the menu and submenu items of the Cisco ISE
administrative interface. This feature lets you create permissions so that you can restrict or enable access at
the menu level.
The data access permissions allow you to grant read and write, read only, or no access to the Admin Groups,
User Identity Groups, Endpoint Identity Groups, Locations, and Device Types data in the Cisco ISE interface.
RBAC Policies
RBAC policies determine if an administrator can be granted a specific type of access to a menu item or other
identity group data elements. You can grant or deny access to a menu item or identity group data element to
an administrator based on the admin group, by using RBAC policies. When administrators log in to the Admin
portal, they can access menus and data that are based on the policies and permissions defined for the admin
groups with which they are associated.
RBAC policies map admin groups to menu access and data access permissions. For example, you can prevent
a network administrator from viewing the Admin Access operations menu and the policy data elements. This
can be achieved by creating a custom RBAC policy for the admin group with which that network administrator
is associated.
Note If you are using customized RBAC policies for admin access, ensure that you provide all the relevant menu
access for a given data access. For example, to add or delete endpoints with data access of Identity or Policy
Admin, you must provide menu access to Work Center > Network Access and Administration > Identity
Management.
Note For a Super Admin user, all the menu items are available. For other admin users, all the menu items in the
Menu Access Privileges column are available for standalone deployment, and primary node in a distributed
deployment. For secondary nodes in a distributed deployment, the menu items under the Administration tab
are not available.
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Home √ √ √ √ √ √ √ √ x x
Home >
√ √ √ √ √ √ √ √ x x
Introduction
Home >
√ √ √ √ √ √ √ √ x x
Dashboard
Context
√ √ √ √ √ √ √ √ x x
Visibility
Context
Visibility
√ √ √ √ √ √ √ √ x x
>
Endpoints
Context
Visibility √ √ √ √ √ √ √ √ x x
> Users
Context
Visibility
> √ √ √ √ √ √ √ √ x x
Network
Devices
Context
Visibility
√ √ √ √ √ √ √ √ x x
>
Application
Operations √ √ √ √ √ √ √ √ x √
Operations
>
Adaptive √ √ x x x x x x x x
Network
Control
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
Adaptive
Network √ √ x x x x x x x x
Control
> Policy
List
Operations
>
Adaptive
Network
√ √ x x x x x x x x
Control
>
Endpoint
Assignment
Operations
> √ √ √ √ √ √ √ √ x x
Reports
Operations
> √ √ √ √ √ √ √ √ x x
RADIUS
Operations
>
RADIUS √ √ √ √ √ √ √ √ x x
> Live
Logs
Operations
>
RADIUS √ √ √ √ √ √ √ √ x x
> Live
Sessions
Operations
>
Threat-Centric
√ √ √ √ √ √ √ √ x x
NAC
Live
Logs
Operations
> √ √ √ √ √ √ √ √ x √
TACACS
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
TACACS √ √ √ √ √ √ √ √ x √
> Live
Logs
Operations
> √ √ √ √ √ √ √ √ x x
Troubleshoot
Operations
>
Troubleshoot
√ x x x x x x x x x
>
Download
Logs
Operations
>
Troubleshoot
√ √ √ √ √ √ √ √ x x
>
Diagnostic
Tools
Operations
>
Troubleshoot
>
√ √ √ √ √ √ √ √ x x
Diagnostic
Tools >
General
Tools
Operations
>
Troubleshoot
>
Diagnostic
Tools > √ √ √ √ √ √ √ √ x x
General
Tools >
RADIUS
Authentication
Troubleshooting
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
Troubleshoot
>
Diagnostic
Tools >
√ √ √ √ √ √ √ √ x x
General
Tools >
Execute
Network
Device
Command
Operations
>
Troubleshoot
>
Diagnostic
Tools > √ √ √ √ √ √ √ √ x x
General
Tools >
Evaluate
Configuration
Validator
Operations
>
Troubleshoot
>
Diagnostic
√ √ √ √ √ √ √ √ x x
Tools >
General
Tools >
Posture
Troubleshooting
Operations
>
Troubleshoot
>
Diagnostic
Tools > √ √ √ √ √ √ √ √ x x
General
Tools >
Agentless
Posture
Troubleshooting
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
Troubleshoot
>
Diagnostic
√ x x x x x x x x x
Tools >
General
Tools >
EndPoint
Debug
Operations
>
Troubleshoot
>
Diagnostic
√ x x x x x x x x x
Tools >
General
Tools >
TCP
Dump
Operations
>
Troubleshoot
>
Diagnostic
Tools > √ √ √ √ √ √ √ √ x x
General
Tools >
Session
Trace
Tests
Operations
>
Troubleshoot
>
Diagnostic
√ √ √ √ √ √ √ √ x x
Tools >
Security
Group
Access
Tools
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
Troubleshoot
>
Diagnostic
Tools >
√ √ √ √ √ √ √ √ x x
Security
Group
Access
Tools >
SXP-IP
Mappings
Operations
>
Troubleshoot
>
Diagnostic
Tools >
√ √ √ √ √ √ √ √ x x
Security
Group
Access
Tools >
IP User
SGT
Operations
>
Troubleshoot
>
Diagnostic
Tools >
Security √ √ √ √ √ √ √ √ x x
Group
Access
Tools >
Egress
(SGACL)
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Operations
>
Troubleshoot
>
Diagnostic
Tools >
√ √ √ √ √ √ √ √ x x
Security
Group
Access
Tools >
Device
SGT
Operations
>
Troubleshoot √ √ √ √ √ √ √ √ x x
> Debug
Wizard
Operations
>
Troubleshoot
> Debug
√ √ √ √ √ √ √ √ x x
Wizard
> Debug
Log
Configuration
Operations
>
Troubleshoot
> Debug
√ √ √ √ √ √ √ √ x x
Wizard
> Debug
Profile
Configuration
Policy √ √ x x x x x x x x
Policy >
Policy √ √ x x x x x x x x
Sets
Policy >
Policy √ √ x x x x x x x x
Elements
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements √ √ x x x x x x x x
>
Dictionaries
Policy >
Policy
Elements √ √ x x x x x x x x
>
Conditions
Policy >
Policy
Elements
>
√ √ x x x x x x x x
Conditions
>
Library
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Library
Conditions
> Simple
Conditions
Policy >
Policy
Elements
> √ √ x x x x x x x x
Conditions
> Smart
Conditions
Policy >
Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Authorization
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions √ √ x x x x x x x x
>
Authorization
> Simple
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Authorization
>
Compound
Conditions
Policy >
Policy
Elements
> √ √ x x x x x x x x
Conditions
> Time
and Date
Policy >
Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Posture
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Anti-Spyware
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Application
Conditions
Policy >
Policy
Elements
>
Conditions
> √ √ x x x x x x x x
Posture
>
Dictionary
Compound
Conditions
Policy >
Policy
Elements
>
Conditions
> √ √ x x x x x x x x
Posture
>
Dictionary
Simple
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
> Disk
Encryption
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions
> √ √ x x x x x x x x
Posture
>
External
DataSource
Conditions
Policy >
Policy
Elements
>
Conditions √ √ x x x x x x x x
>
Posture
> File
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Firewall
Conditions
Policy >
Policy
Elements
>
Conditions
> √ √ x x x x x x x x
Posture
>
Hardware
Attributes
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
> Patch
Management
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Registry
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Service
Conditions
Policy >
Policy
Elements
>
Conditions √ √ x x x x x x x x
>
Posture
> USB
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Anti-Malware
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Anti-Virus
Conditions
Policy >
Policy
Elements
>
Conditions
√ √ x x x x x x x x
>
Posture
>
Compound
Conditions
Policy >
Policy
Elements
>
√ √ x x x x x x x x
Conditions
>
Network
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Conditions
>
√ √ x x x x x x x x
Network
Conditions
>
Endstation
Network
Conditions
Policy >
Policy
Elements
>
Conditions
>
√ √ x x x x x x x x
Network
Conditions
> Device
Port
Network
Conditions
Policy >
Policy
Elements
>
Conditions
> √ √ x x x x x x x x
Network
Conditions
> Device
Network
Conditions
Policy >
Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Profiling
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements √ √ x x x x x x x x
>
Results
Policy >
Policy
Elements
> √ √ x x x x x x x x
Results
>
Authentication
Policy >
Policy
Elements
>
Results
√ √ x x x x x x x x
>
Authentication
>
Allowed
Protocols
Policy >
Policy
Elements
> √ √ x x x x x x x x
Results
>
Authorization
Policy >
Policy
Elements
>
Results
√ √ x x x x x x x x
>
Authorization
>
Authorization
Profiles
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Results
√ √ x x x x x x x x
>
Authorization
>
Downloadable
ACLs
Policy >
Policy
Elements
> √ √ x x x x x x x x
Results
>
Profiling
Policy >
Policy
Elements
>
Results
√ √ x x x x x x x x
>
Profiling
>
Exception
Actions
Policy >
Policy
Elements
>
Results
>
√ √ x x x x x x x x
Profiling
>
Network
Scan
(NMAP)
Actions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
> √ √ x x x x x x x x
Results
>
Posture
Policy >
Policy
Elements
>
Results √ √ x x x x x x x x
>
Posture
>
Requirements
Policy >
Policy
Elements
>
Results
√ √ x x x x x x x x
>
Posture
>
Remediation
Actions
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
>
Anti-Malware
Remediation
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
>
Anti-Virus
Remediation
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
>
Firewall
Remediation
Policy >
Policy
Elements
>
Results
>
√ √ x x x x x x x x
Posture
>
Remediation
Actions
> Link
Remediation
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Results
>
√ √ x x x x x x x x
Posture
>
Remediation
Actions
> Script
Remediation
Policy >
Policy
Elements
>
Results
>
√ √ x x x x x x x x
Posture
>
Remediation
Actions
> USB
Remediation
Policy >
Policy
Elements
>
Results
>
Posture
√ √ x x x x x x x x
>
Remediation
Actions
>
Windows
Update
Remediation
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
>
Application
Remediation
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
>
Anti-Spyware
Remediation
Policy >
Policy
Elements
>
Results
>
√ √ x x x x x x x x
Posture
>
Remediation
Actions
> File
Remediation
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
>
Results
>
Posture
√ √ x x x x x x x x
>
Remediation
Actions
>
Launch
Program
Remediation
Policy >
Policy
Elements
>
Results
>
Posture √ √ x x x x x x x x
>
Remediation
Actions
> Patch
Management
Remediation
Policy >
Policy
Elements
>
Results
>
Posture
>
√ √ x x x x x x x x
Remediation
Actions
>
Windows
Server
Update
Services
Remediation
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Policy >
Policy
Elements
> √ √ x x x x x x x x
Results
> Client
Provisioning
Policy >
Policy
Elements
>
Results √ √ x x x x x x x x
> Client
Provisioning
>
Resources
Policy >
Policy √ √ x x x x x x x x
Sets
Policy >
√ √ x x x x x x x x
Authentication
Policy >
√ √ x x x x x x x x
Authorization
Policy >
√ √ x x x x x x x x
Profiling
Policy >
√ √ x x x x x x x x
Posture
Policy >
Client √ √ x x x x x x x x
Provisioning
Administration √ √ x √ √ √ √ x √ √
Administration
>
√ √ x √ x x x x x √
Identity
Management
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Identity
√ √ x √ x x x x x x
Management
>
Identities
Administration
>
Identity
Management √ √ x √ x x x x x x
>
Identities
> Users
Administration
>
Identity
Management
>
Identities √ √ x √ x x x x x x
> Latest
Manual
Network
Scan
Results
Administration
>
Identity
√ √ x √ x x x x x x
Management
>
Groups
Administration
>
Identity
Management
√ √ x √ x x x x x √
>
External
Identity
Sources
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Identity
Management
√ √ x √ x x x x x x
>
Identity
Source
Sequences
Administration
>
Identity
√ √ x √ x x x x x x
Management
>
Settings
Administration
>
Identity
Management
> √ √ x √ x x x x x x
Settings
> User
Custom
Attributes
Administration
>
Identity
Management
> √ √ x √ x x x x x x
Settings
>
Endpoint
Purge
Administration
>
Identity
Management
> √ √ x √ x x x x x x
Settings
> User
Authentication
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Identity
Management
>
√ √ x √ x x x x x x
Settings
>
Endpoint
Custom
Attributes
Administration
>
Identity
Management
> √ √ x √ x x x x x x
Settings
> REST
ID Store
Settings
Administration
> Device
√ √ x x x x x x √ x
Portal
Management
Administration
> Device
Portal √ √ x x x x x x √ x
Management
> BYOD
Administration
> Device
Portal
√ √ x x x x x x √ x
Management
> Client
Provisioning
Administration
> Device
Portal
√ √ x x x x x x √ x
Management
> My
Devices
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> Device
Portal
Management √ √ x x x x x x √ x
>
Blocked
List
Administration
> Device
Portal
Management √ x x x x x x x x x
>
Certificate
Provisioning
Administration
> Device
Portal
Management √ √ x x x x x x √ x
> Mobile
Device
Management
Administration
> Device
Portal
Management
√ x x x x x x x x x
>
Custom
Portal
Files
Administration
> Device
Portal
√ √ x x x x x x √ x
Management
>
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> Device
Portal
Management
√ √ x x x x x x √ x
>
Settings
> Retry
URL
Administration
> Device
Portal
Management
>
√ √ x x x x x x √ x
Settings
>
Employee
Registered
Devices
Administration
>
√ x x x √ x x x x x
Network
Resources
Administration
>
Network
Resources √ x x x √ x x x x x
>
Network
Devices
Administration
>
Network
Resources
>
√ x x x √ x x x x x
Network
Devices
>
Default
Device
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Network
Resources
>
√ x x x √ x x x x x
Network
Devices
>
Network
Devices
Administration
>
Network
Resources
>
√ x x x √ x x x x x
Network
Devices
> Device
Security
Settings
Administration
>
Network
Resources
√ x x x √ x x x x x
>
Network
Device
Groups
Administration
>
Network
Resources
√ x x x √ x x x x x
>
External
RADIUS
Servers
Administration
>
Network
√ x x x √ x x x x x
Resources
> NAC
Managers
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Network
Resources √ x x x √ x x x x x
>
Location
Services
Administration
>
Network
Resources
>
√ x x x √ x x x x x
Location
Services
>
Location
Servers
Administration
>
Network
Resources
>
√ x x x √ x x x x x
Location
Services
>
Location
Tree
Administration
>
Network
Resources
√ x x x √ x x x x x
>
Network
Device
Profiles
Administration
>
Network
Resources
√ x x x √ x x x x x
>
RADIUS
Server
Sequences
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
Network
Resources √ x x x x x x x x x
>
External
MDM
Administration
>
√ x x x x √ x x x x
pxGrid
Services
Administration
>
pxGrid
√ x x x x √ x x x x
Services
>
Summary
Administration
>
pxGrid
√ x x x x √ x x x x
Services
> Client
Management
Administration
>
pxGrid
Services √ x x x x √ x x x x
> Client
Management
> Clients
Administration
>
pxGrid
Services √ x x x x √ x x x x
> Client
Management
> Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
pxGrid
Services
√ x x x x √ x x x x
> Client
Management
>
Groups
Administration
>
pxGrid
Services
√ x x x x √ x x x x
> Client
Management
>
Certificates
Administration
>
pxGrid
Services
> Client √ x x x x √ x x x x
Management
>
pxCloud
Connection
Administration
>
pxGrid
Services
> Client √ x x x x √ x x x x
Management
>
pxCloud
Policy
Administration
>
pxGrid
√ x x x x √ x x x x
Services
>
Diagnostics
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
>
pxGrid
Services
√ x x x x √ x x x x
>
Diagnostics
>
WebSocket
Administration
>
pxGrid
Services √ x x x x √ x x x x
>
Diagnostics
> Log
Administration
>
pxGrid
Services √ x x x x √ x x x x
>
Diagnostics
> Tests
Administration
>
pxGrid
√ x x x x √ x x x x
Services
>
Settings
Administration
√ √ x x x √ √ x x √
> System
Administration
> System
>
√ x x x x √ x x x x
Backup
&
Restore
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Backup
√ x x x x √ x x x x
&
Restore
> Policy
Export
Administration
> System
>
Backup
&
√ x x x x √ x x x x
Restore
>
Backup
&
Restore
Administration
> System
√ x x x x √ √ x x x
> Admin
Access
Administration
> System
> Admin √ x x x x √ √ x x x
Access >
Administrators
Administration
> System
> Admin
Access > √ x x x x √ √ x x x
Administrators
> Admin
Users
Administration
> System
> Admin
Access > √ x x x x √ √ x x x
Administrators
> Admin
Groups
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
> Admin √ x x x x √ √ x x x
Access >
Authentication
Administration
> System
> Admin √ x x x x √ √ x x x
Access >
Authorization
Administration
> System
> Admin
Access > √ x x x x √ √ x x x
Authorization
>
Permissions
Administration
> System
> Admin
Access >
Authorization √ x x x x √ √ x x x
>
Permissions
> Menu
Access
Administration
> System
> Admin
Access >
Authorization √ x x x x √ √ x x x
>
Permissions
> Data
Access
Administration
> System
> Admin
√ x x x x √ √ x x x
Access >
Authorization
> Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
> Admin √ x x x x √ x x x x
Access >
Settings
Administration
> System
> Admin
√ x x x x √ x x x x
Access >
Settings
> Access
Administration
> System
> Admin
Access > √ x x x x √ x x x x
Settings
>
Session
Administration
> System
> Admin
Access > √ x x x x x x x x x
Settings
> Portal
Customization
Administration
> System
√ √ x x x √ x x x x
>
Settings
Administration
> System
>
√ √ x x x √ x x x x
Settings
> Max
Sessions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Interactive
User
Guide
Administration
> System
>
Settings √ √ x x x √ x x x x
> DHCP
& DNS
Services
Administration
> System
>
Settings √ √ x x x √ x x x x
> Light
Session
Directory
Administration
> System
>
√ √ x x x √ x x x x
Settings
>
Protocols
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Protocols
>
EAP-FAST
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings
>
Protocols √ √ x x x √ x x x x
>
EAP-FAST
> EAP
FAST
Settings
Administration
> System
>
Settings
>
Protocols √ √ x x x √ x x x x
>
EAP-FAST
>
Generate
PAC
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Protocols
>
EAP-TTLS
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Protocols
>
EAP-TLS
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings √ √ x x x √ x x x x
>
Protocols
> PEAP
Administration
> System
>
Settings √ √ x x x √ x x x x
>
Protocols
> IPSec
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Protocols
>
RADIUS
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Network
Success
Diagnostics
Administration
> System
>
Settings
>
√ √ x x x √ x x x x
Network
Success
Diagnostics
>
Telemetry
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings
>
Network √ √ x x x √ x x x x
Success
Diagnostics
> Cisco
Support
Diagnostics
Administration
> System
>
√ √ x x x √ x x x x
Settings
> Client
Provisioning
Administration
> System
>
√ √ x x x √ x x x x
Settings
> FIPS
Mode
Administration
> System
>
Settings √ √ x x x √ x x x x
>
Security
Settings
Administration
> System
> √ √ x x x √ x x x x
Settings
> Proxy
Administration
> System
>
√ √ x x x √ x x x x
Settings
> SMTP
Server
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
√ √ x x x √ x x x x
Settings
> SMS
Gateway
Administration
> System
>
Settings √ √ x x x √ x x x x
> System
Time(Primary
Node)
Administration
> System
>
√ √ x x x √ x x x x
Settings
> Alarm
Settings
Administration
> System
>
√ √ x x x √ x x x x
Settings
>
Posture
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Posture
>
Updates
Administration
> System
>
Settings
> √ √ x x x √ x x x x
Posture
>
General
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Posture
>
Reassessments
Administration
> System
>
Settings
>
√ √ x x x √ x x x x
Posture
>
Acceptable
Use
Policy
Administration
> System
>
√ √ x x x √ x x x x
Settings
>
Profiling
Administration
> System
>
Settings √ √ x x x √ x x x x
>
Endpoint
Scripts
Administration
> System
>
Settings
> √ √ x x x √ x x x x
Endpoint
Scripts >
Login
Configuration
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Settings
√ √ x x x √ x x x x
>
Endpoint
Scripts >
Settings
Administration
> System
>
Settings √ √ x x x √ x x x x
> API
Gateway
Settings
Administration
> System
√ x x x x √ x x x √
>
Deployment
Administration
> System
√ x x x x √ x x x x
>
Licensing
Administration
> System
√ x x x x x x x x x
>
Upgrade
Administration
> System
√ x x x x x x x x x
> Health
Checks
Administration
> System
√ x x x x √ x x x x
>
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Certificates √ x x x x √ x x x x
>
Certificate
Management
Administration
> System
>
Certificates
>
√ x x x x √ x x x x
Certificate
Management
>
Trusted
Certificates
Administration
> System
>
Certificates
>
Certificate √ x x x x √ x x x x
Management
>
Certificate
Signing
Requests
Administration
> System
>
Certificates
> √ x x x x √ x x x x
Certificate
Management
> System
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Certificates
>
√ x x x x √ x x x x
Certificate
Management
> OCSP
Client
Profile
Administration
> System
>
Certificates
>
Certificate
√ x x x x √ x x x x
Management
>
Certificate
Periodic
Check
Settings
Administration
> System
>
Certificates √ x x x x √ x x x x
>
Certificate
Authority
Administration
> System
>
Certificates
>
Certificate √ x x x x √ x x x x
Authority
>
Certificate
Authority
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Certificates
> √ x x x x √ x x x x
Certificate
Authority
>
Overview
Administration
> System
>
Certificates
> √ x x x x √ x x x x
Certificate
Authority
> Issued
Certificates
Administration
> System
>
Certificates
>
Certificate √ x x x x √ x x x x
Authority
>
Internal
CA
Settings
Administration
> System
>
Certificates
>
√ x x x x √ x x x x
Certificate
Authority
>
Certificate
Templates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Certificates
>
Certificate √ x x x x √ x x x x
Authority
>
External
CA
Settings
Administration
> System
√ x x x x √ x x x x
>
Logging
Administration
> System
>
Logging √ x x x x √ x x x x
>
Logging
Categories
Administration
> System
>
Logging √ x x x x √ x x x x
>
Collection
Filters
Administration
> System
>
√ x x x x √ x x x x
Logging
> Log
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Logging
√ x x x x √ x x x x
>
Remote
Logging
Targets
Administration
> System
>
Logging √ x x x x √ x x x x
>
Message
Catalog
Administration
> System
√ x x x x √ x x x x
>
Maintenance
Administration
> System
>
√ x x x x √ x x x x
Maintenance
>
Repository
Administration
> System
>
Maintenance √ x x x x √ x x x x
>
Localdisk
Management
Administration
> System
>
√ x x x x √ x x x x
Maintenance
> Patch
Management
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> System
>
Maintenance
√ x x x x √ x x x x
>
Operational
Data
Purging
Administration
> System
> √ x x x x x x x x x
Session
Info
Administration
> System
> System √ √ x x x √ x x x x
Time(Secondary
Node)
Administration
> System
√ x x x x √ x x x x
> Server
Certificate
Administration
> System
>
√ x x x x √ x x x x
Certificate
Signing
Requests
Administration
> Feed √ √ x x x √ x x x x
Service
Administration
> Feed
Service √ √ x x x √ x x x x
>
Profiler
Administration
> Threat
√ x x x x x x x x x
Centric
NAC
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Administration
> Threat
Centric
NAC > √ x x x x x x x x x
Third
Party
Vendors
Work
√ √ √ √ √ √ √ √ √ √
Centers
Work
Centers
√ √ √ √ √ √ √ √ x x
>
TrustSec
Work
Centers
>
√ √ x x x x x x x x
TrustSec
>
Components
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
Components
> IP
SGT
Static
Mapping
Work
Centers
>
TrustSec
> √ √ x x x x x x x x
Components
>
Network
Devices
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec
> √ √ x x x x x x x x
Components
>
Security
Groups
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
Components
>
Security
Group
ACLs
Work
Centers
>
TrustSec
> √ √ x x x x x x x x
Components
>
Trustsec
Servers
Work
Centers
>
TrustSec
>
Components √ √ x x x x x x x x
>
Trustsec
Servers
> AAA
Servers
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec
>
Components
√ √ x x x x x x x x
>
Trustsec
Servers
>
HTTPS
Servers
Work
Centers
>
TrustSec √ √ x x x x x x x x
>
TrustSec
Policy
Work
Centers
>
TrustSec
> √ √ x x x x x x x x
TrustSec
Policy >
Egress
Policy
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
TrustSec
Policy >
Egress
Policy >
Matrix
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec
>
TrustSec √ √ x x x x x x x x
Policy >
Egress
Policy >
Destination
Tree
Work
Centers
>
TrustSec
>
TrustSec √ √ x x x x x x x x
Policy >
Egress
Policy >
Matrices
List
Work
Centers
>
TrustSec
>
TrustSec √ √ x x x x x x x x
Policy >
Egress
Policy >
Source
Tree
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
TrustSec
Policy >
Network
Device
Authorization
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ x x x x x x x x
TrustSec
> Policy
Sets
Work
Centers
>
TrustSec √ √ x x x x x x x x
>
Authorization
Policy
Work
Centers
> √ √ x x x x x x x x
TrustSec
> SXP
Work
Centers
>
TrustSec √ √ x x x x x x x x
> SXP >
SXP
Devices
Work
Centers
>
TrustSec √ √ x x x x x x x x
> SXP >
All SXP
Mappings
Work
Centers
> √ √ x x x x x x x x
TrustSec
> ACI
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ √ √ √ √ √ √ x x
TrustSec
>
Reports
Work
Centers
>
√ √ x x x x x x x x
TrustSec
>
Overview
Work
Centers
>
TrustSec
√ √ x x x x x x x x
>
Overview
>
Introduction
Work
Centers
>
TrustSec
√ √ x x x x x x x x
>
Overview
>
Dashboard
Work
Centers
>
√ √ x x x x x x x x
TrustSec
> Policy
Sets
Work
Centers
>
√ √ x x x x x x x x
TrustSec
> Policy
Sets
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec √ √ x x x x x x x x
>
Authentication
Policy
Work
Centers
>
√ √ √ √ √ √ √ √ x x
TrustSec
>
Troubleshoot
Work
Centers
>
TrustSec
> √ √ √ √ √ √ √ √ x x
Troubleshoot
> Egress
(SGACL)
Policy
Work
Centers
>
TrustSec
> √ √ √ √ √ √ √ √ x x
Troubleshoot
> IP
User
SGT
Work
Centers
>
TrustSec
> √ √ √ √ √ √ √ √ x x
Troubleshoot
>
SXP-IP
Mappings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec
√ √ √ √ √ √ √ √ x x
>
Troubleshoot
> Device
SGT
Work
Centers
>
√ √ x x x x x x x x
TrustSec
>
Settings
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
Settings
>
General
TrustSec
Settings
Work
Centers
>
TrustSec
> √ √ x x x x x x x x
Settings
> Work
Process
Settings
Work
Centers
>
TrustSec
√ √ x x x x x x x x
>
Settings
> ACI
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
TrustSec
>
√ √ x x x x x x x x
Settings
>
TrustSec
Matrix
Settings
Work
Centers
>
TrustSec
√ √ x x x x x x x x
>
Settings
> SXP
Settings
Work
Centers
√ √ √ √ √ √ √ √ x x
>
Profiler
Work
Centers
>
√ √ x √ x x x x x x
Profiler
> Ext Id
Sources
Work
Centers
>
Profiler √ √ x x x x x x x x
>
Endpoint
Classification
Work
Centers
>
√ √ x x x √ x x x x
Profiler
> Node
Config
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Profiler √ √ x x x x x x x x
>
Manual
Scans
Work
Centers
>
Profiler
>
Manual √ √ x x x x x x x x
Scans >
Manual
NMAP
Scan
Results
Work
Centers
>
Profiler
>
√ √ x x x x x x x x
Manual
Scans >
Manual
NMAP
Scan
Work
Centers
>
√ √ x x x x x x x x
Profiler
> Policy
Sets
Work
Centers
>
Profiler √ √ x x x x x x x x
>
Authorization
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Profiler
>
Reports
Work
Centers
> √ √ x x x x x x x x
Profiler
> Feeds
Work
Centers
>
√ √ x x x x x x x x
Profiler
> Policy
Elements
Work
Centers
>
Profiler
> Policy √ √ x x x x x x x x
Elements
>
Profiler
Conditions
Work
Centers
>
Profiler
> Policy √ √ x x x x x x x x
Elements
> NMAP
Scan
Actions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Profiler
> Policy √ √ x x x x x x x x
Elements
>
Exception
Actions
Work
Centers
>
Profiler √ √ x x x x x x x x
>
Profiling
Policies
Work
Centers
>
√ √ x x x x x x x x
Profiler
> Policy
Sets
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Profiler
>
Troubleshoot
Work
Centers
>
Profiler
>
Troubleshoot √ √ √ √ √ √ √ √ x x
>
Execute
Network
Device
Command
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Profiler
> √ x x x x x x x x x
Troubleshoot
>
EndPoint
Debug
Work
Centers
>
Profiler
>
√ √ √ √ √ √ √ √ x x
Troubleshoot
>
Evaluate
Configuration
Validator
Work
Centers
>
Profiler
√ x x x x x x x x x
>
Troubleshoot
> TCP
Dump
Work
Centers
>
√ √ x x x x x x x x
Profiler
>
Settings
Work
Centers
>
Profiler
> √ √ x x x x x x x x
Settings
>
Profiler
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Profiler
>
√ √ x x x x x x x x
Settings
> NMAP
Scan
Subnet
Exclusions
Work
Centers
>
√ √ x x x x x x x x
Profiler
>
Dictionaries
Work
Centers
>
√ √ x x x x x x x x
Profiler
>
Overview
Work
Centers
>
Profiler √ √ x x √ x x x x x
>
Network
Devices
Work
Centers
√ √ √ √ √ √ √ √ √ x
>
Posture
Work
Centers
>
Posture √ √ x x x x x x x x
>
Network
Devices
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture √ √ x x x x x x x x
>
Posture
Policy
Work
Centers
>
√ √ x x x x x x x x
Posture
> Policy
Sets
Work
Centers
>
Posture √ √ x x x x x x x x
>
Authorization
Policy
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Posture
>
Reports
Work
Centers
>
√ √ x x x x x x x x
Posture
>
Settings
Work
Centers
>
Posture
>
√ √ x x x x x x x x
Settings
>
Posture
General
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
>
√ √ x x x x x x x x
Settings
>
Acceptable
Use
Policy
Work
Centers
>
Posture
> √ √ x x x x x x x x
Settings
>
Software
Updates
Work
Centers
>
Posture
>
Settings √ √ x x x x x x x x
>
Software
Updates
> Client
Provisioning
Work
Centers
>
Posture
>
Settings
√ √ x x x x x x x x
>
Software
Updates
>
Posture
Updates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
>
Settings √ √ x x x x x x x x
>
Software
Updates
> Proxy
Settings
Work
Centers
>
Posture
> √ √ x x x x x x x x
Settings
>
Reassessment
configurations
Work
Centers
>
√ √ x x x x x x x x
Posture
>
Overview
Work
Centers
>
√ √ x x x x x x √ x
Posture
> Client
Provisioning
Work
Centers
>
Posture
> Client √ √ x x x x x x x x
Provisioning
> Client
Provisioning
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Client √ √ x x x x x x √ x
Provisioning
> Client
Provisioning
Portal
Work
Centers
>
Posture
√ √ x x x x x x x x
> Client
Provisioning
>
Resources
Work
Centers
>
√ √ x x x x x x x x
Posture
> Policy
Elements
Work
Centers
>
Posture
√ √ x x x x x x x x
> Policy
Elements
>
Conditions
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Anti-Spyware
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Application
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Compound
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Dictionary
Compound
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Conditions
> File
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Registry
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Anti-Malware
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Anti-Virus
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Dictionary
Simple
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
> Disk
Encryption
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Conditions
>
External
DataSource
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Firewall
Condition
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Hardware
Attributes
Condition
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
> Patch
Management
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Service
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Conditions
> USB
Work
Centers
>
Posture
√ √ x x x x x x x x
> Policy
Elements
>
Requirements
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
√ √ x x x x x x x x
> Policy
Elements
>
Remediations
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Remediations
>
Anti-Virus
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Remediations
>
Firewall
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Remediations
> Link
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Remediations
> Script
Work
Centers
>
Posture
> Policy
Elements
> √ √ x x x x x x x x
Remediations
>
Windows
Server
Update
Services
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Remediations
>
Anti-Malware
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Remediations
>
Anti-Spyware
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Remediations
> File
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Remediations
>
Launch
Program
Work
Centers
>
Posture
> Policy
√ √ x x x x x x x x
Elements
>
Remediations
> Patch
Management
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Remediations
> USB
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
> Policy
Elements √ √ x x x x x x x x
>
Remediations
>
Windows
Update
Work
Centers
>
Posture
> Policy √ √ x x x x x x x x
Elements
>
Authorization
Profiles
Work
Centers
>
√ √ x x x x x x x x
Posture
> Policy
Sets
Work
Centers
>
Posture √ √ x x x x x x x x
>
Authentication
Policy
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Posture
>
Troubleshoot
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Posture
>
√ √ √ √ √ √ √ √ x x
Troubleshoot
>
Agentless
Posture
Troubleshooting
Work
Centers
√ √ √ √ √ √ √ √ x √
> Device
Administration
Work
Centers
> Device
√ √ x x x x x x x √
Administration
>
Overview
Work
Centers
> Device
Administration
√ √ x x x x x x x √
>
Overview
>
Introduction
Work
Centers
> Device
Administration
> √ √ x x x x x x x √
Overview
>
TACACS
Livelog
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
√ √ x x x x x x x √
>
Overview
>
Deployment
Work
Centers
> Device
√ √ x √ x x x x x √
Administration
>
Identities
Work
Centers
> Device
Administration √ √ x √ x x x x x √
>
Identities
> Users
Work
Centers
> Device
Administration √ √ x √ x x x x x √
> User
Identity
Groups
Work
Centers
> Device
√ √ x √ x x x x x √
Administration
> Ext Id
Sources
Work
Centers
> Device
Administration √ √ x x √ x x x x √
>
Network
Resources
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
>
√ √ x x x x x x x √
Network
Resources
>
Network
Devices
Work
Centers
> Device
Administration
>
Network √ √ x x √ x x x x √
Resources
>
Network
Device
Groups
Work
Centers
> Device
Administration
>
√ √ x x x x x x x √
Network
Resources
>
Default
Devices
Work
Centers
> Device
Administration
>
Network √ √ x x x x x x x √
Resources
>
TACACS
External
Servers
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
>
Network √ √ x x x x x x x √
Resources
>
TACACS
Server
Sequence
Work
Centers
> Device
√ √ x x x x x x x √
Administration
> Policy
Elements
Work
Centers
> Device
Administration
√ √ x x x x x x x √
> Policy
Elements
>
Conditions
Work
Centers
> Device
Administration
> Policy
Elements
√ √ x x x x x x x √
>
Conditions
>
Authentication
Simple
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
> Policy
Elements √ √ x x x x x x x √
>
Conditions
>
Library
Conditions
Work
Centers
> Device
Administration
> Policy
√ √ x x x x x x x √
Elements
>
Conditions
> Smart
Conditions
Work
Centers
> Device
Administration
> Policy
Elements
√ √ x x x x x x x √
>
Conditions
>
Authorization
Simple
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
> Policy
Elements
√ √ x x x x x x x √
>
Conditions
>
Authorization
Compound
Conditions
Work
Centers
> Device
Administration
> Policy √ √ x x x x x x x √
Elements
>
Network
Conditions
Work
Centers
> Device
Administration
> Policy
Elements
> √ √ x x x x x x x √
Network
Conditions
>
Endstation
Network
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
> Policy
Elements
√ √ x x x x x x x √
>
Network
Conditions
> Device
Network
Conditions
Work
Centers
> Device
Administration
> Policy
Elements
> √ √ x x x x x x x √
Network
Conditions
> Device
Port
Network
Conditions
Work
Centers
> Device
Administration
√ √ x x x x x x x √
> Policy
Elements
>
Results
Work
Centers
> Device
Administration
> Policy
Elements √ √ x x x x x x x √
>
Results
>
Allowed
Protocols
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Device
Administration
> Policy
Elements
√ √ x x x x x x x √
>
Results
>
TACACS
Command
Sets
Work
Centers
> Device
Administration
> Policy
Elements √ √ x x x x x x x √
>
Results
>
TACACS
Profiles
Work
Centers
> Device
Administration
√ √ x x x x x x x √
> Device
Admin
Policy
Sets
Work
Centers
> Device
√ √ √ √ √ √ √ √ x √
Administration
>
Reports
Work
Centers
> Device
√ √ x x x x x x x √
Administration
>
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
√ √ √ x x x x x x x
>
PassiveID
Work
Centers
>
√ √ x x x x x x x x
PassiveID
>
Overview
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Overview
>
Introduction
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Overview
>
Dashboard
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Overview
> Live
Sessions
Work
Centers
>
√ √ √ x x x x x x x
PassiveID
>
Troubleshoot
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ x x x x x x x x
PassiveID
>
Certificates
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Certificates
> System
Certificates
Work
Centers
>
PassiveID
> √ √ x x x x x x x x
Certificates
> OCSP
Client
Profile
Work
Centers
>
PassiveID
>
Certificates √ √ x x x x x x x x
>
Certificate
Periodic
Check
Settings
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Certificates
> Issued
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
PassiveID
>
√ √ x x x x x x x x
Certificates
>
Internal
CA
Settings
Work
Centers
>
PassiveID
> √ √ x x x x x x x x
Certificates
>
Certificate
Templates
Work
Centers
>
PassiveID
> √ √ x x x x x x x x
Certificates
>
Trusted
Certificates
Work
Centers
>
PassiveID
>
√ √ x x x x x x x x
Certificates
>
Certificate
Signing
Requests
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Certificates
>
Overview
Work
Centers
>
PassiveID
>
√ √ x x x x x x x x
Certificates
>
Certificate
Authority
Certificates
Work
Centers
>
√ √ √ x x x x x x x
PassiveID
>
Reports
Work
Centers
>
√ √ x x x x x x x x
PassiveID
>
Providers
Work
Centers
>
PassiveID √ √ x x x x x x x x
>
Providers
> Agents
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
PassiveID √ √ x x x x x x x x
>
Providers
> SPAN
Work
Centers
>
PassiveID
> √ √ x x x x x x x x
Providers
>
Mapping
Filters
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Providers
> Active
Directory
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Providers
> API
Providers
Work
Centers
>
PassiveID
√ √ x x x x x x x x
>
Providers
> Syslog
Providers
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
PassiveID
> √ √ x x x x x x x x
Providers
>
Endpoint
Probes
Work
Centers
>
√ √ x x x x x x x x
PassiveID
>
Subscribers
Work
Centers √ √ √ √ √ √ √ √ √ x
> BYOD
Work
Centers
> BYOD √ √ x x x x x x x x
>
Overview
Work
Centers
> BYOD
√ √ x x √ x x x x x
>
Network
Devices
Work
Centers
> BYOD √ √ x x x x x x x x
> Client
Provisioning
Work
Centers
> BYOD
> Client √ √ x x x x x x x x
Provisioning
>
Resources
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> Client
√ √ x x x x x x x x
Provisioning
> Client
Provisioning
Policy
Work
Centers
> BYOD √ √ x x x x x x x x
> Policy
Elements
Work
Centers
> BYOD
> Policy √ √ x x x x x x x x
Elements
>
Results
Work
Centers
> BYOD
> Policy
Elements
√ √ x x x x x x x x
>
Results
>
Authorization
Profiles
Work
Centers
> BYOD
> Policy
Elements
√ √ x x x x x x x x
>
Results
>
Allowed
Protocols
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> Policy
Elements
√ √ x x x x x x x x
>
Results
>
Downloadable
ACLs
Work
Centers
> BYOD
> Policy √ √ x x x x x x x x
Elements
>
Conditions
Work
Centers
> BYOD
> Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Authentication
Simple
Conditions
Work
Centers
> BYOD
> Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Authorization
Simple
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> Policy
Elements
√ √ x x x x x x x x
>
Conditions
>
Library
Conditions
Work
Centers
> BYOD
> Policy
Elements √ √ x x x x x x x x
>
Conditions
> Smart
Conditions
Work
Centers
> BYOD
> Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Authorization
Compound
Conditions
Work
Centers
> BYOD √ √ x x x x x x x x
> Policy
Sets
Work
Centers
> BYOD
√ √ x x x x x x x x
>
Authentication
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD √ √ √ √ √ √ √ √ x x
>
Reports
Work
Centers
> BYOD √ √ x x x x x x x x
>
Settings
Work
Centers
> BYOD
>
Settings √ √ x x x x x x x x
>
Employee
Registered
Devices
Work
Centers
> BYOD
> √ √ x x x x x x x x
Settings
> Client
Provisioning
Work
Centers
> BYOD
> √ √ x x x x x x x x
Settings
> Retry
URL
Work
Centers
> BYOD √ √ x √ x x x x x x
>
Identities
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> √ √ x √ x x x x x x
Identities
>
Endpoints
Work
Centers
> BYOD
>
Identities √ √ x √ x x x x x x
>
Identity
Source
Sequences
Work
Centers
> BYOD
>
Identities √ √ x √ x x x x x x
>
Network
Access
Users
Work
Centers
> BYOD
√ √ x √ x x x x x x
>
Identity
Groups
Work
Centers
> BYOD √ √ x √ x x x x x x
> Ext Id
Sources
Work
Centers
> BYOD
√ √ x x x x x x √ x
> Portals
&
Components
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> Portals
√ √ x x x x x x √ x
&
Components
> BYOD
Portals
Work
Centers
> BYOD
> Portals
&
√ √ x x x x x x √ x
Components
>
Blocked
List
Portal
Work
Centers
> BYOD
> Portals
& √ √ x x x x x x √ x
Components
> My
Devices
Portals
Work
Centers
> BYOD
> Portals
√ √ x x x x x x x x
&
Components
>
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
> Portals
&
Components √ √ x x x x x x x x
>
Certificates
>
Certificate
Templates
Work
Centers
> BYOD
> Portals
&
Components
√ √ x x x x x x x x
>
Certificates
>
Internal
CA
Settings
Work
Centers
> BYOD
> Portals
&
Components
√ √ x x x x x x x x
>
Certificates
>
External
CA
Templates
Work
Centers
> BYOD √ √ x x x x x x x x
> Policy
Sets
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> BYOD
√ √ x x x x x x x x
>
Authorization
Policy
Work
Centers
> BYOD
> √ √ x x x x x x x x
Custom
Portal
Files
Work
Centers
> √ √ √ √ √ √ √ √ x x
Network
Access
Work
Centers
>
Network √ √ x x x x x x x x
Access >
Policy
Sets
Work
Centers
>
Network √ √ x x x x x x x x
Access >
Policy
Sets
Work
Centers
>
Network √ √ x x x x x x x x
Access >
Authentication
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Network
Access >
Reports
Work
Centers
>
√ √ x x x x x x x x
Network
Access >
Settings
Work
Centers
>
Network
√ √ x x x x x x x x
Access >
Settings
> Client
Provisioning
Work
Centers
>
Network
Access > √ √ x x x x x x x x
Settings
>
Collection
Filters
Work
Centers
>
Network
√ √ x x x x x x x x
Access >
Settings
>
Protocols
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
√ √ x x x x x x x x
Settings
>
Protocols
> EAP
TLS
Work
Centers
>
Network
Access >
√ √ x x x x x x x x
Settings
>
Protocols
>
EAP-FAST
Work
Centers
>
Network
Access >
Settings
√ √ x x x x x x x x
>
Protocols
>
EAP-FAST
> EAP
FAST
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
Settings
> √ √ x x x x x x x x
Protocols
>
EAP-FAST
>
Generate
PAC
Work
Centers
>
Network
Access > √ √ x x x x x x x x
Settings
>
Protocols
> PEAP
Work
Centers
>
Network
Access >
√ √ x x x x x x x x
Settings
>
Protocols
>
RADIUS
Work
Centers
>
Network
√ √ x x x x x x x x
Access >
Settings
> Proxy
Settings
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
√ √ x x x x x x x x
Network
Access >
Dictionaries
Work
Centers
>
√ √ x x x x x x x x
Network
Access >
Overview
Work
Centers
>
Network
√ √ x x x x x x x x
Access >
Overview
>
Introduction
Work
Centers
>
Network
Access > √ √ x x x x x x x x
Overview
>
RADIUS
Livelog
Work
Centers
>
√ √ x √ x x x x x x
Network
Access >
Identities
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
√ √ x √ x x x x x x
Access >
Identities
>
Endpoints
Work
Centers
>
Network
Access >
√ √ x √ x x x x x x
Identities
>
Network
Access
Users
Work
Centers
>
Network
Access >
√ √ x √ x x x x x x
Identities
>
Identity
Source
Sequences
Work
Centers
>
Network √ √ x √ x x x x x x
Access >
Id
Groups
Work
Centers
>
Network √ √ x √ x x x x x x
Access >
Ext Id
Sources
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network √ √ x x √ x x x x x
Access >
Network
Resources
Work
Centers
>
Network
Access >
√ √ x x √ x x x x x
Network
Resources
>
Network
Devices
Work
Centers
>
Network
Access > √ √ x x √ x x x x x
Network
Resources
> Device
Groups
Work
Centers
>
Network
Access >
√ √ x x √ x x x x x
Network
Resources
>
Default
Device
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
Network √ √ x x √ x x x x x
Resources
>
External
RADIUS
Servers
Work
Centers
>
Network
Access >
Network √ √ x x √ x x x x x
Resources
>
RADIUS
Server
Sequences
Work
Centers
>
Network
Access >
Network √ √ x x x x x x x x
Resources
>
External
MDM
Servers
Work
Centers
>
Network √ √ x x x x x x x x
Access >
Policy
Elements
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access > √ √ x x x x x x x x
Policy
Elements
>
Conditions
Work
Centers
>
Network
Access >
Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Authentication
Simple
Conditions
Work
Centers
>
Network
Access >
Policy
√ √ x x x x x x x x
Elements
>
Conditions
>
Library
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
Policy √ √ x x x x x x x x
Elements
>
Conditions
> Smart
Conditions
Work
Centers
>
Network
Access >
Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Authorization
Simple
Conditions
Work
Centers
>
Network
Access >
Policy
Elements √ √ x x x x x x x x
>
Conditions
>
Authorization
Compound
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
Policy
√ √ x x x x x x x x
Elements
>
Conditions
> Time
and Date
Conditions
Work
Centers
>
Network
Access > √ √ x x x x x x x x
Policy
Elements
>
Results
Work
Centers
>
Network
Access >
Policy
√ √ x x x x x x x x
Elements
>
Results
>
Allowed
Protocols
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access >
Policy
√ √ x x x x x x x x
Elements
>
Results
>
Authorization
Profiles
Work
Centers
>
Network
Access >
Policy
√ √ x x x x x x x x
Elements
>
Results
>
Downloadable
ACLs
Work
Centers
>
Network √ √ x x x x x x x x
Access >
Authorization
Policy
Work
Centers
>
√ √ √ √ √ √ √ √ x x
Network
Access >
Troubleshoot
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
>
Network
Access > √ x x x x x x x x x
Troubleshoot
>
EndPoint
Debug
Work
Centers
>
Network
√ x x x x x x x x x
Access >
Troubleshoot
> TCP
Dump
Work
Centers
>
Network
Access > √ √ √ √ √ √ √ √ x x
Troubleshoot
>
Collection
Filters
Work
Centers
>
Network
Access >
√ √ √ √ √ √ √ √ x x
Troubleshoot
>
RADIUS
Authentication
Troubleshooting
Work
Centers
√ √ √ √ √ √ √ √ √ x
> Guest
Access
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest √ √ x x x x x x x x
Access >
Overview
Work
Centers
> Guest √ √ x x x √ x x x x
Access >
Administration
Work
Centers
> Guest
Access >
√ √ x x x √ x x x x
Administration
> SMS
Gateway
Providers
Work
Centers
> Guest
Access > √ √ x x x √ x x x x
Administration
>
Certificates
Work
Centers
> Guest
Access >
Administration √ √ x x x √ x x x x
>
Certificates
> System
Certificates
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Administration
>
√ √ x x x √ x x x x
Certificates
>
Certificate
Periodic
Check
Settings
Work
Centers
> Guest
Access >
Administration
> √ √ x x x √ x x x x
Certificates
>
Certificate
Signing
Requests
Work
Centers
> Guest
Access > √ √ x x x √ x x x x
Administration
> SMTP
Server
Work
Centers
> Guest
Access > √ √ x x x x x x √ x
Portals
&
Components
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Portals √ √ x x x x x x √ x
&
Components
> Guest
Types
Work
Centers
> Guest
Access >
Portals
√ √ x x x x x x √ x
&
Components
>
Sponsor
Portals
Work
Centers
> Guest
Access >
Portals √ √ x x x x x x √ x
&
Components
> Guest
Portals
Work
Centers
> Guest
Access >
Portals
√ √ x x x x x x √ x
&
Components
>
Sponsor
Groups
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Policy
Sets
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Authorization
Policy
Work
Centers
> Guest
Access > √ √ x x x x x x x x
Custom
Portal
Files
Work
Centers
> Guest √ √ x x x x x x x x
Access >
Identities
Work
Centers
> Guest
Access > √ √ x x x x x x x x
Identities
>
Endpoints
Work
Centers
> Guest
Access >
Identities √ √ x x x x x x x x
>
Network
Access
Users
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Identities √ √ x x x x x x x x
>
Identity
Source
Sequences
Work
Centers
> Guest
√ √ x √ x x x x x x
Access >
Identity
Groups
Work
Centers
> Guest
√ √ x √ x x x x x x
Access >
Ext Id
Sources
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Network
Devices
Work
Centers
> Guest
√ √ x x x x x x √ x
Access >
Manage
Accounts
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Policy
Elements
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
√ √ x x x x x x x x
Policy
Elements
>
Conditions
Work
Centers
> Guest
Access >
Policy
Elements
√ √ x x x x x x x x
>
Conditions
>
Authorization
Simple
Conditions
Work
Centers
> Guest
Access >
Policy
Elements
> √ √ x x x x x x x x
Conditions
>
Common
Time
and Date
Conditions
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Policy
Elements
√ √ x x x x x x x x
>
Conditions
>
Authorization
Compound
Conditions
Work
Centers
> Guest
Access >
√ √ x x x x x x x x
Policy
Elements
>
Results
Work
Centers
> Guest
Access >
Policy
Elements √ √ x x x x x x x x
>
Results
>
Allowed
Protocols
Work
Centers
> Guest
Access >
Policy
Elements √ √ x x x x x x x x
>
Results
>
Downloadable
ACLs
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Policy
Elements √ √ x x x x x x x x
>
Results
>
Authorization
Profiles
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Policy
Sets
Work
Centers
> Guest
√ √ x x x x x x x x
Access >
Authentication
Policy
Work
Centers
> Guest √ √ √ √ √ √ √ √ x x
Access >
Reports
Work
Centers
> Guest √ √ x x x x x x √ x
Access >
Settings
Work
Centers
> Guest
Access >
√ √ x x x x x x √ x
Settings
> Guest
Password
Policy
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Settings √ √ x x x x x x √ x
> Guest
Account
Purge
Policy
Work
Centers
> Guest
Access >
√ √ x x x x x x √ x
Settings
> Guest
Email
Settings
Work
Centers
> Guest
Access >
√ √ x x x x x x √ x
Settings
> Guest
Username
Policy
Work
Centers
> Guest
Access > √ √ x x x x x x √ x
Settings
>
Logging
Work
Centers
> Guest
Access >
√ √ x x x x x x √ x
Settings
>
Custom
Fields
Menus Super Policy Helpdesk Identity Network System RBAC MnT Customization TACACS+
and Admin Admin Admin Admin Admin Admin Admin Admin Admin Admin
Submenus Menu Menu Menu Menu Menu Menu Menu Menu Menu Menu
Access Access Access Access Access Access Access Access Access Access
Work
Centers
> Guest
Access >
Settings √ √ x x x x x x √ x
> Guest
Locations
and
SSIDs
Work
Centers √ √ √ x x x x x x x
> GPC
Wizard √ x x x x x x x x x
Settings √ x x x x x x x x x
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access >
Authorization > Permissions > Menu Access
Step 2 Click Add, and enter values for the Name and Description fields.
a) Expand the ISE Navigation Structure menu to the required level, and click the options for which you want to create
permissions.
b) In the Permissions for Menu Access pane, click Show.
Step 3 Click Submit.
independent of the default network device group objects. You should assign the network device objects to
the newly created network devices groups to create restricted access.
Note You can enable or restrict data access permissions only for the User Identity Groups, Network Device Groups,
and Endpoint Identity Groups, but not to Admin Groups.
If you have read-only permission for a data type (for example, Endpoint Identity Groups), you will not be
able to perform CRUD operations on that data type. If you have read-only permission for an object (for
example, GuestEndpoints), you cannot perform edit or delete operations on that object.
The following image shows how data access privileges are applied at the second-level or third-level menu
that contains additional submenus or options for different RBAC groups.
Label Description
1 Denotes full access for the User Identity Groups data type.
2 Denotes that Endpoint Identity Groups derive the maximum permission (full access)
that is granted to its child (Asia, in the example shown in the figure).
4 Denotes that the parent (Continents) derives the maximum access permission granted
to its child (Asia).
6 Denotes that when full access is granted to the parent (Network Device Groups), it
results in the children automatically inheriting permissions.
7 Denotes that when full access is granted to the parent (Asia), it results in the objects
inheriting the Full Access permission, unless permissions are explicitly granted to the
objects.
The following table shows the default data access permissions for different admin groups.
√: Denotes that a user has full access
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Admin √ x x x √ √ x x !
Groups
Admin √ x x x √ √ x x !
Groups
> Super
Admin
Admin √ x x x √ √ x x !
Groups
> Policy
Admin
Admin √ x x x √ √ x x !
Groups
>
Helpdesk
Admin
Admin √ x x x √ √ x x !
Groups
>
Identity
Admin
Admin √ x x x √ √ x x !
Groups
>
Network
Device
Admin
Admin √ x x x √ √ x x !
Groups
> System
Admin
Admin √ x x x √ √ x x !
Groups
> RBAC
Admin
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Admin √ x x x √ √ x x !
Groups
> MnT
Admin
Admin √ x x x √ √ x x !
Groups
> ERS
Admin
Admin √ x x x √ √ x x !
Groups
> ERS
Operator
Admin √ x x x √ √ x x !
Groups
>
Customization
Admin
Admin √ x x x √ √ x x !
Groups
>
TACACS+
Admin
Admin √ x x x √ √ x x !
Groups
> Read
Only
Admin
Admin √ x x x √ √ x x !
Groups
>
Elevated
System
Admin
Admin √ x x x √ √ x x !
Groups
> SPOG
Admin
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Admin √ x x x √ √ x x !
Groups
> ERS
Trustsec
User √ √ √ x x x √ √ !
Identity
Groups
User √ √ √ x x x √ √ !
Identity
Groups
>
GuestType_Weekyl
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
OWN_ACCOUNTS
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
GROUP_ACCOUNTS
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
GuestType_SocaiL
l ogn
i
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
Employee
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
User √ √ √ x x x √ √ !
Identity
Groups
>
GuestType_Daily
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
GuestType_Contractor
(default)
User √ √ √ x x x √ √ !
Identity
Groups
>
ALL_ACCOUNTS
(default)
Endpoint √ √ √ x x x √ x !
Identity
Groups
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Blocked
List
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
GuestEndpoints
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
RegisteredDevices
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Unknown
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Sony-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Csico-Merak-iDevcie
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Wnidows11-Workstaotin
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Apple-iDevice
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
BlackBerry
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Android
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Axis-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Juniper-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Epson-Device
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Synology-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Vizio-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Trendnet-Device
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Cisco-IP-Phone
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
OS_X_BgiSurW
- orksatoitn
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Endpoint √ √ √ x x x √ x !
Identity
Groups
>
Profiled
>
Workstation
Network √ x x √ x x x √ !
Device
Groups
Network √ x x √ x x x √ !
Device
Groups
> All
Locations
Network √ x x √ x x x √ !
Device
Groups
> All
Locations
> Asia
Network √ x x √ x x x √ !
Device
Groups
> All
Locations
> Asia >
India
Network √ x x √ x x x √ !
Device
Groups
> Is
IPSEC
Device
Menus Super Policy Identity Network System RBAC Customization TACACS+ Read
and Admin Admin Admin Admin Admin Admin Admin Data Admin Only
Submenus Data Data Data Data Data Data Access Data Admin
Access Access Access Access Access Access Access Data
Access
Network √ x x √ x x x √ !
Device
Groups
> Is
IPSEC
Device >
Yes
Network √ x x √ x x x √ !
Device
Groups
> Is
IPSEC
Device >
No
Network √ x x √ x x x √ !
Device
Groups
> All
Device
Types
Customization NA NA NA NA NA NA √ NA NA
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authorization >
Permissions
Step 2 Choose Permissions > Data Access.
Step 3 Click Add, and enter values for the Name and Description fields.
a) Click to expand the admin group and select the corresponding admin group.
b) Click Full Access, Read Only Access, or No Access.
Step 4 Click Save.
deployments. The Read-Only Admin policy is applicable to the Read-Only Admin group. By default, Super
Admin Menu Access and Read-Only Data Access permissions are granted to Read-Only administrators. This
policy cannot be duplicated and the associated Data Access permission cannot be edited.
Note • The default read-only policy is mapped to the Read Only Admin group. You cannot create custom RBAC
policy using the Read Only Admin group.
• Cisco ISE supports the read-only functionality based on the static check of Read-Only Admin Group
only.
Cisco ISE Release 3.0 and later releases do not support legacy licenses, such as Base, Plus, and Apex licenses,
that were used in Cisco ISE Release 2.x. Cisco ISE Release 3.x licenses are managed entirely through a
centralized database that is called the Cisco Smart Software Manager (CSSM). You can register, activate, and
manage all your licenses easily and efficiently with single-token registration.
To maximize economy for customers, licensing in Cisco ISE is supplied in the following packages:
• Tier Licenses
From Cisco ISE Release 3.0, a new set of licenses that are called Tier Licenses replace the Base, Apex,
and Plus licenses used in releases earlier than Release 3.0. Tier Licenses include three licenses—Essentials,
Advantage, and Premier.
If you currently have Base, Apex, or Plus licenses, use the CSSM to convert them into the new license
types.
• Device Administration Licenses
Policy Service nodes (PSN) that have the TACACS+ persona enabled on them use Device Administration
licenses.
• Virtual Appliance Licenses
Virtual appliance licenses are available in three forms, VM Small, VM Medium, and VM Large.
If a virtual appliance is used, but your Cisco ISE does not have an active VM license, you receive warnings
and notifications of noncompliant license consumption until you procure and install a VM license.
However, Cisco ISE services are not interrupted.
• Evaluation Licenses
The Evaluation license is enabled by default when you first install Cisco ISE Release 3.0 and later releases
and support up to 100 endpoints. Evaluation licenses are 90-day licenses that give you access to all the
Cisco ISE features. During the evaluation period, license consumption is not reported to the CSSM.
If you are upgrading to Cisco ISE Release 3.0 and later releases with Base, Apex, and Plus licenses smart
licenses, your smart licenses are upgraded to the new license types in Cisco ISE. However, you must register
the new license types in CSSM to activate the licenses in the Cisco ISE release that you upgrade to.
If you own traditional Cisco ISE licenses, you must convert them to smart licenses to enable license consumption
in Cisco ISE Release 3.0 and later releases. To convert Cisco ISE 2.x licenses to the new license types, open
a case online through the Support Case Manager at http://cs.co/scmswl, or use the contact information that is
provided at http://cs.co/TAC-worldwide.
Notifications about noncompliant license consumption are also displayed in Cisco ISE. If your license
consumption is out of compliance for 45 days in a 60-day period, you will lose all administrative control of
Cisco ISE until you purchase and activate the required licenses.
When upgrading from one licensing package to another, Cisco ISE continues to offer all the features that were
available in the earlier package before the upgrade. However, you do have to reconfigure any settings that
you had already configured. For example, if you currently use an Essentials license and later add an Advantage
license, the features that are already configured using the Essentials license will not change.
You should update your license agreements if:
• The evaluation period has ended, and you have not yet registered your license.
• Your license has expired.
• The endpoint consumption exceeds your licensing agreement.
Tier Licenses
The following table specifies what the new Tier Licenses enable.
Advantage • All the features that are enabled by the Cisco ISE Essentials license.
• Bring Your Own Device (BYOD) device registration and provisioning, with a
built-in certification authority. Device registration occurs through the configured
My Devices portals.
• Security Group Tagging, TrustSec, and Cisco Application-Centric Infrastructure
(ACI) integration.
• Profiling services, including basic asset visibility and enforcement features.
• Feed services.
• Context sharing (such as pxGrid), and security ecosystem integrations.
• Rapid Threat Containment, using Adaptive Network Control and context-sharing
services.
Premier • All the features that are enabled by the Cisco ISE Essentials and Advantage
licenses.
• Posture visibility and enforcement.
• Compliance visibility and enforcement through Enterprise Mobility Management
and Mobile Device Management.
• Threat-Centric Network Access Control visibility and enforcement.
Note You may witness higher Cisco ISE license consumption count if the privacy settings in endpoints permit
MAC randomization or rotating and changing MAC. When an endpoint authenticates with a new random
MAC address, a new Cisco ISE session is created.
VM Small 16 GB 12 CPUs
VM Medium 64 GB 16 CPUs
For example, if you are using a 3595-equivalent VM node with 16 CPUs and 64-GB RAM, you need a VM
Medium license to enable Cisco ISE services on this VM node. Even if you only have VM Small licenses
registered and activated, Cisco ISE will register the consumption of a VM Medium license by the VM node.
This is because the license consumed is determined by the RAM and CPU specifications of the VM node.
You will then receive warnings and notifications of noncompliant license consumption until you procure and
install the required VM licenses. However, Cisco ISE services are not interrupted.
You can install multiple VM licenses based on the number of VMs in your deployment and their resources.
VM licenses are infrastructure licenses. Therefore, you can install VM licenses irrespective of the endpoint
licenses available in your deployment. However, in order to use the features enabled by the Tier licenses, you
must also install the appropriate Tier licenses.
After installing or upgrading to Cisco ISE Release 2.4 or later releases, if there is any mismatch between the
number of deployed VM nodes and installed VM licenses, alarms are displayed in the Alarms dashlet in the
Home page every 14 days. Alarms are also displayed if there are any changes in the VM node’s resources,
and when a VM node is registered or deregistered.
VM licenses are perpetual licenses. VM licensing changes are displayed every time you log in to the Cisco
ISE GUI, until you check the Do not show this message again check box in the dialog box displayed.
Evaluation Licenses
Evaluation licenses are activated by default when you install or upgrade to Cisco ISE Release 3.0 and later
releases and support up to 100 endpoints. The Evaluation license is active for 90 days, and you have access
to all the Cisco ISE features during this time. Cisco ISE is considered to be in Evaluation mode when the
Evaluation license is in use.
The Cisco ISE GUI displays messages with the number of days that are left in the Evaluation mode.
Note You must purchase and register Cisco ISE licenses by the end of the Evaluation mode to continue using the
Cisco ISE features that you need.
Note CSSM satellite is not supported in Cisco ISE Releases 3.0 Patch 1 and earlier.
Cisco ISE takes internal samples of license consumption every 30 minutes. License compliancy and
consumption is updated accordingly. To view this information in the Licenses table in Cisco ISE, from the
main menu, choose Administration > System > Licensing, and click Refresh.
From the time you register your Cisco ISE Primary Administration node (PAN) with the CSSM, Cisco ISE
reports peak counts of license consumption to the CSSM server every six hours. The peak count reports help
ensure that license consumption in Cisco ISE is in compliance with the licenses purchased and registered.
Cisco ISE communicates with the CSSM server by storing a local copy of the CSSM certificate. The CSSM
certificate is automatically reauthorized during the daily synchronization, and when you refresh the Licenses
table. Typically, CSSM certificates are valid for six months.
If there is a change in the compliance status when Cisco ISE synchronizes with the CSSM server, the Last
Authorization column of the Licenses table is updated accordingly. In addition, when entitlements are no
longer compliant, the number of days for which they are out of compliancy appears in the Days Out of
Compliancy column. Noncompliancy is also indicated in the notifications displayed at the top of the Licensing
area, and on the Cisco ISE toolbar next to the License Warning link. In addition to notifications, you can
view alarms.
Note Device Admin licenses are authorized when Cisco ISE communicates with the CSSM server, but they are not
session-based, and therefore, no consumption count is associated with them in the Licenses table.
The compliance column of the Licenses table displays one of the following values:
• In Compliance: The use of this license is in compliance.
• Released Entitlement: The licenses have been purchased and released for use, but none have been
consumed so far in this Cisco ISE deployment. In such a scenario, the Consumption Count for the
license is 0.
• Evaluation: Evaluation licenses are available for use.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Licensing.
Step 2 In the Licensing window that is displayed, click Registration Details.
Step 3 In the Registration Details area that is displayed, enter the registration token that you received from CSSM, in the
Registration Token field.
Step 4 Choose a connection method from the Connection Method drop-down list:
• Direct HTTPS if you have configured a direct connection to the internet.
• HTTPS Proxy if you do not have a direct connection to the internet and need to use a proxy server. (If you change
your proxy server configuration after you register Cisco ISE Smart Licenses, you must update your Smart Licenses
configuration in the Licensing window. Cisco ISE establishes a connection with the CSSM using the updated proxy
server, avoiding disruption of Cisco ISE services.)
• Transport Gateway is the recommended option. If you have configured a Transport Gateway, this connection is
chosen by default. To choose another connection method, you must remove the Transport Gateway configuration.
• SSM On-Prem Server to connect to the configured SSM on-prem server. This option is available in Cisco ISE
Release 3.0 Patch 2 and later. See Smart Licensing for Air-Gapped Networks, on page 152.
Step 5 In the Tier and Virtual Appliance areas, check the check boxes for all the licenses you need to enable. The chosen
licenses are activated and their consumption is tracked by CSSM.
Step 6 Click Register.
Step 1 (Optional) When you first install Cisco ISE Release 3.0 and later releases, all the license entitlements are enabled
automatically as part of the Evaluation mode. After you register your license token, if your CSSM account does not
include certain entitlements and you did not disable them during registration, noncompliant notifications are displayed
in Cisco ISE. Add those entitlements to your CSSM account (contact your CSSM account representative for assistance),
and then, in the Licenses table, click Refresh to remove noncompliant notifications and continue to use the related
features. After you refresh the authorization, log out and then log back in to Cisco ISE for the relevant noncompliancy
messages to be removed.
Step 2 (Optional) If the daily automatic authorization does not succeed for any reason, noncompliancy messages may appear.
Click Refresh to reauthorize your entitlements. After you refresh the authorization, log out and then log back in to Cisco
ISE for the relevant noncompliancy messages to be removed.
Step 3 (Optional) When you first install Cisco ISE Release 3.0 and later releases, all license entitlements are enabled automatically
as part of the evaluation period. After you register your token, if your CSSM account does not include certain entitlements
and you did not disable them during registration, you can still disable those entitlements from Smart Licensing in ISE in
order to avoid unnecessary noncompliant notifications. From the Licenses table, check the check boxes for the license
entitlements that are not included in your token, and click Disable from the toolbar. After you have disabled license
entitlements, log out and then log back in to Cisco ISE for the relevant features to be removed from the menus and for
the noncompliancy messages to be removed.
Step 4 (Optional) After you add entitlements to your account, enable those entitlements. From the Licenses table, check the
check boxes for the required disabled licenses, and click Enable from the toolbar.
Step 5 (Optional) The registration certificate is automatically refreshed every six months. To manually refresh your Smart
Licensing certificate registration, click Renew Registration at the top of the Licensing window.
Step 6 (Optional) To remove your Cisco ISE registration (indicated by UDIs) from your Smart Account, but continue to use
Smart Licensing till the end of the evaluation period, click Deregister at the top of the Cisco Smart Licensing area. You
can do this, for example, if you need to change the UDIs you have indicated as part of the registration process. If you
still have time remaining in your evaluation period, Cisco ISE remains in Smart Licensing. If your evaluation period is
at an end, a notification appears when the browser is refreshed. After you deregister your smart license, you can follow
the registration process again in order to register with the same or different UDIs.
Step 7 (Optional) To remove your Cisco ISE registration (indicated by UDIs) from your Smart Account entirely, and to revert
to traditional licensing, click Disable at the top of the Cisco Smart Licensing area. You can do this, for example, if you
need to change the UDIs you have indicated as part of the registration process. After you disable the smart license, follow
the registration process again in order to activate and register with the same or different UDIs.
Note The licensing alarm is displayed for about 60 days from the first occurrence of noncompliant license use even
if you fix the licensing issue by registering the necessary licenses.
If the use of all three Tier licenses is out of compliance for 45 days in a 60-day period, administrative control
of Cisco ISE is lost until you register the correct licenses. You will be able to access only the Licensing
window in the Cisco ISE administration portal until the correct licenses are registered. However, Cisco ISE
continues to handle authentications.
Possible Causes
Because of the configuration of an authorization policy, the Licensing table reports that Cisco ISE has used
a license that you have not purchased and registered. Before you purchase an Advantage or Premier license,
the Cisco ISE administration portal does not display the features covered by these licenses. However, after
you purchase these licenses, the GUI continues to display the features that the licenses enable even after the
license has expired or endpoint consumption of the license has exceeded a set limit. Thus, you can configure
the features even if you do not currently have a valid license for them.
Solution
In the Cisco ISE administration portal, click the Menu icon ( ) and choose Policy > Policy Sets, identify
the authorization rule that is using the feature for which you do not have a registered license, and reconfigure
that rule.
Cisco ISE is unable to report license usage to CSSM, and this lack of reporting results in the loss of
administrative access to Cisco ISE and restrictions in Cisco ISE features.
To avoid licensing issues in air-gapped networks and enable full Cisco ISE functionality, you can configure
a Smart Software Manager (SSM) On-Premises server. This licensing method is available in Cisco ISE Release
3.0 Patch 2 and later releases.
You must configure an SSM On-Prem server and ensure that Cisco ISE can reach this server. This server
takes over the role of CSSM in your air-gapped network, releasing license entitlements, as needed, and tracking
usage metrics. The SSM On-Prem server also sends notifications, alarms, and warning messages that are
related to licensing consumption and validity.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Licensing.
Step 2 Click Registration Details.
Step 3 In the Registration Details area that is displayed, in the Registration Token field, enter the registration token that you
received from CSSM.
Step 4 From the Connection Method drop-down list, choose SSM On-Prem server .
The Certificate window in the SSM On-Prem portal displays either the IP address or the hostname (or FQDN) of the
connected SSM On-Prem server.
Step 5 In the SSM On-Prem server Host field, enter the configured IP address or the hostname (or FQDN).
Step 6 In the Tier and Virtual Appliance areas, check the check boxes for all the licenses you want to enable. The chosen
licenses are activated and their consumption is tracked by CSSM.
Step 7 Click Register.
Note Ensure that port 443 and the port used for ICMP communication are open while registering Cisco ISE with the
SSM On-Prem server.
• Service: A service is a specific feature that a persona provides, such as network access, profiler, posture,
security group access, monitoring and troubleshooting, and so on.
• Node: A node is an individual instance that runs the Cisco ISE software. Cisco ISE is available as an
appliance and also as a software that can be run on VMware. Each instance (appliance or VMware) that
runs the Cisco ISE software is called a node.
• Persona: The persona of a node determines the services provided by the node. A Cisco ISE node can
assume any of the following personas: Administration, Policy Service, Monitoring, and pxGrid. The
menu options that are available through the Admin portal are dependent on the role and personas that a
Cisco ISE node assumes.
• Deployment Model: Determines if your deployment is distributed, standalone, or high availability in
standalone, which is a basic two-node deployment.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Check the check box next to the Cisco ISE node that you want to configure, and click Edit.
Step 3 Enter the values, as required, and click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
The Register button is disabled initially. To enable this button, configure a Primary PAN.
Step 2 Check the check box next to the current node, and click Edit.
Step 3 Click Make Primary to configure your primary PAN.
Step 4 Click Save to save the node configuration.
What to do next
1. Add secondary nodes to your deployment.
2. Enable the profiler service and configure the probes, if required.
within ISE check box in the Trusted Certificates window for the PAN to validate the secondary node's
certificate.
While registering a node with session services enabled (such as Network Access, Guest, Posture, and so on),
you can add it to a node group. See Create a Policy Service Node Group, on page 203 for more details.
Step 7 Check the check boxes to select the personas and services to be enabled on the node, and then click Save.
When a node is registered, an alarm (which confirms that a node has been added to the deployment) is generated on the
primary PAN. You can view this alarm in the Alarms dashlet in the Cisco ISE GUI Dashboard. After the registered
node is synchronized and restarted, you can log in to the secondary node GUI using the same credentials used on the
primary PAN.
What to do next
• For time-sensitive tasks such as guest user access and authorization, logging, and so on, ensure that the
system time on your nodes is synchronized.
• If you registered a secondary PAN, and are using the internal Cisco ISE CA service, you must back up
the Cisco ISE CA certificates and keys from the primary PAN and restore them on the secondary PAN.
, click the corresponding radio button to enable or disable the replication of the dynamically discovered
endpoints across all the nodes in your Cisco ISE deployment:
A full replication typically occurs when you first register a Cisco ISE node as a secondary node. Incremental
replication occurs after a full replication and ensures that any new changes, such as additions, modifications,
or deletions to the configuration data in the PAN are reflected in the secondary nodes. The process of replication
ensures that all the Cisco ISE nodes in a deployment are in sync. You can view the status of replication in the
Node Status column in the Deployment window of the Cisco ISE Admin portal. When you register a Cisco
ISE node as a secondary node or perform a manual synchronization with the PAN, the node status shows an
orange icon, indicating that the requested action is in progress. After the synchronization is complete, the
node status turns green, indicating that the secondary node is synchronized with the PAN.
Replication Stopped Node is connected but replication The underlying issue may resolve
has stopped. The node is reachable by itself. If not, log in to the Cisco
on ports 443 and 12001. ISE GUI and perform a manual
synchronization from the
This is a temporary status that will
Deployment window.
change when the underlying
replication issue is resolved.
Node Not Reachable Node is not reachable on port 443 The node may come back up by
but replication works fine. itself when the underlying issue
resolves. If not, log in to the Cisco
ISE GUI and perform a manual
synchronization from the
Deployment window.
Disconnected Node is not reachable and This status is set if the node is down
replication has stopped. for more than five minutes.
The node may come back up by
itself when the underlying issue
resolves. If not, log in to the Cisco
ISE GUI and perform a manual
synchronization from the
Deployment window.
that the reports and logs from the various nodes in your deployment are always synchronized with
timestamps.
• Configure the Cisco ISE administrator password when you install Cisco ISE. The previous Cisco ISE
administrator default login credentials (admin/cisco) are no longer valid. Use the username and password
that was created during the initial setup, or the current password if it was changed later.
• Configure the DNS server. Enter the IP addresses and fully qualified domain names (FQDNs) of all the
Cisco ISE nodes that are part of your distributed deployment in the DNS server. Otherwise, node
registration fails.
• Configure the forward and the reverse DNS lookup for all the Cisco ISE nodes in your distributed
deployment in the DNS server. Otherwise, you may run into deployment-related issues when registering
and restarting Cisco ISE nodes. Performance might be degraded if reverse DNS lookup is not configured
for all the nodes.
• (Optional) Deregister a secondary Cisco ISE node from the primary PAN to uninstall Cisco ISE from it.
• Back up the primary MnT, and restore the data to the new secondary MnT. This ensures that the history
of the primary MnT is in sync with the new MnT because the new changes are replicated.
• Ensure that the primary PAN and the standalone node that you are about to register as a secondary node
are running the same version of Cisco ISE.
• Enable Internal CA Settings on your Cisco ISE primary PAN before you add another node to your
deployment to ensure that the Cisco ISE certificate services function as expected. To enable Internal CA
Settings, click the Menu icon ( ) and choose Administration > System > Certificates > Certificate
Authority > Internal CA Settings.
• While adding a new node to the deployment, make sure that the issuer certificate chain of wildcard
certificates is part of the trusted certificates of the new node. When the new node is added to the
deployment, the wildcard certificates are replicated to the new node.
• When configuring your Cisco ISE deployment to support Cisco TrustSec, or when Cisco ISE is integrated
with Cisco Catalyst Center, do not configure a PSN as SXP-only. SXP is an interface between Cisco
TrustSec and non-Cisco TrustSec devices. SXP does not communicate with the Cisco TrustSec-enabled
network devices.
All Nodes • View and configure the system time and the NTP server settings.
• Install the server certificate and manage certificate signing request. You can
perform server certificate operations for all the nodes in the deployment through
the primary PAN that centrally manages all the server certificates.
Note The private keys are not stored in the local database and are not copied
from the relevant node. The private keys are stored in the local file system.
PSNs (Policy Options to join, leave, and test the Active Directory connection are available. Each
Service nodes) PSN must be separately joined to the Active Directory domain. You must first define
the domain information and join the PAN to the Active Directory domain. Then, join
the other PSNs to the Active Directory domain individually.
Personas (Only appears if the node type is Cisco ISE) Lists the personas that a Cisco ISE node
has assumed, for example, Administration, Policy Service, Monitoring, or pxGrid.
For example, Administration, Policy Service, Monitoring, or pxGrid.
Role Indicates the role (primary, secondary, or standalone) that the Administration and
Monitoring personas have assumed, if these personas are enabled on this node. The
role can be any one or more of the following:
• PRI(A): Refers to the primary PAN.
• SEC(A): Refers to the secondary PAN.
• PRI(M): Refers to the primary MnT.
• SEC(M): Refers to the secondary MnT.
Services (Only appears if the Policy Service persona is enabled) Lists the services that run on
this Cisco ISE node. Services can include any one of the following:
• Identity Mapping
• Session
• Profiling
• All
Node Status Indicates the status of each Cisco ISE node in a deployment for data replication:
• Green (Connected): Indicates that a Cisco ISE node, which is already registered
in the deployment, is in sync with the primary PAN.
• Red (Disconnected): Indicates that a Cisco ISE node is not reachable, is down,
or data replication is not happening.
• Orange (In Progress): Indicates that a Cisco ISE node is newly registered with
the primary PAN, you have performed a manual sync operation, or the Cisco ISE
node is not in sync (out of sync) with the primary PAN.
For more information, click the quick view icon for each Cisco ISE node in the Node
Status column.
Related Topics
Cisco ISE Distributed Deployment, on page 159
Cisco ISE Deployment Terminology, on page 155
Configure a Cisco ISE Node, on page 156
Register a Secondary Cisco ISE Node, on page 157
Menu icon ( ) and choose Administration > System > Deployment > Deployment Node > Edit > General
Settings.
If you configure one of your Monitoring nodes as primary or secondary, the other
Monitoring node automatically becomes the secondary or primary node, respectively.
Both the primary and secondary Monitoring nodes receive Administration and Policy
Service logs. If you change the role for one Monitoring node to None, the role of the
other Monitoring node also becomes None, thereby cancelling the high availability
pair after you designate a node as a Monitoring node. You will find this node listed as
a syslog target in the Remote Logging Targets window. To view this window, click
the Menu icon ( ) and choose Administration > System > Logging > Remote
Logging Targets.
pxGrid Check this check box to enable the pxGrid persona. Cisco pxGrid is used to share the
context-sensitive information from the Cisco ISE session directory to other policy
network systems such as Cisco Adaptive Security Appliance (ASA). The pxGrid
framework can also be used to exchange policy and configuration data between nodes,
for example, sharing tags and policy objects between Cisco ISE and third-party vendors,
and for non-Cisco ISE-related information exchanges such as threat information.
Related Topics
Personas in Distributed Cisco ISE Deployments, on page 156
Administration Node, on page 176
Policy Service Node, on page 184
Monitoring Node, on page 187
Cisco pxGrid Node, on page 194
Synchronize Primary and Secondary Cisco ISE Nodes, on page 202
Create a Policy Service Node Group, on page 203
Deploy Cisco pxGrid Node, on page 195
Change Node Personas and Services, on page 202
Configure MnT Nodes for Automatic Failover, on page 193
DHCP SPAN Click this toggle button to enable DHCP SPAN for each Cisco ISE node that has
assumed the Policy Service persona to collect DHCP packets.
• Interface: Choose the interface on the Cisco ISE node.
HTTP Click this toggle button to enable HTTP per Cisco ISE node that has assumed the
Policy Service persona to receive and parse HTTP packets.
• Interface: Choose the interface on the Cisco ISE node.
RADIUS Click this toggle button to enable the RADIUS server for each Cisco ISE node that
has assumed the Policy Service persona to collect RADIUS session attributes as well
as Cisco Device Protocol (CDP) and Link Layer Discovery Protocol (LLDP) attributes
from the Cisco IOS Sensor-enabled devices.
Network Scan Click this toggle button to enable the NMAP probe.
(NMAP)
DNS Click this toggle button to enable DNS for each Cisco ISE node that has assumed the
Policy Service persona to perform a DNS lookup for the FQDN. Enter the Timeout
period in seconds.
Note For the DNS probe to work on a particular Cisco ISE node in a distributed
deployment, you must enable one of these probes—DHCP, DHCP SPAN,
HTTP, RADIUS, or SNMP. For DNS lookup, one of these probes must be
started along with the DNS probe.
SNMP Query Click this toggle button to enable SNMP query for each Cisco ISE node that has
assumed the Policy Service persona to poll network devices at specified intervals.
Enter values in Retries, Timeout, Event Timeout (mandatory), and Description
(optional) fields.
Note In addition to configuring the SNMP Query probe, you must also configure
other SNMP settings in Administration > Network Resources > Network
Devices. When you configure SNMP settings on the network devices, ensure
that you enable CDP and LLDP globally on your network devices.
Active Directory Click this toggle button to scan the defined Active Directory servers for information
about Windows users.
• Days before rescan: Choose the days after which you want the scan to run again.
pxGrid Click this toggle button to allow Cisco ISE to collect (profile) endpoint attributes over
pxGrid.
Related Topics
Cisco ISE Profiling Service, on page 732
Network Probes Used by Profiling Service, on page 735
Configure Profiling Service in Cisco ISE Nodes, on page 735
Logging Settings
The following sections explain how to configure the severity of debug logs, create an external log target, and
enable Cisco ISE to send log messages to these external log targets.
Target Type Select the target type from the drop-down list. The default value is UDP Syslog.
IP Address Enter the IP address or hostname of the destination machine that will store the logs.
Cisco ISE supports IPv4 and IPv6 formats for logging.
Facility Code Choose the syslog facility code that must be used for logging, from the drop-down list.
Valid options are Local0 through Local7.
Maximum Length Enter the maximum length of the remote log target messages. Valid values are from
200 through 1024 bytes.
Include Alarms When you check this check box, alarm messages are sent to the remote server as well.
For this Target
Comply to RFC When you check this check box, the delimiters (, ; { } \ \) in the syslog messages sent
3164 to the remote servers are not escaped even if a backslash (\) is used.
Buffer Message This check box is displayed when you choose TCP Syslog or Secure Syslog from the
When Server Down Target Type drop-down list. Check this check box to allow Cisco ISE to buffer the
syslog messages when a TCP syslog target or secure syslog target is unavailable. Cisco
ISE retries sending messages to the target when the connection to the target resumes.
After the connection resumes, messages are sent sequentially, starting with the oldest,
and proceeding to the newest. Buffered messages are always sent before new messages.
If the buffer is full, old messages are discarded.
Buffer Size (MB) Set the buffer size for each target. By default, it is set to 100 MB. Changing the buffer
size clears the buffer, and all the existing buffered messages for the specific target are
lost.
Reconnect Timeout Enter the time (in seconds) to configure how long the TCP and secure syslogs are
(Sec) stored for before being discarded when the server is down.
Select CA This drop-down list is displayed when you choose Secure Syslog from the Target
Certificate Type drop-down list. Choose a client certificate from the drop-down list.
Ignore Server This check box is displayed when you choose Secure Syslog from the Target Type
Certificate drop-down list. Check this check box for Cisco ISE to ignore server certificate
Validation authentication and accept any syslog server.
Log Severity Level For some logging categories, this value is set by default, and you cannot edit it. For
some logging categories, you can choose one of the following severity levels from a
drop-down list:
• FATAL: Emergency level. This level means that you cannot use Cisco ISE and
you must immediately take the necessary action.
• ERROR: This level indicates a critical error condition.
• WARN: This level indicates a normal but significant condition. This is the default
level set for many logging categories.
• INFO: This level indicates an informational message.
• DEBUG: This level indicates a diagnostic bug message.
Local Logging Check this check box to enable logging events for a category on the local node.
Targets This area allows you to choose the targets for a logging category by transferring the
targets between the Available and the Selected areas using the left and right arrow
icons.
The Available area contains the existing logging targets, both local (predefined) and
external (user-defined).
The Selected area, which is initially empty, then displays the targets that have been
chosen for the category.
Minimum Length Specify the minimum length of the password (in characters). The default is six
characters.
Password must not Admin name or its characters in reverse order: Check this check box to restrict the
contain use of the administrator username or its characters in reverse order as the password.
Cisco or its characters in reverse order: Check this check box to restrict the use of
the word "Cisco" or its characters in the reverse order as the password.
This word or its characters in reverse order: Check this check box to restrict the
use of any word that you define or its characters in the reverse order as the password.
Repeated characters four or more times consecutively: Check this check box to
restrict the use of repeated characters four or more times consecutively as the password.
Dictionary words, their characters in reverse order, or their letters replaced with
other characters: Check this check box to restrict the use of dictionary words, their
characters in reverse order, or their letters replaced with other characters, as the
password.
Substitution of $ for s, @ for a, 0 for o, 1 for l, ! for i, 3 for e, and so on, is not permitted.
For example, Pa$$w0rd is not permitted.
• Default Dictionary: Choose this option to use the default Linux dictionary in
Cisco ISE. The default dictionary contains approximately 480,000 English words.
This option is selected by default.
• Custom Dictionary: Choose this option to use your customized dictionary. Click
Choose File to select a custom dictionary file. The text file must comprise
newline-delimited (JSON format) words, .dic extension, and a size less than 20
MB.
Password must Check the check box for the type of characters an administrator's password must
contain at least one contain. Choose one or more of the following options:
character of each
• Lowercase alphabetic characters
of the selected
types • Uppercase alphabetic characters
• Numeric characters
• Non-alphanumeric characters
Password History Specify the number of previous passwords from which the new password must be
different, to prevent the repeated use of the same password. Check the Password must
be different from the previous nversions check box, and enter the number in the
corresponding field.
Enter the number of days before which you cannot reuse a password. Check the Cannot
reuse password within n days check box, and enter the number in the corresponding
field.
Password Lifetime Check the check boxes for the following options to force users to change passwords
after a specified time period:
• Administrator passwords expire n days after creation or last change: Time
(in days) before the administrator account is disabled if the password is not
changed. The valid range is 1 to 3650 days.
• Send an email reminder to administrators n days prior to password
expiration: Time (in days) before which administrators are reminded that their
password will expire. The valid range is 1 to 3650 days.
Require Admin Check this check box if you want the admin user to enter the login password to view
Password network device-sensitive data such as shared secrets and passwords.
Password cached The password that is entered by the admin user is cached for this time period. The
for n Minutes admin user will not be prompted to enter the password again during this period to view
the network device-sensitive data. The valid range is from 1 to 60 minutes.
Related Topics
Cisco ISE Administrators, on page 3
Create a New Administrator, on page 4
Session Timeout
Session Idle Enter the time, in minutes, that you want Cisco ISE to wait for, before it logs out the
Timeout administrator if there is no activity. The default value is 60 minutes. The valid range
is from 6 to 100 minutes.
Session Info
Invalidate Check the check box adjacent to the session ID that you want to terminate and click
Invalidate.
Related Topics
Administrator Access Settings, on page 340
Configure Session Timeout for Administrators, on page 344
Terminate an Active Administrative Session, on page 345
Administration Node
A Cisco ISE node with the Administration persona allows you to perform all administrative operations on
Cisco ISE. It handles all the system-related configurations that are related to functionalities such as
authentication, authorization, auditing, and so on. In a distributed environment, you can have a maximum of
two nodes running the Administration persona. The Administration persona can take on of these following
roles—Standalone, Primary, or Secondary.
Existing endpoint No
with profile change
New endpoint No
learned through
profiling.
Existing guest: Yes (apart from flows enabled for device registration, such as Hotspot, BYOD, and
Central Web CWA with automatic device registration)
Authentication
(CWA)
Guest change No
password
Guest: AUP No
New Guest No
(Sponsored or
Self-registered)
Posture Yes
MDM on-boarding No
pxGrid Service No
Log in to GUI of Yes (The login process is delayed because a blocking call to the PAN is attempted to
secondary nodes update the last login details. Login proceeds after this call times out.)
Note To support certificate provisioning with the internal CA, you must to import the root certificate of the original
primary PAN and its key into the new primary node, after promotion. Certificate provisioning does not work
after automatic failover for the PSN nodes that are added after the promotion of the secondary node to primary
PAN.
and one for the Secondary PAN. If you use only one health check node, and that node goes down, automatic
failover will not happen.
When both the PANs are in the same data center, you can use a single nonadministrative ISE node as the
health check node for both the Primary PAN and the Secondary PAN. When a single health check node checks
the health of both the Primary PAN and the Secondary PAN, it assumes both the active and passive roles.
A health check node is a nonadministration node, which means it can be a Policy Service, Monitoring, or
pxGrid node, or a combination of these. We recommend that you designate PSN nodes as health check nodes
in the same data center as the Administration nodes. However, in a small or a centralized deployment, where
the two Administration nodes are not in the same location (LAN or data center), any node (PSN, pxGrid, or
MnT) not having the Administration persona can be used as the health check node.
Note If you chose to not enable automatic failover, and rely on manually promoting the secondary node when the
primary PAN fails, you do not need any check nodes.
If all the validations pass, the Secondary PAN promotes itself to the primary role.
The following are some sample (but not limited to) scenarios where automatic failover of the Secondary PAN
can be attempted:
• Health of the Primary PAN is consistently not good for the Number of failure polls before failover
value during the polling period.
• Cisco ISE services on the Primary PAN are manually stopped, and remain stopped for the failover period.
• The Primary PAN is shut down using soft halt or reboot option, and remains shut down for the configured
failover period.
• The Primary PAN goes down abruptly (power down), and remains down for the failover period.
• The network interface of the Primary PAN is down (network port shut or network service down), or it
is not reachable by the health check node for any other reason, and remains down for the configured
failover period.
Restore of Backup Restore action through the CLI and user interface is blocked.
If the PAN automatic failover configuration was enabled prior to restore, you must
reconfigure it after a successful restore.
Change Node Change of the following node personas through the GUI is blocked:
Persona
• Administration persona in both the Primary and Secondary PANs
• Persona of the PAN
• Deregistration of health check node after enabling the PAN Automatic Failover
feature
Other CLI The following admin operations through the CLI is blocked:
Operations
• Patch installation and rollback
• DNS server change
• IP address change of eth1, eth2, and eth3 interfaces
• Host alias change of eth1, eth2, and eth3 interfaces
• Time zone change
Users with Some session data is stored on the failed PAN, and cannot be updated by the PSN.
maximum connected
devices cannot
connect.
CLI Operations The following administrative operations through the CLI display a warning message
if the PAN automatic failover configuration is enabled. These operations may trigger
automatic failover if a service or system is not restarted within the failover window.
Hence, while performing the following operations, we recommend that you to disable
the PAN automatic failover configuration:
• Manually stopping the Cisco ISE service
• Soft reload (reboot) of Cisco ISE using the admin CLI
Step 4 Choose the health check node for the primary PAN from the Primary Health Check Node drop-down list containing
all the available secondary nodes.
We recommend that you have this node in the same location or data center as the primary PAN.
Step 5 Choose the health check node for the secondary PAN, from the Secondary Health Check Node drop-down list containing
all the available secondary nodes.
We recommend that you have this node in the same location or data center as the secondary PAN.
Step 6 Provide the Polling Interval time after which the PAN status is checked. The valid range is 30 to 300 seconds.
Step 7 Provide the count for Number of Failure Polls before Failover.
Failover occurs if the status of the PAN is not good for the specified number of failure polls. The valid range is 2 to 60
counts.
What to do next
After the promotion of the Secondary PAN to the Primary PAN, do the following:
• Manually sync the old Primary PAN to bring it back into the deployment.
• Manually sync any other secondary node that is outof sync, to bring it back into the deployment.
If the node that was originally the Primary PAN, comes back up, it will be demoted automatically and become the
Secondary PAN. You must perform a manual synchronization on this node (that was originally the Primary PAN) to
bring it back into the deployment.
In the Edit Node window of a secondary node, you cannot modify the personas or services because the options are
disabled. You have to log in to the Admin portal to make changes.
Step 1 Run the Cisco ISE Perform System Erase utility, as described in the Cisco ISE Installation Guide for your version of
Cisco ISE. This document is available at: https://www.cisco.com/c/en/us/support/security/identity-services-engine/
products-installation-guides-list.html
Step 2 Perform a fresh install of Cisco ISE, as described in the Cisco ISE Installation Guide.
Step 3 Configure the standalone node as a primary Policy Administration node, as described in Configure a Primary Policy
Administration Node, on page 157.
Note While a single NAD can be configured with many Cisco ISE nodes as RADIUS servers and
dynamicauthorization clients, it is not necessary for all the nodes to be in the same node group.
The members of a node group should be connected to each other using high-speed LAN connection such as
Gigabit Ethernet. The node group members need not be L2 adjacent, but L2 adjacency is highly recommended
to ensure sufficient bandwidth and reachability. See Create a Policy Service Node Group, on page 203 for
more details.
In addition, you can configure the following options under Advanced Settings:
• Batch Size: The session updates can be sent in batches. This value specifies the number of records sent
in each batch from a Light Data Distribution instance to the other PSNs in the deployment. If this field
is set to 1, the session updates are not sent in batches. The default value is 10 records.
• TTL: This value specifies the maximum time a session will wait for a batch to complete before updating
the Light Data Distribution. The default value is 1000 milliseconds.
In case of connectivity issues between the PSNs, for example, when a PSN is down, the session details are
retrieved from the MnT session directory and stored for future use.
Large deployments can hold up to 2,000,000 session records. Small deployments can store 1,000,000 session
records. When an accounting stop request is received for a session, the corresponding session data is deleted
from all Light Data Distribution instances. When the number of stored records exceeds the maximum limit,
the oldest sessions are deleted based on the timestamp.
Note • If the IPv6 prefix length of a session is less than 128 bits and the interface ID is not specified, the IPv6
prefix is rejected, thereby preventing multiple sessions from having the same key.
• Light Data Distribution uses Cisco ISE messaging services for inter-node communication. Cisco ISE
Release 3.0 and later support Certificate Signing Request generation for Cisco ISE Messaging Service.
Thus, Cisco ISE Release 3.0 and later have both internal and external CA support for ISE Messaging
Service. If you face issues with the Cisco ISE messaging service, you have to regenerate Cisco ISE
messaging service certificate.
• 1. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System >
Certificates > Certificate Management > Certificate Signing Requests
2. In the Certificate(s) will be used for section, select ISE Messaging service.
3. Click Generate ISE messaging service certificate.
This feature is enabled by default from Cisco ISE Release 2.7. If required, you can disable it to fall back to
the old mechanism of not using the endpoint owner directory. The Endpoint Owner Directory is also used
in profiling, and disabling this option will use the legacy profiler owner's directory. You can enable or disable
this feature by checking or unchecking the Enable Endpoint Owner Directory check box in the Light Data
Distribution window. (To view this window, click the Menu icon ( ) and choose Administration >
System > Settings > Light Data Distribution).
Monitoring Node
A Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages from
the PANs and PSNs in your network. This persona provides advanced monitoring and troubleshooting tools
that you can use to effectively manage your network and resources. A node with this persona aggregates and
correlates the data that it collects to provide you with meaningful information in the form of reports.
Cisco ISE allows you to have a maximum of two nodes with this persona that can take on primary or secondary
roles for high availability. Both the primary and secondary MnT nodes collect log messages. If the primary
MnT goes down, the primary PAN points to the secondary node to gather monitoring data. But the secondary
node will not be promoted to primary automatically. This should be done by following the procedure described
in Manually Modify the MnT Role.
At least one node in your distributed setup should assume the Monitoring persona. We recommend that you
do not have the Monitoring and Policy Service personas enabled on the same Cisco ISE node, and that the
node be dedicated solely to monitoring, for optimum performance.
You can access the Monitoring menu from the PAN in your deployment.
Note If you have enabled pxGrid, you must create a new certificate for the pxGrid node. Create the certificate
template with digital signature usage and generate a new PxGrid certificate.
Note If your deployment uses TCP or secure syslogs for Cisco ISE deployment, the functionality remains same as
the earlier releases.
If the prerequisites listed above are met, the queue-link alarm might be triggered due to the upgrade process.
To resolve the queue link alarm, regenerate the Cisco ISE root CA chain:
1. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates >
Certificate Management > Certificate Signing Requests.
2. Click Generate Certificate Signing Request (CSR) and then select the ISE Root CA in the Certificate(s)
will be used for drop-down list.
3. Click Replace ISE root CA Certificate Chain.
• Timeout: A Queue Link Error alarm with the cause as Timeout occurs when there is a network issue
between two nodes in the Cisco ISE deployment. Check the connectivity on port 8671 to troubleshoot
this error.
• Unknown CA: A Queue Link Error alarm with the cause as Unknown CA occurs when when there is
a broken Cisco ISE Messaging Certificate present in the System Certificates window (To view this
window, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.) This issue can be resolved by regenerating the Cisco ISE Messaging Certificate by choosing
Administration > System > Certificates > Certificate Management > Certificate Signing Requests
and then clicking on Generate Certificate Signing Request (CSR) on the Cisco ISE GUI.
Note Regeneration is not required if you have already replaced the Cisco ISE root CA
certificate chain.
When you replace the Cisco ISE Root CA chain, the Cisco ISE Messaging Service certificate is also replaced.
This is followed by the restart of the Cisco ISE Messaging service with a downtime of about two minutes.
The syslogs are lost during this downtime. To avoid losing the syslogs during the downtime, the Cisco ISE
Messaging Service can be disabled for a short period.
To enable or disable the Cisco ISE messaging service for UDP syslogs delivery to MnT, perform this procedure:
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose System > Logging > Log Settings.
Step 2 Check or uncheck the Use “ISE Messaging Service” for UDP Syslogs delivery to MnT check box to enable or disable
the use of the Cisco ISE Messaging Service.
Step 3 Click Save.
Caution When the primary node comes back up after a failover, back up of the secondary and restore the data to update
the primary node.
Monitoring Database
The rate and amount of data that is utilized by the monitoring functions requires a separate database on a
dedicated node that is used for these purposes.
Like PSN, the MnT node has a dedicated database that requires you to perform maintenance tasks, as described
in the topics covered in this section.
Note You should not perform a backup when a purge operation is in progress. If you start a backup during a purge
operation, the purge operation stops or fails.
If you register a secondary MnT node, we recommend that you first back up the primary MnT node and then
restore the data to the new secondary MnT node. This ensures that the history of the primary MnT node is in
sync with the new secondary node when the new changes are replicated.
disk space is below 80 percent. Purging always checks the Monitoring database disk space limit before
proceeding.
Note The reset option causes Cisco ISE services to be temporarily unavailable.
The Operational Data Purging window contains the Database Utilization and Purge Data Now areas. To
view this window, click the Menu icon ( ) and choose Administration > System > Maintenance >
Operational Data Purging. You can view the total available database space and the RADIUS and TACACS
data stored in the Database Utilization area. Hover the mouse over the status bar to display the available disk
space and the number of days the existing data is stored for in the database. Specify the period for which the
RADIUS and TACACS data is supposed to be retained in the Data Retention Period area. Data is purged
at 4 a.m. every day, and you can configure the export of data to a repository before it is purged, by specifying
the number of retention days. Check the Enable Export Repository check box to select and create a repository,
and specify an Encryption Key.
In the Purge Data Now area, you can purge all the RADIUS and TACACS data or specify the number of
days beyond which data is supposed to be purged.
Note You must export RADIUS authentication and accounting, TACACS authorization and accounting, RADIUS
errors, and misconfigured supplicants tables to a repository before purging.
Related Topics
Purge Older Operational Data, on page 192
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Maintenance > Operational
Data Purging.
Note For scheduled backup and purge to work properly on the nodes of a monitoring redundant pair, configure the
same repository, or repositories, on both the primary and secondary nodes using the CLI. The repositories are
not automatically synced between the two nodes.
From the Cisco ISE dashboard, verify that the MnT nodes are ready. The System Summary dashlet shows
the MnT nodes with a green check mark to the left when their services are ready.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 In the Deployment Nodes window, check the check box next to the MnT node that you want to specify as primary, and
click Edit.
Step 3 Click the General Settings tab and choose Primary from the Role drop-down list.
When you choose an MnT node as primary, the other MnT node automatically becomes secondary. In the case of a
standalone deployment, primary and secondary role configuration is disabled.
Step 4 Click Save. Both the primary and secondary nodes restart.
For Extensible Messaging and Presence Protocol clients, Cisco pxGrid nodes work in active-standby high
availability mode which means that the Cisco pxGrid Service is in Running state on the active node and in
Disabled state on the standby node.
Note In a High Availability Cisco ISE deployment, the pxGrid persona nodes that work in an active-standby setup
show that the pxGrid Service is in running state on the active node and in standby state on the standby node.
To verify the status of pxGrid services on a Cisco ISE node, use the following CLI command:
show logging application pxgrid/pxgrid.state
After the automatic failover to the secondary Cisco pxGrid node is initiated, if the original primary Cisco
pxGrid node is brought back into the network, the original primary Cisco pxGrid node continues to have the
secondary role and is not promoted back to the primary role unless the current primary node goes down.
Note At times, the original primary Cisco pxGrid node might be automatically promoted back to the primary role.
In a high-availability deployment, when the primary Cisco pxGrid node goes down, it might take around three
to five minutes to switchover to the secondary Cisco pxGrid node. We recommend that the client waits for
the switchover to complete, before clearing the cache data just in case the primary Cisco pxGrid node fails.
The following logs are available for the Cisco pxGrid node:
• pxgrid.log: Provides state change notifications.
• pxgrid-cm.log: Displays updates on publisher or subscriber or both and data exchange activity between
the client and the server.
• pxgrid-controller.log: Displays the details of client capabilities, groups, and client authorization.
• pxgrid-jabberd.log: Displays all the logs related to system state and authentication.
• pxgrid-pubsub.log: Displays all the information related to publisher and subscriber events.
Note • If Cisco pxGrid service is disabled on a node, port 5222 is down, but port 8910 (used by web clients) is
functional and continues to respond to the requests.
Note • You can enable Cisco pxGrid and Cisco pxGrid persona with the Cisco ISE Advantage license.
• Cisco pxGrid should be defined in order to work with the Passive ID Work Center. For more information,
see the "PassiveID Work Center" section in Cisco ISE Admin Guide: Asset Visibility
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 In the Deployment Nodes window, check the check box next to the node for which you want to enable the Cisco pxGrid
services, and click Edit.
Step 3 Click the General Settings tab and enable the pxGrid toggle button.
Step 4 Click Save.
Note When you upgrade from the previous version, the Save option might be disabled. This happens when the browser
cache refers to the old files from the previous version of Cisco ISE. Clear the browser cache to enable the Save
option.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > pxGrid Services > Settings.
Step 2 Check one of the following check boxes based on your requirements:
• Automatically approve new certificate-based accounts: Check this check box to automatically approve the
connection requests from new Cisco pxGrid clients.
• Allow password-based account creation: Check this check box to enable username or password-based authentication
for Cisco pxGrid clients. When this option is enabled, Cisco pxGrid clients cannot be automatically approved.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > pxGrid Services > Client Management >
Certificates.
Step 2 From the I want to drop-down list, choose one of the following options:
• Generate a single certificate (without a certificate signing request): You must enter the Common Name (CN) if
you select this option.
• Generate a single certificate (with a certificate signing request): You must enter the Certificate Signing Request
details if you select this option.
• Generate bulk certificates: You can upload a CSV file that contains the required details.
• Download Root Certificate Chain: You can download the root certificates and add them to the trusted certificate
store. You must specify the host name and the certificate download format.
Note This field is not displayed if you select the Generate Bulk Certificate option.
Step 6 From the Certificate Download Format drop-down list, choose one of the following options:
• Certificate in Private Enhanced Electronic Mail (PEM) format, key in PKCS8 PEM format (including
certificate chain): The root certificate, the intermediate CA certificates, and the end entity certificate are represented
in the PEM format. PEM-formatted certificates are BASE64-encoded ASCII files. Each certificate starts with the
"--------BEGIN CERTIFICATE-----" tag and ends with the "-------END CERTIFICATE----"
tag. The end entity’s private key is stored using PKCS* PEM. It starts with the "-----BEGIN ENCRYPTED
PRIVATE KEY----" tag and ends with the "-----END ENCRYPTED PRIVATE KEY----" tag.
• PKCS12 format (including certificate chain; one file for both the certificate chain and key): A binary format
to store the root CA certificate, the intermediate CA certificate, and the end entity's certificate and private key in
one encrypted file.
Any client with a noncompliant certificate fails to integrate with Cisco ISE. Use a certificate issued by the internal CA,
or generate a new certificate with proper usage extensions:
• The Key Usage extension in the certificate must contain the Digital Signature and Key Encipherment fields.
• The Extended Key Usage extension in the certificate must contain the Client Authentication and Server
Authentication fields.
• The Netscape Certificate Type extension is not required. If you want to include that extension, add both SSL Client
and SSL Server in the extension.
• If you are using a self-signed certificate, the Basic Constraints CA field must be set to True, and the Key Usage
extension must contain the Key Cert Sign field.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > pxGrid Services > Client Management >
Policy.
Step 2 From the Service drop-down list, choose one of the following options:
• com.cisco.ise.pubsub
• com.cisco.ise.config.anc
• com.cisco.ise.config.profiler
• com.cisco.ise.config.trustsec
• com.cisco.ise.service
• com.cisco.ise.system
• com.cisco.ise.radius
• com.cisco.ise.sxp
• com.cisco.ise.trustsec
• com.cisco.ise.mdm
Step 3 From the Operation drop-down list, choose one of the following options:
• <ANY>
• publish
• publish /topic/com.cisco.ise.session
• publish /topic/com.cisco.ise.session.group
• publish /topic/com.cisco.ise.anc
• <CUSTOM>: You can specify a custom operation if you select this option.
See pxGrid Operations and Services Use Cases for more information.
Note The following additional attributes are published to the /topic/com.cisco.ise.session for REST ID store for Cisco
ISE 3.0 patch 5 and later releases:
• identityProvider:Azure
• oid
• tenantID
• preferredUsername
Step 4 From the Groups drop-down list, choose the groups that you want to map to this service.
ANC and manually added groups are listed in this drop-down list.
Note Only the clients that belong to the groups included in the policy can subscribe to the service specified in that
policy. For example, if you define a pxGrid policy for com.cisco.ise.pubsub service and assign the ANC group
to this policy, only the clients that belong to the ANC group can subscribe to the com.cisco.ise.pubsub service.
You can find the following pxGrid operations in the Cisco ISE GUI.
Operation <ANY>
When you use the <ANY> operation with a service and a particular user group, any operation related to that
service is only accessible to the users in the chosen user group.
Consider the following example.
Service: com.cisco.ise.session; Operation: <ANY>; Groups: SessionUsers.
In this example, only pxGrid clients that are part of the ‘SessionUsers’ group will be able to perform any
operation related to session topic (like subscribe/gets operations).
Operation publish
All the publish related operations are applicable only when com.cisco.ise.pubsub is chosen as the service.
You can use the publish operation to create a pxGrid policy specifying that only a pxGrid client of a particular
user group can publish a chosen topic or can publish all topics.
Operation <Custom>
You can use the <Custom> operation to specify an operation that is not provided in the Operation drop-down
list. Currently, pxGrid supports the following operations but not all of them are listed in the Operation
drop-down list:
1. 'sets' (applicable on all services and topics except pubsub) – You can use this to restrict access to REST
API calls that perform a set operation.
2. 'gets' (applicable on all services and topics except pubsub) – You can use this to restrict access to REST
API calls that perform a get operation.
3. 'publish' followed by a particular topic name (only applicable on pubsub service) – You can use this to
restrict access to users who can publish a particular topic.
For example, Service: com.cisco.ise.pubsub, Operation: publish/topic/com.cisco.ise.session.
However, some rules with the same operation, service, and topic are incomprehensible and must be
avoided. For example, Service: com.cisco.ise.session, Operation: publish /topic/com.cisco.ise.session.
4. subscribe' followed by topic name (only applicable on pubsub service) – You can use this to restrict access
to users who can subscribe to a particular topic.
For example, Service: com.cisco.ise.pubsub, Operation: publish /topic/com.cisco.ise.session
All the Cisco ISE nodes that are a part of your deployment are listed.
The output also includes time stamp details, the total number of endpoints that connected through each of the
Policy Service nodes (PSNs) in the deployment, total number of endpoints, active endpoints, load, and
authentication traffic details.
See the Cisco Identity Services Engine CLI Reference Guide for more information on this command.
Note Obtain the backup from the standalone device regularly to avoid loss in the latest
configuration changes.
Note When you enable or disable any of the services that run on a PSN or make any changes to a PSN, you will
be restarting the application server processes on which these services run. Expect a delay while these services
restart. Because this delay in restarting services, automatic failover, if enabled in your deployment, might get
initiated. To avoid this, make sure that the automatic failover configuration is turned off.
You can edit the Cisco ISE node configuration to change the personas and services that run on the node.
Note When you promote the secondary Administration node to the primary PAN position, the primary node will
assume a secondary role. This causes both the primary and secondary nodes to restart, causing a delay.
Note We recommend that you put all the PSNs in the same local network and as a part of the same node group.
PSNs need not be a part of a load-balanced cluster to join the same node group. However, each local PSN in
a load-balanced cluster should typically be part of the same node group.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Click the Settings icon at the top of the left navigation pane.
You can view these changes in the Deployment window of the primary PAN. However, expect a delay of
five minutes for the changes to take effect and appear in the Deployment window.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Check the check box next to the secondary node that you want to remove, and click Deregister.
Step 3 Click OK.
Step 4 Verify the receipt of an alarm on your primary PAN to confirm that the secondary node is deregistered successfully. If
the secondary node fails to deregister from the primary PAN, it means the alarm is not generated.
If no processes are running when you use the halt command, or if you enter Yes in response to the warning
message displayed, then you must respond to the following question:
Do you want to save the current configuration?
If you enter Yes to save the existing Cisco ISE configuration, the following message is displayed:
Saved the running configuration to startup successfully.
Note We recommend that you stop the application process before rebooting the appliance.
We also recommend that you stop the application process before rebooting Cisco ISE. For more information,
see the Cisco Identity Services Engine CLI Reference Guide.
If any of the nodes 1. Deregister the failed node from the deployment.
other than the
Primary PAN is 2. Reinstall Cisco ISE on the failed node.
corrupted 3. Reregister the node in the existing deployment.
Note You must import the old certificates to the node before or after the registration.
If the Primary PAN If, for example, there are two nodes, N1 (Primary PAN) and N2 (Secondary PAN):
is corrupted
1. Promote secondary PAN (N2) to Primary PAN.
2. Remove the failed node (N1) from the deployment.
3. Reinstall Cisco ISE on the failed node (N1).
4. Register the node (N1) as Secondary PAN to deployment.
5. Import the old certificates to the node (N1) after the registration is completed.
6. Promote the node (N1) back to Primary PAN to have similar deployment as earlier.
If both Primary PAN If, for example, there are two nodes, N1 (Primary PAN) and N2 (Secondary PAN):
and Secondary PAN
1. Reinstall Cisco ISE on Primary PAN node (N1) and Secondary PAN node (N2).
are corrupted
2. Restore configuration backup in Primary PAN node (N1).
3. Import old certificates in Primary PAN node (N1).
4. Register the other node (N2) as Secondary PAN in the deployment.
5. Perform reset-config on other nodes and register the nodes in the deployment.
6. Import certificates to all the nodes.
Note If the Primary PAN and Secondary PANs are VMs, reinstalling Cisco ISE
might change the UDI. Hence, you must reinstall the licenses with the new
UDIs.
Step 1 Change the hostname or IP address of the Cisco ISE node using the hostname, ip address, or ip domain-name command
from the Cisco ISE CLI.
Step 2 Reset the Cisco ISE application configuration using the application stop ise command from the Cisco ISE CLI to restart
all the services.
Step 3 Register the Cisco ISE node to the primary PAN if it is a part of a distributed deployment.
Note If you are using the hostname while registering the Cisco ISE node, the fully qualified domain name (FQDN) of
the standalone node that you are going to register, for example, abc.xyz.com, must be DNS-resolvable from the
primary PAN. Otherwise, node registration fails. You must enter the IP addresses and FQDNs of the Cisco ISE
nodes that are a part of your distributed deployment in the DNS server.
After you register the Cisco ISE node as a secondary node, the primary PAN replicates the change in the IP address,
hostname, or domain name to the other Cisco ISE nodes in your deployment.
Administration Portal
Figure 2: Cisco ISE Administration Portal
1 Menu Icon
Click the Menu icon ( ) for a slide-in window with the following menus.
The slide-in Menu window also contains a search bar with which you can
find the window that you need. Click Dashboard for the home page.
Figure 3: Cisco ISE Main Menu
• Posture
• Device Administration
• PassiveID
2 Top-Right Menu
Icons
•
Use this icon to search for endpoints and display their distribution by
profiles, failures, identity stores, location, device type, and so on.
•
Click the icon to view the Interactive Help menu that provides access
to multiple resources.
•
Click this icon to access the following options:
• PassiveID Setup: The PassiveID Setup option launches the
PassiveID Setup wizard to set up passive identity using Active
Directory. Configure the server to gather user identities and IP
addresses from external authentication servers and deliver the
authenticated IP addresses to the corresponding subscriber.
• Visibility Setup: Visibility Setup is a Proof of Value (PoV)
service that collects endpoint data such as applications, hardware
inventory, USB status, firewall status, and the overall compliance
state of Windows endpoints. The collected data is then sent to
Cisco ISE. When you launch the ISE Visibility Setup wizard, it
allows you to specify an IP address range to run endpoint
discovery for a preferred segment of the network or a group of
endpoints.
The PoV service uses the Cisco Stealth Temporal agent to collect
endpoint posture data. Cisco ISE pushes the Cisco Stealth
Temporal agent to computers running Windows with an
Administrator account type, which automatically runs a temporary
executable file to collect context. The agent then removes itself.
To experience the optional debug capabilities of Cisco Stealth
Temporal agent, check the Endpoint Logging check box (click
the Menu icon ( ), and choose Visibility Setup > Posture) to
save the debug logs in an endpoint or multiple endpoints. You
can view the logs in either of the following locations:
• C:\WINDOWS\syswow64\config\systemprofile\ (64-bit
operating system)
• C:\WINDOWS\system32\config\systemprofile\ (32-bit
operating system)
•
Click this icon for a menu of system activities, including launching
Interactive Help
The Interactive Help enables users to work effectively with Cisco ISE by providing tips and step-by-step
guidance to complete tasks with ease.
This feature is enabled by default. To disable this feature, click the Menu icon ( ) and choose
Administration > System > Settings > Interactive Help, and uncheck the Enable Interactive Help check
box.
Click the Show button to view the Interactive Help menu.
If you access the Cisco ISE administrator portal through a Google Chrome Incognito window, you must enable
third-party cookies to view and access Interactive Help. See Third-party cookie controls in Incognito mode.
The home page has five default dashboards that display your Cisco ISE data. Each of these dashboards has
several predefined dashlets.
• Summary: This dashboard contains a linear metrics dashlet, pie chart dashlets, and list dashlets. The
metrics dashlet is not configurable. By default this dashboard contains the dashlets Status Endpoints,
Endpoint Categories, and Network Devices.
• Endpoints: By default, this dashboard contains the dashlets Status, Endpoints, Endpoint Categories,
and Network Devices.
• Guests: This dashboard contains dashlets that provide information on guest user type, log in failures,
and location of acitivity.
• Vulnerability: This dashboard displays the information that vulnerability servers report to Cisco ISE.
• Threat: This dashboard displays information from the threat servers reports sent to Cisco ISE.
• Add Dashlet(s) displays a dialog box with a list of dashlets available. Click Add or Remove next to the
dashlet name to add or remove a dashlet from the dashboard.
• Export saves the selected home page view to a PDF.
• Layout Template configures the number of columns that are displayed in this view.
• Manage Dashboards contains two options:
• Mark As Default Dashboard: Choose this option to make the current dashboard the default view
when you choose Home.
• Reset All Dashboards: Use this option to also reset all the dashboards and remove your
configurations on all the Home dashboards.
You can view the context visibility data only from the primary PAN.
Dashlets on the Context Visibility windows show information about endpoints, and endpoint connections to
NADs. The information currently displayed is based on the content in the list of data below the dashlets on
each window. Each window displays endpoint data, based on the name of the tab. As you filter the data, both
the list and dashlets update. You can filter the data by clicking on parts of one or more of the circular graphs,
by filtering rows on the table, or any combination those actions. As you select filters, the effects are additive,
also referred to as cascading filter, which allows you to drill down to find the particular data you are looking
for. You can also click an endpoint in the list, and get a detailed view of that endpoint.
We recommend that you enable the accounting settings on the network access devices (NADs) to ensure that
the accounting start and update information is sent to Cisco ISE.
Cisco ISE can collect accounting information, such as the latest IP address, status of the session (Connected,
Disconnected, or Rejected), the number of days an endpoint has been inactive, only if accounting is enabled.
This information is displayed in the Live Logs, Live Sessions and Context Visibility windows in the Cisco
ISE administration portal. When accounting is disabled on a NAD, there might be a missing, incorrect, or
mismatched accounting information between the Live Sessions, Live Logs and Context Visibility windows.
There are four main menu options under Context Visibility:
• Endpoints: Filter the endpoints you want to view based on types of devices, compliance status,
authentication type, hardware inventory, and more. See The Hardware Dashboard, on page 222 for
additional information.
Note The Visibility Setup workflow that is available on the Cisco ISE administration
portal home page allows you to add a list of IP address ranges for endpoints
discovery. After this workflow is configured, Cisco ISE authenticates the
endpoints, but the endpoints that are not included in the configured IP address
ranges are not displayed in the Context Visibility > Endpoints window and the
Endpoints listing page (Work Centers > Network Access > Identities >
Endpoints).
Note Updating User Attributes from AD depends on the interval configured under
Active Directory Probe. For more information, see Active Directory Probe.
• Network Devices: This window displays the list of NADs that have endpoints connected to them. For
any NAD, click the number of endpoints that is displayed in the corresponding # of endpoints column.
A window that lists all the devices filtered by that NAD is displayed.
Note If you have configured your network device with SNMPv3 parameters, you cannot
generate the Network Device Session Status Summary report that is provided
by the Cisco ISE monitoring service (Operations > Reports > Catalog >
Network Device > Session Status Summary). You can generate this report
successfully if your network device is configured with SNMPv1 or SNMPv2c
parameters.
• Application: Use this window to identify the number of endpoints that have a specific application
installed. The results are displayed in graphical and table formats. The graphical representation helps
you make a comparative analysis. For example, you can find out the number of endpoints with the Google
Chrome software along with their Version, Vendor, and Category (Anti-phishing, Browser, and so on)
in a table as well as a bar chart. For more information, see The Application Dashboard.
You can create a new tab in the Context Visibility windows and create a custom list for additional filtering.
Dashlets are not supported in custom views.
Click a section of a circular graph in a dashlet to view a new window with filtered data from that dashlet in.
From this new window, you can continue to filter the displayed data, as described in Filtering Displayed Data
in a View, on page 225.
For more information about using Context Visibility windows to find endpoint data, see the following Cisco
YouTube video https://www.youtube.com/watch?v=HvonGhrydfg.
Related Topics
The Hardware Dashboard, on page 222
Note There might be some discrepancies in the endpoint operating system data that is displayed in the Context
Visibility window when you enable multiple probes in Cisco ISE for an endpoint.
Label Description
1 The Summary tab is displayed by default on the home page. It displays the Application Categories
dashlet, which contains a bar chart. Applications are classified into 13 categories. Applications
that do not fall into any of these categories are grouped as Unclassified.
The available categories are Anti-Malware, Antiphishing, Backup, Browser, Data Loss Prevention,
Data Storage, Encryption, Firewall, Messenger, Patch Management, Public File Sharing, Virtual
Machine, and VPN Client.
2 Each bar corresponds to a classified category. Hover over each bar to view the total number of
applications and endpoints that correspond to the selected application category.
3 The applications and endpoints that fall under the Classified category are displayed in blue.
Unclassified applications and endpoints are displayed in gray. Hover over the classified or
unclassified category bars to view the total number of applications and endpoints that belong to
that category. You can click Classified and view the results in the bar chart and table in the window.
When you click Unclassified, the bar chart is disabled and the results are displayed in the table
in the window.
Label Description
4 The applications and endpoints are displayed based on the selected filter. You can view the
breadcrumb trail as you click different filters. You can click Clear All Filters to remove all the
applied filters.
5 When you click multiple bars, the corresponding classified applications and endpoints are displayed
in the table. For example, if you select the Antimalware and Patch Management categories, the
following results are displayed:
6 Click an endpoint in the Endpoints With This Software column in the table to view the endpoint
details, such as Mac address, NAD IP address, NAD port ID/SSID, IPv4 address, and so on.
7 You can select an application name and choose the Create App Compliance option from the
Policy Actions drop-down list to create application compliance condition and remediation.
Note The hardware inventory data takes 120 seconds to be displayed in the ISE GUI. The hardware inventory data
is collected for posture compliant and non-compliant states.
The Context Visibility > Endpoints > Hardware page displays the Manufacturers and Endpoint
Utilizations dashlets. These dashlets reflect the changes based on the selected filter. The Manufacturers
dashlet displays hardware inventory details for endpoints with Windows and Mac OS. The Endpoint
Utilizations dashlet displays the CPU, Memory, and Disk utilization for endpoints. You can select any of the
three options to view the utilization in percentage.
• Devices With Over n% CPU Usage.
• Devices With Over n% Memory Usage.
• Devices With Over n% Disk Usage.
Note • The Quick Filters in the Hardware Visibility Page need at least 3 characters to take effect. Another way
to make the Quick Filter work efficiently is to click on the filters of other column attributes after entering
the characters.
• Some of the column attributes are greyed out as this table is only used to filter based on attributes related
to hardware.
• The Operating System filter applies only to the Manufacturers Chart. It is not relevant to the table below
it.
The hardware attributes of an endpoint and their connected external devices are displayed in a table format.
The following hardware attributes are displayed:
• MAC Address
• BIOS Manufacturer
• BIOS Serial Number
• BIOS Model
• Attached Devices
• CPU Name
• CPU Speed (GHz)
• CPU Usage (%)
• Number of Cores
• Number of Processors
• Memory Size (GB)
• Memory Usage (%)
• Total Internal Disk(s) Size (GB)
• Total Internal Disk(s) Free Size (GB)
• Total Internal Disk(s) Usage (%)
• Number of Internal Disks
• NAD Port ID
• Status
• Network Device Name
• Location
• UDID
• IPv4 Address
• Username
• Hostname
• OS Types
• Anomalous Behavior
• Endpoint Profile
• Description
• Endpoint Type
• Identity Group
• Registration Date
• Identity Store
• Authorization Profile
You can click the number in the Attached Devices column that corresponds to an endpoint to view the Name,
Category, Manufacturer, Type, Product ID, and Vendor ID of the USB devices that are currently attached to
the endpoint.
Note Cisco ISE profiles the hardware attributes of a client’s system, however, there may be a few hardware attributes
Cisco ISE does not profile. These hardware attributes may not appear in the Hardware Context Visibility
page.
The hardware inventory data collection interval can be controlled in the Administration > System > Settings >
Posture > General Settings page. The default interval is 5 minutes.
Dashlets
The following image is an example of a dashlet:
1. The Open New Window icon opens this dashlet in a new browser window. The pie chart refreshes. Click
the X to delete this dashlet. This option is only available on the home page. You delete dashlets in Context
Visibility windows using the gear symbol in the top-right corner of the screen.
2. Some dashlets have different categories of data. Click the category to see a pie chart with that set of data.
3. The pie chart shows the data that you have selected. Click one of the pie segments to open a new tab in
with the filtered data, based on that pie segment.
Click a section of the pie chart in a home page dashboard to open the chart in a new browser window. The
new window displays data that is filtered by the section of the pie chart that you clicked on.
When you click a section of the pie chart in a Context Visibility window, the displayed data is filtered but
context does not change. You view the filtered data in the same browser window.
If you click defau...evice in the Network Devices dashlet, a new window displays the data, as shown in the
following image:
Filter the data further by clicking more sections of the pie charts. You can also use the Filter drop-down list
or the gear icon at the top-right corner of the list of data to manage the data displayed.
Save your custom filters.
Step 1 Click Filter and choose Advanced Filter from the drop-down list.
Step 2 Specify the search attributes, such as fields, operators, and values from the Filter menus.
Step 3 Click + to add more conditions.
Step 4 Click Go to display the entries that match the specified attributes.
Step 5 Click Save to save the filter.
Step 6 Enter a name and click Save. The filter now appears in the Filter drop-down list.
Step 1 Click Filter and choose Quick Filter from the drop-down list.
Step 2 Enter search criteria in one or more of the attribute fields, and the entries that match the specified attributes display
automatically.
If you enable the Adaptive Network Control service, you can select endpoints in the list and assign or
revoke network access. You can also issue a change of authorization.
When you click the pie chart on a home page dashlet, the new window that is displayed contains the
options ANC and Change Authorization. Check the check box for the endpoint you want to perform
an action on, and choose the necessary action from the drop-down lists ofANC and Change Authorization.
Figure 6: Endpoint Actions in Dashlet Views
• MDM Actions
If you connect an MDM server to Cisco ISE, you can perform MDM actions on selected endpoints.
Choose the necessary action from the MDM Actions drop-down list.
Note You can view this dashboard data only in the Cisco ISE primary PAN portal.
The dashboard’s real-time data provides an at-a-glance status of the devices and users accessing your network,
and an overview of the system's health.
Click the gear icon in the second level menu bar for a drop-down list of dashboard settings. The following
table contains descriptions for the dashboard settings options available in the drop-down list:
Layout Template You can change the layout of the template in which
the dashlets are displayed.
To change the layout:
1. Click Layout Template.
2. Select the required layout from the options
available.
You can delete a dashboard that you have created by clicking the close (x) icon next to the corresponding
custom dashboard.
Each dashlet has a toolbar at the top-right corner where you can perform the following operations:
• Detach: To view a dashlet in a separate window.
• Refresh: To refresh a dashlet.
• Remove: To remove a dashlet from the dashboard.
You can drag and drop the dashlet using the gripper icon that is present at the top-left corner of the dashlet.
The Alarms dashlet contains a quick filter for the Severity column. You can filter alarms by their severity by
choosing Critical, Warning, or Info from the Severity drop-down list.
Supported Languages
Cisco ISE provides localization and internalization support for the following languages and browser locales.
Czech cs-cz
Dutch nl-nl
English en
French fr-fr
German de-de
Hungarian hu-hu
Italian it-it
Japanese ja-jp
Korean ko-kr
Polish pl-pl
Russian ru-ru
Spanish es-es
Note NAC and MAC agent installers, and WebAgent pages are not localized.
Note UTF-8 authentication with RSA is not supported as RSA does not support UTF-8 users. RSA servers, which
are compatible with Cisco ISE, also do not support UTF-8.
User password The passwords can contain any combination of upper and lowercase letters, numbers,
policy and special characters (including !, @, #, $, ^, &, *, (, and ). The password field accepts
any characters including UTF-8 characters, but it does not accept control characters.
Some languages do not have uppercase or lowercase alphabets. If your user password
policy requires the user to enter a password with uppercase or lowercase characters
and the user’s language does not support these characters, the user cannot set a
password. For the user password field to support UTF-8 characters, uncheck the
following check boxes in the user password policy page (Click the Menu icon and
chooseAdministration > Identity Management > Settings > User Authentication
Settings > Password Policy):
• Lowercase alphabetic characters
• Uppercase alphabetic characters
You cannot use dictionary words, their characters in reverse order, or their letters
replaced with other characters.
RSA • Messages
• Prompts
Posture conditions The following fields in the Policy > Policy Elements > Conditions > Posture windows:
• File Condition > Add > File Path.
• Application Condition > Add > Process Name.
• Service Condition > Add > Service Name.
• Conditions list displays.
Guest and My • Sponsor > Language Template: all supported languages, all fields.
Devices settings
• Guest > Language Template: all supported languages, all fields.
• My Devices >Language Template: all supported languages, all fields.
Operations > • General Tools > RADIUS Authentication Troubleshooting > Username
Troubleshoot
Policies • Authentication > value for the antivirus expression within policy conditions
• Authorization or posture or client provisioning > other conditions > value for the
antivirus expression within policy conditions
Attribute value in • Authentication > simple condition or compound condition > value for the antivirus
policy library expression
conditions
• Authentication > simple condition list display
• Authentication > simple condition list > left navigation quick view display
• Authorization > simple condition or compound condition > value for the antivirus
expression
• Authorization > simple condition list > left navigation quick view display
• Posture > Dictionary simple condition or dictionary compound condition > value
for the antivirus expression
• Guest > simple condition or compound condition > value for the antivirus
expression
Provide full or partial MAC addresses in the following Cisco ISE windows:
• Policy > Policy Sets
• Policy > Policy Elements > Conditions > Authorization
• Authentications > Filters (Endpoint and Identity columns)
• Global search
• Operations > Reports > Report Filters
• Operations > Troubleshoot > Diagnostic Tools > General Tools > Endpoint Debug
Provide full MAC addresses (six octets separated by ‘:’ or ‘-’ or ‘.’) in the following Cisco ISE windows:
• Operations > Adaptive Network Control
• Operations > Troubleshoot > Diagnostic Tools > General Tools > RADIUS Authentication
Troubleshooting
• Operations > Troubleshooting > Diagnostic Tools > General Tools > Posture Troubleshooting
• Administration > Identities > Endpoints
• Administration > System > Deployment
• Administration > Logging > Collection Filters
Step 1 Enter the Cisco ISE URL in the address bar of your browser (for example, https://<ise hostname or ip address>/admin/).
Step 2 Enter the username and case-sensitive password that were specified and configured during the initial Cisco ISE setup.
Step 3 Click Login or press Enter.
If your login is unsuccessful, click the Problem logging in? link in the log in window and follow the instructions that
are displayed.
The Cisco ISE proxy configuration supports basic authentication for proxy servers. NT LAN Manager (NTLM)
authentication is not supported.
Note When you select OAuth Authentication Type for MDM configuration and integration , Cisco ISE uses NTLM
authentication for proxy servers.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Proxy.
Step 2 Enter the proxy IP address or DNS-resolvable hostname, and specify the port through which proxy traffic travels to and
from Cisco ISE in the Proxy host server : port field.
Step 3 Check the Password required check box, if necessary.
Step 4 Enter the username and password that are used to authenticate to the proxy servers in the User Name and Password
fields. Reenter the password in the Confirm Password field.
Step 5 Enter the IP address or the address range of hosts or domains that must be bypassed in the Bypass proxy for these hosts
and domain text box.
Step 6 Click Save.
Troubleshooting
To troubleshoot issues that are related to the API Gateway, set the Log Level for the following components
to DEBUG in the Debug Log Configuration window. (To view this window, click the Menu icon ( ) and
choose Operations > Troubleshoot > Debug Wizard > Debug Log Configuration.)
• ise-kong
• kong
The logs can be downloaded from the Download Logs window. (To view this window, click the Menu icon
( ) and choose Operations > Troubleshoot > Download Logs.) You can choose to download either a
support bundle from the Support Bundle tab (by clicking the Download button on the tab), or download the
kong debug logs from the Debug Logs tab (by clicking the Log File value for kong debug log).
Verification
If you are able to log in to the Cisco ISE primary PAN successfully every time, the API Gateway setup is
working as expected.
Note If REST APIs are accessed through API Gateway on a different tab in the same web browser where the GUI
is logged in, the GUI gets logged out.
This happens only when the API is served by remote nodes other than API Gateway node.
From Cisco ISE 3.0 onwards, the UI services on port 443 are served through a docker service, which may
result in behaviour change in cases that involve a multiple Network Interface Controller (NIC) scenario. You
may need to adjust the routes to make sure the packets are routed through the intended interface or gateway
based on the specific need, using the ip route command from the admin shell. For more information on using
the ip route command, see the Cisco ISE CLI Commands in Configuration Mode section in the Cisco ISE
CLI Reference Guide.
Note The ERS APIs support TLS 1.1 and TLS 1.2. ERS APIs do not support TLS 1.0 regardless of enabling TLS
1.0 in the Security Settings window (Administration > System > Settings > Security Settings). Enabling
TLS 1.0 in the Security Settings window is related to the EAP protocol only and does not impact ERS APIs.
You must assign special privileges to a user for the user to perform operations using the External RESTful
Services APIs. In Cisco ISE Release 2.6 and later, External RESTful Services users can be either internal
users or belong to an external Microsoft Active Directory group. The Active Directory group to which the
external users belong must be mapped to either ERS Admin or ERS Operator groups:
• ERS Admin: This user can create, read, update, and delete External RESTful Services API requests.
They have full access to all External RESTful Services APIs (GET, POST, DELETE, PUT).
• ERS Operator: This user has read-only access (GET requests only).
Note A user with the role Super Admin can access all External RESTful Services APIs.
ERS session idle timeout is 60 sec. If several requests are sent during this period, the same session is used
with the same Cross-Site Request Forgery (CSRF) token. If the session has been idle for more than 60 sec,
the session is reset and a new CSRF token is used.
The External RESTful Services APIs are disabled by default. If you evoke the External RESTful Services
API calls before enabling them, you will receive an error response. Enable the Cisco ISE REST API feature
for the applications developed for a Cisco ISE REST API to be able to access Cisco ISE. The Cisco REST
APIs uses HTTPS port 9060, which is closed by default. If the Cisco ISE REST APIs are not enabled on the
Cisco ISE administration server, the client application receives a timeout error from the server for any Guest
REST API requests.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > ERS Settings.
Step 2 Click the Enable ERS for Read/Write radio button to enable External RESTful Services on the Primary Administration
node (PAN).
Step 3 Click the Enable ERS for Read for All Other Nodes radio button if there are any secondary nodes in your deployment.
External RESTful Service requests of all types are valid only for primary Cisco ISE nodes. Secondary nodes have
read-access (GET requests).
Step 4 In the CSRF Check area, click the radio button for one of the following options:
• Use CSRF Check for Enhanced Security: If this option is enabled, the External RESTful Services client must
send a GET request to fetch the CSRF token from Cisco ISE and include the CSRF token in the requests that are
sent to Cisco ISE. Cisco ISE will validate a CSRF token when a request is received from the External RESTful
Services client. Cisco ISE processes the request only if the token is valid. This option is not applicable for External
RESTful Services clients earlier than Cisco ISE Release 2.3.
• Disable CSRF for ERS Request: If this option is enabled, CSRF validation is not performed. This option can be
used for External RESTful Services clients earlier than Cisco ISE 2.3.
All REST operations are audited and the logs are logged in the system logs. External RESTful Services APIs
have a debug logging category, which you can enable from the debug logging window in the Cisco ISE GUI.
When you disable External RESTful Services in Cisco ISE, port 9060 remains open but no communication
is allowed through the port.
Related Topics
External RESTful Services Software Development Kit , on page 242
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > Active Directory.
Step 2 Add the Active Directory groups that the external user belongs to as an external identity source.
See the section "Active Directory as an External Identity Source" in Chapter "Asset Visibility" in the Cisco ISE
Administrator Guide.
Step 4 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Admin Access > Authentication >
Authentication Method.
Step 5 Choose AD: <Join Point Name> from the Identity Source drop-down list.
Step 6 Choose either Password Based or Client Certificate Based authentication by clicking the corresponding radio button.
Step 7 Choose Administration > System > Admin Access > Administrators > Admin Groups.
Step 8 Click ERS Admin group or ERS Operator from the list of administration groups,
Step 9 Click Add and add the external group to the administrator group as a member user.
Step 10 Click Save.
The Cisco ISE administrator must assign special privileges to a user to allow the user to perform operations
using the External RESTful Services APIs. In Cisco ISE Release 2.6 and later, External RESTful Services
users can be either internal users or belong to an external Active Directory. The Active Directory group to
which the external users belong must be mapped to either ERS Admin or ERS Operator groups:
• ERS Admin: This user can create, read, update, and delete External RESTful Services API requests.
They have full access to all External RESTful Services APIs (GET, POST, DELETE, PUT).
• ERS Operator: This user has read-only access (GET requests only).
Note A user with the role Super Admin can access all External RESTful Services APIs.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > System Time.
Step 2 In the NTP Server Configuration area, enter the unique IP addresses (IPv4 or IPv6 or fully qualified domain name
[FQDN] value) for your NTP servers.
Step 3 (Optional) To authenticate the NTP server using private keys, click the NTP Authentication Keys tab and specify one
or more authentication keys if any of the servers that you specify require authentication through an authentication key.
Carry out the following steps:
a) Click Add.
b) Enter the necessary values in the Key ID and Key Value fields. Choose the required Hashed Message Authentication
Code (HMAC) value from the HMAC drop-down list.The Key ID field supports numeric values between 1 to 65535
and the Key Value field supports up to 15 alphanumeric characters.
c) Click OK.
d) Return to the NTP Server Configuration tab.
Step 4 (Optional) To authenticate the NTP server using public key authentication, configure the Autokey security model on
Cisco ISE from the CLI. See the ntp server and crypto commands in the Cisco Identity Services Engine CLI Reference
Guide for your Cisco ISE release.
Step 5 Click Save.
Note Use three or more NTP servers to ensure accurate time synchronization across your network, even if one of
the servers fails or two of the servers are out of sync. See https://insights.sei.cmu.edu/blog/
best-practices-for-ntp-services.
Note Cisco ISE uses Portable Operating System Interface (POSIX)-style signs in the time zone names and the
output abbreviations. Therefore, zones west of Greenwich have a positive sign and zones east of Greenwich
have a negative sign. For example, TZ='Etc/GMT+4' corresponds to 4 hours behind Universal Time (UT).
Caution When you change the time zone on a Cisco ISE appliance after installation, Cisco ISE services restart on that
particular node. We recommend that you perform such changes within a maintenance window. Also, it is
important to have all the nodes in a single Cisco ISE deployment that is configured to the same time zone. If
you have Cisco ISE nodes located in different geographical locations or time zones, you should use a global
time zone such as UTC on all the Cisco ISE nodes.
The recipient of alarm notifications can be any internal admin user with the Include system alarms in emails
option enabled. The sender’s email address for sending alarm notifications is set as ise@<hostname> by
default, but it can also be configured if needed. To configure the sender's email address, click on Administration
> System > Settings > Alarm Settings > Alarm Notification and type in the Enter sender e-mail: field.
The following table shows which node in a distributed Cisco ISE environment sends emails.
To configure an Simple Mail Transfer Protocol (SMTP) server, click the Menu icon ( ) and Administration >
System > Settings > SMTP Server. Configure the following fields:
• In the SMTP Server Settings area:
• SMTP Server: Enter the hostname of the outbound SMTP server.
• SMTP Port: Enter the SMTP port number. This port must be open to connect to the SMTP server.
• Connection Timeout: Enter the maximum time that Cisco ISE waits for a connection to the SMTP
server before starting a new connection. The timeout value is configured in seconds.
• In the Encryption Settings area, check the Use TLS/SSL Encryption check box to communicate with
a secure SMTP server. If you use Secure Sockets Layer (SSL), add the root certificate of the SMTP
server to Cisco ISE Trusted Certificates.
• In the Authentication Settings area, check the Use Password Authentication check box to use username
and password for authentication instead of SSL.
Step 3 Send the Consent Token Challenge to the Cisco Technical Assistance Center (TAC):
Cisco TAC generates Consent Token Response using the Consent Token Challenge that you provide.
Step 4 Choose option 2 and then enter the Consent Token Response that is provided by Cisco TAC:
Enter CLI Option:
2
Please input the response when you are ready .........................
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
Response Signature Verified successfully !
Granting shell access
sh-4.2# ls
What to do next
To exit from the shell mode, run the exit command:
sh-4.2# exit
exit
Root shell exited
3. Show History
4. Exit
Enter CLI Option:
3
************************************
SN No : 1
************************************
Challenge
3/WcyAAAAQEBAAQAAAABAgAEAAAAAAMACMt89YhCTVWWBAAQwo9lyianfhO4C5u1+v80AQUABAAADhAGAANJU0UHAAZJU0VfQ1QIAANJU0UJACcJIDU2NGQ5NjgwLTFmZmEtOWI0ZS0wZjY1LTdlZDllMGQ1M2UzNQo=
generated at 2019-06-12 15:40:01.000
************************************
SN No : 2
************************************
Cisco ISE enables FIPS 140-2 compliance via RADIUS shared secret and key management measures. When
the FIPS mode is enabled, any function that uses a non-FIPS-compliant algorithm fails.
When you enable the FIPS mode:
• All non-FIPS compliant cipher suites are disabled for EAP-TLS, PEAP, TEAP, EAP-TTLS, and
EAP-FAST.
• All non-FIPS compliant cipher suites are disabled in SSH.
• Certificates and private keys must use only FIPS-compliant hash and crytographic algorithms.
• RSA private keys must be 2048 bits or greater.
• ECDSA private keys must be 224 bits or greater.
• ECDSA server certificate works with only TLS 1.2.
• DHE ciphers work with DH parameters of 2048 bits or greater for all ISE TLS clients.
• 3DES ciphers are not allowed for Cisco ISE as a server
• SHA-1 is not allowed for generating certificates.
Once the FIPS Mode is enabled, all the nodes in the deployment are rebooted automatically. Cisco ISE performs
a rolling restart by first restarting the primary PAN and then restarting each secondary node, one at a time.
Hence, it is recommended that you plan for the downtime before changing the configuration.
Tip We recommend that you do not enable FIPS mode before completing the database migration process.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > FIPS Mode.
Step 2 Choose Enabled from the FIPS Mode drop-down list.
Step 3 Click Save and restart your machine.
What to do next
After you enable FIPS mode, enable and configure the following FIPS 140 compliant functions:
• Generate a Self-Signed Certificate, on page 271.
• Create a Certificate-Signing Request and Submit it to a Certificate Authority, on page 289.
• Configure RADIUS authentication settings as mentioned under Network Device Definition Settings, on
page 847.
You may want to enable administrator account authorization using a Common Access Card function. Although
using Common Access Card functions for authorization is not strictly a FIPS 140 requirement, it is a well-known
secure-access measure that is used in several environments to bolster FIPS 140 compliance.
To ensure that Cisco ISE can authenticate and authorize an administrator based on the Common Access
Card-based client certificate that is submitted from the browser, configure the following:
• The external identity source (Active Directory in the following example).
• The Active Directory user groups to which the administrator belongs.
• How to find the user's identity in the certificate.
• Active Directory user groups to Cisco ISE RBAC permissions mapping.
• The Certificate Authority (trust) certificates that sign the client certificates.
• A method to determine if a client certificate has been revoked by the certificate authority.
You can use a Common Access Card to authenticate credentials when logging in to Cisco ISE.
Step 1 Configure an Active Directory identity source in Cisco ISE and join all Cisco ISE nodes to Active Directory.
Step 2 Configure a certificate authentication profile according to the guidelines.
Be sure to select the attribute in the certificate that contains the administrator username in the Principal Name X.509
Attribute field. For Common Access Cards, the Signature Certificate on the card is normally used to look up the user in
Active Directory. The Principal Name is found in this certificate in the Subject Alternative Name extension, specifically
in the Other Name area of the extension. So the attribute selection here should be Subject Alternative Name - Other
Name.
If the Active Directory record for the user contains the user's certificate, and you want to compare the certificate that is
received from the browser against the certificate in Active Directory, check the Binary Certificate Comparison check
box, and select the Active Directory instance name that was specified earlier.
Step 3 Enable Active Directory for password-based administrator authentication. Choose the Active Directory instance name
that you connected and joined to Cisco ISE earlier.
Note You must use password-based authentication until you complete other configurations. Then, you can change the
authentication type to client certificate based at the end of this procedure.
Step 4 Create an external administrator group and map it to an Active Directory group. In the Cisco ISE GUI, click the Menu
icon ( ) and choose Administration > System > Admin Access > Administrators > Admin Groups. Create an external
system administrator group.
Step 5 Configure an administrator authorization policy to assign RBAC permissions to the external administrator groups.
Caution We strongly recommend that you create an external Super Admin group, map it to an Active Directory group,
and configure an administrator authorization policy with Super Admin permissions (menu access and data access),
and create at least one user in that Active Directory Group. This mapping ensures that at least one external
administrator has Super Admin permissions once Client Certificate-Based Authentication is enabled. Failure
to do this may lead to situations where the Cisco ISE administrator is locked out of critical functionality in the
administration portal.
Step 6 Administration > System > Certificates > Certificate Store > Trusted Certificates to import certificate authority
certificates into the Cisco ISE trusted certificates store.
Cisco ISE does not accept a client certificate unless the certificate authority certificates in the client certificate’s trust
chain are placed in the Cisco ISE Certificates store. You must import the appropriate certificate authority certificates in
to the Cisco ISE Certificates store.
a) Click Import and click Choose File in the Certificate File area.
b) Check the Trust for client authentication and Syslog check box.
c) Click Submit.
Cisco ISE prompts you to restart all the nodes in the deployment after you import a certificate. You can defer the
restart until you import all the certificates. However, after importing all the certificates, you must restart Cisco ISE
before you proceed.
Step 7 Configure the certificate authority certificates for revocation status verification.
a) Administration > System > Certificates > OSCP Client Profile.
b) Click Add.
c) Enter the name of an OSCP server, an optional description, and the URL of the server in the corresponding fields.
d) Administration > System > Certificates > Certificate Store.
e) For each certificate authority certificate that can sign a client certificate, specify how to do the revocation status check
for that certificate authority. Choose a certificate authority certificate from the list and click Edit. On the edit page,
choose OCSP or certificate revocation list (CRL) validation, or both. If you choose OCSP, choose an OCSP service
to use for that certificate authority. If you choose CRL, specify the CRL Distribution URL and other configuration
parameters.
Step 8 Enable client certificate-based authentication. Choose Administration > System > Admin Access > Authentication.
a) In the Authentication Method tab, click the Client Certificate Based radio button.
b) Choose the certificate authentication profile that you configured earlier from the Certificate Authentication Profile
drop-down list.
c) Select the Active Directory instance name from the Identity Source drop-down list.
d) Click Save.
Here, you switch from password-based authentication to client certificate-based authentication. The certificate
authentication profile that you configured earlier determines how the administrator’s certificate is authenticated. The
administrator is authorized using the external identity source, which in this example is Active Directory.
The Principal Name attribute from the certificate authentication profile is used to look up the administrator in Active
Directory.
a set of X.509 client certificates that identify a particular employee. Access via the Common Access Card
requires a card reader into which you insert the card and enter a PIN. The certificates from the card are then
transferred into the Windows certificate store, where they are available to applications such as the local browser
running Cisco ISE.
Note Cisco ISE Release 2.6 and later releases include TLS-protected UDP syslogs if you enable the use of Cisco ISE
Messaging Service for delivering UDP syslogs to MnT nodes.
Target Type Select the target type from the drop-down list. The default value is UDP Syslog.
IP Address Enter the IP address or hostname of the destination machine that will store the logs.
Cisco ISE supports IPv4 and IPv6 formats for logging.
Facility Code Choose the syslog facility code that must be used for logging, from the drop-down list.
Valid options are Local0 through Local7.
Maximum Length Enter the maximum length of the remote log target messages. Valid values are from
200 through 1024 bytes.
Include Alarms When you check this check box, alarm messages are sent to the remote server as well.
For this Target
Comply to RFC When you check this check box, the delimiters (, ; { } \ \) in the syslog messages sent
3164 to the remote servers are not escaped even if a backslash (\) is used.
Buffer Message This check box is displayed when you choose TCP Syslog or Secure Syslog from the
When Server Down Target Type drop-down list. Check this check box to allow Cisco ISE to buffer the
syslog messages when a TCP syslog target or secure syslog target is unavailable. Cisco
ISE retries sending messages to the target when the connection to the target resumes.
After the connection resumes, messages are sent sequentially, starting with the oldest,
and proceeding to the newest. Buffered messages are always sent before new messages.
If the buffer is full, old messages are discarded.
Buffer Size (MB) Set the buffer size for each target. By default, it is set to 100 MB. Changing the buffer
size clears the buffer, and all the existing buffered messages for the specific target are
lost.
Reconnect Timeout Enter the time (in seconds) to configure how long the TCP and secure syslogs are
(Sec) stored for before being discarded when the server is down.
Select CA This drop-down list is displayed when you choose Secure Syslog from the Target
Certificate Type drop-down list. Choose a client certificate from the drop-down list.
Ignore Server This check box is displayed when you choose Secure Syslog from the Target Type
Certificate drop-down list. Check this check box for Cisco ISE to ignore server certificate
Validation authentication and accept any syslog server.
Step 1 In the Cisco ISE administration portal, click the Menu icon ( ) and choose Administration > System > Logging >
Logging Categories.
Step 2 Click the radio button next to the Administrative and Operational Audit logging category, then click Edit.
Step 3 Choose WARN from the Log Severity Level drop-down list.
Step 4 In the Targets area, move the secure syslog remote logging target that you created earlier to the Selected area.
Step 5 Click Save.
Step 6 Repeat this task to enable the following logging categories. Both these logging categories have INFO as the default log
severity level and you cannot edit it.
• AAA Audit.
• Posture and Client Provisioning Audit.
Log Severity Level For some logging categories, this value is set by default, and you cannot edit it. For
some logging categories, you can choose one of the following severity levels from a
drop-down list:
• FATAL: Emergency level. This level means that you cannot use Cisco ISE and
you must immediately take the necessary action.
• ERROR: This level indicates a critical error condition.
• WARN: This level indicates a normal but significant condition. This is the default
level set for many logging categories.
• INFO: This level indicates an informational message.
• DEBUG: This level indicates a diagnostic bug message.
Local Logging Check this check box to enable logging events for a category on the local node.
Targets This area allows you to choose the targets for a logging category by transferring the
targets between the Available and the Selected areas using the left and right arrow
icons.
The Available area contains the existing logging targets, both local (predefined) and
external (user-defined).
The Selected area, which is initially empty, then displays the targets that have been
chosen for the category.
Note Cisco ISE Release 2.6 and later releases include TLS-protected UDP syslogs if you enable the use of Cisco
ISE Messaging Service for delivering UDP syslogs to MnT nodes.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Remote Logging
Targets.
Step 2 Click the radio button next to a TCP or UDP syslog collector.
Step 3 Click Edit.
Step 4 Choose Disabled from the Status drop-down list.
Step 5 Click Save.
Step 6 Repeat this process until you disable all the TCP or UDP syslog collectors.
You can view this information on the Remote Logging Targets window (Administration > System >
Logging > Remote Logging Targets). You cannot delete the default syslog collectors and cannot update the
following fields for the default syslog collectors:
• Name
• Target Type
• IP/Host address
• Port
During a fresh Cisco ISE installation, a certificate that is named Default Self-signed Server Certificate is
added to the Trusted Certificates store. This certificate is marked for Trust for Client authentication and
Syslog usage, making it available for secure syslog usage. While configuring your deployment or updating
the certificates, you must assign relevant certificates to the secure syslog targets.
During a Cisco ISE upgrade, if there are any existing secure syslog targets pointing to MnT nodes on port
6514, the names and configurations of the target are retained. After the upgrade, you cannot delete these syslog
targets and you cannot edit the following fields:
• Name
• Target Type
• IP/Host address
• Port
If no such targets exist at the time of upgrade, default secure syslog targets are created similar to the fresh
installation scenario, without any certificate mapping. You can assign the relevant certificates to these syslog
targets. If you try to map a secure syslog target that is not mapped to any certificate to a logging category,
Cisco ISE displays the following message:
Note You cannot create a new logging target using the hostname or IP address and port of an already existing target.
Each logging target must have a unique hostname or IP address and port.
Offline Maintenance
If the maintenance time period is less than an hour, take the Cisco ISE node offline and perform the maintenance
task. When you bring the node back online, the PAN node will automatically synchronize all the changes that
happened during maintenance time period. If the changes are not synchronized automatically, you can manually
synchronize it with the PAN.
If the maintenance time period is more than an hour, deregister the node at the time of maintenance and
reregister the node when you add the node back to deployment.
We recommend that you schedule the maintenance at a time period during which the activity is low.
Note 1. Data replication issues may occur if the queue contains more than 1,000,000 messages or if the Cisco ISE
node is offline for more than six hours.
2. If you are performing maintenance on the primary MnT node, we recommend that you take an operational
backup of the MnT node before performing maintenance activities.
• Changing the host name will cause any certificate using the old host name to become invalid. Therefore,
a new self-signed certificate using the new host name will be generated now for use with HTTPs or EAP.
Note All the above considerations are applicable for any change in the domain name as well.
Manage certificates for all the nodes in your deployment through the Cisco ISE administration portal.
Note Cisco ISE cannot import more than one certificate with the same private key. If
the certificate is renewed and imported without changing the private key, then
the existing certificate is replaced with the imported certificate.
• Trusted Certificates: These are CA certificates that are used to establish trust for the public keys that are
received from users and devices. The Trusted Certificates store also contains certificates that are distributed
by the Simple Certificate Enrollment Protocol (SCEP), which enables the registration of mobile devices
into the enterprise network. Trusted certificates are managed on the primary PAN, and are automatically
replicated to all the other nodes in a Cisco ISE deployment.
In a distributed deployment, you must import the certificate only into the Certificate Trust List (CTL) of the
PAN. The certificate gets replicated to the secondary nodes.
To ensure certificate authentication in Cisco ISE is not impacted by minor differences in certificate-driven
verification functions, use lowercase hostnames for all Cisco ISE nodes that are deployed in a network.
Certificate Usage
When you import a certificate into Cisco ISE, specify the purpose for which the certificate is to be used. In
the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates, and click Import.
Choose one or more of the following uses:
• Admin: For internode communication and authenticating the administration portal.
• EAP Authentication: For TLS-based EAP authentication.
• RADIUS DTLS: For RADIUS DTLS server authentication.
• Portal: For communicating with all Cisco ISE end-user portals.
• SAML: For verifying that the SAML responses are being received from the correct identity provider.
• pxGrid: For communicating with the pxGrid controller.
Associate different certificates from each node for communicating with the administration portal (Admin
usage), the pxGrid controller (pxGrid usage), and for TLS-based EAP authentication (EAP Authentication
usage). However, you can associate only one certificate from each node for each of these purposes.
You must always use a new private key for each certificate that you import into Cisco ISE. When you reuse
private keys across certificates, application initialization errors may occur due to a Red Hat NSS database
limitation.
When a new certificate is imported into the Red Hat NSS database, any existing certificate that has the same
private key is overridden. Cisco ISE application initialization is impacted if an admin certificate's private key
is overridden.
With multiple PSNs in a deployment that can service a web portal request, Cisco ISE needs a unique identifier
to identify the certificate that must be used for portal communication. When you add or import certificates
that are designated for portal use, define a certificate group tag and associate it with the corresponding certificate
on each node in your deployment. Associate this certificate group tag to the corresponding end-user portals
(guest, sponsor, and personal devices portals). This certificate group tag is the unique identifier that helps
Cisco ISE identify the certificate that must be used when communicating with each of these portals. You can
only designate one certificate from each node for each of the portals.
Note An EAP-TLS client certificate should have KeyUsage=Key Agreement and ExtendedKeyUsage=Client
Authentication for the following ciphers:
• ECDHE-ECDSA-AES128-GCM-SHA256
• ECDHE-ECDSA-AES256-GCM-SHA384
• ECDHE-ECDSA-AES128-SHA256
• ECDHE-ECDSA-AES256-SHA384
To bypass this requirement, choose Administration > System > Settings > Security Settings and check the
Accept certificates without validating purpose checkbox.
Note X.509 certificates that are imported into Cisco ISE must be in privacy-enhanced mail (PEM) or distinguished
encoding rule format. Files containing a certificate chain (a system certificate along with the sequence of trust
certificates that sign it) can be imported, subject to certain restrictions.
If the expiring certificate is a self-signed certificate, you can extend its expiration date by editing the certificate.
For a certificate authority-signed certificate, you must allow sufficient time to acquire the replacement certificate
from your certificate authority.
Step 1 Configure system certificates on each node in your deployment for the following:
• TLS-enabled authentication protocols such as EAP-TLS.
• Administration portal authentication.
• Allow browser and REST clients to access Cisco ISE web portals.
• Allow access to pxGrid controller.
By default, a Cisco ISE node is preinstalled with a self-signed certificate that is used for EAP authentication, and for
access to administration portal, end user portals, and pxGrid controller. In a typical enterprise environment, this self-signed
certificate is replaced with server certificates that are signed by a trusted CA.
Step 2 Populate the Trusted Certificates store with the CA-signed certificates that are used to establish trust with the user, and
device certificates that will be presented to Cisco ISE.
To validate the authenticity of a user or device certificate with a certificate chain that consists of a root CA certificate
and one or more intermediate CA certificates:
• Enable the relevant trust option for the root CA.
In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System >Certificates > Certificate
Management > Trusted Certificates. In this window, check the check box for the root CA certificate and click
Edit. In the Usage area, check the necessary check boxes in the Trusted For area.
For inter-node communications, you must populate the Trusted Certificates store with the trust certificates that validate
the Admin system certificate of each node in the Cisco ISE deployment. To use the default self-signed certificate for
internode communication, export this certificate from the System Certificates window of each Cisco ISE node and import
it into the Trusted Certificates store. If you replace the self-signed certificates with CA-signed certificates, it is only
necessary to populate the Trusted Certificates store with the appropriate root CA and intermediate CA certificates. You
cannot register a node in a Cisco ISE deployment until you complete this step.
If you use self-signed certificates to secure communication between a client and a PSN in a deployment, when BYOD
users move from one location to another, EAP-TLS user authentication fails. For such authentication requests that have
to be serviced between a few PSNs, you must secure communication between the client and the PSN with an
externally-signed CA certificate or use wildcard certificates that are signed by an external CA.
Note After you obtain a backup from a standalone Cisco ISE node or the PAN, if you change the certificate configuration
on one or more nodes in your deployment, you must obtain another backup to restore data. Otherwise, if you try
to restore data using the older backup, communication between the nodes might fail.
Wildcard Certificates
A wildcard certificate uses a wildcard notation (an asterisk and period before the domain name) and the
certificate can be shared across multiple hosts in an organization. For example, the CN value for the certificate
subject would be a generic hostname such as aaa.ise.local and the SAN field would include the same generic
hostname and a wildcard notation such as DNS.1=aaa.ise.local and DNS.2=*.ise.local.
If you configure a wildcard certificate to use *.ise.local, you can use the same certificate to secure any other
host whose DNS name ends with “.ise.local,” such as :
• aaa.ise.local
• psn.ise.local
• mydevices.ise.local
• sponsor.ise.local
Wildcard certificates secure communication in the same way as a regular certificate, and requests are processed
using the same validation methods.
The following figure is an example of a wildcard certificate that is used to secure a website.
Figure 7: Example of Wildcard Certificate
Note If you use wildcard certificates, we recommend that you partition your domain space for greater security. For
example, instead of *.example.com, you can partition it as *.amer.example.com. If you do not partition your
domain, it could lead to serious security issues.
Wildcard certificates use an asterisk (*) and a period before the domain name. For example, the common
name value for a certificate’s Subject Name would be a generic hostname such as aaa.ise.local and the SAN
field would have the wildcard character such as *.ise.local. Cisco ISE supports wildcard certifications in which
the wildcard character (*) is the left-most character in the presented identifier. For example, *.example.com
or *.ind.example.com. Cisco ISE does not support certificates in which the presented identifier contains other
characters along with the wildcard character. For example, abc*.example.com, or a*b.example.com, or
*abc.example.com.
Note When generating a CSR on a node using the wildcard character (*) in the CN or SAN, the certificate will be
considered as a wildcard. Cisco ISE adds it to the PAN and replicates it to all other nodes.
Where IP_address is the IP address of the network interface (eth1 or eth2 or eth3) and host-alias is the name
that you assign to the network interface. FQDN-string is the fully qualified domain name of the network
interface. Using this command, you can assign a host-alias or an FQDN-string or both to a network interface.
Here is an example using the ip host command: ip host a.b.c.d sales sales.amerxyz.com
After you assign a host alias to the non-eth0 interface, restart the application services on Cisco ISE using the
application start ise command.
Use the no form of this command to remove the association of the host alias with the network interface.
Wildcard certificates are considered less secure than using a unique server certificate in each Cisco ISE node.
But cost and other operational factors outweigh the security risk.
Security devices such as Cisco Adaptive Security Appliance also support wildcard certificates.
You must be careful when deploying wildcard certificates. For example, if you create a certificate with
*.company.local and an attacker is able to recover the private key, that attacker can spoof any server in the
company.local domain. Therefore, it is considered a best practice to partition the domain space to avoid this
type of compromise.
To address this possible issue and to limit the scope of use, wildcard certificates may also be used to secure
a specific subdomain of your organization. Add an asterisk (*) in the subdomain area of the common name
where you want to specify the wildcard.
For example, if you configure a wildcard certificate for *.ise.company.local, that certificate may be used to
secure any host whose DNS name ends in “.ise.company.local”, such as:
• psn.ise.company.local
• mydevices.ise.company.local
• sponsor.ise.company.local
Certificate Hierarchy
In the administration portal, view the certificate hierarchy or the certificate trust chain of all endpoint, system,
and trusted certificates. The certificate hierarchy includes the certificate, all the intermediate CA certificates,
and the root certificate. For example, when you choose to view a system certificate from the the administration
portal, the details of the corresponding system certificate are displayed. The certificate hierarchy is displayed
at the top of the certificate. Click a certificate in the hierarchy to view its details. The self-signed certificate
does not have any hierarchy or trust chain.
In the certificate listing windows, you will see one of the following icons in the Status column:
• Green icon: Indicates a valid certificate (valid trust chain).
• Red icon: Indicates an error (for example, trust certificate missing or expired).
• Yellow icon: Warns that a certificate is about to expire and prompts renewal.
System Certificates
Cisco ISE system certificates are server certificates that identify a Cisco ISE node to other nodes in the
deployment and to client applications. System certificates are:
• Used for inter-node communication in a Cisco ISE deployment. Check the Admin check box in the
Usage area of these certificates.
• Used by browser and REST clients who connect to Cisco ISE web portals. Check the Portal check box
in the Usage area of these certificates.
• Used to form the outer TLS tunnel with PEAP and EAP-FAST. Check the EAP Authentication check
box in the Usage area for mutual authentication with EAP-TLS, PEAP, and EAP-FAST.
• Used for RADIUS DTLS server authentication.
• Used to communicate with SAML identity providers. Check the SAML check box in the Usage area of
this certificate. If you choose the SAML option, you cannot use this certificate for any other service.
A SAML certificate is used by multiple Cisco ISE services such as Posture services and licensing
communication between Cisco ISE and the Cisco Smart Software Manager. If you delete the SAML
certificate from your Cisco ISE, the associated services are disrupted.
• Used to communicate with the pxGrid controller. Check the pxGrid check box in the Usage area of these
certificates.
Install valid system certificates on each node in your Cisco ISE deployment. By default, two self-signed
certificates and one signed by the internal Cisco ISE CA are created on a Cisco ISE node during installation
time:
• A self-signed server certificate designated for EAP, Admin, Portal, and RADIUS DTLS (it has a key
size of 2048 and is valid for one year).
• A self-signed SAML server certificate that can be used to secure communication with a SAML identity
provider (it has a key size of 2048 and is valid for one year).
• An internal Cisco ISE CA-signed server certificate that can be used to secure communication with pxGrid
clients (it has a key size of 4096 and is valid for one year).
When you set up a deployment and register a secondary node, the certificate that is designated for pxGrid
controller is automatically replaced with a certificate that is signed by the primary node's CA. Thus, all pxGrid
certificates become part of the same PKI trust hierarchy.
Note • When you export a wildcard system certificate to be imported into the other nodes (for inter-node
communication), ensure that you export the certificate and the private key, and specify an encryption
password. During import, you will need the certificate, private key, and encryption password.
• Cisco ISE supports the use of RSASSA-PSS algorithm only for trusted certificates and endpoint certificates
for EAP-TLS authentication. When you view the certificate, the signature algorithm is listed as
1.2.840.113549.1.1.10 instead of the algorithm name.
Cisco ISE does not support system certificates that use RSASSA-PSS as the signature algorithm. This
is applicable for the server certificate, root certificate, and intermediate CA certificate.
For supported key and cipher information for your release, see the appropriate version of the Cisco Identity
Services Engine Network Component Compatibility guide.
We recommend that you replace the self-signed certificate with a CA-signed certificate for greater security.
To obtain a CA-signed certificate, you must:
1. Create a Certificate-Signing Request and Submit it to a Certificate Authority, on page 289
2. Import a Root Certificate into the Trusted Certificate Store, on page 283
3. Bind a CA-Signed Certificate to a Certificate Signing Request, on page 289
Step 1 Choose Administration > System > Certificates > System Certificates.
Step 2 The following columns are displayed in the System Certificates window:
• Friendly Name: Name of the certificate.
• Usage: The services for which this certificate is used.
• Portal group tag: Applicable only for certificates that are designated for portal use. This field specifies which
certificate has to be used for portals.
• Issued To: Common Name of the certificate subject.
• Issued By: Common Name of the certificate issuer
• Valid From: Date on which the certificate was created, also known as the "Not Before" certificate attribute.
• Valid To (Expiration): Expiration date of the certificate, also known as the "Not After" certificate attribute. The
following icons are displayed next to the expiration date:
• Green icon: Expiring in more than 90 days.
• Blue icon: Expiring in 90 days or less.
• Yellow icon: Expiring in 60 days or less.
• Orange icon: Expiring in 30 days or less.
• Red icon: Expired.
Note Changing the certificate of the admin role certificate on a primary PAN node restarts services on all other
nodes. The system restarts one node at a time, after the primary PAN restart is complete.
Step 1 Choose Administration > System > Certificates > System Certificates.
Step 2 Click Import.
The Import Server Certificate window is displayed.
Step 3 Enter the values for the certificate that you are going to import.
Step 4 Click Submit.
Certificate File (Required) Click Choose File and choose the certificate file from your local system.
Private Key File (Required) Click Choose File and choose the private key file from your local system.
Password (Required) Enter the password to decrypt the private key file.
Friendly Name Enter a friendly name for the certificate. If you do not specify a name, Cisco ISE
automatically creates a name in the following format:
<common name> # <issuer> # <nnnnn> where <nnnnn> is a unique five-digit number.
Allow Wildcard Check this check box if you want to import a wildcard certificate. A wildcard certificate
Certificates uses a wildcard notation (an asterisk and period before the domain name). Wildcard
certificates are shared across multiple hosts in an organization.
If you check this check box, Cisco ISE imports this certificate to all the other nodes
in the deployment.
Validate Certificate Check this check box if you want Cisco ISE to validate the certificate extensions. If
Extensions you check this check box and the certificate that you import contains a basic constraints
extension with the CA flag set to true, ensure that the key usage extension is present.
The keyEncipherment bit or the keyAgreement bit, or both, must also be set.
Usage Choose the service for which this system certificate must be used:
• Admin: Server certificate used to secure communication with the administration
portal and between the Cisco ISE nodes in a deployment.
Note Changing the certificate of the admin role certificate on the primary PAN
restarts services on all other Cisco ISE nodes.
• EAP Authentication: Server certificate used for authentications that use the EAP
protocol for SSL or TLS tunneling.
• RADIUS DTLS: Server certificate used for RADIUS DTLS authentication.
• pxGrid: Client and server certificate to secure communication between the pxGrid
client and the server.
• ISE Messaging Service: Used by Syslog Over Cisco ISE Messaging feature,
which enables MnT WAN survivability for built-in UDP syslog collection targets
(LogCollector and LogCollector2).
• SAML: Server certificate used to secure communication with the SAML identity
provider. A certificate that is designated for SAML use cannot be used for any
other service such as Admin, EAP authentication, and so on.
• Portal: Server certificate used to secure communication with all Cisco ISE web
portals
Note If the certificate is generated by other third-party tools and not Cisco ISE, you cannot import the certificate
or its private key into Cisco ISE.
Related Topics
System Certificates, on page 267
View System Certificates, on page 268
Import a System Certificate, on page 269
Note If you use a self-signed certificate and you want to change the hostname of your Cisco ISE node, log in to the
administration portal of the Cisco ISE node, delete the self-signed certificate that has the old hostname, and
generate a new self-signed certificate. Otherwise, Cisco ISE continues to use the self-signed certificate with
the old hostname.
Common Name (Required if you do not specify a SAN) By default, the common name is the FQDN
(CN) of the Cisco ISE node for which you are generating the self-signed certificate.
City (L) (Do not abbreviate) City name. For example, San Jose.
Country (C) Country name. Enter the two-letter ISO country code. For example, US.
Subject Alternative An IP address, DNS name, or Uniform Resource Identifier (URI) that is associated
Name (SAN) with the certificate.
Key Type The algorithm to be used for creating the public key, either RSA or ECDSA.
Key Length The bit size for the public key. Choose one of the following options from the drop-down
list for RSA:
• 512
• 1024
• 2048
• 4096
Choose one of the following options from the drop-down list for ECDSA:
• 256
• 384
Note RSA and ECDSA public keys might have different key lengths for the same
security level.
Choose 2048 if you plan to get a public CA-signed certificate or deploy Cisco ISE as
a FIPS-compliant policy management system.
Digest to Sign With Choose one of the following hashing algorithms from the drop-down list:
• SHA-1
• SHA-256
Certificate Policies Enter the certificate policy OID or list of OIDs that the certificate should conform to.
Use a comma or space to separate the OIDs.
Expiration TTL Specify the number of days after which the certificate expires. Choose the value from
the drop-down lists.
Friendly Name Enter a friendly name for the certificate. If you do not specify a name, Cisco ISE
automatically creates a name in the format <common name> # <issuer> # <nnnnn>
where <nnnnn> is a unique five-digit number.
Allow Wildcard Check this check box if you want to generate a self-signed wildcard certificate. A
Certificates wildcard certificate uses a wildcard notation (an asterisk and period before the domain
name) and allows the certificate to be shared across multiple hosts in an organization.
Related Topics
System Certificates, on page 267
View System Certificates, on page 268
Generate a Self-Signed Certificate, on page 271
Step 1 Choose Administration > System > Certificates > System Certificates.
Step 2 Check the check box next to the certificate that you want to edit, and click Edit.
Step 3 To renew a self-signed certificate, check the Renewal Period check box and enter the expiration Time to Live (TTL) in
days, weeks, months, or years. Choose the required value from the drop-down lists.
Step 4 Click Save.
If the Admin check box is checked, then the application server on the Cisco ISE node restarts. In addition, if the Cisco
ISE node is the PAN in a deployment, then the application server on all the other nodes in the deployment also restart.
The system restarts one node at a time, after the primary PAN restart has completed.
For information on troubleshooting, see Launching a BYOD Portal using Google Chrome 65, on page 274Configuring
Wireless BYOD setup using Mozilla Firefox 64, on page 274.
Step 1 Generate a new self-signed certificate from the Cisco ISE GUI by filling the Subject Alternative Name field. Both DNS
and IP Address must be filled.
Step 2 Cisco ISE services restart.
Step 3 Redirect the portal in Chrome browser.
Step 4 From browser, View Certificate > Details > Copy the certificate by selecting base-64 encoded
Step 5 Install the certificate in Trusted path.
Step 6 Close the Chrome browser and try to redirect the portal.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.
Step 2 Check the check boxes next to the certificates that you want to delete, and click Delete.
A warning message is displayed.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.
Step 2 Check the check box next to the certificate that you want to export and click Export.
Step 3 Choose whether to export only the certificate, or the certificate and its associated private key.
Tip We do not recommend exporting the private key that is associated with a certificate because its value may be
exposed. If you must export a private key (for example, when you export a wildcard system certificate to be
imported into the other Cisco ISE nodes for inter-node communication), specify an encryption password for the
private key. You must specify this password while importing this certificate into another Cisco ISE node to decrypt
the private key.
Step 4 Enter the password if you have chosen to export the private key. The password should be at least eight characters long.
Step 5 Click Export to save the certificate to the file system that is running your client browser.
If you export only the certificate, the certificate is stored in the PEM format. If you export both the certificate and private
key, the certificate is exported as a .zip file that contains the certificate in the PEM format and the encrypted private key
file.
The certificates in the Trusted Certificate store are managed on the primary PAN, and are replicated to every
node in the Cisco ISE deployment. Cisco ISE supports wildcard certificates.
Cisco ISE uses the trusted certificates for the following purposes:
• To verify client certificates used for authentication by endpoints, and by Cisco ISE administrators
accessing ISE-PICthe administration portal using certificate-based administrator authentication.
• To enable secure communication between Cisco ISE nodes in a deployment. The Trusted Certificates
store must contain the chain of CA certificates needed to establish trust with the system certificate on
each node in a deployment.
• If a self-signed certificate is used for the system certificate, the self-signed certificate from each
node must be placed in the Trusted Certificates store of the PAN.
• If a CA-signed certificate is used for the system certificate, the CA root certificate, and any
intermediate certificates in the trust chain, must be placed in the Trusted Certificates store of the
PAN.
• To enable Secure LDAP authentication, a certificate from the certificate store must be selected when
defining an LDAP identity source that will be accessed over SSL.
• To distribute to personal devices preparing to register in the network using the personal devices portals.
Cisco ISE implements the SCEP on PSNs to support personal device registration. A registering device
uses the SCEP protocol to request a client certificate from a PSN. The PSN contains a registration authority
(RA) that acts as an intermediary. The RA receives and validates the request from the registering device
and then forwards the request to an external CA or the internal Cisco ISE CA, which issues the client
certificate. The CA sends the certificate back to the RA, which returns it to the device.
Each SCEP CA used by Cisco ISE is defined by a SCEP RA profile. When a SCEP RA profile is created,
two certificates are automatically added to the Trusted Certificates store:
• A CA certificate (a self-signed certificate)
• An RA certificate (a Certificate Request Agent certificate), which is signed by the CA.
The SCEP protocol requires that these two certificates be provided by the RA to a registering device. By
placing these two certificates in the Trusted Certificates store, they are replicated to all PSN nodes for
use by the RA on those nodes.
Note When a SCEP RA profile is removed, the associated CA chain is also removed
from the Trusted Certificates store. However, if the same certificates are referenced
by secure syslog, LDAP, system, or trust certificates, only the SCEP profile is
deleted.
Manufacturing) certificate. These certificates are disabled by default. If you have Cisco IP phones as endpoints
in your deployment, enable the root and manufacturing certificates so the Cisco-signed client certificates for
the phones are authenticated.
Status This column displays Enabled or Disabled. If the certificate is disabled, Cisco ISE
will not use the certificate for establishing trust.
Trusted for Displays one or more of the following services for which the certificate is used.
• Infrastructure
• Cisco Services
• Endpoints
Valid From Displays the date and time when the certificate was issued. This value is also known
as the “Not Before” certificate attribute.
Expiration Date Displays the date and time when the certificate expires. This value is also known as
the “Not After” certificate attribute.
Expiration Status Provides information about the status of the certificate expiration. There are five icons
and categories of informational message that are displayed in this column:
• Green: Expiring in more than 90 days
• Blue: Expiring in 90 days or less
• Yellow: Expiring in 60 days or less
• Orange: Expiring in 30 days or less
• Red: Expired
Related Topics
Trusted Certificates Store, on page 275
View Trusted Certificates, on page 279
Change the Status of a Certificate in Trusted Certificates Store, on page 279
Add a Certificate to Trusted Certificates Store, on page 279
• DNS
• Email
• URI (The URI constraint must start with a URI prefix such as http://, https://, ftp://, or ldap://).
When a trusted certificate contains a constraint that is not supported and the certificate that is being verified
does not contain the appropriate field, Cisco ISE rejects the certificate because it cannot verify unsupported
constraints.
The following is an example of the name constraints definition within the trusted certificate:
An acceptable client certificate subject that matches the above definition is as follows:
Step 1 To view all the certificates, choose click the Menu icon ( ) and choose Administration > System > Certificates >
Trusted Certificates. The Trusted Certificates window displayed, listing all the trusted certificates.
Step 2 Check the check box of the trusted certificate and click Edit, View, Export, or Delete to perform the required task.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates.
Step 2 In the ISE-PIC GUI, click the Menu icon ( ) and choose Certificates > Trusted Certificates.
Step 3 Check the check box next to the certificate you want to enable or disable, and click Edit.
Step 4 Choose the status from the Status drop-down list.
Step 5 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates.
Step 2 Check the check box next to the certificate that you want to edit, and click Edit.
Step 3 (Optional) Enter a name for the certificate in the Friendly Name field. If you do not specify a friendly name, a default
name is generated in the following format:
common-name#issuer#nnnnn
Step 4 Define the usage of the certificate by checking the necessary check boxes in the Trusted For area.
Step 5 (Optional) Enter a description for the certificate in the Description field.
Step 6 Click Save.
Certificate Issuer
Friendly Name Enter a friendly name for the certificate. This is an optional field. If you do not enter
a friendly name, a default name is generated in the following format:
common-name#issuer#nnnnn
Status Choose Enabled or Disabled from the drop-down list. If the certificate is disabled,
Cisco ISE will not use the certificate for establishing trust.
Usage
Trust for Check this check box if you want this certificate to verify server certificates (from
authentication other Cisco ISE nodes or LDAP servers).
within ISE
Trust for client (Applicable only if you check the Trust for authentication within ISE check box)
authentication and Check the check box if you want this certificate to be used to:
Syslog
• Authenticate endpoints that connect to Cisco ISE using the EAP protocol.
• Trust a Syslog server.
Trust for You can check this check box only when Trust for client authentication and Syslog
certificate based is selected.
admin
Check this check box to enable usage for certificate-based authentications for admin
authentication
access. Import the required certificate chains into the Trusted Certificate store.
Trust for Check this check box if you want this certificate to be used to trust external Cisco
authentication of services such as the Feed Service.
Cisco Services
Certificate Status Cisco ISE supports two ways of checking the revocation status of a client or server
Validation certificate that is issued by a particular CA. The first way is to validate the certificate
using the Online Certificate Status Protocol (OCSP), which makes a request to an
OCSP service maintained by the CA. The second way is to validate the certificate
against a CRL which is downloaded from the CA into Cisco ISE. Both of these methods
can be enabled, in which case OCSP is used first and only if a status determination
cannot be made then the CRL is used.
Validate Against Check the check box to validate the certificate against OCSP services. You must first
OCSP Service create an OCSP Service to be able to check this box.
Reject the request Check the check box to reject the request if certificate status is not determined by the
if OCSP returns OCSP service. If you check this check box, an unknown status value that is returned
UNKNOWN status by the OCSP service causes Cisco ISE to reject the client or server certificate currently
being evaluated.
Reject the request Check the check box for Cisco ISE to reject the request if the OCSP Responder is not
if OCSP Responder reachable.
is unreachable
Download CRL Check the check box for the Cisco ISE to download a CRL.
CRL Distribution Enter the URL to download the CRL from a CA. This field is automatically populated
URL if it is specified in the certificate authority certificate. The URL must begin with “http”,
“https”, or “ldap.”
Retrieve CRL The CRL can be downloaded automatically or periodically. Configure the time interval
between downloads.
If download failed, Configure the time interval that Cisco ISE must wait Cisco ISE tries to download the
wait CRL again.
Bypass CRL Check this check box, for the client requests to be accepted before the CRL is received.
Verification if CRL If you uncheck this check box, all client requests that use certificates signed by the
is not Received selected CA will be rejected until Cisco ISE receives the CRL file.
Ignore that CRL is Check this check box if you want Cisco ISE to ignore the start date and expiration date
not yet valid or and continue to use the not yet active or expired CRL and permit or reject the EAP-TLS
expired authentications based on the contents of the CRL.
Uncheck this check box if you want Cisco ISE to check the CRL file for the start date
in the Effective Date field and the expiration date in the Next Update field. If the CRL
is not yet active or has expired, all authentications that use certificates signed by this
CA are rejected.
Related Topics
Trusted Certificates Store, on page 275
Edit a Trusted Certificate, on page 280
Step 1 Choose Administration > System > Certificates > Trusted Certificates.
Step 2 Check the check boxes next to the certificates that you want to delete, and click Delete.
A warning message is displayed. To delete the Cisco ISE Internal CA certificates, click one of the following options:
• Delete: To delete the Cisco ISE internal CA certificates. All endpoint certificates that are signed by the Cisco ISE
internal CA become invalid and the endpoints cannot join the network. To allow the endpoints on the network again,
import the same Cisco ISE internal CA certificates into the Trusted Certificates store.
• Delete & Revoke: Deletes and revokes the Cisco ISE internal CA certificates. All endpoint certificates that are
signed by the Cisco ISE internal CA become invalid and the endpoints cannot get on to the network. This operation
cannot be undone. You must replace the Cisco ISE root certificate chain for the entire deployment.
Note If you export certificates from the internal CA and plan to use the exported certificates to restore from backup,
use the CLI command application configure ise. See Export Cisco ISE CA Certificates and Keys, on page
315.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates.
Step 2 Check the check box next to the certificate that you want to export, and click Export. You can export only one certificate
at a time.
Step 3 The chosen certificate downloads in the PEM format into the file system that is running your client browser.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates.
Step 2 Click Import.
Step 3 In the Import a new Certificate into the Certificate Store window, click Choose File to select the root CA certificate
that is signed and returned by your CA.
Step 4 Enter a Friendly Name.
If you do not enter a Friendly Name, Cisco ISE autopopulates this field with a name of the format
common-name#issuer#nnnnn, where nnnnn is a unique number. You can also edit the certificate later to change the
Friendly Name.
Step 5 Check the check boxes next to the services for which you want to use this trusted certificate.
Step 6 (Optional) In the Description field, enter a description for your certificate.
Step 7 Click Submit.
What to do next
Import the intermediate CA certificates into the Trusted Certificates store (if applicable).
Certificate File Click Browse to choose the certificate file from the computer that is running the
browser.
Friendly Name Enter a friendly name for the certificate. If you do not specify a name, Cisco ISE
automatically creates a name in the format <common name>#<issuer>#<nnnnn>,
where <nnnnn> is a unique five-digit number.
Trust for Check the check box if you want this certificate to be used to verify server certificates
authentication (from other ISE nodes or LDAP servers).
within ISE
Trust for client (Applicable only if you check the Trust for authentication within ISE check box) Check
authentication and the check box if you want this certificate to be used to:
Syslog
• Authenticate endpoints that connect to ISE using the EAP protocol
• Trust a Syslog server
Trust for Check this check box if you want this certificate to be used to trust external Cisco
authentication of services such as the feed service.
Cisco Services
Validate Certificate (Only if you check both the Trust for client authentication and Enable Validation of
Extensions Certificate Extensions options) Ensure that the “keyUsage” extension is present and
the “keyCertSign” bit is set, and that the basic constraints extension is present with
the CA flag set to true.
Related Topics
Trusted Certificates Store, on page 275
Certificate Chain Import, on page 284
Import a Root Certificate into the Trusted Certificate Store, on page 283
2. Import the certificate chain file using the Bind a CA-Signed Certificate operation. This operation imports
the last certificate from the file as a local certificate.
Note • If you change the Admin certificate on a registered secondary node, you
must obtain appropriate CA certificates that can be used to validate the
secondary node’s Admin certificate and import it into the CTL of the PAN.
• If you use self-signed certificates to secure communication between a client
and PSN in a deployment, when BYOD users move from one location to
another, EAP-TLS user authentication fails. For such authentication requests
that have to be serviced between a few PSNs, you must secure
communication between the client and the PSN with an externally-signed
CA certificate or use wildcard certificates signed by an external CA.
Ensure that the certificate issued by the external CA has basic constraints defined and the CA flag is set to
true. To install CA-signed certificates for inter-node communication, carry out the following steps. For
information on these tasks, refer to Chapter "Basic Setup" in the Cisco ISE Administrator Guide.
Step 1 Create a Certificate Signing Request (CSR) and submit the CSR to a Certificate Authority.
Step 2 Import the root certificates to the trusted certificate store.
Step 3 Bind the CA-signed certificate to the CSR.
Trusted Certificate Name Serial Number Purpose of Certificate Cisco ISE Releases with
Certificate
Baltimore CyberTrust 02 00 00 B9 This certificate can serve Releases 2.4 and later.
Root CA as the root CA certificate
in CA chains used by
cisco.com in some
geographies. The
certificate was also used
in ISE 2.4 posture/CP
update XML files when
they hosted at
https://s3.amazonaws.com.
DST Root CA X3 44 AF B0 80 D6 A3 27 This certificate can serve Releases 2.4 and later.
Certificate Authority BA 89 30 39 86 2E F8 40 as the root CA certificate
6B for the CA chain used by
cisco.com.
Thawte Primary Root 34 4E D5 57 20 D5 ED This certificate can serve Releases 2.4 and later.
CA EC 49 F4 2F CE 37 DB as the root CA certificate
2B 6D for the CA chain used by
cisco.com and
perfigo.com.
VeriSign Class 3 Public 18 DA D1 9E 26 7D E8 This certificate serves as Releases 2.4 and later.
Primary Certification BB 4A 21 58 CD CC 6B the root CA certificate for
Authority 3B 4A VeriSign Class 3 Secure
Server CA-G3.
You must use this
certificate when
configuring profiler feed
services in Cisco ISE.
Trusted Certificate Name Serial Number Purpose of Certificate Cisco ISE Releases with
Certificate
Cisco Root CA 2048 5F F8 7B 28 2B 54 DC This certificate can be Releases 2.4 and later.
8D 42 A3 15 B5 68 C9 used by certain Cisco
AD FF devices connecting to
Cisco ISE. The certificate
is disabled by default.
DigiCert Root CA 02 AC 5C 26 6A 0B 40 You must use this Releases 2.4 and later.
9B 8F 0B 79 F2 AE 46 25 certificate for flows where
77 guest login with Facebook
is used.
DigiCert SHA2 High 04 E1 E7 A4 DC 5C F2 You must use this Releases 2.4 and later.
Assurance Server CA F3 6D C0 2B 42 B8 5D certificate for flows where
15 9F guest login with Facebook
is used.
HydrantID SSL ICA G2 75 17 16 77 83 D0 43 7E Trusted for Cisco Releases 2.4 and 2.6.
B5 56 C3 57 94 6E 45 63 services.
B8 EB D3 AC
QuoVadis Root CA 2 05 09 You must use this Releases 2.4 and later.
certificate in the profiler,
posture, and client
provisioning flows.
Cisco Licensing Root 01 This certificate is part of Releases 2.6 and later.
CA the Cisco Trust root store
bundle that is used in
Cisco ISE.
Trusted Certificate Name Serial Number Purpose of Certificate Cisco ISE Releases with
Certificate
Cisco Root CA 2099 01 9A 33 58 78 CE 16 C1 This certificate is part of Releases 2.6 and later.
C1 the Cisco Trust root store
bundle that is used in
Cisco ISE.
DigiCert Global Root 08 3B E0 56 90 42 46 B1 This certificate is part of Releases 2.6 and later.
CA A1 75 6A C9 59 91 C7 the Cisco Trust root store
4A bundle that is used in
Cisco ISE.
Cisco ECC Root CA 03 This certificate is part of Releases 2.6 and later.
2099 the Cisco Trust root store
bundle that is used in
Cisco ISE.
Certificate-Signing Requests
For a CA to issue a signed certificate, you must create a certificate signing request and submit it to the CA.
The list of certificate-signing requests that you have created is available in the Certificate-Signing Requests
window. To view this window, click the Menu icon ( ) and chooseAdministration > System > Certificates >
Certificate-Signing Requests. To obtain signatures from a CA, you must export the certificate-signing request
and then send the certificates to the CA. The CA signs and returns your certificates.
You can manage the certificates centrally from the Cisco ISE administration portal. You can create
certificate-signing requests for all the nodes in your deployment and export them. Then, you should submit
the certificate-signing requests to a CA, obtain the signed certificates from the CA, import the root and
intermediary CA certificates given by the CA into the Trusted Certificates store, and bind the CA-signed
certificates to the certificate-signing requests.
Step 1 Choose Administration > System > Certificates > Certificate-Signing Requests.
Step 2 Click Generate Certificate-Signing Requests (CSR) to generate the certificate-signing request.
Step 3 Enter the values for generating a certificate-signing request. See Trusted Certificate Settings, on page 280 for information
on each of the fields in the window displayed.
Step 4 (Optional) Check the check box of the signing request that you want to download and and click Export to download the
request.
Step 5 Copy all the text from “-----BEGIN CERTIFICATE REQUEST-----” through “-----END CERTIFICATE
REQUEST-----.” and paste the contents of the request in the certificate request of the chosen CA.
Step 6 Download the signed certificate.
Some CAs might email the signed certificate to you. The signed certificate is in the form of a .zip file that contains the
newly issued certificate and the public signing certificates of the CA that you must add to the Cisco ISE trusted certificates
store. The digitally-signed CA certificate, root CA certificate, and other intermediate CA certificate (if applicable) can
be downloaded to the local system running your client browser.
Step 1 Choose Administration > System > Certificates > Certificate-Signing Requests.
Step 2 Check the check box next to the certificate signing request you must bind with the CA-signed certificate.
Step 3 Click Bind Certificate.
Step 4 In the Bind CA Signed Certificate window displayed, click Choose File to choose the CA-signed certificate.
Step 7 (Optional) Check the services for which this certificate will be used in the Usage area.
This information is autopopulated if you have enabled the Usage option while generating the certificate signing request.
You can also choose to edit the certificate at a later time to specify the usage.
Changing the Admin usage certificate on a primary PAN restarts the services on all the other nodes. The system restarts
one node at a time, after the primary PAN restarts.
Step 8 Click Submit to bind the certificate-signing request with the CA-signed certificate.
If this certificate is marked for Cisco ISE internode communication usage, the application server on the Cisco ISE node
restarts.
Repeat this process to bind the certificate-signing request with the CA-signed certificate on the other nodes in the
deployment.
What to do next
Import a Root Certificate into the Trusted Certificate Store, on page 283
Step 1 Choose Administration > System > Certificates > Certificate-Signing Requests.
Step 2 Check the check box next to the certificates that you want to export, and click Export.
Step 3 The certificate-signing request is downloaded to your local file system.
check box and enter the wildcard FQDN notation in the SAN field (DNS name), for example,
*.amer.example.com. If you plan to use the certificate for EAP Authentication, do not enter the wildcard value
in the CN= field.
With the use of wildcard certificates, you no longer have to generate a unique certificate for each Cisco ISE
node. Also, you no longer have to populate the SAN field with multiple FQDN values to prevent certificate
warnings. Using an asterisk (*) in the SAN field allows you to share a single certificate across multiple both
nodes in a deployment and helps prevent certificate name mismatch warnings. However, use of wildcard
certificates is considered less secure than assigning a unique server certificate for each Cisco ISE node.
The following table describes the fields in the certificate-signing request window, which you can use to
generate a certificate-signing request that can be signed by a Certificate Authority (CA). To view this window,
click the Menu icon ( ) and choose Administration > System > Certificates > Certificate Management
> Certificate-Signing Request.
• Admin: Used for server authentication (to secure communication with the Admin portal and between
ISE nodes in a deployment). The certificate template on the signing CA is often called a Web Server
certificate template. This template has the following properties:
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
• EAP Authentication: Used for server authentication. The certificate template on the signing CA is
often called a Computer or Machine certificate template. This template has the following properties:
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
Note Digital signature key usage is required for EAP-TLS client certificates.
• RADIUS DTLS: Used for RADIUS DTLS server authentication. This template has the following
properties:
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
• ISE Messaging Service: Used by the feature Syslog Over Cisco ISE Messaging, which enables
MnT WAN survivability for built-in UDP syslog collection targets (LogCollector and LogCollector2).
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
• Portal: Used for server authentication (to secure communication with all ISE web portals). The
certificate template on the signing CA is often called a Computer or Machine certificate template.
This template has the following properties:
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
• pxGrid: Used for both client and server authentication (to secure communication between the pxGrid
client and server). The certificate template on the signing CA is often called a Computer or Machine
• SAML: Server certificate used to secure communication with the SAML Identity Provider (IdP). A
certificate designated for SAML use cannot be used for any other service such as Admin, EAP
authentication, and so on.
• Key Usage: Digital Signature (Signing)
• Extended Key Usage: TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
Note We recommend that you do not use a certificate that contains the value of 2.5.29.37.0 for the
Any Purpose object identifier in the Extended Key Usage attribute. If you use a certificate that
contains the value of 2.5.29.37.0 for the Any Purpose object identifier in the Extended Key Usage
attribute, the certificate is considered invalid and the following error message is displayed:
source=local ; type=fatal ; message="unsupported certificate"
• Renew ISE OCSP Responder Certificates: (Applicable only for the internal CA service) Used to
renew the ISE OCSP responder certificate for the entire deployment (and is not a certificate signing
request). For security reasons, we recommend that you renew the ISE OCSP responder certificates
every six months.
Allow Wildcard Check this check box to use a wildcard character (*) in the CN and/or the DNS name in the SAN field
Certificates of the certificate. If you check this check box, all the nodes in the deployment are selected automatically.
You must use the asterisk (*) wildcard character in the left-most label position. If you use wildcard
certificates, we recommend that you partition your domain space for greater security. For example, instead
of *.example.com, you can partition it as *.amer.example.com. If you do not partition your domain, it
might lead to security issues.
Generate CSRs for Check the check boxes next to the nodes for which you want to generate the certificate. To generate a
these Nodes CSR for select nodes in the deployment, you must uncheck the Allow Wildcard Certificates option.
City (L) (Do not abbreviate) City name. For example, San Jose.
State (ST) (Do not abbreviate) State name. For example, California.
Country (C) Country name. You must enter the two-letter ISO country code. For example, US.
Subject Alternative An IP address, DNS name, Uniform Resource Identifier (URI), or Directory Name that is associated with
Name (SAN) the certificate.
• DNS Name: If you choose the DNS name, enter the fully qualified domain name of the ISE node.
If you have enabled the Allow Wildcard Certificates option, specify the wildcard notation (an asterisk
and a period before the domain name). For example, *.amer.example.com.
• IP Address: IP address of the ISE node to be associated with the certificate.
• Uniform Resource Identifier: A URI that you want to associate with the certificate.
• Directory Name: A string representation of distinguished name(s) (DNs) defined per RFC 2253.
Use a comma (,) to separate the DNs. For “dnQualifier” RDN, escape the comma and use
backslash-comma “\,” as separator. For example, CN=AAA,dnQualifier=O=Example\,DC=COM,C=IL
Key Type Specify the algorithm to be used for creating the public key: RSA or ECDSA.
Key Length Specify the bit size for the public key.
The following options are available for RSA:
• 512
• 1024
• 2048
• 4096
Note RSA and ECDSA public keys might have different key length for the same security level.
Certificate Policies Enter the certificate policy OID or list of OIDs that the certificate should conform to. Use comma or space
to separate the OIDs.
Related Topics
Certificate-Signing Requests, on page 288
Create a Certificate-Signing Request and Submit it to a Certificate Authority, on page 289
Bind a CA-Signed Certificate to a Certificate Signing Request, on page 289
Note Cisco ISE presents the Portal certificate on TCP port 8443 (or the port that you have configured for portal
use).
Step 1 Create a Certificate-Signing Request and Submit it to a Certificate Authority, on page 289.
You must choose a Certificate Group Tag that you have already defined or create a new one for the portal. For example,
mydevicesportal.
Step 2 Import a Root Certificate into the Trusted Certificate Store, on page 283.
Step 3 Bind a CA-Signed Certificate to a Certificate Signing Request, on page 289.
Note When you add a new certificate, you can reassign the portal group tag from the Default Portal Certificate
Group tag to a different portal group tag. This will change all the portals that are associated with the certificate
by default, to those that are mapped to that portal group tag only. The system displays a list of these portals.
When you edit an existing certificate, if the portal tag that is associated with the certificate is already in use
by any of the portals, then you cannot reassign the Default Portal Certificate Group tag or any other portal
group tag to this certificate.
The following procedure describes how to reassign the default portal certificate group tag to a CA-signed
certificate.
Step 1 Choose Administration > System > Certificates > System Certificates.
Hover the mouse over the i icon next to the Default Portal Certificate Group tag to view the list of portals that use this
tag. You can also view the ISE nodes in the deployment that have portal certificates which are assigned this tag.
Step 2 Check the check box next to the CA-signed certificate that you want to use for portals, and click Edit.
Be sure to choose a CA-signed certificate that is not in use by any of the portals.
Step 3 Under the Usage area, check the Portal check box and choose the Default Portal Certificate Group Tag.
Step 4 Click Save.
A warning message appears.
Step 5 Click Yes to reassign the default portal certificate group tag to the CA-signed certificate.
Step 1 Create a self-signed certificate, choose "Portal" as a service, and assign a different certificate group tag (for example,
tempportaltag).
Step 2 Change the portal configuration to use the newly created certificate group tag (tempportaltag).
Step 3 Edit the default self-signed certificate and remove the Portal role.
This option removes the Default Portal Certificate Group tag association with the default self-signed certificate.
Option Description
a. Choose "Portal" as a service for which you will use this certificate and associate
the "Default Portal Certificate Group" tag.
b. Send the CSR to a CA and obtain the signed certificate.
c. Import the root and any other intermediate certificates of the CA that signed your
certificate in to the Trusted Certificates store.
d. Bind the CA-signed certificate with the CSR.
Import the private key and the When you import the CA-signed certificate:
CA-signed certificate
a. Choose "Portal" as a service for which you will use this certificate and associate
the "Default Portal Certificate Group" tag.
b. Import the root and any other intermediate certificates of the CA that signed your
certificate in to the Trusted Certificates store.
Edit an existing CA-signed When you edit the existing CA-signed certificate:
certificate.
Choose "Portal" as a service for which you will use this certificate and associate the
"Default Portal Certificate Group" tag.
value from 0 to 15. A value of 0 indicates that the certificate has already expired. A value of 1 indicates
that the certificate has less than 1 day before it expires.
• Is Expired: This Boolean attribute indicates whether a certificate has expired or not. If you want to allow
certificate renewal only when the certificate is near expiry and not after it has expired, use this attribute
in authorization policy condition.
Step 1 Choose Policy > Policy Elements > Results > Authentication > Allowed Protocols > Default Network Access.
Step 2 Check the Allow Authentication of expired certificates to allow certificate renewal in Authorization Policy check
box under the EAP-TLS protocol and EAP-TLS inner methods for PEAP and EAP-FAST protocols.
Requests that use the EAP-TLS protocol will go through the NSP flow.
For PEAP and EAP-FAST protocols, you must manually install and configure Cisco AnyConnect for Cisco ISE to process
the request.
What to do next
Create an Authorization Policy Profile for CWA Redirection, on page 300
Step 1 Choose Policy > Policy Elements > Results > Authorization > Authorization Profiles.
Step 2 Click Add.
Step 3 Enter a name for the authorization profile. For example, CertRenewal_CWA.
Step 4 Check the Web Redirection (CWA, DRW, MDM, NSP, CPP) check box in the Common Tasks area.
Step 5 Choose Centralized Web Auth from the drop-down list and the limited access ACL.
Step 6 Check the Display Certificates Renewal Message check box.
The URL-redirect attribute value changes and includes the number of days for which the certificate is valid.
Step 1 Choose Work Centers > Guest Access > Portals & Components > Guest Portals.
a) Select the chosen CWA portal and click Edit.
Step 2 From BYOD Settings, check the Allow employees to use personal devices on the network check box.
Step 3 Click Save.
click the Menu icon ( ) and choose Administration > System > Certificates > Certificate Management
> Certificate Periodic Check Settings.
Check ongoing Check this check box if you want Cisco ISE to check ongoing sessions against CRLs
sessions against that are automatically downloaded.
automatically
retrieved CRL
First check at Specify the time of the day when the CRL or OCSP check should begin each day.
Enter a value between 00:00 and 23:59 hours.
Check every Specify the time interval in hours that Cisco ISE waits before checking the CRL or
OCSP server again.
Cisco ISE doesn’t allow the specification of LDAP binding type in its CRL retrieval configuration, and
connects to an LDAP URL using anonymous bind at the certificate distribution point. Cisco ISE only supports
LDAP binding for authentication to LDAP servers.
Cisco ISE uses HTTP (port 80), HTTPS (port 443), and LDAP (port 389) protocols by default for CRL
processes. In the case of Windows Vista SP1 and Windows Server 2008 endpoints, Microsoft only supports
the following protocols for CRLs:
• HTTP: A PKI client only performs authentications for locally configured proxies. By default, authentication
is performed only when a proxy server returns an error message that proxy authentication is required.
• LDAP: The PKI client signs and encrypts all LDAP traffic for PKI objects and only uses Kerberos
authentication if authentication is required for network retrieval.
For more information, see What’s New in Certificate Revocation in Windows Vista and Windows Server
2008
Related Topics
OCSP Services, on page 334
Add OCSP Client Profiles, on page 336
Step 2 Open the command prompt and go to the folder that contains your .pfx file.
Step 3 Run the following command to extract the private key in .pem format: openssl pkcs12 -in certname.pfx -nocerts -out
key.pem -nodes
You will be prompted to type the import password. Type the password that you used to protect your keypair when you
created the .pfx file. You will be prompted again to provide a new password to protect the .pem file that you are creating.
Store the password to your key file in a secure place to avoid misuse.
Step 4 Run the following command to extract the certificate in .pem format: openssl pkcs12 -in certname.pfx -nokeys -out
cert.pem
Step 5 Run the following command to decrypt the private key: openssl rsa -in key.pem -out server.key
Type the pasword that you created to protect the private key file in the previous step.
The .pem file and the decrypted and the encrypted .key files are available in the path, where you started OpenSSL.
When a CA Service is disabled on the primary administrative node, the CA service is still seen as running on
the secondary administration node's CLI. Ideally, the CA service should be seen as disabled. This is a known
Cisco ISE issue.
Note After the trusted certificate is configured with a policy, you cannot delete the certificate. The following message
is displayed in the This Trusted Certificate Refered by Policy Sets section in the Trusted Certificates
window. To view this window, click the Menu icon ( ) and choose Administration > System >
Certificates > Trusted Certificates:
Certificate cannot be deleted because it is used in a policy. To delete
the certificate, please modify policy condition first.
To configure certificate fringerprint for Cisco ISE, follow the below steps in compliance with the order:
1. Create an internal user. For more information, see "Add Users" section in the chapter "Asset Visibility"
in Cisco Identity Services Engine Administrator Guide, Release 3.0.
2. Add a network device. For more information, see "Add a Network Device in Cisco ISE" section in the
chapter "Basic Setup"in Cisco Identity Services Engine Administrator Guide, Release 3.0.
3. Import external CA in External Certificates. For more information, see "Import a System Certificate"
section in the chapter "Basic Setup" in Cisco Identity Services Engine Administrator Guide, Release 3.0.
You can also import the Issuer- Fingerprint SHA-256 certificate using the SCEP protocol. In the Cisco
ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Certificate
Authority > External CA Settings. In the Add SCEP RA Profile window that is displayed, click Add.
Enter the certificate name in the Name field. Enter the CA server URL in the URL field. Click Test
Connection.
4. Create a Policy with SHA-256 Fingerprint.
5. Create and Map an Authentication Policy with SHA-256 Fingerprint.
6. Create an Authorization Policy.
7. Verify PRRT Logs.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Set.
Step 2 In the Policy Set window that is displayed, click Settings and from the drop down list, choose insert a new row.
Step 3 In the New Policy Name field, enter a name.
Step 4 Enter the Description for the policy.
Step 5 Click the Add ( + ) icon adjacent to the new Policy Set Name under the Conditions column.
Step 6 In the Condition Studio window that is displayed, click the Click to Add Attribute field.
Step 7 Select the Network Access-Protocol (Dictionary-Attribute) combination from the All Dictionary drop-down list.
Step 8 Select the Equals operator to build a logical condition.
Step 9 Choose RADIUS from the Choose from List or Type drop-down list.
Step 10 Click Use.
Step 11 In the Policy Set window that is displayed, from the Allowed Protocols/ Server Sequence drop down list, select
Default Network Access.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Set > Default.
Step 2 Click Authentication Policy.
Step 3 Click the settings icon and choose insert a new row.
Step 4 In the Authentication Rule Name window, enter the name.
Step 5 Click on the Add ( + ) icon adjacent to the rule name.
Step 6 In the Condition Studio window that is displayed, click the Click to add Attributes field.
Step 7 Choose CERTIFICATE-Issuer- Fingerprint SHA-256 (Dictionary-Attribute) combination from the All Dictionary
drop-down list.
Step 8 Select the Equals operator to build a logical condition.
Step 9 Choose Cisco Manufacturing CA SHA2 fingerprint sha256 from Choose from List or Type drop-down list.
Step 10 Click Use.
Step 11 In the Policy Set window that is displayed, from the Allowed Protocols/Server Sequence drop-down list, select
Preloaded_Certificate_Profile.
Step 12 Click Save.
Step 1 Choose In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Set > Default.
Step 2 Click Authorization Policy.
Step 3 Click on the settings icon and choose insert a new rowfrom the drop-down list.
Step 4 In the Authorization Rule Name window, enter the name.
Step 5 Click the Add ( + ) icon adjacent to the rule name.
Step 6 In the Condition Studio window that is displayed, click the Click to Add Attributes field.
Step 7 Select the CERTIFICATE-Issuer- Fingerprint SHA-256 (Dictionary-Attribute) combination from the All Dictionary
drop-down list.
Step 8 Select the Equals operator to build a logical condition.
Step 9 Select Cisco Root CA 2099 fingerprint shafrom Choose from List or Type drop-down list.
Step 10 Click Use.
Step 11 In the Policy Set window that is displayed, from the Allowed Protocols/Server Sequence drop down list, select
PermitAccess.
Step 12 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operation > RADIUS > Live Logs.
Step 2 In the Live Logs window that is displayed, click the latest log details.
Step 3 In the Authentication Details window that is displayed, view the SHA-256 value in the Issuer- Fingerprint SHA-256
column to confirm that the Issuer- Fingerprint SHA-256 certificate is successfully added and validated.
When you set up a deployment, the node that you designate as the Primary Administration Node (PAN)
becomes the Root CA. The PAN has a Root CA certificate and a Node CA certificate that is signed by the
Root CA.
When you register a Secondary Administration Node to the PAN, a Node CA certificate is generated and is
signed by the Root CA on the Primary Administration Node.
Any Policy Service Node (PSN) that you register with the PAN is provisioned an Endpoint CA and an OCSP
certificate signed by the Node CA of the PAN. The Policy Service Nodes (PSNs) are subordinate CAs to the
PAN. When you use the ISE CA, the Endpoint CA on the PSN issues the certificates to the endpoints that
access your network.
Figure 9: Cisco ISE CA Certificates Provisioned on Administration and Policy Service Nodes in a Deployment
Note Cisco ISE supports Enterprise Java Beans Certificate Authority (EJBCA) for
standard EAP authentication like PEAP, EAP-TLS, and so on. You must disable
the Enable End Entity Profile Limitations option (under System > Basic
Configurations) in EJBCA to enable EJBCA support for proxy SCEP.
• If you use an enterprise PKI to issue certificates for Apple iOS devices, ensure that you configure key
usage in the SCEP template and enable the Key Encipherment option.
If you use Microsoft CA, edit the Key Usage Extension in the certificate template. In the Encryption
area, click the Allow Key Exchange only with Key Encryption (Key encipherment) radio button and
check the Allow Encryption of User Data check box.
• Cisco ISE supports the use of RSASSA-PSS algorithm for trusted certificates and endpoint certificates
for EAP-TLS authentication. When you view the certificate, the signature algorithm is listed as
1.2.840.113549.1.1.10 instead of the algorithm name.
Note If you use the Cisco ISE internal CA for the BYOD flow, the Admin certificate should not be signed using
the RSASSA-PSS algorithm (by an external CA). The Cisco ISE internal CA cannot verify an Admin certificate
that is signed using this algorithm and the request would fail.
RSA
ECC 1 2
1
Windows 7 and Apple iOS do not natively support ECC for EAP-TLS authentication.
2
This release of Cisco ISE does not support the use of ECC certificates on MAC OS X devices.
Note Whenever the Cisco ISE internal CA is replaced in a deployment, then the ISE messaging service must also
be refreshed at that time to retrieve the complete certificate chain.
When you regenerate the Cisco ISE internal CA chain, the Valid From field of all the certificates in the chain
will display the date one day previous to the day of regeneration.
If there is a change in domain or host name and if the root CA chain is regenerated, all the certificates including
the system certificates will get updated with the new domain or host name except the SAML certificate. The
SAML certificate has to be regenerated separately.
ECC Key Size (in bits) RSA Key Size (in bits)
160 1024
224 2048
256 3072
384 7680
521 15360
ISE does not support explicit parameters in the EC part of a certificate. If you try to import a certificate with
explicit parameters, you get the error: Validation of certificate failed: Only named ECParameters supported.
Cisco ISE CA service supports ECC certificates for devices connecting through the BYOD flow. You can
also generate ECC certificates from the Certificate Provisioning Portal.
Note The following table lists the operating systems and versions that support ECC along with the supported curve
types. If your devices are not running a supported operating system or on a supported version, you can use
RSA-based certificates instead.
Windows 7 and Apple iOS do not natively support ECC for authentication over EAP-TLS. This release of
Cisco ISE does not support the use of ECC certificates on MAC OS X devices.
If the BYOD flow with Enrollment over Secure Transport (EST) protocol is not working properly, check the
following:
• Certificate Services Endpoint Sub CA certificate chain is complete. To check whether the certificate
chain is complete:
1. Choose Administration > System > Certificates > Certificate Authority > Certificate Authority
Certificates.
2. Check the check box next to the certificate that you want to check and click View.
• Ensure that the CA and EST services are up and running. If the services are not running, go to
Administration > System > Certificates > Certificate Authority > Internal CA Settings to enable
the CA service.
Note • This release of Cisco ISE does not support EST clients to authenticate directly against the EST Server
residing within Cisco ISE. While on-boarding an Android or a Windows endpoint, ISE triggers an EST
flow if the request is for an ECC-based certificate.
• BYOD flow with Android clients might fail when using EST protocol along with a static IP address, an
FQDN or a hostname in the authorization profile. The workaround is to use SCEP instead of EST. You
can configure SCEP in the native supplicant profile. See Create Native Supplicant Profiles for more
information.
Step 1 Choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates..
Step 2 In the ISE-PIC GUI, click the Menu icon ( ) and choose .
Step 3 Check the check box next to the certificate that you want to edit, and click Edit.
Step 4 Modify the editable fields as required. See Trusted Certificate Settings, on page 280 for a description of the fields.
Step 5 Click Save to save the changes you have made to the certificate store.
Step 1 Choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates.
Step 2 In the ISE-PIC GUI, click the Menu icon ( ) and choose .
Step 3 Check the check box next to the certificate that you want to export, and click Export. You can export only one certificate
at a time.
Step 4 Save the privacy-enhanced mail file to the file system that is running your client browser.
Step 1 Log in to the Admin Portal of the deployment where the endpoint is getting authenticated.
Step 2 Choose Administration > System > Certificates > Trusted Certificates.
Step 3 Click Import.
Step 4 Configure the field values as necessary. See Trusted Certificate Import Settings, on page 283 for more information.
If client certificate-based authentication is enabled, then Cisco ISE will restart the application server on each node in
your deployment, starting with the application server on the PAN and followed, one-by-one, by each additional node.
Certificate Templates
Certificate templates contain properties that are common to all certificates issued by the Certificate Authority
(CA) based on that template. The certificate template defines the Subject, Subject Alternative Name (SAN),
key type, key size, SCEP RA profile that must be used, validity period of the certificate, and the extended key
usage (EKU) that specifies whether the certificate has to be used for client or server authentication or both.
The internal Cisco ISE CA (ISE CA) uses a certificate template to issue certificates based on that template.
Cisco ISE comes with the following default certificate templates for the ISE CA. You can create additional
certificate templates, if needed. The default certificate templates are:
• CA_SERVICE_Certificate_Template—For other network services that use Cisco ISE as the Certificate
Authority. For example, use this certificate template while configuring ISE to issue certificates for ASA
VPN users. You can modify only the validity period in this certificate template.
• EAP_Authentication_Certificate_Template—For EAP authentication.
• pxGrid_Certificate_Template—For the pxGrid controller while generating the certificate from the
Certificate Provisioning Portal.
Step 1 Choose Policy > Policy Sets, and expand the Default policy set to view the authorization policy rules.
Step 2 Add a new rule or edit an existing rule. This example describes editing the Compliant_Device_Access rule:
a) Edit the Compliant_Device_Access rule.
b) Choose Add Attribute/Value.
c) From Dictionaries, choose the CERTIFICATE: Template Name attribute and Equals operator.
d) Enter the value of the certificate template name. For example, EAP_Authentication_Certificate_Template.
Step 3 Click Save.
Step 1 Create a network access user account (Administration > Identity Management > Identities > Users > Add).
Make note of the user group to which the user is assigned.
Step 2 Edit the Certificate Provisioning Portal Settings (Administration > Device Portal Management > Certificate Provisioning).
a) Select the certificate provisioning portal and click Edit.
b) Click the Portal Settings drop-down list. From the Configure authorized groups Available list, select the user group
to which the network access user belongs to and move it to Chosen list.
c) Click the Certificate Provisioning Portal Settings drop-down list. Choose the pxGrid_Certificate_Template. See
the Portal Settings for Certificate Provisioning Portal section in Cisco ISE Admin Guide: Guest and BYOD for more
information.
d) Save the portal settings.
Step 3 Launch the Certificate Provisioning Portal. Click the Portal Test URL link.
a) Log in to the Certificate Provisioning Portal using the user account created in step 1.
b) Accept the AUP and click Continue.
c) From the I want to drop-down list, choose Generate a single certificate (with certificate signing request).
d) In the Certificate Signing Request Details field, paste the contents of the CSR from the clipboard.
e) From the Certificate Download Format drop-down list, choose PKCS8 format.
Note If you choose the PKCS12 format, you must convert the single certificate file in to separate certificate and
key files. The certificate and key files must be in binary DER encoded or PEM format before you can import
them in to Cisco ISE.
Step 4 Import the Cisco ISE CA chain in to the Trusted Certificates store in the pxGrid client.
Issued Certificates
The Admin portal lists all the certificates issued by the internal ISE CA to endpoints (Administration > System
> Certificates > Endpoint Certificates). The Issued Certificates page provides you an at-a-glance view of the
certificate status. You can mouse over the Status column to find out the reason for revocation if a certificate
has been revoked. You can mouse over the Certificate Template column to view additional details such as
Key Type, Key Size or Curve Type, Subject, Subject Alternative Name (SAN), and Validity of the certificate.
You can click on the endpoint certificate to view the certificate.
All certificates issued by the ISE CA (certificates automatically provisioned through the BYOD flow and
certificates obtained from the Certificate Provisioning portal) are listed in the Endpoint Certificates page. You
can manage these certificates from this page.
For example, if you want to view the certificates issued to user7, enter user7 in the text box that appears below
the Friendly Name field. All the certificates issued by Cisco ISE to this user appear. Remove the search term
from the text box to cancel the filter. You can also use the Advanced Filter option to view records based on
various search criteria.
This Endpoint Certificates page also provides you the option to revoke an endpoint certificate, if necessary.
The Certificate Management Overview page displays the total number of endpoint certificates issued by each
PSN node in your deployment. You can also view the total number of revoked certificates per node and the
total number of certificates that have failed. You can filter the data on this page based on any of the attributes.
Note Expired or revoked issued certificates will be automatically deleted after 30 days.
Certificates Number of revoked endpoint certificates (certificates that were issued by the PSN
Revoked node).
Certificates Failed Number of failed authentication requests processed by the PSN node.
Related Topics
Issued Certificates, on page 313
User and Endpoint Certificate Renewal, on page 298
Configure Cisco ISE to Use Certificates for Authenticating Personal Devices, on page 318
Configure Cisco ISE to Allow Users to a Renew Certificate, on page 299
Revoke an Endpoint Certificate, on page 333
You must back up and restore Cisco ISE CA certificates and keys when you:
• Have a Secondary Administration Node in the deployment
• Replace the entire Cisco ISE CA root chain
• Configure Cisco ISE root CA to act as a subordinate CA of an external PKI
• Restore data from a configuration backup. In this case, you must first regenerate the Cisco ISE CA root
chain and then back up and restore the ISE CA certificates and keys.
Note Whenever the Cisco ISE internal CA is replaced in a deployment, then the ISE messaging service must also
be refreshed that time to retrieve the complete certificate chain.
Step 1 Enter application configure ise command from the Cisco ISE CLI.
Step 2 Enter 7 to export the certificates and keys.
Step 3 Enter the repository name.
Step 4 Enter an encryption key.
A success message appears with the list of certificates that were exported, along with the subject, issuer, and serial number.
Example:
The following 4 CA key pairs were exported to repository 'sftp' at 'ise_ca_key_pairs_of_ise-vm1':
Subject:CN=Cisco ISE Self-Signed CA of ise-vm1
Issuer:CN=Cisco ISE Self-Signed CA of ise-vm1
Serial#:0x621867df-568341cd-944cc77f-c9820765
Step 1 Enter application configure ise command from the Cisco ISE CLI.
Step 2 Enter 8 to import the CA certificates and keys.
Step 3 Enter the repository name.
Step 4 Enter the name of the file that you want to import. The file name should be in the format ise_ca_key_pairs_of_<vm
hostname>.
Step 5 Enter the encryption key to decrypt the file.
A success message appears.
Example:
The following 4 CA key pairs were imported:
Subject:CN=Cisco ISE Self-Signed CA of ise-vm1
Issuer:CN=Cisco ISE Self-Signed CA of ise-vm1
Serial#:0x21ce1000-8008472c-a6bc4fd9-272c8da4
Note Encryption of exported keys file was introduced in Cisco ISE Release 2.6. The export of keys from Cisco ISE
Release 2.4 and earlier versions and import of keys in Cisco ISE Release 2.6 and later versions will not be
successful.
Generate Root CA and Subordinate CAs on the Primary PAN and PSN
When you set up the deployment, Cisco ISE generates a root CA on the primary PAN and subordinate CA
certificates on the PSNs for the Cisco ISE CA service. However, when you change the domain name or the
hostname of the primary PAN or PSN, you must regenerate root CA on the primary PAN and sub CAs on the
PSNs respectively.
If you want to change the hostname on a PSN, instead of regenerating the root CA and subordinate CAs on
the primary PAN and PSNs respectively, you can deregister the PSN before changing the hostname, and
register it back. A new subordinate certificate gets provisioned automatically on the PSN.
Note PXgrid and IMS certificates will not be replaced by Internal CA while regenerating root CA if the respective
certificate is externally signed.
If you want to change the signing by Internal CA for PXgrid certificate, generate a self-signed Pxgrid certificate
and regenerate the root CA.
If you want to change the signing by Internal CA for Cisco ISE Messaging Services certificate, regenerate
the Cisco ISE Messaging Services certificate from the CSR page.
Step 1 Choose Administration > System > Certificates > Certificate Signing Requests
Step 2 Click Generate Certificate Signing Requests (CSR).
Step 3 Choose ISE Root CA from the Certificate(s) will be used for drop-down list.
Step 4 Click Replace ISE Root CA Certificate chain.
The root CA and subordinate CA certificates get generated for all the nodes in your deployment.
Step 1 Choose Administration > System > Certificates > Certificate Signing Requests.
Step 2 Click Generate Certificate Signing Requests (CSR).
Step 3 Choose ISE Intermediate CA from the Certificate(s) will be used for drop-down list.
Step 4 Click Generate.
Step 5 Export the CSR, send it to the external CA, and obtain the CA-signed certificate.
Step 6 Import the root CA certificate from the external CA in to the Trusted Certificates store.
Step 7 Bind the CA-signed certificate with the CSR.
What to do next
If you have a secondary PAN in the deployment, obtain a backup of the Cisco ISE CA certificates and keys
from the primary PAN and restore it on the secondary PAN. Server and root certificates are then automatically
replicated in the secondary PAN. This ensures that the secondary PAN can function as subordinate CA of the
external PKI in case of administration node failover.
Step 1 Choose Administration > Identity Management > Identities > Users.
Step 2 Click Add.
Step 3 Enter the user details.
Step 4 In the Passwords section, choose the Login Password and TACACS+ Enable Password to set the access level to a
network device.
Step 5 Select Employee from the User Group drop-down list.
All users who belong to the Employee user group share the same set of privileges.
What to do next
Create a Certificate Authentication Profile for TLS-Based Authentication, on page 319
Step 1 Choose Administration > Identity Management > External Identity Sources > Certificate Authentication Profile.
Step 2 Enter a name for your certificate authentication profile. For example, CAP.
Step 3 Choose Subject - Common Name as the Principal Username X509 Attribute.
Step 4 Click Save.
What to do next
Create an Identity Source Sequence for TLS-Based Authentication, on page 319
Step 1 Choose Administration > Identity Management > Identity Source Sequences.
Step 2 Click Add.
Step 3 Enter a name for the identity source sequence. For example, Dot1X.
Step 4 Check the Select Certificate Authentication Profile check box and select the certificate authentication profile that you
created earlier, namely CAP.
Step 5 Move the identity source that contains your user information to the Selected list box in the Authentication Search List
area.
You can add additional identity sources and Cisco ISE searches these data stores sequentially until a match is found.
Step 6 Click the Treat as if the user was not found and proceed to the next store in the sequence radio button.
Step 7 Click Submit.
What to do next
Configure Certificate Authority Settings, on page 320
Windows Standard certificate store Launch mmc.exe from the /cmd prompt or view
in the certificate snap-in.
Mac Standard certificate store Application > Utilities > Keychain Access
Step 1 Choose Administration > System > Certificates > External CA Settings.
Step 2 Click Add.
Step 3 Enter a name for the external CA setting. For example, EXTERNAL_SCEP.
Step 4 Enter the external CA server URL in the URL text box.
Click Test Connection to check if the external CA is reachable. Click the + button to enter additional CA server URLs.
Step 5 Click Submit.
What to do next
Create a CA Template, on page 321
Create a CA Template
The certificate template defines the SCEP RA profile that must be used (for the internal or external CA), Key
Type, Key Size or Curve Type, Subject, Subject Alternative Name (SAN), validity period of the certificate,
and the Extended Key Usage. This example assumes that you are going to use the internal Cisco ISE CA. For
an external CA template, the validity period is determined by the external CA and you cannot specify it.
You can create a new CA template or edit the default certificate template,
EAP_Authentication_Certificate_Template.
By default, the following CA templates are available in Cisco ISE:
• CA_SERVICE_Certificate_Template—For other network services that use the ISE CA. For example,
use this certificate template while configuring ISE to issue certificates for ASA VPN users.
• EAP_Authentication_Certificate_Template—For EAP authentication.
• pxGrid_Certificate_Template—For pxGrid controller while generating the certificate from the Certificate
Provisioning Portal.
Note Certificate templates that use the ECC key type can be used only with the internal Cisco ISE CA.
Step 1 Choose Administration > System > CA Service > Internal CA Certificate Template.
Step 2 Enter a name for the internal CA template. For example, Internal_CA_Template.
Step 3 (Optional) Enter values for the Organizational Unit, Organization, City, State, and Country fields.
We do not support UTF-8 characters in the certificate template fields (Organizational Unit, Organization, City, State,
and Country). Certificate provisioning fails if UTF-8 characters are used in the certificate template.
The username of the internal user generating the certificate is used as the Common Name of the certificate. Cisco ISE
Internal CA does not support "+" or "*" characters in the Common Name field. Ensure that your username does not
include "+" or "*" special characters.
Step 4 Specify the Subject Alternative Name (SAN) and the validity period of the certificate.
Step 5 Specify a Key Type. Choose RSA or ECC.
The following table lists the operating systems and versions that support ECC along with the curve types that are
supported. If your devices are not running a supported operating system or on a supported version, you can use RSA-based
certificates instead.
Windows 7 and Apple iOS do not natively support ECC for EAP-TLS authentication. This release of Cisco ISE does
not support the use of ECC certificates on MAC OS X devices.
If the devices in your network run an operating system that is not supported (Windows 7, MAC OS X, or Apple iOS,
we recommend that you choose RSA as the Key Type.
Step 6 (Applicable if you choose the RSA Key Type) Specify a key size. You must choose 1024 or a higher key size.
Step 7 (Applicable only if you choose the ECC Key Type) Specify the Curve Type. The default is P-384.
Step 8 Choose ISE Internal CA as the SCEP RA Profile.
Step 9 Enter the validity period in days. The default is 730 days. Valid range is between 1 and 730.
Step 10 Specify the Extended Key Usage. Check the Client Authentication check box if you want the certificate to be used
for client authentication. Check the Server Authentication check box if you want the certificate to be used for server
authentication.
Step 11 Click Submit.
The internal CA certificate template is created and will be used by the client provisioning policy.
What to do next
Create a Native Supplicant Profile to be Used in Client-Provisioning Policy, on page 323
Internal CA Settings
The following table describes the fields in the internal CA Settings window. You can view the internal CA
settings and disable the internal CA service from this window. To view this window, click the Menu icon
( ) and choose Administration > System > Certificates > Certificate Authority > Internal CA Settings.
Host Name Host name of the Cisco ISE node that is running the
CA service.
Personas Cisco ISE node personas that are enabled on the node
running the CA service. For example, Administration,
Policy Service, etc.
OCSP Responder URL URL for Cisco ISE node to access the OCSP server.
SCEP URL URL for the Cisco ISE node to access the SCEP
server.
Related Topics
Cisco ISE CA Service, on page 302
Configure Cisco ISE to Use Certificates for Authenticating Personal Devices, on page 318
Step 1 Choose Policy > Policy Elements > Results > Client Provisioning > Resources.
Step 2 Choose Add > Native Supplicant Profile.
Step 3 Enter a name for the native supplicant profile. For example, EAP_TLS_INTERNAL.
Step 4 Choose ALL from the Operating System drop-down list.
Note The MAC OS version 10.10 user should manually connect to the provisioned SSID for dual-SSID PEAP flow.
What to do next
Download Agent Resources from Cisco for Windows and MAC OS X Operating Systems, on page 323
Download Agent Resources from Cisco for Windows and MAC OS X Operating Systems
For Windows and MAC OS X operating systems, you must download the remote resources from the Cisco
site.
Step 1 Choose Policy > Policy Elements > Resources > Client Provisioning > Resources.
Step 2 Choose Add > Agent resources from Cisco site.
Step 3 Check the check boxes next to the Windows and MAC OS X packages. Be sure to include the latest versions.
Step 4 Click Save.
What to do next
Create Client-Provisioning Policy Rules for Apple iOS, Android, and MAC OS X Devices, on page 324
Create Client-Provisioning Policy Rules for Apple iOS, Android, and MAC OS X Devices
Client provisioning resource policies determine which users receive which version (or versions) of resources
(agents, agent compliance modules, and agent customization packages/profiles) from Cisco ISE upon login
and user session initiation.
When you download the agent compliance module, it always overwrites the existing one, if any, available in
the system.
To enable employees to bring iOS, Android, MAC OS X devices, you must create policy rules for each of
these devices on the Client Provisioning Policy page.
What to do next
Configure the Dot1X Authentication Policy Rule for TLS-Based Authentication, on page 324
Step 3 To edit the conditions for the Dot1X authentication policy rule, hover over the cell in the Conditions column and click
. The Conditions Studio opens.
Step 4 From the Actions column in the Dot1X policy rule, click the cog icon and then from the drop-down menu, insert a new
policy set by selecting any of the insert or duplicate options, as necessary.
A new row appears in the Policy Sets table.
Step 5 Enter a name for the rule. For example, eap-tls.
Step 6 From the Conditions column, click the (+) symbol.
Step 7 Create the required conditions in the Conditions Studio Page. In the Editor section, click the Click To Add an
Attribute text box, and select the required Dictionary and Attribute (for example, Network Access:UserName Equals
User1).
You can drag and drop a Library condition to the Click To Add An Attribute text box.
What to do next
Create Authorization Profiles for Central Web Authentication and Supplicant-Provisioning Flows, on page
325
Create Authorization Profiles for Central Web Authentication and Supplicant-Provisioning Flows
You must define authorization profiles to determine the access that must be granted to the user after the
certificate-based authentication is successful.
Step 1 Choose Policy > Policy Elements > Results > Authorization > Authorization Profiles.
What to do next
Create Authorization Policy Rules, on page 326
Step 1 Choose Policy > Policy Sets, and expand the policy set to view the authorization policy rules.
Step 2 Insert additional policy rules above the default rule.
Step 3 Click Save.
• CWA_GooglePlay - This profile is for Android devices that go through the central web authentication
flow. This profile enables Android devices to access Google Play Store and download the Cisco Network
Setup Assistant. Check the Web Authentication check box, choose Centralized from the drop-down
list, and enter NSP-ACL-Google in the ACL text box.
• NSP - This profile is for non-Android devices that go through the supplicant provisioning flow. Check
the Web Authentication check box, choose Supplicant Provisioning from the drop-down list, and enter
NSP-ACL in the ACL text box.
• NSP-Google - This profile is for Android devices that go through the supplicant provisioning flow. Check
the Web Authentication check box, choose Supplicant Provisioning from the drop-down list, and enter
NSP-ACL-Google in the ACL text box.
Review the default Blackhole_Wireless_Access authorization profile. The Advanced Attributes Settings
should be:
• Cisco:cisco-av-pair = url-redirect=https://ip:port/blockedportal/gateway?portal=PortalID
• Cisco:cisco-av-pair = url-redirect-acl=BLACKHOLE
5. The VPN connection is established after the relevant policies and ACLs are applied. The client starts
key generation for SCEP only after AAA authentication succeeds and the VPN connection is established.
6. The client starts the SCEP enrollment and sends SCEP requests to ASA over HTTP.
7. ASA looks up the session information of the request and relays the request to ISE CA, if the session is
allowed for enrollment.
8. ASA relays the response from ISE CA back to the client.
9. If enrollment succeeds, the client presents a configurable message to the user and disconnects the VPN
session.
10. The user can again authenticate using the certificate and a normal VPN connection is established.
Step 1 Define the ASA as a network access device in Cisco ISE. See Add a Network Device in Cisco ISE, on page 331 for
information on how to add ASA as a network device.
Step 2 Configure Group Policy in ASA, on page 332.
Step 3 Configure AnyConnect Connection Profile for SCEP Enrollment, on page 332.
Step 4 Configure a VPN Client Profile in ASDM, on page 333.
Step 5 Import Cisco ISE CA Certificates into ASA.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 2 Click Add.
Step 3 Enter the corresponding values in the Name, Description, and IP Address fields.
Step 4 Choose the required values from the Device Profile, Model Name, Software Version, and Network Device Group
drop-down lists.
Step 5 (Optional) Check the RADIUS Authentication Settings check box to configure the RADIUS protocol for authentication.
Step 6 (Optional) Check the TACACS Authentication Settings check box to configure the TACACS protocol for authentication.
Step 7 (Optional) Check the SNMP Settings check box to configure SNMP for the Cisco ISE profiling service to collect
information from the network device.
Step 8 (Optional) Check the Advanced Trustsec Settings check box to configure a Cisco TrustSec-enabled device.
Step 9 Click Submit.
Step 7 In the Client Address Assignment area, select the DHCP server and client address pools to use.
Step 8 In the Default Group Policy area, click Manage and select the Group Policy that you have created with the ISE SCEP
URL and port number.
Example:
For example, ISE_CA_SCEP.
Step 9 Choose Advanced > General and check the Enable Simple Certificate Enrollment Protocol check box for this
connection profile.
Step 10 Click OK.
Your AnyConnect connection profile is created.
Step 7 Enter values for the Certificate Contents that define how the client requests the contents of the certificate.
Step 8 Click OK.
The AnyConnect client profile is created. Refer to the Cisco AnyConnect Secure Mobility Client for your version of
AnyConnect for additional information.
If a PSN (sub CA) is compromised, you can revoke all certificates issued by that PSN by filtering on the
Issued By field from the Endpoint Certificates page.
When you revoke a certificate issued to an employee, if there is an active session (authenticated using that
certificate), the session is terminated immediately. Revoking a certificate ensures that unauthorized users do
not have any access to resources as soon as the certificate is revoked.
Step 1 Choose Administration > System > Certificates > Certificate Authority > Issued Certificates.
Step 2 Check the check box next to the endpoint certificate that you want to revoke and click Revoke.
You can search for the certificate based on the Friendly Name and Device Type.
Step 3 Enter the reason for revoking the certificate.
Step 4 Click Yes.
OCSP Services
The Online Certificate Status Protocol (OCSP) is a protocol that is used for checking the status of x.509 digital
certificates. This protocol is an alternative to the Certificate Revocation List (CRL) and addresses issues that
result in handling CRLs.
Cisco ISE has the capability to communicate with OCSP servers over HTTP to validate the status of certificates
in authentications. The OCSP configuration is configured in a reusable configuration object that can be
referenced from any certificate authority (CA) certificate that is configured in Cisco ISE.
You can configure CRL and/or OCSP verification per CA. If both are selected, then Cisco ISE first performs
verification over OCSP. If a communication problem is detected with both the primary and secondary OCSP
servers, or if an unknown status is returned for a given certificate, Cisco ISE switches to checking the CRL.
Note Cisco ISE receives from OCSP responder servers a thisUpdate value, which indicates the time since the last
certificate revocation. If the thisUpdate value is greater than 7 days, the OCSP certificate verification fails in
Cisco ISE.
In case of timeout (which is 5 seconds), when Cisco ISE communicates with the primary OCSP server, it
switches to the secondary OCSP server.
Cisco ISE uses the secondary OCSP server for a configurable amount of time before attempting to use the
primary server again.
OCSP Failures
The three general OCSP failure scenarios are as follows:
• Failed OCSP cache or OCSP client side (Cisco ISE) failures.
• Failed OCSP responder scenarios, for example:
The first primary OCSP responder not responding, and the secondary OCSP responder responding to
the Cisco ISE OCSP request.
Errors or responses not received from Cisco ISE OCSP requests.
An OCSP responder may not provide a response to the Cisco ISE OCSP request or it may return an
OCSP Response Status as not successful. OCSP Response Status values can be as follows:
• tryLater
• signRequired
• unauthorized
• internalError
• malformedRequest
There are many date-time checks, signature validity checks and so on, in the OCSP request. For
more details, refer to RFC 2560 X.509 Internet Public Key Infrastructure Online Certificate Status
Protocol - OCSP which describes all the possible states, including the error states.
Step 1 Choose Administration > System > Certificates > Certificate Management > OCSP Client Profile.
Step 2 Enter the values to add an OCSP Client Profile.
Step 3 Click Submit.
Enable Secondary Server Check this check box to enable a secondary OCSP
server for high availability.
Fallback to Primary Server After Interval n Use this option when you want Cisco ISE to move to
Minutes the secondary server and then fall back to the primary
server again. In this case, all other requests are
skipped, and the secondary server is used for the
amount of time that is configured in the text box. The
allowed time range is 1 to 999 minutes.
Enable Nonce Extension Support You can configure a nonce to be sent as part of the
OCSP request. The Nonce includes a pseudo-random
number in the OCSP request. It is verified that the
number that is received in the response is the same as
the number that is included in the request. This option
ensures that old communications cannot be reused in
replay attacks.
Validate Response Signature The OCSP responder signs the response with one of
the following certificates:
• The CA certificate
• A certificate different from the CA certificate
In order for Cisco ISE to validate the response
signature, the OCSP responder needs to send the
response along with the certificate, otherwise the
response verification fails, and the status of the
certificate cannot be relied on. According to the
RFC, OCSP can sign the response using different
certificates. This is true as long as OCSP sends
the certificate that signed the response for Cisco
ISE to validate it. If OCSP signs the response
with a different certificate that is not configured
in Cisco ISE, the response verification will fail.
Use OCSP URLs specified in Authority Click the radio button to use the OCSP URLs
Information Access (AIA) specified in the Authority Information Access
extension.
Response Cache
Clear Cache Click Clear Cache to clear entries of all the certificate
authorities that are connected to the OCSP service.
In a deployment, Clear Cache interacts with all the
nodes and performs the operation. This mechanism
updates every node in the deployment.
Related Topics
OCSP Services, on page 334
Cisco ISE CA Service Online Certificate Status Protocol Responder, on page 334
OCSP Certificate Status Values, on page 335
OCSP High Availability, on page 335
OCSP Failures, on page 335
OCSP Statistics Counters, on page 339
Add OCSP Client Profiles, on page 336
Message Description
OCSPSecondaryCertsGoodCount The number of ‘good’ statuses that are returned for a given
CA using the primary OCSP server
ClearCacheInvokedCount How many times clear cache was triggered since the
interval
OCSPCertsCleanedUpCount How many cached entries were cleaned since the t interval
Note Admin users can move endpoint MAC addresses from the Endpoint Identity Groups they have read-only
access to, to the Endpoint Identity Groups they have full access to. The other way around is not possible.
Step 1 Choose Administration > System > Admin Access > Authorization > RBAC Policy.
The RBAC Policies page contains a set of ready-to-use predefined policies for default admin groups. You cannot edit or
delete these default policies. However, you can edit the data access permissions for the default Read-Only Admin policy.
Step 2 Click Actions next to any of the default RBAC policy rule.
Here, you can insert new RBAC policies, duplicate an existing RBAC policy, and delete an existing RBAC policy.
passwords, and so on. The password policy that you define in the Administrator Account Settings in Cisco
ISE applies to all administrator accounts.
Cisco ISE supports administrator passwords with UTF-8 characters.
Step 1 Choose Administration > System > Admin Access > Settings > Access > Session.
Step 2 Enter the maximum number of concurrent administrative sessions that you want to allow through the GUI and CLI
interfaces. The valid range for concurrent administrative GUI sessions is from 1 to 20. The valid range for concurrent
administrative CLI sessions is 1 to 10.
Step 3 If you want Cisco ISE to display a message before an administrator logs in, check the Pre-login banner check box and
enter your message in the text box.
Step 4 If you want Cisco ISE to display a message after an administrator logs in, check the Post-login banner check box and
enter your message in the text box.
Step 5 Click Save.
Note The character limit is set at 1500 for the Pre-login banner and 3000 for the Post-login banner. All characters except
% and < are supported. For login banner installation through CLI, the maximum length of the file name used is
256 characters.
Related Topics
Allow Administrative Access to Cisco ISE from Select IP Addresses, on page 341
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Settings
> Access > IP Access.
Step 2 Click the Allow only Listed IP addresses to Connect radio button.
Note Connection on Port 161 (SNMP) is used for administrative access. However, when IP access restrictions are
configured, the snmpwalk fails if the node from which it was performed is not configured for administrative
access.
Step 3 In the Configure IP List for Access Restriction area, click Add.
Step 4 In the Add IP CIDR dialog box, enter the IP addresses in the classless interdomain routing (CIDR) format in the IP
Address field.
Note This IP address can be an IPv4 or an IPv6 address. You can configure multiple IPv6 addresses for a Cisco ISE
node.
Step 5 Enter the subnet mask in the Netmask in CIDR format field.
Step 6 Click OK.
Repeat steps 4 to 7 to add more IP address ranges to this list.
Step 1 From the Cisco ISE home page, choose Administration > System > Admin Access > Settings > Access.
Step 2 Click the MnT Access tab.
Step 3 To allow nodes or entities either within the deployment or outside the deployment to send syslogs to MnT, click the
Allow any IP address to connect to MnT radio button. To allow only nodes or entities within the deployment to send
syslogs to MnT, click the Allow only the nodes in the deployment to connect to MnT radio button.
Note For ISE 2.6 P2 and later, Use ISE Messaging Service for UDP Syslogs delivery to MnT is turned on by default
which doesn’t allow syslogs coming from any other entities outside of deployment.
Note • Email notifications for internal admin users are sent to root@host. You cannot configure the email
address, and many SMTP servers reject this email.
Follow open defect CSCui5583, which is an enhancement to allow you to change the email address.
• Cisco ISE supports administrator passwords with UTF-8 characters.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authentication.
Step 2 Click the radio button for one of the following authentication methods:
• Password Based: Choose this option to use the standard user ID and password credentials for administrator logins.
Choose Internal or External from the Identity Source drop-down list.
Note If you have configured an external identity source such as LDAP and want to use that as your authentication
source to grant access to the admin user, you must select that particular identity source from the Identity
Source list box.
• Client Certificate Based: Choose this option to specify a certificate-based policy. From the Certificate
Authentication Profile drop-down list, choose an existing authentication profile. Choose the required value from
the Identity Source drop-down list.
Step 3 Click the Password Policy tab and enter the required values to configure the Cisco ISE GUI and CLI password
requirements.
Step 4 Click Save to save the administrator password policy.
Note If you use an external identity store to authenticate administrators at login, note that even if this setting is configured
for the password policy applied to the administrator profile, the external identity store will still validate the
administrator’s username and password.
Related Topics
Administrator Password Policy Settings, on page 173
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authentication >
Account Disable Policy.
Step 2 Check the Disable account after n days of inactivity check box, and enter the number of days in the corresponding
field.
This option allows you to disable the administrator account if the administrator account was inactive for the specified
number of days. However, you can exclude individual administrator accounts from this account disable policy using the
Inactive Account Never Disabled option in the Administration > System > Admin Access > Administrators > Admin
Users window.
Step 3 Click Save to configure the global account disable policy for administrators.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authentication >
Lock/Suspend Settings.
Step 2 Check the Suspend Or Lock Account With Incorrect Login Attempts check box and enter the number of failed
attempts after which action should be taken. The valid range is from 3 through 20. Click the radio button for one of the
following options:
• Suspend Account For n Minutes: Choose this option to suspend any account that exceeds a specified number of
incorrect login attempts. The valid range is from 15 through 1440.
• Lock Account: Choose this option to lock an account that exceeds a specified number of incorrect login attempts.
You can enter a custom email remediation message, such as asking the end user to contact the helpdesk to unlock the
account. You can also unlock all locked accounts by disabling and then enabling the Suspend Or Lock Account With
Incorrect Login Attempts option.
Step 1 Choose Administration > System > Admin Access > Settings > Session > Session Timeout.
Step 2 Enter the time in minutes that you want Cisco ISE to wait before it logs out the administrator if there is no activity. The
default value is 60 minutes. The valid range is from 6 to 100 minutes.
Step 3 Click Save.
Step 1 Choose Administration > System > Admin Access > Settings > Session > Session Info.
Step 2 Check the check box next to the session ID that you want to terminate and click Invalidate.
Minimum Length Specify the minimum length of the password (in characters). The default is six
characters.
Password must not Admin name or its characters in reverse order: Check this check box to restrict the
contain use of the administrator username or its characters in reverse order as the password.
Cisco or its characters in reverse order: Check this check box to restrict the use of
the word "Cisco" or its characters in the reverse order as the password.
This word or its characters in reverse order: Check this check box to restrict the
use of any word that you define or its characters in the reverse order as the password.
Repeated characters four or more times consecutively: Check this check box to
restrict the use of repeated characters four or more times consecutively as the password.
Dictionary words, their characters in reverse order, or their letters replaced with
other characters: Check this check box to restrict the use of dictionary words, their
characters in reverse order, or their letters replaced with other characters, as the
password.
Substitution of $ for s, @ for a, 0 for o, 1 for l, ! for i, 3 for e, and so on, is not permitted.
For example, Pa$$w0rd is not permitted.
• Default Dictionary: Choose this option to use the default Linux dictionary in
Cisco ISE. The default dictionary contains approximately 480,000 English words.
This option is selected by default.
• Custom Dictionary: Choose this option to use your customized dictionary. Click
Choose File to select a custom dictionary file. The text file must comprise
newline-delimited (JSON format) words, .dic extension, and a size less than 20
MB.
Password must Check the check box for the type of characters an administrator's password must
contain at least one contain. Choose one or more of the following options:
character of each
• Lowercase alphabetic characters
of the selected
types • Uppercase alphabetic characters
• Numeric characters
• Non-alphanumeric characters
Password History Specify the number of previous passwords from which the new password must be
different, to prevent the repeated use of the same password. Check the Password must
be different from the previous nversions check box, and enter the number in the
corresponding field.
Enter the number of days before which you cannot reuse a password. Check the Cannot
reuse password within n days check box, and enter the number in the corresponding
field.
Password Lifetime Check the check boxes for the following options to force users to change passwords
after a specified time period:
• Administrator passwords expire n days after creation or last change: Time
(in days) before the administrator account is disabled if the password is not
changed. The valid range is 1 to 3650 days.
• Send an email reminder to administrators n days prior to password
expiration: Time (in days) before which administrators are reminded that their
password will expire. The valid range is 1 to 3650 days.
Require Admin Check this check box if you want the admin user to enter the login password to view
Password network device-sensitive data such as shared secrets and passwords.
Password cached The password that is entered by the admin user is cached for this time period. The
for n Minutes admin user will not be prompted to enter the password again during this period to view
the network device-sensitive data. The valid range is from 1 to 60 minutes.
Related Topics
Cisco ISE Administrators, on page 3
Create a New Administrator, on page 4
Session Timeout
Session Idle Enter the time, in minutes, that you want Cisco ISE to wait for, before it logs out the
Timeout administrator if there is no activity. The default value is 60 minutes. The valid range
is from 6 to 100 minutes.
Session Info
Invalidate Check the check box adjacent to the session ID that you want to terminate and click
Invalidate.
Related Topics
Administrator Access Settings, on page 340
Configure Session Timeout for Administrators, on page 344
Terminate an Active Administrative Session, on page 345
Quarantine and unquarantine operations can be triggered from the session directory reports for active endpoints.
Note If a quarantined session is unquarantined, the initiation method for a newly unquarantined session depends
on the authentication method that is specified by the switch configuration.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Adaptive Network Control > Policy List.
Step 2 Click Add.
Step 3 Enter a name for the ANC policy and specify the ANC action. The following options are available:
• Quarantine
• Shut_Down
• Port_Bounce
You can select one or multiple actions, but you cannot combine Shut_Down and Port_Bounce with the other ANC actions
.
Quarantine and Re_Authenticate are the only two actions that can be combined.
When an ANC policy with Quarantine, Port_Bounce, or Re_Authenticate is assigned or unassigned to an active endpoint,
a CoA is triggered for that endpoint.
When an ANC policy with Shut_Down action is assigned to an active endpoint, a CoA is triggered to shutdown the switch
interface. However, CoA is not triggered when an ANC policy with Shut_Down action is unassigned.
Step 4 Choose Policy > Policy Sets, and expand the policy set.
Step 5 Associate the ANC policy with the corresponding authorization policy by using the ANCPolicy attribute.
Step 6 Choose Operations > Adaptive Network Control > Endpoint Assignment.
Step 7 Click Add.
Step 8 Enter the IP address or MAC address of the endpoint and select the policy from the Policy Assignment drop-down list.
Step 9 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Authorization > Authorization
Profiles.
Step 2 Click Add.
Step 3 Enter a unique name and description for the authorization profile, and update the Access Type as ACCESS_ACCEPT.
Step 4 Check the DACL Name check box, and choose DENY_ALL_TRAFFIC from the drop-down list.
Step 5 Click Submit.
Exception authorization polices are intended for authorizing limited access to meet special conditions or
permissions or an immediate requirement. For ANC authorization, you need to create a quarantine exception
policy that is processed before all standard authorization policies. You need to create an exception rule with
the following condition:
Session:ANCPolicy EQUALS Quarantine.
Note If the endpoint count to be purged is more than 10000, only the first 10000 endpoints are purged during the
initial purge. After 1 hour, another purge is initiated to delete the next set of 10000 endpoints. This purge
cycle will continue until all the endpoints are purged based on purge condition that is matched. This behavior
optimizes system performance.
Possible Causes
The authentication timer setting is not correctly set on the client machine, or the authentication interval is not
correctly set on the switch.
Solution
There are several possible resolutions for this issue:
1. Check the Session Status Summary report in Cisco ISE for the specified NAD or switch, and ensure
that the interface has the appropriate authentication interval configured.
2. Enter “show running configuration” on the NAD/switch and ensure that the interface is configured with
an appropriate “authentication timer restart” setting. (For example, “authentication timer restart 15,” and
“authentication timer reauthenticate 15.”)
3. Enter “interface shutdown” and “no shutdown” to bounce the port on the NAD/switch and force
reauthentication following a potential configuration change in Cisco ISE.
Note Because CoA requires a MAC address or session ID, we recommend that you do not bounce the port that is
shown in the Network Device SNMP report.
Note When you want to change the authorization state of an endpoint through ANC, you must provide the IP address
or the MAC address for the endpoint. If the IP address or the MAC address is not found in the active session
for the endpoint, then you will see the following error message:
If an externally authenticated administrator performs an ANC operation from Operations in the Cisco ISE
using the IP address or MAC address of the endpoint, Cisco ISE returns the following error message:
Server failure: User not found internally. Possible use of unsupported externally
authenticated user
When Cisco ISE is run on VMware, VMware snapshots are not supported for backing up ISE data.
Note Cisco ISE does not support VMware snapshots for backing up ISE data because a VMware snapshot saves
the status of a VM at a given point in time. In a multinode Cisco ISE deployment, data in all the nodes are
continuously synchronized with current database information. Restoring a snapshot might cause database
replication and synchronization issues. We recommend that you use the backup functionality included in
Cisco ISE for archival and restoration of data.
Using VMware snapshots or any third-party backup service to back up Cisco ISE data might result in
interrupting Cisco ISE services. When a backup is initiated by VMware or any other third-party backup service
like CommVault SAN level backup, it quiesces the file system to maintain crash consistency, which can cause
your Cisco ISE functionalities to freeze. A reboot is required to resume the services on your Cisco ISE
deployment.
The restore operation can be performed with the backup files of previous versions of Cisco ISE and restored
on a later version, as long as the previous versions are in the supported direct upgrade path for the later version.
Cisco ISE, Release 3.0 supports restore from backups obtained from Release 2.4 and later.
Note While recreating a deployment after backing up and restoring data, a Context Visibility Reset of both the
Primary PAN and Secondary PAN are required to ensure that data on both the nodes are synced.
We recommend that you have a repository size of minimum 100 GB for all types of deployment (small,
medium, and large).
The following table shows the supportability information between the Cisco ISE operations and the type of
external repositories:
Repository Config Config Upgrade Operational Operational Support Validation Exporting Exporting
Type Backup Restore Backup Restore Bundle from Reports from Policies
the the User from the
User Interface User
Interface Interface
FTP √ √ √ √ √ √ √ √ √
SFTP √ √ √ √ √ √ √ √ √
TFTP X X X X X X X X X
HTTP X X √ X X X X X X
HTTPS X X √ X X X X X X
NFS √ √ √ √ √ √ √ √ √
Create Repositories
You can use the CLI and GUI to create repositories. We recommend that you use the GUI due to the following
reasons:
• Repositories that are created through the CLI are saved locally and do not get replicated to the other
deployment nodes. These repositories do not get listed in the GUI’s repository page.
• Repositories that are created on the primary PAN get replicated to the other deployment nodes.
The keys are generated only at the primary PAN on GUI, and so during upgrade you need to generate the
keys again at GUI of new primary admin and export it to the SFTP server. If you remove the nodes from your
deployment, you need to generate the keys on GUI of non-admin nodes and export it to the SFTP server.
You can configure an SFTP repository in Cisco ISE with RSA public key authentication. Instead of using an
administrator-created password to encrypt the database and logs, you can choose the RSA public key
authentication that uses secure keys. In case of SFTP repository created with RSA public key, the repositories
created through the GUI do not get replicated in the CLI and the repositories created through the CLI do not
get replicated in the GUI. To configure same repository on the CLI and GUI, generate RSA public keys on
both CLI and GUI and export both the keys to the SFTP server.
Note Cisco ISE initiates outbound SSH or SFTP connections in FIPS mode even if FIPS mode is not enabled on
ISE. Ensure that the remote SSH or SFTP servers that communicate with ISE allow FIPS 140 approved
cryptographic algorithms.
Cisco ISE uses embedded FIPS 140 validated cryptographic modules. For details of the FIPS compliance
claims, see the FIPS Compliance Letter.
• If you want to create an SFTP repository with RSA public key authentication, perform the following
steps:
• Enable RSA public key authentication in the SFTP repository.
• You must log in as the Admin CLI user. Enter the host key of the SFTP server from the Cisco ISE
CLI using the crypto host_key add command. The host key string should match the hostname that
you enter in the Path field of the repository configuration page.
• Generate the key pairs and export the public key to your local system from the GUI. From the Cisco
ISE CLI, generate the key pairs using the crypto key generate rsa passphrase test123 command,
where, passphrase must be greater than four letters, and export the keys to any repository (local disk
or any other configured repository).
• Copy the exported RSA public key to the PKI-enabled SFTP server and add it to the
"authorized_keys" file.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Maintenance > Repository.
Step 2 Click Add to add a new repository.
Step 3 Enter the values as required to set up new repository. See Repository Settings, on page 358 for a description of the fields.
Step 4 Click Submit to create the repository.
Step 5 Verify that the repository is created successfully by clicking Repository from the Operations navigation pane on the
left or click the Repository List link at the top of Repository window to go to the repository listing page.
What to do next
• Ensure that the repository that you have created is valid. You can do so from the Repository Listing
window. Select the corresponding repository and click Validate. Alternatively, you can execute the
following command from the Cisco ISE command-line interface:
show repository repository_name
where repository_name is the name of the repository that you have created.
Note If the path that you provided while creating the repository does not exist, then
you will get the following error:
%Invalid Directory
Repository Settings
The following table describes the fields on the Repository List window, which you can use to create repositories
to store your backup files. To view this window, click the Menu icon ( ) and choose Administration >
System > Maintenance > Repository.
Repository Enter the name of the repository. Alphanumeric characters are allowed and the
maximum length is 80 characters.
Protocol Choose one of the available protocols that you want to use.
Server Name (Required for TFTP, HTTP, HTTPS, FTP, SFTP, and NFS) Enter the hostname or IP
address (IPv4 or IPv6) of the server where you want to create the repository.
Note Ensure that the ISE eth0 interface is configured with an IPv6 address if you
are adding a repository with an IPv6 address.
Path Enter the path to your repository. The path must be valid and must exist at the time
you create the repository.
This value can start with two forward slashes (//) or a single forward slash (/) denoting
the root directory of the server. However, for the FTP protocol, a single forward slash
(/) denotes the FTP of the local device home directory and not the root directory.
Enable PKI (Optional; applicable only for SFTP repository) Check this check box if you want to
authentication enable RSA Public Key Authentication in SFTP repository.
User Name (Required for FTP, SFTP) Enter the username that has write permission to the specified
server. A username can contain alphanumeric and _-. /@\$ characters.
Password (Required for FTP, SFTP) Enter the password that will be used to access the specified
server. Passwords can consist of the following characters: 0 to 9, a to z, A to Z, -, ., |,
@, #,$, ^, &, *, (, ), +, and =.
Related Topics
Backup and Restore Repositories, on page 356
Create Repositories, on page 357
Note After you enable RSA public key authentication in SFTP repository, you will not be able to log in using SFTP
credentials. You can either use PKI-based authentication or credential-based authentication. If you want to
use credential-based authentication again, you must remove the public key pair from the SFTP server.
Step 1 Log in to SFTP server with an account that has permission to edit the /etc/ssh/sshd_config.file.
Note The location of the sshd_config file might vary based on the operating system installation.
Step 3 Remove the "#" symbol from the following lines to enable RSA public key authentication:
• RSAAuthentication yes
• PubkeyAuthentication yes
Note If Public Auth Key is no, change it to yes.
• AuthorizedKeysFile ~/.ssh/authorized_keys
Note If you are using the internal CA, you should use the CLI to export certificates and keys. Backup using in the
administration portal does not back up the CA chain.
For more information, see the "Export Cisco ISE CA Certificates and Keys" section in the "Basic Setup"
chapter Cisco Identity Services Engine Administrator Guide .
Configurational and operational backups on Cisco ISE can overload your system for a short time. This expected
behaviour of temporary system overload will depend on the configuration and monitoring database size of
your system.
Related Topics
Maintenance Settings, on page 1204
Important When performing a back up and restore, the restore overwrites the list of trusted certificates on the target
system with the list of certificates from the source system. It is critically important to note that backup and
restore functions do not include private keys associated with the Internal Certificate Authority (CA) certificates.
If you are performing a back up and restore from one system to another, you have to choose from one of these
options to avoid errors:
• Option 1:
Export the CA certificates from the source ISE node through the CLI and import them in to the target
system through the CLI.
Pros: Any certificates issued to endpoints from the source system will continue to be trusted. Any new
certificates issued by the target system will be signed by the same keys.
Cons: Any certificates that have been issued by the target system prior to the restore function will not
be trusted and will need to be re-issued.
• Option 2:
After the restore process, generate all new certificates for the internal CA.
Pros: This option is the recommended and clean method, where neither the original source certificates
or the original target certificates will be used. Certificates issued by the original source system continues
to be trusted.
Cons: Any certificates that have been issued by the target system prior to the restore function will not
be trusted and will need to be re-issued.
Note For backup and restore operations, the following repository types are not
supported: CD-ROM, HTTP, HTTPS, or TFTP. This is because, either these
repository types are read-only or the protocol does not support file listing. To
restore a backup, choose the repository and click Restore.
Related Topics
Cisco ISE Restore Operation, on page 366
Export Authentication and Authorization Policy Configuration, on page 371
Repository Name Repository where your backup file should be saved. You cannot enter a repository
name here. You can only choose an available repository from the drop-down list.
Ensure that you create the repository before you run a backup.
Encryption Key This key is used to encrypt and decrypt the backup file.
Related Topics
Backup Data Type, on page 355
On-Demand and Scheduled Backups, on page 360
Backup History, on page 365
Backup Failures, on page 365
Cisco ISE Restore Operation, on page 366
Export Authentication and Authorization Policy Configuration, on page 371
Synchronize Primary and Secondary Nodes in a Distributed Environment, on page 373
Perform an On-Demand Backup, on page 360
Schedule a Backup
You can perform an On-demand backup to instantly back up the configuration or monitoring (operational)
data. The restore operation restores Cisco ISE to the configuration state that existed at the time of obtaining
the backup.
Important When performing a back up and restore, the restore overwrites the list of trusted certificates on the target
system with the list of certificates from the source system. It is critically important to note that backup and
restore functions do not include private keys associated with the Internal Certificate Authority (CA) certificates.
If you are performing a back up and restore from one system to another, you will have to choose from one of
these options to avoid errors:
• Option 1:
Export the CA certificates from the source ISE node through the CLI and import them in to the target
system through the CLI.
Pros: Any certificates issued to endpoints from the source system will continue to be trusted. Any new
certificates issued by the target system will be signed by the same keys.
Cons: Any certificates that have been issued by the target system prior to the restore function will not
be trusted and will need to be re-issued.
• Option 2:
After the restore process, generate all new certificates for the internal CA.
Pros: This option is the recommended and clean method, where the original source certificates or the
original target certificates will be used. Certificates issued by the original source system will continue
to be trusted.
Cons: Any certificates that have been issued by the target system prior to the restore function will not
be trusted and will need to be re-issued.
• Do not back up using a local repository. You cannot back up the monitoring data in the local repository
of a remote Monitoring node.
• To perform the following task, you must be a Super Admin or System Admin.
Note For backup and restore operations, the following repository types are not supported: CD-ROM, HTTP, HTTPS,
or TFTP. This is because, either these repository types are read-only or the protocol does not support file
listing.
Name Enter a name for your backup file. You can enter a descriptive name of your choice.
Cisco ISE appends the timestamp to the backup filename and stores it in the repository.
You will have unique backup filenames even if you configure a series of backups. On
the Scheduled Backup list window, the backup filename will be prepended with
“backup_occur” to indicate that the file is an occurrence kron job.
Repository Name Select the repository where your backup file should be saved. You cannot enter a
repository name here. You can only choose an available repository from the drop-down
list. Ensure that you create the repository before you run a backup.
Encryption Key Enter a key to encrypt and decrypt the backup file.
Schedule Options Choose the frequency of your scheduled backup and fill in the other options accordingly.
Related Topics
Backup Data Type, on page 355
On-Demand and Scheduled Backups, on page 360
Backup History, on page 365
Backup Failures, on page 365
Cisco ISE Restore Operation, on page 366
Export Authentication and Authorization Policy Configuration, on page 371
Backup History
Backup history provides basic information about scheduled and on-demand backups. It lists the name of the
backup, backup file size, repository where the backup is stored, and time stamp that indicates when the backup
was obtained. This information is available in the Operations Audit report and on the Backup and Restore
page in the History table.
For failed backups, Cisco ISE triggers an alarm. The backup history page provides the failure reason. The
failure reason is also cited in the Operations Audit report. If the failure reason is missing or is not clear, you
can run the backup-logs command from the Cisco ISE CLI and look at the ADE.log for more information.
While the backup operation is in progress, you can use the show backup status CLI command to check the
progress of the backup operation.
Backup history is stored along with the Cisco ADE operating system configuration data. It remains there even
after an application upgrade and are only removed when you reimage the PAN.
Backup Failures
If backup fails, check the following:
• Check if there is any NTP sync or service failure issue. When the NTP service on Cisco ISE is not
working, Cisco ISE raises the NTP Service Failure alarm. When Cisco ISE cannot sync with all the
configured NTP servers, Cisco ISE raises the NTP Sync Failure alarm. Cisco ISE backup might fail if
the NTP services are down or if there is any sync issue. Check the Alarms dashlet and fix the NTP sync
or service issue before you retry the backup operation.
• Make sure that no other backup is running at the same time.
• Check the available disk space for the configured repository.
• Monitoring (operational) backup fails if the monitoring data takes up more than 75% of the allocated
monitoring database size. For example, if your Monitoring node is allocated 600 GB, and the
monitoring data takes up more than 450 GB of storage, then monitoring backup fails.
• If the database disk usage is greater than 90%, a purge occurs to bring the database size to less than
or equal to 75% of its allocated size.
• Verify if a purge is in progress. Backup and restore operations will not work while a purge is in progress.
• Verify if the repository is configured correctly.
Note The new backup/restore user interface in Cisco ISE makes use of meta-data in the backup filename. Therefore,
after a backup completes, you should not modify the backup filename manually. If you manually modify the
backup filename, the Cisco ISE backup/restore user interface will not be able to recognize the backup file. If
you have to modify the backup filename, you should use the Cisco ISE CLI to restore the backup.
• We recommend that you do not change the system timezone after the initial Cisco ISE installation and
setup.
• If you changed the certificate configuration on one or more nodes in your deployment, you must obtain
another backup to restore the data from the standalone Cisco ISE node or Primary PAN. Otherwise, if
you try to restore data using an older backup, the communication between the nodes might fail.
• After you restore the configuration backup on the Primary PAN, you can import the Cisco ISE CA
certificates and keys that you exported earlier.
Note If you did not export the Cisco ISE CA certificates and keys, then after you restore
the configuration backup on the Primary PAN, generate the root CA and
subordinate CAs on the Primary PAN and Policy Service Nodes (PSNs).
• If you are trying to restore a platinum database without using the correct FQDN (FQDN of a platinum
database), you need to regenerate the CA certificates. (To view this window, click the Menu icon ( )
and choose Administration > Certificates > Certificate Signing Requests > Replace ISE Root CA
certificate chain).However, If you restore the platinum database with the correct FQDN, note that the
CA certificates regenerated automatically.
• You need a data repository, which is the location where Cisco ISE saves your backup file. You must
create a repository before you can run an on-demand or scheduled backup.
• If you have a standalone administration node that fails, you must run the configuration backup to restore
it. If the Primary PAN fails, you can use the distributed setup to promote your Secondary Administration
Node to become the primary. You can then restore data on the Primary PAN after it comes up.
Note Cisco ISE also provides the backup-logs CLI command that you can use to collect
log and configuration files for troubleshooting purposes.
restore Type this command to restore data from a configuration or operational backup.
filename Name of the backed-up file that resides in the repository. Supports up to 120
alphanumeric characters.
Note You must add the .tar.gpg extension after the filename (for example,
myfile.tar.gpg).
repository-name Name of the repository you want to restore the backup from.
hash Hashed encryption key for restoring backup. Specifies an encrypted (hashed) encryption
key that follows. Supports up to 40 characters.
plain Plaintext encryption key for restoring backup. Specifies an unencrypted plaintext
encryption key that follows. Supports up to 15 characters.
include-adeos (Optional, applicable only for configuration backup) Enter this command operator
parameter if you want to restore ADE-OS configuration from a configuration backup.
When you restore a configuration backup, if you do not include this parameter, Cisco
ISE restores only the Cisco ISE application configuration data.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
When you use restore commands in Cisco ISE, the Cisco ISE server restarts automatically.
The encryption key is optional while restoring data. To support restoring earlier backups where you have not
provided encryption keys, you can use the restore command without the encryption key.
Examples
Related Commands
Description
backup Performs a backup (Cisco ISE and Cisco ADE OS) and places the backup in a
repository.
show repository Displays the available backup files located on a specific repository.
If the sync status and replication status after application restore for any secondary node is Out of Sync, you
have to reimport the certificate of that secondary node to the Primary PAN and perform a manual
synchronization.
Note You can restore configuration database backup and regenerate the Root CA on a primary PAN only. However,
you cannot restore the configuration database backup on a registered PAN.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Backup and Restore.
Step 2 Select the name of the backup from the list of Configurational backup and click Restore.
Step 3 Enter the Encryption Key used during the backup.
Step 4 Click Restore.
What to do next
If you are using the Cisco ISE CA service, you must:
1. Regenerate the entire Cisco ISE CA root chain.
2. Obtain a backup of the Cisco ISE CA certificates and keys from the primary PAN and restore it on the
secondary PAN. This ensures that the secondary PAN can function as the root CA or subordinate CA of
an external PKI in case of a Primary PAN failure and you promote the secondary PAN to be the primary
PAN.
You must use the CLI to restore an on-demand Monitoring database backup from previous releases of Cisco
ISE. Restoring a scheduled backup across Cisco ISE releases is not supported.
Note If you attempt to restore data to a node other than the one from which the data was taken, you must configure
the logging target settings to point to the new node. This ensures that the monitoring syslogs are sent to the
correct node.
Step 1 If you are using a primary and secondary PAN, synchronize the PANs.
When you synchronize the PANs, you must chose a PAN and promote that to be the active primary.
Step 2 Before you deregister the Monitoring node, assign the Monitoring persona to another node in the deployment.
Every deployment must have at least one functioning Monitoring node.
Step 6 Promote the newly restored and registered node as the active Monitoring node.
Step 1 Prepare to deregister the node to be restored. This is done by assigning the monitoring persona to another node in the
deployment.
A deployment must have at least one functioning Monitoring node.
Restore History
You can obtain information about all restore operations, log events, and statuses from the Operations Audit
Report window.
Note However, the Operations Audit Report window does not provide information about the start times
corresponding to the previous restore operations.
For troubleshooting information, you have to run the backup-logs command from the Cisco ISE CLI and
look at the ADE.log file.
While the restore operation is in progress, all Cisco ISE services are stopped. You can use the show restore
status CLI command to check the progress of the restore operation.
control Lists (DACLs), and authorization profiles. You can choose to email the XML file or save it to your
local system.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Backup & Restore.
Step 2 Click Policy Export.
Step 3 Enter the values as needed.
Step 4 Click Export.
Use a text editor such as WordPad to view the contents of the XML file.
Encryption Key Enter a key to encrypt and decrypt the export data. This field is enabled only if you
select the Export with Encryption Key option.
Destination
Download file to Allows you to download the policy export file to your local system.
local computer
Email file to You can enter multiple email addresses separated by a comma.
Repository Select the repository to export policy data to. You can’t enter a repository name here.
You can only choose an available repository from the drop-down list. Ensure that you
create the repository before scheduling a policy export.
Export Now Click this option to export the data to the local computer or send as an email attachment.
You can’t export to a repository; you can only schedule a repository export.
Schedule
Schedule Options Choose the frequency of the export schedule and enter the other details accordingly.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Check the check boxes next to the secondary ISE nodes with an Out of Sync replication status.
Step 3 Click Syncup and wait until the nodes are synchronized with the PAN. You will have to wait until this process is complete
before you can access the Cisco ISE Admin portal again.
Assumption
All Cisco ISE nodes in the deployment were destroyed. The new hardware was imaged using the same
hostnames and IP addresses.
Resolution Steps
1. You have to replace both the N1 and N2 nodes. N1 and N2 nodes will now have a standalone configuration.
2. Obtain a license with the UDI of the N1 and N2 nodes and install it on the N1 node.
3. You must then restore the backup on the replaced N1 node. The restore script will try to sync the data on
N2, but N2 is now a standalone node and the synchronization fails. Data on N1 will be reset to time T1.
4. You must log in to the N1 Admin portal to delete and reregister the N2 node. Both the N1 and N2 nodes
will have data reset to time T1.
Assumptions
All Cisco ISE nodes in the deployment were destroyed. The new hardware was imaged at a different location
using different hostnames and IP addresses.
Resolution Steps
1. Obtain the N1 backup and restore it on N1A. The restore script will identify the hostname change and
domain name change, and will update the hostname and domain name in the deployment configuration
based on the current hostname.
2. You must generate a new self-signed certificate.
3. You must log in to the Cisco ISE administrator portal on N1A.In the Cisco ISE GUI, click the Menu icon
( ) and choose Administration > System > Deployment, and do the following:
Delete the old N2 node.
Register the new N2A node as a secondary node. Data from the N1A node will be replicated to the N2A
node.
Assumptions
This deployment is a standalone deployment and the new or reimaged hardware has the same IP address and
hostname.
Resolution Steps
Once the N1 node is up after a reimage or you have introduced a new Cisco ISE node with the same IP address
and hostname, you must restore the backup taken from the old N1 node. You do not have to make any role
changes.
Assumptions
This is a standalone deployment and the replaced hardware has a different IP address and hostname.
Resolution Steps
1. Replace the N1 node with a new hardware. This node will be in a standalone state and the hostname is
N1B.
2. You can restore the backup on the N1B node. No role changes are required.
Configuration Rollback
Problem
There may be instances where you inadvertently make configuration changes that you later determine were
incorrect. For example, you may delete several NADs or modify some RADIUS attributes incorrectly and
realize this issue several hours later. In this case, you can revert to the original configuration by restoring a
backup that was taken before you made the changes.
Possible Causes
There are two nodes: N1 (primary Policy Administration Node or primary PAN) and N2 (secondary Policy
Administration Node or secondary PAN) and a backup of the N1 node is available. You made some incorrect
configuration changes on N1 and want to remove the changes.
Solution
Obtain a backup of the N1 node that was taken before the incorrect configuration changes were made. Restore
this backup on the N1 node. The restore script will synchronize the data from N1 to N2.
Assumptions
Only the primary node in a distributed deployment has failed.
Resolution Steps
1. Log in to the N2 administrator portal. In the Cisco ISE GUI, click the Menu icon ( ) and choose
Administration > System > Deployment and configure N2 as your primary node.
The N1 node is replaced with a new hardware, reimaged, and is in the standalone state.
2. From the N2 administrator portal, register the new N1 node as a secondary node.
Now, the N2 node becomes your primary node and the N1 node becomes your secondary node.
If you wish to make the N1 node the primary node again, log in to the N1 administrator portal and make it
the primary node. N2 automatically becomes a secondary server. There is no data loss.
Resolution Steps
1. Reimage the new N3A node to the default standalone state.
Note If the Monitoring node is configured as the syslog server for a network device, ensure that the logging source
sends the correct network access server (NAS) IP address in the following format:
<message_number>sequence_number: NAS_IP_address: timestamp: syslog_type: <message_text>
Otherwise, this might impact functionalities that depend on the NAS IP address.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Local Log Settings.
Step 2 In the Local Log Storage Period field, enter the maximum number of days to keep the log entries in the configuration
source.
Logs may be deleted earlier than the configured Local Log Storage Period if the size of the localStore folder reaches
97 GB.
Step 3 Click Delete Logs Now to delete the existing log files at any time before the expiration of the storage period.
Step 4 Click Save.
By default, AAA Diagnostics subcategories and System Diagnostics subcategories logging targets are disabled
during a fresh Cisco ISE installation or an upgrade to reduce the disk space. You can configure logging targets
manually for these subcategories but local logging for these subcategories are always enabled.
You can use the default logging targets that are configured locally at the end of the Cisco ISE installation or
you can create external targets to store the logs.
Note If a syslog server is configured in a distributed deployment, syslog messages are sent directly from the
authenticating PSNs to the syslog server and not from the MnT node.
Related Topics
Cisco ISE Message Codes, on page 379
Note Any changes to the default remote logging target SecureSyslogCollector results in the restart of the Cisco
ISE Monitoring & Troubleshooting Log Processor service.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Remote Logging
Targets.
Step 2 Click Add.
Step 3 Enter the required details.
Step 4 Click Save.
Step 5 Go to the Remote Logging Targets page and verify the creation of the new target.
The logging targets can then be mapped to each of the logging categories below. The PSN nodes send the relevant logs
to the remote logging targets depending on the services that are enabled on those nodes.
• AAA Audit
• AAA Diagnostics
• Accounting
• External MDM
• Passive ID
• Posture and Client Provisioning Audit
• Posture and Client Provisioning Diagnostics
• Profiler
Logs of the following categories are sent by all nodes in the deployment to the logging targets:
• Administrative and Operational Audit
• System Diagnostics
• System Statistics
For the logging category Passed Authentications, the option to allow local logging is disabled by default.
Enabling local logging for this category will result in high utilization of operational space, and fill prrt-server.log
along with the iseLocalStore.log.
If you choose to enable local logging for Passed Authentications, go to Administration > System > Logging >
Logging Categories, click Passed Authentications from the category section, and check the check box
against Local Logging.
Related Topics
Set Severity Levels for Message Codes, on page 380
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Logging Categories.
Step 2 Click the radio button next to the category that you want to edit, and click Edit.
Step 3 Modify the required field values.
Step 4 Click Save.
Step 5 Go to the Logging Categories page and verify the configuration changes that were made to the specific category.
Endpoint ID from the Authentications page and click Endpoint Debug. This tool provides all debug information
for all services related to the specific endpoint in a single file.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > General
Tools > Endpoint Debug.
Step 2 Click the MAC Address or IP radio button and enter the MAC or IP address of the endpoint.
Step 3 Check the Automatic disable after n Minutes check box if you want to stop log collection after a specified amount of
time. If you check this check box, you must enter a time between 1 and 60 minutes.
The following message appears: "Endpoint Debug degrades the deployment performance. Would you like to continue?"
Related Topics
Endpoint Debug Log Collector, on page 380
Collection Filters
You can configure the Collection Filters to suppress the syslog messages being sent to the monitoring and
external servers. The suppression can be performed at the Policy Services Node levels based on different
attribute types. You can define multiple filters with specific attribute type and a corresponding value.
Before sending the syslog messages to monitoring node or external server, Cisco ISE compares these values
with fields in syslog messages to be sent. If any match is found, then the corresponding message is not sent.
Note If you configure a collection filter (Administration > System > Logging > Collection Filter) for any Attribute
and Filter Type; and you have also selected the Disable account after n days of inactivity check box
(Administration > Identity Management > User Authentication Settings > Disable Account Policy), your
account might be disabled as a result of the syslog messages of successful authentication not being relayed
to the monitoring node.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Collection Filters.
Step 2 Click Add.
Step 3 Choose the Filter Type from the following list:
• User Name
• MAC Address
• Policy Set Name
• NAS IP Address
• Device IP Address
Step 4 Enter the corresponding Value for the filter type you have selected.
Step 5 Choose the Result from the drop-down list. The result can be All, Passed, or Failed.
Step 6 Click Submit.
Related Topics
Collection Filters, on page 381
Event Suppression Bypass Filter, on page 382
Report Filters
There are two types of reports, single-section and multi-section. Single-section reports contain a single grid
(Radius Authentications report) and multi-section reports contain many grids (Authentications Summary
report) and represent data in the form of charts and tables. The Filter drop-down menu in the single-section
reports contains the Quick Filter and Advanced Filter. In the multi-section reports, you can specify only
advanced filters.
Multi-section reports may contain one or more mandatory advanced filters that require your input. For example,
when you click the Health Summary report (Operations > Reports > Diagnostics page), it displays two
mandatory advanced filters—Server and Time Range. You must specify the operator command, server name,
required values for both these filters, and click Go to generate the report. You can add new advanced filters
by clicking the Plus (+) symbol. You can export multi-section reports only in the PDF format. You cannot
schedule Cisco ISE multi-section reports to run and re-run at specific time or time intervals.
Note When you click a report, data for the current date is generated by default. However, some multi-section reports
require mandatory input from the user apart from the time range.
By default, the Quick Filter is displayed as the first row in single-section reports. The fields may contain a
drop-down list from which you can select the search criteria or may be a text box.
An Advanced Filter contains an outer criteria that contains one or more inner criteria. The outer criteria is
used to specify if the search should meet All or Any specified inner criteria. The inner criteria contains one
or more conditions that is used to specify the Category (Endpoint ID, Identity Group) Method (operator
commands, such as Contains, Does Not Contain), and Time Range for the condition.
When using the Quick Filter, you can choose a date or time from the Logged At drop-down list to generate
reports for a data set logged in the last 30 days or less. If you want to generate a report for a date or time prior
to 30 days, use the Advanced Filter to set the required time frame in the From and To fields of the Custom
option from the drop-down list.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports and click the required report.
Step 2 From the Settings drop-down list, choose the required fields.
Step 3 In the required field, you can choose from the drop-down list or type the specific characters to filter data. The search uses
the Contains operator command. For example, to filter by text that begins with “K”, enter K or to filter text that has “geo”
anywhere in the text, enter geo. You can also use asterisks (*), for example, the regex starting with *abc and ending with
*def.
The quick filter uses the following conditions: contains, starts with, ends with, starts with or ends with, and multiple
values with OR operator.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports and click the required report.
Step 2 In the Filters section, from the Match drop-down list, choose one of the options.
a) Choose All to match all specified conditions.
b) Choose Any to match any one specified condition.
Step 3 From the Time Range drop-down list, choose the required category.
Step 4 From the Operator Commands drop-down list, choose the required command. For example, you can filter text that
begins with a specific character (use Begin With), or specific characters anywhere in the text (use Contains). Or, you can
choose the Logged Time and corresponding Custom option and specify the From and To date and time from the calendar
to filter data.
Step 5 From the Time Range drop-down list, choose the required option.
Step 6 Click Go.
You can save a filtered report and retrieve it from the Filter drop-down list for future reference.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > ISE Reports.
You can also navigate to the Reports link under each work center to view the set of reports specific to that work center.
Related Topics
Export Reports, on page 385
Available Reports, on page 390
Reports Navigation
You can get detailed information from the reports output. For example, if you have generated a report for a
period of five months, the graph and table will list the aggregate data for the report in a scale of months.
You can click a particular value from the table to see another report related to this particular field. For example,
an authentication summary report will display the failed count for the user or user group. When you click the
failed count, an authentication summary report is opened for that particular failed count.
Export Reports
You can only export the PDF file format of the following reports:
• Authentication Summary
• Health Summary
• RBACL Drop Summary
Note Flows for RBACL dropped packets are available only with the Cisco Catalyst
6500 series switches.
Step 1 Run a report, as described in the Running and Viewing Reports section.
Step 2 Click Export To in the top-right corner of the report summary page.
Step 3 Choose one of the following options:
• Repository (CSV): To export the report in CSV file format to a repository
• Local (CSV): To export the report in CSV file format to a local disk
• Local (PDF): To export the report in pdf file format to a local disk
Note • When you select the local CSV or pdf option, only the first 500 records are exported. You can use the
Repository CSV option to export all the records.
• When you export the multi-section reports using the local pdf option, only the first 100 rows are exported
for each section.
My Reports
You can add preconfigured system reports and personally filtered reports to the My Reports section. Reports
saved to the My Reports section retain the filters applied to them.
Step 1 On the Reports window (Operations > Reports), click the report that you require from the Reports drop-down menu
displayed on the left.
Step 2 (Optional) When the selected report opens, add required filters to customize the report.
Step 3 Click the Add to My Reports button at the top right-hand corner of the window.
Step 4 The Save to My Reports dialog box opens. The name and description of the report is auto populated. You can edit these
fields if needed.
Step 5 (Optional) The selected reports are saved with the applicable filters, thus, retaining their customization.
Step 6 Click Save to save the report. A dialog box saying that the report has been successfully saved will be displayed.
Step 7 The selected report will now appear in the My Reports drop-down list for easy access.
You can remove a report added to the My Reports section by clicking the Remove From My Reports button
at the top right-hand corner of the window. Click OK in the Alert dialog box that appears and the report will
be removed from your My Reports section.
Note Flows for RBACL dropped packets are available only with the Cisco Catalyst
6500 Series Switches.
Step 1 On the Reports window (Operations > Reports), select the report that you want to schedule from the Reports
drop-down menu displayed on the left.
Step 2 (Optional) When the selected report opens, apply the filters that you want to be applicable to the report.
Step 3 Click the Schedule button at the top right-hand corner of the window..
Step 4 The Save as Schedule dialog box opens.
Step 5 Fill in the details such as name, description, email, date, and time of the schedule job.
Step 6 From the Repository drop-down list, choose the external repository that would save the scheduled report. For more
information, see “Table 1. Supportability Matrix for External Repositories” under the Backup and Restore Repositories
section of the Cisco ISE Administrator Guide.
Step 7 From the Frequency drop-down list, choose the frequency of the schedule as required. For example, if you only need
data of the last 12 hours, select the Last 12 hours data field while scheduling the report.
Step 8 Select a Start Date and End Date as required and click Save.
Step 9 All the selected filters will automatically apply to the report while scheduling it.
Step 10 You can see the created schedule and applied filters in the Scheduled Reports section at the bottom of the window.
You can also edit and delete scheduled reports as needed. Choose the scheduled report of your choice from
the Scheduled Reports drop-down list (Operations > Reports > Scheduled Reports). Click Edit Schedule
to make changes to your scheduled reports and click Save. Click Delete Schedule to delete your scheduled
report.
Step 1 On the Reports window (Operations > Reports), select the report that you want to schedule from the Reports
drop-down menu displayed on the left.
Step 2 (Optional) When the selected report opens, apply the filters that you want to be applicable to the report.
Step 3 In this scenario, to get the data from the previous day, select the Logged at field and apply the Yesterday filter. This
will return the previous day’s data whenever the scheduled report runs. If you only need data of the last 12 hours, select
the Last 12 hours datafield in the Save as Schedule dialog box while scheduling the report.
Step 4 Click the Schedule button at the top right-hand corner of the window.
Step 5 The Save as Schedule dialog box opens.
Step 6 Fill in the details such as name, description, email, date, and time of the schedule job.
Step 7 From the Repository drop-down list, choose the external repository that would save the scheduled report. For more
information, see “Table 1. Supportability Matrix for External Repositories” under the Backup and Restore Repositories
section of the Cisco ISE Administrator Guide.
Step 8 From the Frequency drop-down list, choose the frequency of the schedule as required. For example, if you only need
data of the last 12 hours, select the Last 12 hours data field while scheduling the report.
Step 9 Select a Start Date and End Date as required and click Save.
Step 10 All the selected filters will automatically apply to the report while scheduling it.
Step 11 You can see the created schedule and applied filters in the Scheduled Reports section at the bottom of the window.
Note • Most scheduled reports are exported in .csv format. However, the scheduled reports for Radius
Authentication, Radius Accounting, TACACS Authentication, TACACS Accounting, and Operations
Audit are exported in a .zip folder containing .csv files.
• If an external administrator (for example: Active Directory Administrator) creates a scheduled report
without filling the email-id field, no email notifications will be sent.
• An internal or external Cisco ISE user should be deleted only after deleting the scheduled reports created
by that particular user to ensure that there are no active schedules running after the user is removed.
• You can save or schedule (with filters) Cisco ISE reports only from the PAN.
• A scheduled report job runs on both Primary MnT and Secondary MnT nodes. If the Primary MnT is
down, the Secondary MnT executes the scheduled report job. In such a scenario, the Secondary MnT
first pings the Primary MnT. Only if the ping fails, the Secondary MnT runs the scheduled export job.
• Cisco ISE 3.1 Patch 1 onwards, the date format in exported reports has changed from YYYY-MM-DD
to DD-MM-YY. The time format has changed from hh:mm:ss.sss to hh:mm:ss.sss AM/PM (24 hour
format to 12 hour format).
• Block a problematic host—You can use the Session termination with port shutdown option to block an
infected host that sends a lot of traffic over the network. However, the RADIUS protocol does not
currently support a method for re-enabling a port that has been shut down.
• Force endpoints to reacquire IP addresses—You can use the Session termination with port bounce option
for endpoints that do not have a supplicant or client to generate a DHCP request after a VLAN change.
• Push an updated authorization policy to an endpoint—You can use the Session reauthentication option
to enforce an updated policy configuration, such as a change in the authorization policy on existing
sessions based on the discretion of the administrator. For example, if posture validation is enabled, when
an endpoint gains access initially, it is usually quarantined. After the identity and posture of the endpoint
are known, it is possible to send the Session reauthentication command to the endpoint for the endpoint
to acquire the actual authorization policy based on its posture.
For CoA commands to be understood by the device, it is important that you configure the options appropriately.
For CoA to work properly, you must configure the shared secret of each device that requires a dynamic change
of authorization. Cisco ISE uses the shared secret configuration to request access from the device and issue
CoA commands to it.
Note In this release of Cisco ISE, the maximum number of active authenticated endpoint sessions that can be
displayed is limited to 100,000.
Related Topics
Change Authorization for RADIUS Sessions, on page 389
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > RADIUS Livelog.
Step 2 Switch the view to Show Live Session.
Step 3 Click the CoA link for the RADIUS session that you want to issue CoA and choose one of the following options:
• SAnet Session Query—Use this to query information about sessions from SAnet supported devices.
• Session reauthentication—Reauthenticate session. If you select this option for a session established on an ASA
device supporting COA, this will invoke a Session Policy Push CoA.
• Session reauthentication with last—Use the last successful authentication method for this session.
• Session reauthentication with rerun—Run through the configured authentication method from the beginning.
Note Session reauthentication with last and Session reauthentication with rerun options are not currently
supported in Cisco IOS software.
• Session termination—Just end the session. The switch reauthenticates the client in a different session.
• Session termination with port bounce—Terminate the session and restart the port.
• Session termination with port shutdown—Terminate the session and shutdown the port.
Step 4 Click Run to issue CoA with the selected reauthenticate or terminate option.
If your CoA fails, it could be one of the following reasons:
• Device does not support CoA.
• Changes have occurred to the identity or authorization policy.
• There is a shared secret mismatch.
Available Reports
The following table lists the preconfigured reports, grouped according to their category. Descriptions of the
report functionality and logging category are also provided.
To generate syslogs for a logging category, set its Log Severity Level to Info:
• In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging >
Logging Categories.
• Click the logging category for which syslogs must be generated.
• From the Log Severity Level drop-down list, choose Info.
• Click Save.
Note In Cisco ISE Release 2.6 and later, users with IPv6 addresses will have the following events logged in the
audit reports—login/logout, password change, and operational changes made. In Administrator Logins, User
Change Password Audit, and Operations Audit reports, you can filter logs by IPv4 and IPv6 records.
Audit
Adaptive Network The Adaptive Network Control In the Cisco ISE GUI, click the Menu icon ( ) and
Control Audit Audit report is based on choose Administration > System > Logging >
RADIUS accounting. It Logging Categories, and click Passed
displays historical reporting of Authentications and RADIUS Accounting.
all the network sessions for
each endpoint.
Administrator The Administrator Logins In the Cisco ISE GUI, click the Menu icon ( ) and
Logins report provides information choose Administration > System > Logging >
about all the GUI-based Logging Categories, and click Administrative and
administrator login events as Operational Audit.
well as successful CLI login
events.
Change The Change Configuration In the Cisco ISE GUI, click the Menu icon ( ) and
Configuration Audit Audit report provides details choose Administration > System > Logging >
about configuration changes Logging Categories and click Administrative and
within a specified time period. Operational Audit.
If you need to troubleshoot a
feature, this report can help you
determine if a recent
configuration change
contributed to the problem.
Endpoints Purge The Endpoints Purge Activities In the Cisco ISE GUI, click the Menu icon ( ) and
Activities report enables a user to review choose Administration > System > Logging >
the history of endpoints purge Logging Categories, and click Profiler.
activities. This report requires
that the Profiler logging
category is enabled. (Note that
this category is enabled by
default.)
Operations Audit The Operations Audit report In the Cisco ISE GUI, click the Menu icon ( ) and
provides details about any choose Administration > System > Logging >
operational changes, such as, Logging Categories, and click Administrative and
running backups, registering a Operational Audit.
Cisco ISE node, or restarting an
application.
User Change The User Change Password In the Cisco ISE GUI, click the Menu icon ( ) and
Password Audit Audit report displays choose Administration > System > Logging >
verification about employees' Logging Categories, and click Administrative and
password changes. Operational Audit.
Device Administration
TACACS The TACACS Accounting In the Cisco ISE GUI, click the Menu icon ( ) and
Accounting report provides accounting choose Administration > System > Logging >
details for a device session. It Logging Categories and select TACACS Accounting.
displays information related to
the generated and logged time
of the users and devices.
Diagnostics
AAA Diagnostics The AAA Diagnostics report In the Cisco ISE GUI, click the Menu icon ( ) and
provides details of all the choose Administration > System > Logging >
network sessions between Cisco Logging Categories, and select the following logging
ISE and users. If users cannot categories: Policy Diagnostics, Identity Stores
access the network, you can Diagnostics, Authentication Flow Diagnostics, and
review this report to identify RADIUS Diagnostics.
trends and identify whether the
issue is isolated to a particular
user or indicative of a more
widespread problem.
Note Sometimes ISE will
silently drop the
Accounting Stop
request of an endpoint
if user authentication is
in progress. However,
ISE starts
acknowledging all the
accounting requests
after user
authentication is
completed.
AD Connector The AD Connector Operations In the Cisco ISE GUI, click the Menu icon ( ) and
Operations report provides log of choose Administration > System > Logging >
operations performed by the Logging Categories, and select AD Connector.
AD Connector, such as Cisco
ISE Server password refresh,
Kerberos tickets management,
DNS queries, DC discovery,
LDAP, RPC Connections
management, and so on.
If some AD failures are
encountered, you can review
the details in this report to
identify the possible causes.
Endpoint Profile The Top Authorization by In the Cisco ISE GUI, click the Menu icon ( ) and
Changes Endpoint (MAC address) report choose Administration > System > Logging >
displays how many times each Logging Categories, and select Passed
endpoint MAC address was Authentications and Failed Attempts.
authorized by Cisco ISE to
access the network.
OCSP Monitoring The OCSP Monitoring Report In the Cisco ISE GUI, click the Menu icon ( ) and
specifies the status of the choose Administration > System > Logging >
Online Certificate Status Logging Categories, and select System Diagnostics.
Protocol (OCSP) services. It
identifies whether Cisco ISE
can successfully contact a
certificate server, and provides
certificate status auditing. It
also provides a summary of all
the OCSP certificate-validation
operations performed by Cisco
ISE. It retrieves information
related to the good and revoked
primary and secondary
certificates from the OCSP
server. Cisco ISE caches the
responses and utilizes them for
generating subsequent OCSP
Monitoring Reports. In the
event the cache is cleared, it
retrieves information from the
OCSP server.
RADIUS Errors The RADIUS Errors report In the Cisco ISE GUI, click the Menu icon ( ) and
enables you to check for choose Administration > System > Logging >
RADIUS Requests Dropped Logging Categories, and select Failed Attempts.
(authentication or accounting
requests that are discarded from
unknown Network Access
Device), EAP connection time
outs, and unknown NADs.
Note You can view the
report only for the past
5 days.
System Diagnostics The System Diagnostic report In the Cisco ISE GUI, click the Menu icon ( ) and
provides details about the status choose Administration > System > Logging >
of the Cisco ISE nodes. If a Logging Categories, and select the following logging
Cisco ISE node is unable to categories: Internal Operations Diagnostics,
register, you can review this Distributed Management, and Administrator
report to troubleshoot the issue. Authentication and Authorization.
This report requires that you
first enable several diagnostic
logging categories. Collecting
these logs can negatively
impact Cisco ISE performance.
So, these categories are not
enabled by default, and you
should enable them just long
enough to collect the data.
Otherwise, they are
automatically disabled after 30
minutes.
Client Provisioning The Client Provisioning report In the Cisco ISE GUI, click the Menu icon ( ) and
indicates the client provisioning choose Administration > System > Logging >
agents applied to particular Logging Categories, and select Posture and Client
endpoints. You can use this Provisioning Audit and Posture and Client
report to verify the policies Provisioning Diagnostics.
applied to each endpoint, and
in turn, use this to verify
whether the endpoints have
been correctly provisioned.
Note The MAC address of
an endpoint is not
displayed in the
Endpoint ID column
if the endpoint does not
connect with ISE (no
session is established),
or if a Network
Address Translation
(NAT) address is used
for the session.
External Mobile The External Mobile Device In the Cisco ISE GUI, click the Menu icon ( ) and
Device Management Management report provides choose Administration > System > Logging >
details about integration Logging Categories and select MDM.
between Cisco ISE and the
external Mobile Device
Management (MDM) server.
You can use this report to see
which endpoints have been
provisioned by the MDM server
without logging into the MDM
server directly. It also displays
information such as registration
and MDM-compliance status.
Passive ID The Passive ID report enables In the Cisco ISE GUI, click the Menu icon ( ) and
you to monitor the state of choose Administration > System > Logging >
WMI connection to the domain Logging Categories and select Identity Mapping.
controller and gather statistics
related to it (such as amount of
notifications received, amount
of user login/logouts per second
etc.)
Note Sessions authenticated
by this method do not
have authentication
details in the report.
Profiled Endpoints The Profiled Endpoints In the Cisco ISE GUI, click the Menu icon ( ) and
Summary Summary report provides choose Administration > System > Logging >
profiling details about Logging Categories and select Profiler.
endpoints that are accessing the
network.
Note For endpoints that do
not register a session
time, such as a Cisco
IP-Phone, the term Not
Applicable is shown in
the Endpoint session
time field.
RADIUS The RADIUS Authentications In the Cisco ISE GUI, click the Menu icon ( ) and
Authentications report enables you to review the choose Administration > System > Logging >
history of authentication Logging Categories and select these logging
failures and successes. If users categories: Passed Authentications and Failed
cannot access the network, you Attempts.
can review the details in this
report to identify possible
causes.
Top Authorizations The Top Authorization by User Passed Authentications, Failed Attempts
by User report displays how many times
each user was authorized by
Cisco ISE to access the
network.
Guest
AUP Acceptance The AUP Acceptance Status In the Cisco ISE GUI, click the Menu icon ( ) and
Status report provides details of AUP choose Administration > System > Logging >
acceptances from all the Guest Logging Categories and select Guest.
portals.
Primary Guest The Primary Guest Report In the Cisco ISE GUI, click the Menu icon ( ) and
Report combines data from various choose Administration > System > Logging >
Guest Access reports and Logging Categories and select Passed
enables you to export data from Authentications.
different reporting sources. The
Primary Guest report also
provides details about the
websites that guest users are
visiting. You can use this report
for security auditing purposes
to demonstrate when guest
users accessed the network and
what they did on it.
You must also enable HTTP
inspection on the network
access device (NAD) used for
guest traffic. This information
is sent back to Cisco ISE by the
NAD.
To check when the clients reach
the maximum simultaneous
sessions limit, from the Admin
portal, choose Administration
> System > Logging >
Logging Categories and do the
following:
1. Increase the log level of
"Authentication Flow
Diagnostics" logging
category from WARN to
INFO.
2. Change LogCollector
Target from Available to
Selected under the
"Logging Category" of
AAA Diagnostics.
My Devices Login The My Devices Login and In the Cisco ISE GUI, click the Menu icon ( ) and
and Audit Audit report provides details choose Administration > System > Logging >
about the login activities and Logging Categories and select My Devices.
the operations performed by the
users on the devices in My
Devices Portal.
Sponsor Login and The Sponsor Login and Audit In the Cisco ISE GUI, click the Menu icon ( ) and
Audit report provides details of guest choose Administration > System > Logging >
users' login, add, delete, enable, Logging Categories and select Guest.
suspend and update operations
and the login activities of the
sponsors at the sponsors portal.
If guest users are added in bulk,
they are visible under the
column 'Guest Users.' This
column is hidden by default. On
export, these bulk users are also
present in the exported file.
SXP
Trustsec
TrustSec —
Deployment
Verification
Trustsec Policy This report lists the requests To view this report, you must do the following:
Download sent by the network devices for
policy (SGT/SGACL) 1. In the Cisco ISE GUI, click the Menu icon ( )
download and the details sent and choose Administration > System >
by ISE. If the Workflow mode Logging > Logging Categories.
is enabled, the requests can be 2. Choose AAA Diagnostics > RADIUS
filtered for production or Diagnostics.
staging matrix.
3. Set the Log Severity Level to DEBUG for
RADIUS Diagnostics.
Time Shows the time at which the log was received by the monitoring and troubleshooting
collection agent. This column is required and cannot be deselected.
Status Shows if the authentication succeeded or failed. This column is mandatory and cannot
be deselected. Green is used to represent passed authentications. Red is used to represent
failed authentications.
Details Clicking the icon under the Details column opens the Accounting Detail Report in
a new browser window. This report offers information about authentication and related
attributes, and authentication flow.
Clicking the icon under the Details column opens the Accounting Detail report if an
accounting event is processed for that session. If the session is in authenticated state,
Authentication Detail report is displayed when you click the icon under the Details
column.
The Response Time in the Authentication Detail report is the total time taken by
Cisco ISE to process the authentication flow. For example, if authentication consists
of three roundtrip messages that took 300 ms for the initial message, 150 ms for the
next message, and 100 ms for the last, Response Time is 300 + 150 + 100 = 550 ms.
Note You cannot view the details for endpoints that are active for more than 7 days.
You will see a window with the following message when you click the Details
icon for endpoints that are active for more than 7 days: No Data available
for this record. Either the data is purged or authentication for
this session record happened a week ago. Or if this is an
'PassiveID' or 'PassiveID Visibility' session, it will not have
authentication details on ISE but only the session.
Repeat Count Shows the number of time the authentication requests were repeated in the last 24
hours, without any change in the context of identity, network devices, and authorization.
Identity Shows the logged in username that is associated with the authentication.
If the username is not present in any ID Store, it is displayed as INVALID. If the
authentication fails due to any other reason, it is displayed as USERNAME.
Note This is applicable only for users. This is not applicable for MAC addresses.
To aid debugging, you can force Cisco ISE to display the invalid usernames. To do
this, check the Disclose Invalid Usernames check box under Administration >
System > Settings > Security Settings. You can also configure the Disclose Invalid
Usernames option to time out, so that you do not have to manually turn it off.
Endpoint ID Shows the unique identifier for an endpoint, usually a MAC or IP address.
Endpoint Profile Shows the type of endpoint that is profiled, for example, profiled to be an iPhone,
Android, MacBook, Xbox, and so on.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
Authorization Shows the authorization profile that was used for authentication.
Profiles
Device Port Shows the port number at which the endpoint is connected.
Identity Group Shows the identity group that is assigned to the user or endpoint, for which the log
was generated.
Posture Status Shows the status of posture validation and details on the authentication.
Server Indicates the policy service from which the log was generated.
Failure Reason Shows the detailed reason for failure, if the authentication failed.
Auth Method Shows the authentication method that is used by the RADIUS protocol, such as
Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2),
IEE 802.1x or dot1x, and so on.
Authentication Shows the authentication protocol used, such as Protected Extensible Authentication
Protocol Protocol (PEAP), Extensible Authentication Protocol (EAP), and so on.
Security Group Shows the group that is identified by the authentication log.
Note In the RADIUS Live Logs and TACACS+ Live Logs window, a Queried PIP entry appears for the first
attribute of each policy authorization rule. If all the attributes within the authorization rule are related to a
dictionary that was already queried for previous rules, no additional Queried PIP entry appears.
Authentication Latency
Authentication Latency is the average response time of the RADIUS authentication process from the time
authetication process is initiated. In the Cisco ISE GUI, click the Menu icon ( ) and choose Dashboard >
System Summary dashlet..
You can select the following authentication latency timeframe from the drop-down list:
• 60 mins: This option gives you the authentication latency for the authentication that was initiated in last
60 mins.
• 12 hrs: This option gives you the authentication latency for the authentication process that was initiated
in last 24 hrs.
The response time that is displayed is in millisecond (ms). To view a detailed report of authentication latenty,
click on the latest log in the Live Logs window. To view this window, click the Menu icon ( ) and choose
Operations > RADIUS.
Updated Shows the timestamp when the session was last updated because of a change.
Account Session Shows the time span (in seconds) of a user's session.
Time
Action Click the Actions icon to reauthenticate an active RADIUS session or disconnect an
active RADIUS session.
Endpoint ID Shows the unique identifier for an endpoint, usually a MAC or IP address.
Posture Status Shows the status of posture validation and details of the authentication.
Security Group Shows the group that is identified by the authentication log.
Server Indicates the Policy Service node from which the log was generated.
Auth Method Shows the authentication method that is used by the RADIUS protocol, such as
Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol
(CHAP), IEE 802.1x or dot1x, and so on.
Authentication Shows the authentication protocol used, such as Protected Extensible Authentication
Protocol Protocol (PEAP), Extensible Authentication Protocol (EAP), and so on.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
PRA Action Shows the periodic reassessment action taken on a client after it is successfully postured
for compliance on your network.
WLC Roam Shows the boolean (Y/N) used to track if an endpoint has been handed off during
roaming, from one Wireless Lan Controller (WLC) to another. It has the value of
cisco-av-pair=nas-update =Y or N.
Note Cisco ISE relies on the nas-update=true attribute from WLC to identify whether
the session is in roaming state. When the original WLC sends an accounting
stop attribute with nas-update=true, the session is not deleted in ISE to avoid
reauthentication. If roaming fails, ISE clears the session after five days of
inactivity.
Provider Endpoint events are learned from different syslog sources. These syslog sources are
referred to as providers.
• Windows Management Instrumentation (WMI): WMI is a Windows service that
provides a common interface and object model to access management information
about operating system, devices, applications, and services.
• Agent: A program that runs on a client on behalf of the client or another program.
• Syslog: A logging server to which a client sends event messages.
• REST: A client is authenticated through a terminal server. The TS Agent ID,
Source Port Start, Source Port End, and Source First Port values are displayed
for this syslog source.
• Span: Network information is discovered using span probes.
• DHCP: DHCP event.
• Endpoint
Note When two events from different providers are learned or obtained from an
endpoint session, the providers are displayed as comma-separated values in
the Live Sessions window.
Endpoint Check Shows the time at which an endpoint was last checked by the endpoint probe.
Time
Endpoint Check Shows the result of an endpoint probe. The possible values are:
Result
• Unreachable
• User Logout
• Active User
Source Port Start (Values are displayed only for the REST provider) Shows the first port number in a
port range.
Source Port End (Values are displayed only for the REST provider) Shows the last port number in a
port range.
Source First Port (Values are displayed only for the REST provider) Shows the first port allocated by
the Terminal Server Agent.
A Terminal Server refers to a server or network device that allows multiple endpoints
to connect to it without a modem or network interface and facilities the connection of
the multiple endpoints to a LAN network. The multiple endpoints appear to have the
same IP address, and therefore, it is difficult to identify the IP address of a specific
user. Consequently, to identify a specific user, a Terminal Server Agent is installed in
the server, which allocates a port range to each user. This helps create an IP address-port
user mapping.
TS Agent ID (Values are displayed only for the REST provider) Shows the unique identity of the
Terminal Server Agent that is installed on an endpoint.
AD User Resolved (Values are displayed only for AD user) Shows the potential accounts that matched.
Identities
AD User Resolved (Values are displayed only for AD user) Shows the Distinguished Name of AD user,
DNs for example, CN=chris,CN=Users,DC=R1,DC=com
Generated Time Shows the syslog generation time based on when a particular event was triggered.
Logged Time Shows the time when the syslog was processed and stored by the Monitoring node.
This column is mandatory and cannot be deselected.
Status Shows if the authentication succeeded or failed. This column is required and cannot
be deselected. Green is used to represent passed authentications. Red is used to represent
failed authentications.
Details Brings up a report when you click the magnifying glass icon, allowing you to drill
down and view more detailed information about the selected authentication scenario.
This column is required and cannot be deselected.
Session Key Shows the session keys (found in the EAP success or EAP failure messages) returned
by ISE to the network device.
Username Shows the user name of the device administrator. This column is required and cannot
be deselected.
Type Consists of two Types—Authentication and Authorization. Shows names of users who
have passed or failed authentication, authorization, or both. This column is mandatory
and cannot be deselected.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
ISE Node Shows the name of the ISE node through which the access request is processed.
Network Device IP Shows the IP addresses of network devices whose access requests are processed.
Network Device Shows the name of corresponding network device groups to which a network device
Groups belongs.
Device Type Shows the device type policy that is used to process access requests from different
network devices.
Location Shows the location-based policy that is used to process access requests from network
devices.
Device Port Shows the device port number through which the access request is made.
Failure Reason Shows the reason for rejecting an access request that is made by a network device.
Remote Address Shows the IP address, MAC address, or any other string that uniquely identifies the
end station.
Shell Profile Shows the privileges that were granted to a device administrator for executing
commands on the network device.
Export Summary
You can view the details of the reports exported by all the users in the last seven days, along with the status.
The export summary includes both the manual and scheduled reports. The Export Summary window is
automatically refreshed every two minutes. Click the Refresh icon to refresh the Export Summary window
manually.
The super admin can cancel the export that is In-Progess or in Queued state. Other users are allowed only
to cancel the export process that they have initiated.
By default, only three manual export of reports can run at a given point of time; the remaining triggered manual
export of reports are queued. There are no such limits for the scheduled export of reports.
Note All the reports in the queued state are scheduled again and the reports in the In-Progress or
Cancellation-in-progress state are marked as failed when the Cisco ISE server is restarted. If the primary
MnT node is down, the scheduled report export job runs on secondary MnT node.
The following table describes the fields in the Export Summary window. In the Cisco ISE GUI, click the
Menu icon ( ) and choose Operations > Reports > Export Summary.
Exported By Shows the role of the user who initiated the export process.
Triggered On Shows the time at which the export process has been triggered in the system.
Repository Displays the name of the repository where the exported data will be stored.
Filter Parameters Shows the filter parameters selected while exporting the report.
Status Shows the status of the exported reports. It can be one of the following:
• Queued
• In-progress
• Completed
• Cancellation-in-progress
• Cancelled
• Failed
• Skipped
Note Failed status indicates the reason for failure. Skipped status indicates that the
scheduled export of reports is skipped because the primary MnT node is down.
The device administrator is the user who logs into the network devices such as switches, wireless access
points, routers, and gateways, (normally through SSH), to perform the configuration and maintenance of the
administered devices. The Cisco ISE administrator logs into Cisco ISE to configure and coordinate the devices
that a device administrator logs in to.
The Cisco ISE administrator is the intended reader of this document, who logs into Cisco ISE to configure
the settings that control the operations of the device administrator. The Cisco ISE administrator uses the device
administration features (In the Cisco ISE GUI, click the Menu icon ( ) and chooseWork centers > Device
Administration) to control and audit the configuration of the network devices. A device can be configured
to query the Cisco ISE server using the TACACS security protocol. The Cisco ISE Monitoring node provides
enhanced reports that are related to device administration. A Cisco ISE administrator can perform the following
tasks:
• Configure network devices with the TACACS+ details (shared secret).
• Add device administrators as internal users and set their enable passwords as needed.
• Create policy sets that allow TACACS results, such as command sets and shell profiles, to be selected
in authorization policy rules in a device administration access service.
• Configure the TACACS server in Cisco ISE to allow device administrators to access devices based on
the policy sets.
The device administrator performs the task of setting up a device to communicate with the Cisco ISE server.
When a device administrator logs on to a device, the device queries the Cisco ISE server, which in turn queries
an internal or external identity store, to validate the details of the device administrator. When the validation
is done by the Cisco ISE server, the device informs the Cisco ISE server of the final outcome of each session
or command authorization operation for accounting and auditing purposes.
A Cisco ISE administrator can manage device administration using TACACS Plus (TACACS+).
Note You should check the Enable Device Admin Service check box in the Administration > System >
Deployment > General Settings page to enable TACACS+ operations. Ensure that this option is enabled in
each PSN in a deployment.
Due to a known limitation of TACACS+ protocol to create a secure connection between switch or router and
Cisco ISE, ensure that IP Security protocol is deployed between the two parties.
Option Description
All Policy Service Nodes Enables the device administration service in all PSNs.
With this option, new PSNs are automatically enabled
for device admin when they are added.
Specific Nodes Displays the ISE Nodes section that lists all the PSNs
in your deployment. You can select the required nodes
that need the device admin service to be enabled.
Note If the deployment is not licensed for TACACS+, the above options are disabled.
The TACACS Ports field allows you to enter a maximum of four TCP ports, which are comma-separated and
port values range 1–65535. Cisco ISE nodes and their interfaces listen for TACACS+ requests on the specified
ports and you must ensure that the specified ports are not used by other services. The default TACACS+ port
value is 49.
When you click Save, the changes are synchronized with the nodes that are specified in the Administration >
System > Deployment Listing window.
selected to control the authorization process. Each rule table has an exception policy that can be used to
override the rules for specific circumstances, often the exception table is used for temporary situations.
A Proxy Sequence policy set contains a single selected proxy sequence. If the policy set is in this mode then
one or more remote proxy servers are used to process the requests (although local accounting may be configured
by the Proxy Sequence).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Device Admin
Policy Sets.
Step 2 From the Actions column on any row, click the cog icon and then from the drop-down list, insert a new policy set by
selecting any of the insert or duplicate options, as necessary.
A new row appears in the Policy Sets table.
Step 3 Enter the name and description for the policy set.
Step 4 If necessary, from the Allowed Protocols/Server Sequence column, click the (+) symbol and select one of the following:
a) Create a New Allowed Protocol
b) Create a TACACS Server Sequence
Step 5 From the Conditions column, click the (+) symbol.
Step 6 Create the required conditions in the Conditions Studio Page. In the Editor section, click the Click To Add an
Attribute text box, and select the required Dictionary and Attribute (for example, Device-Location Equals Europe).
You can drag and drop a Library condition to the Click To Add An Attribute text box.
Note You can add IPv4 or IPv6 single address for the Device IP address attribute in the conditions that are used in
authentication and authorization policies.
• (For Default Devices) In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers >
Device Administration > Network Resources > Default Devices > TACACS Authentication
Settings. See the section "Default Network Device Definition in Cisco ISE" in for more information.
Shared Secret A string of text that is assigned to a network device when TACACS+ protocol is
enabled. A user must enter the text before the network device authenticates a username
and password. The connection is rejected until the user supplies the shared secret. This
is not a mandatory field.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a message
box is displayed. You can either click Yes or No.
Remaining Retired (Available only if you select Yes in the above message box) Displays the default value
Period specified in the following navigation path: In the Cisco ISE GUI, click the Menu icon
( ) and choose Work Centers > Device Administration > Settings > Connection
Settings > Default Shared Secret Retirement Period. You can change the default
values.
This allows a new shared secret to be entered and the old shared secret will remain
active for the specified number of days.
End (Available only if you select Yes in the above message box) Ends the retirement period
and terminates the old shared secret.
Enable Single Check to use a single TCP connection for all TACACS+ communication with the
Connect Mode network device. Choose one of the following:
• Legacy Cisco Devices
• Or, TACACS+ Draft Compliance Single Connect Support. If you disable Single
Connect Mode, ISE uses a new TCP connection for every TACACS+ request.
Note In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources >
Network Devices > Add window to access the TACACS+ Authentication Settings option.
show show Y —
3. After Cisco ISE has analyzed all the command sets, it authorizes the command:
a. If Cisco ISE designated any command set as Commandset-DenyAlways, Cisco ISE denies the
command.
b. If there is no Commandset-DenyAlways, Cisco ISE permits the command if any command set is
Commandset-Permit; otherwise, Cisco ISE denies the command. The only exception is when the
Unmatched check box is checked.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Policy Elements >
Results > TACACS Command Sets.
You can also configure TACACS command sets in the Work Centers > Device Administration > Device Admin Policy
Sets page.
Note Click the action icon to increase or decrease the column width of the Grant, Command, and Argument fields.
Step 6 Check the Permit any command that is not listed below check box to allow commands and arguments that are not
specified as Permit, Deny or Deny Always in the Grant column.
TACACS+ Profile
TACACS+ profiles control the initial login session of the device administrator. A session refers to each
individual authentication, authorization, or accounting request. A session authorization request to a network
device elicits a Cisco ISE response. The response includes a token that is interpreted by the network device,
which limits the commands that may be executed during a session. The authorization policy for a device
administration access service can contain a single shell profile and multiple command sets. The TACACS+
profile definitions are split into two components:
• Common tasks
• Custom attributes
There are two views in the TACACS+ Profiles window (In the Cisco ISE GUI, click the Menu icon ( ) and
choose Work Centers > Device Administration > Policy Elements > Results > TACACS Profiles), Task
Attribute View and Raw View. You can enter common tasks using the Task Attribute View and create
custom attributes in the Task Attribute View and the Raw View.
The Common Tasks section allows you to select and configure the frequently used attributes for a profile.
The attributes that are included here are those defined by the TACACS+ protocol draft specifications. However,
the values can be used in the authorization of requests from other services. In the Task Attribute View, the
Cisco ISE administrator can set the privileges that will be assigned to the device administrator. The common
task types are:
• Shell
• Cisco WLC
• Cisco Nexus
• Generic
The Custom Attributes section allows you to configure extra attributes. It provides a list of attributes that
are not recognized by the Common Tasks section. Each definition consists of the attribute name, an indication
of whether the attribute is mandatory or optional, and the value for the attribute.
Note You can define a total of 24 task attributes for TACACS-enabled network devices. If you define more than
24 task attributes, none of them are sent to TACACS-enabled network devices.
In the Raw View, you can enter the mandatory attributes using an equal to (=) sign between the attribute name
and its value and optional attributes are entered using an asterisk (*) between the attribute name and its value.
The attributes that are entered in the Raw View section are reflected in the Custom Attributes section in the
Task Attribute View and vice versa. The Raw View section is also used to copy and paste the attribute list
(for example, another product's attribute list) from the clipboard onto Cisco ISE. Custom attributes can be
defined for nonshell services.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Policy Elements >
Results > TACACS Profiles.
You can also configure TACACS command sets in the Work Centers > Device Administration > Device Admin Policy
Sets page.
Step 4 In the Task Attribute View tab, check the required Common Tasks. See the Common Tasks Settings, on page 433 page.
Step 5 In the Task Attribute View tab, in the Custom Attributes section, click Add to enter the required attributes.
Shell
The following options are available for the Cisco ISE administrator to set the device administrator's privileges.
Option Description
Default Privilege Enable the default (initial) privilege level for a device
administrator for the shell authorization. Select any
one of the following options:
• Select values between 0 through 15.
• Select the required Identity Store Attribute.
Cisco WLC
The following options are available for the Cisco ISE administrator to control a device administrator's access
to the Cisco WLC application tabs. The Cisco WLC application contains the following tabs: WLAN, Controller,
Wireless, Security, Management, and Commands.
Option Description
Nexus
The following options are available for the Cisco ISE administrator to control a device administrator's access
to the Cisco Nexus switches.
Option Description
Generic
The Cisco ISE administrator uses the option to specify custom attributes that are not available in the common
tasks.
Note If password lifetime is configured for the Login password and Enable password, the user account will be disabled
if the passwords are not changed within the specified time period. If Cisco ISE is configured as TACACS+ server
and the Enable Bypass option is configured on the network device, you cannot change the Enable password from
the CLI (via telnet). In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity
Management > Identities > Users to change the Enable password for internal users.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Settings.
In the Connection Settings tab, you can change the default values for the required fields.
• In the Authorization cache timeout field, you can set the Time-To-Live (TTL) value for which certain attributes
of an internal user are cached upon the first authorization request. The cached attributes include username, and
user-specific attributes, such as UserGroup. In the Cisco ISE GUI, click the Menu icon ( ) and choose System
Administration > Configuration > Dictionaries > Identity > Internal Users to create attributes. The default value
is 0, which means the authorization cache is disabled.
• Single Connect Support: If you disable Single Connect Mode, ISE uses a new TCP connection for every TACACS+
request.
Step 2 In the Password Change Control tab, define the required fields to control whether password update is permitted through
TACACS+.
The prompts in the Enable Telnet Change Password section are enabled only when this option is selected. Or else, the
prompts in the Disable Telnet Change Password are enabled. The password prompts are fully customizable and can be
modified as needed.
In the Password Policy Violation Message field, you can display an appropriate error message for the password set by
the internal users if the new password does not match the specified criteria.
Step 3 In the Session Key Assignment tab, select the required fields to link TACACS+ requests into a session.
The session key is used by the Monitoring node to link AAA requests from clients. The default settings are for
NAS-Address, Port, Remote-Address, and User fields to be enabled.
Related Topics
TACACS+ Authentication Settings and Shared Secret, on page 427
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Reports >
Reports..
You can also view the reports in another location. In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations >
Reports > Reports page.
Step 2 In the Report Selector, expand Device Administration to view Authentication Summary, TACACS Accounting,
TACACS Authentication, TACACS Authorization , TACACS Command Accounting, Top N Authentication by
Failure Reason, Top N Authentication by Network Device, Top N Authentication by User reports.
Step 3 Select the report and choose the data with which you want to search using the Filters drop-down list.
Step 4 Select the Time Range during which you want to view the data.
Step 5 Click Run.
Generated Time Shows the syslog generation time based on when a particular event was triggered.
Logged Time Shows the time when the syslog was processed and stored by the Monitoring node.
This column is mandatory and cannot be deselected.
Status Shows if the authentication succeeded or failed. This column is required and cannot
be deselected. Green is used to represent passed authentications. Red is used to represent
failed authentications.
Details Brings up a report when you click the magnifying glass icon, allowing you to drill
down and view more detailed information about the selected authentication scenario.
This column is required and cannot be deselected.
Session Key Shows the session keys (found in the EAP success or EAP failure messages) returned
by ISE to the network device.
Username Shows the user name of the device administrator. This column is required and cannot
be deselected.
Type Consists of two Types—Authentication and Authorization. Shows names of users who
have passed or failed authentication, authorization, or both. This column is mandatory
and cannot be deselected.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
ISE Node Shows the name of the ISE node through which the access request is processed.
Network Device IP Shows the IP addresses of network devices whose access requests are processed.
Network Device Shows the name of corresponding network device groups to which a network device
Groups belongs.
Device Type Shows the device type policy that is used to process access requests from different
network devices.
Location Shows the location-based policy that is used to process access requests from network
devices.
Device Port Shows the device port number through which the access request is made.
Failure Reason Shows the reason for rejecting an access request that is made by a network device.
Remote Address Shows the IP address, MAC address, or any other string that uniquely identifies the
end station.
Shell Profile Shows the privileges that were granted to a device administrator for executing
commands on the network device.
• Employees: Employees who are included in identity stores (such as Active Directory, LDAP, Internal
Users) can also gain access through the credentialed Guest portals (Sponsored-Guest and Self-Registered
Guest portals), if configured.
Devices onboarded through the Bring Your Own Device (BYOD) workflow will not be treated as a Guest
device and the Endpoint Identity Group that is configured will not be changed. For more information on Bring
Your Own Device (BYOD), see Bring Your Own Device (BYOD).
After their guest accounts are created, guests can use the Sponsored-Guest portal to log in and gain access to
the network.
When creating guest accounts, certain sponsor groups can be restricted to using specific guest types. Members
of such a group can create guests with only the features specified for their guest type. For instance, the sponsor
group, ALL_ACCOUNTS, can be set up to use only the Contractor guest type, and the sponsor groups,
OWN_ACCOUNTS and GROUP_ACCOUNTS, can be set up to use Daily and Weekly guest types. If the
self-registering guests using the Self-Registered Guest portal typically need access for just a day, you can
assign them the Daily guest type.
The guest type defines the user identity group for a guest.
For more information, see:
• User Identity Groups, on page 586
• Create a User Identity Group, on page 594
In the Cisco ISE GUI, click the Menu icon ( ) and choose Guest Access > Configure > Guest Types, and enter the
required details.
Use these settings to create the types of guests who can access your network, and their access privileges. You can also
specify which Sponsor Groups can create a Guest Type.
Guest Type Name Provide a name (from 1 to 256 characters) that distinguishes
this Guest Type from the default Guest Types and others
that you create.
Description Provide additional information (maximum of 2000
characters) about the recommended use of this Guest Type,
for example, use for self-registering guests, Do not use for
guest account creation, and so on.
Language File Export or import the language file to use for portals using
this Guest Type.
Collect Additional Data Select custom fields to collect additional information from
guests.
To view this window, click the Menu icon ( ) and choose
Guest Access > Settings > Custom Fields.
Maximum Access Time—Account Duration Starts From First Login: The account start time starts when the
guest user first logs in to the guest portal, and the end time
equals the specified duration time. If the guest user never
logs in, the account remains in the Awaiting First login state
until the account is removed by the Guest Account Purge
Policy. Self-registered and Sponsor-created user accounts
start when they create their acoounts and log in to them.
Note If you choose Allow access only on these days
and times, the location is used to establish context
of these times. If you do not want From First
Login access to be based on location, do not set
days and times for access.
Allow Access only on these Days and Times Enter the time range and select the days of the week to
specify when this Guest Type can access the network. If
this Guest Type remains connected outside these time
parameters, they will be logged out. The time ranges are
related to the time zones defined by the locations assigned
to the guests using this Guest Type.
Click + or - for adding or deleting restricted access times.
Configure Guest Account Purge Policy You can schedule an endpoint purge job. The endpoint
purge schedule is enabled by default and Cisco ISE deletes
endpoints that are older than 30 days. See the section
"Endpoints Purge Settings" in Cisco ISE Admin Guide:
Maintain and Monitor for more information.
Login Options—Maximum simultaneous logins Enter the maximum number of user sessions that this Guest
Type can have running concurrently.
When Guest Exceeds Limit When you select Maximum simultaneous logins, you must
also select the action to take when a user connects after that
limit is reached.
When the guest exceeds limit:
• Disconnect the oldest connection
• Disconnect the newest connection
• Redirect user to a portal page showing an error
message: An error message is displayed for a
period of time that can be configured. After this,
the session is disconnected, and the user is
redirected to the Guest portal. The error page's
content is configured on the Portal Page
Customization dialog box, under the Messages
> Error Messages tab.
Maximum Devices Guests can Register Enter the maximum number of devices that can be registered
to each guest. You can set the limit to a number lower than
what is already registered for the guests of this Guest Type.
This will only affect newly created guest accounts.
When guest users reach the maximum number of devices
they can register, they view a notification that informs them
that they can proceed in one of the following ways:
• Select a registered device to remove from their device
list and then add a new device.
• Proceed with registering a new device. In this scenario,
the oldest registered device on their list is automatically
deregistered.
Allow Guest to bypass the Guest portal Allows users to bypass the credentialed Guest captive portal
(web authentication page) and access the network by
providing credentials to wired and wireless (dot1x)
supplicants or VPN clients. Guest accounts go to Active
state bypassing the Awaiting Initial Login state and the AUP
page, even if it is required.
If you do not enable this setting, users must first log in
through the credentialed Guest captive portal before they
will be able to access other parts of the network.
Account Expiration Notification—Send account Send a notification to Guests before their account expires
expiration notification __ days before account expires and specify how many days, hours or minutes in advance
of the expiration.
View messages in Specify the language to use when displaying email or SMS
notifications as you set them up.
Copy text from Reuse email text that you created for another Guest Type
for account expiry notification.
Send test email to me at Ensure that the email notification displays as it should by
sending it to your email address.
SMS Select text (SMS) as the method used for account expiry
notification.
Copy text from Reuse text messages that you created for another Guest
Type.
Send test SMS to me at Ensure that the text notification displays as it should by
sending it to your cell phone.
These sponsor groups can create this guest type Select which sponsor groups can create Guest accounts with
this Guest Type.
If you want to disable use of this Guest Type, do not assign
it to any sponsor group. If you want to discontinue use of
this Guest Type, delete the sponsor groups listed.
What to do next
• Create or modify sponsor groups to use this guest type.
• If appropriate, assign this guest type to self-registering guests in the Self-Registered Guest portal.
Step 1 Identify the sponsor groups that allow the sponsor to create guests using the target guest type. In the Cisco ISE GUI, click
the Menu icon ( ) and choose Work Centers > Guest Access > Configure > Portals and Components > Sponsor
Groups. Open each sponsor group and examine the This sponsor group can create accounts using these guest types
list.
Step 2 Identify the Self-Registered portals that assign the target guest type. In the Cisco ISE GUI, click the Menu icon ( ) and
choose Work Centers > Guest Access > Configure > Portals and Components > Guest Portals. Open each
Self-Registered Guest portal. If the portal uses the specific guest type, expand Portal Settings, and change the assigned
Guest Type in the Employees using this portal as guests inherit login options from: field.
Step 3 Open the guest type you wish to delete, and delete all sponsor groups that you identified in the previous steps. This action
effectively prevents all sponsors from using creating a new guest account with this guest type. In the Cisco ISE GUI,
click the Menu icon ( ) and choose Work Centers > Guest Access > Configure > Portals and Components > Guest
Type.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Guest Type. Under Login Options:
a) Check the Maximum simultaneous logins check box and enter the maximum number of simultaneous logins allowed.
b) Under When guest exceeds limit, click the Disconnect the newest connection option.
c) Check the Redirect user to a portal page showing an error message check box.
Step 2 Choose Policy > Policy Elements > Results, and create an authorization profile:
a) Under Common Tasks, check Web Redirection and do the following:
• In the first drop-down, choose Centralized Web Auth.
• Enter the ACL you created as part of the prerequisite.
• For Value, select the guest portal to be redirected to.
b) Scroll down in Common Tasks, and check the Reauthentication check box and do the following:
• In Timer, enter the amount of time you want the error page to display before redirecting the user to the guest
portal.
• In Maintain Connectivity During Reauthentication, choose Default.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets. Create an authorization policy so that
when the attribute NetworkAccess.SessionLimitExceeded is true, the user is redirected to the portal.
What to do next
You can customize the text of the error page on the Portal Page Customization tab. Choose Messages > Error
Messages and change the text of the error message key ui_max_login_sessions_exceeded_error.
If the Cisco ISE server is down when the purge is scheduled to run, the purge is not executed. The purge
process will run again at the next scheduled purge time, assuming the server is operational at that time.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Settings > Guest
Account Purge Policy.
Step 3 Specify the number of days of inactivity to expire users in Expire portal-user information after. This setting prevents
LDAP and Active Directory accounts that were never used from staying in the ISE database indefinitely.
If a first login does not happen, on expiry of the specified time period, the guest account is moved to the expired state
and is then purged, based on the configured purge policy.
You can also specify the frequency (in days or weeks) at which the expired guest accounts must be purged. If you have
selected the Purge occurs every _ weeks option, you can also specify the day and time for purging the expired accounts.
Step 4 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Guest Access > Settings > Custom Fields.
Step 2 Enter the Custom Field Name, pick a Data Type from the drop-down list, and enter Tip Text to help provide additional
information about the custom field. For instance, if you enter Date of Birth, pick Date-MDY, and enter a tip for the date
format as MM/DD/YYYY.
Step 3 Click Add.
The custom field appears in the list in alphabetical order or in the context of the sorted order.
Step 4 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Note If you delete a custom field, it will no longer be available for selection in the Custom Fields list for guest types
and in the Self-Registered Guest and Sponsor portals settings. If the field is being used, Delete will be disabled.
What to do next
You can include the desired custom fields:
• When defining a guest type so that accounts created with that guest type will include this information.
See Create or Edit Guest Types.
• When configuring the Sponsor portal for sponsors to use when creating guest accounts. See Customize
Sponsor Portals, on page 483.
• When requesting information from self-registering guests using a Self-Registered Guest portal. See
Create a Self-Registered Guest Portal, on page 467.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Settings > Guest Email
Settings.
Step 2 Enable email notifications to guests is checked by default. If you disable this setting, guests will not receive email
notifications regardless of any other settings you may have enabled while configuring Guest and Sponsor portals.
Step 3 Enter the Default “From” email address that is designated for sending email notifications to guests. For example,
donotreply@ yourcompany.com.
Step 4 Do one of the following:
• Check Send notifications from sponsor's email address (if sponsored) if you want guests to receive notifications
from the sponsor who created their accounts. Self-registering guests will receive notifications from the default email
address.
• Check Always send notifications from the default email address if you want guests to receive notifications,
regardless of whether they are sponsored and self-registering.
Step 5 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Note Guest access times are based on the Guest Location's time zone. A Guest user may not be able to login if the
Guest Location's time zone doesn't match the system time zone. In this case, the Guest user may get an
"Authentication Failed" error. You might see the "Guest active time period not yet started" error message in
the debug report. As a workaround, you can adjust the Guest access start time to match the local time zone
of the Guest user by using the Manage Accounts option.
The SSIDs you add here are available to Sponsor Portals, so Sponsors can tell the Guest which SSID to connect
to.
You can't delete a Guest Location or a SSID if it is configured in a Sponsor portal or assigned to a Guest
account.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Portals & Components > Settings >
Guest Locations and SSIDs.
Step 2 For Guest Locations:
a) For each time-zone that you need to support, enter a Location name and pick a Time zone from the drop-down list.
b) Click Add.
Note In a Guest Location, the name of the place, the name of the time zone, and the GMT offset are static; you
cannot change them. The GMT offset does not change with daylight savings time changes. The GMT offsets
are the opposite of what is shown in the list. For example, Etc/GMT+3 is actually GMT-3.
Note For From First-login guest type, ensure that you configure a Guest Location (time zone) only if you intend
to configure the access time restrictions in the Work Centers > Guest Access > Portals & Components >
Guest Types page.
What to do next
If you added a new Guest Location or SSID, you can:
• Provide the SSIDs for Sponsors to use when creating Guest accounts. See Portal Settings for Sponsor
Portals, on page 512.
• Add the Guest Locations to Sponsor Groups, so that Sponsors assigned to that group can use them when
creating guest accounts. See Configure Sponsor Groups, on page 476.
• Assign the Guest Locations available to self-registering guests using a Self-Registered Guest portal. See
Create a Self-Registered Guest Portal, on page 467.
• For existing guest accounts, edit them manually to add SSIDs or Locations.
• The special characters <, >, /, space, comma, and % cannot be used.
• Minimum length and minimum required characters apply to all passwords.
• Passwords cannot match usernames.
• New passwords cannot match current passwords.
• Guests do not receive notifications before password expiration, unlike guest account expiration. When
guest passwords expire, either sponsors can reset the password to a random password or guests can log
in using their current login credentials and then change their password.
Note The guest default username is four alpabetic and password is four numeric characters. Short, easy to remember
usernames and passwords are adequate for short-term guests. You can change the username and password
length in ISE, if you desire.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Guest Access > Settings > Guest Password Policy.
Step 2 Enter the Minimum password length (in characters) for the guest passwords.
Step 3 Specify the characters from each character set that can be used by guests to create passwords.
Choose one of the following options under Allowed Characters and Minimums to specify the password policy for
guests:
• Use all the characters from each character set.
• To prevent the use of certain characters, choose Custom from the drop-down menu, and delete these characters
from the predefined and complete sets.
Step 4 Enter the minimum number of characters to use from each set.
The total number of required characters across the four character sets should not exceed the overall Minimum password
length.
Step 5 Choose one of the following options under Password Expiration:
• Specify the frequency (in days) when guests have to change their passwords after they first log in. If the guests do
not reset their passwords before they expire, the next time they log in to the network using their original login
credentials, they are prompted to change their passwords.
• Set the passwords to never expire.
Step 6 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
What to do next
You should customize the error messages that are related to the password policy to provide the password
requirements.
1. Choose Guest Access > Portals & Components > Sponsored-Guest Portals or Self-Registered Guest
Portals > Edit > Portal Page Customization > Error Messages.
2. Search for the keyword policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Portals & Components > Settings >
Guest Username Policy.
Step 2 Enter the Minimum username length (in characters) for the guest usernames.
Step 3 Choose one of the options under Username Criteria for Known Guests to specify the policy for creating usernames
for known guests.
Step 4 Choose one of the following options under Characters Allowed in Randomly-Generated Usernames to specify the
policy for creating random usernames for guests:
• Use all characters from each character set.
• To prevent the use of certain characters, choose Custom from the drop-down menu, and delete these characters
from the predefined and complete sets.
Step 5 Enter the minimum number of characters to use from each set.
The total number of characters from the three character sets should not exceed the number specified in Minimum
username length.
Step 6 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
What to do next
You should customize the error messages that are related to the username policy to provide the username
requirements.
1. Choose Work Centers > Guest Access > Portals & Components > Sponsored-Guest Portals,
Self-Registered Guest Portals, Sponsor Portals, or My Devices Portals > Edit > Portal Page
Customization > Error Messages.
2. Search for the keyword policy.
SMS providers are configured as SMS Gateways in Cisco ISE. Email from Cisco ISE is converted to SMS
by the SMS gateway. The SMS gateway can be behind a proxy server.
Note Cisco ISE SMS gateway does not support authorization codes in JSON format.
When entering information in the fields, you should update all text within [ ], such as [USERNAME],
[PASSWORD], [PROVIDER_ID], and so on, with information specific to your SMS provider's account.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > SMS Gateway >
SMS Gateway Providers.
Step 2 Click Add.
Step 3 Enter the following details to configure the SMS gateway:
Use these settings to configure sending SMS messages to guests and sponsors via an HTTP API (GET or POST method).
Data (Url encoded portion) Enter the Data (URL encoded portion) for the GET or POST
request.
This field is URL encoded. If using the default GET method,
the data is appended to the URL specified above.
Use HTTP POST method for data portion If you are using the POST method, check this option.
The data specified above is used as the content of the POST
request.
HTTP POST data content type If you are using the POST method, specify the content type
such as "plain/text" or "application/xml".
Step 4 (Optional) Check the Enable Mobile Number Format check box if you want to add a Javascript to format the mobile
number before it is sent to the SMS provider.
Step 5 Click Submit.
What to do next
If you configured a new SMS gateway, you can:
• Select the SMS service provider to use when sending SMS notifications about expiring accounts to guests.
See Create or Edit Guest Types.
• Specify which of the configured SMS providers should display on the Self-Registration form for
self-registering guests to pick from. See Create a Self-Registered Guest Portal, on page 467.
6. Registration is successful. The user is directed to the option configured in After submitting the guest
form for self-registration, direct guest to on Registration Form Settings. The user's account is added
to the endpoint identity group configured for the portal's guest type.
7. The user has access until the guest account expires, or the user disconnects from the network.
If the account expired, the only way to allow the user to log in is to reactivate the account, or to delete it.
The user must go through the login flow again.
If a user disconnects from the network, and reconnects, the action Cisco ISE takes depends on the
authorization rules. If the user hits an authorization similar to:
rule if guestendpoint then permit access
and the user is still in the endpoint group, then the user is redirected to the logon page. If a user still has
a valid token, they are automatically logged in. If not, the user must go through registration again.
If the user is no longer in the endpoint group, the user is redirected to the guest page to go through
registration.
enables a guest to reconnect if the user device falls asleep, or if the user device roams to another building.
When the user reconnects, the user is redirected back to guest page which either does auto login with a
token, or starts registration again.
• For MAB, every time the user reconnects, the user is redirected to the guest portal, and needs to click
the social media again. If Cisco ISE still has a token for that user's account (guest account hasn't expired),
then the flow goes to log in success immediately, without having to connect with the social media provider.
To prevent every reconnect redirecting to another social login, you can configure an authorization rule
that remembers the device, and permits access until the account expires. When the account expires, it is
removed from the endpoint group, and the flow is redirected back to the rule for guest redirect. For
example:
if wireless_mab and guest endpoint then permit access
if wireless_mab then redirect to self-registration social media portal
ISE Reports: The Guest username is the user's name on the social media site.
Facebook Analytics: You can see who is using your guest network through Facebook social logon by using
analytics from Facebook.
Wireless and Facebook: The User Name on the Wireless controller is the unique Facebook ID, the same as
the SocialMediaIdentifier on the Live Logs. To see the setting in the Wireless UI, choose Monitor > Clients >
Detail, and look at the User Name field.
For information about configuring Social Login for Cisco ISE, see Configuring Social Login, on page 457.
Note The social login URL for Facebook is HTTPS. Not all NADs support redirection to a HTTPS URL. See
https://communities.cisco.com/thread/79494?start=0&tstart=0&mobileredirect=true.
Step 3 Click App Review, and select Yes for Your app is currently live and available to the public.
Step 4 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > Social Login. Click Add to create a new social login external identity source.
• Type: Select the type of Social Login provider. Facebook is currently the only option.
• App ID: Enter the App ID from the Facebook application.
• App Secret: Enter the App Secret from the Facebook application.
Step 5 In Cisco ISE, enable Social Media Login in a self-registered portal. On the portal page, choose Portal & Page Settings >
Login Page Settings, check the Allow Social Logincheck box, and enter the following details:
• Show registration form after social login: This allows the user to change the information provided by Facebook.
• Require guests to be approved: This informs the user that a sponsor must approve their account, and will send
them credentials for login.
Step 6 Choose Administration > External Identity Sources, select the Facebook Login window, and edit your Facebook
external identity source.
This creates redirect URIs, which you add to the Facebook application.
Step 7 In Facebook, add the URIs from the previous step to your Facebook application.
What to do next
In Facebook, you can display data about your app, which shows the guest activity with the Facebook Social
Login.
Guest Portals
When people visiting your company wish to use your company’s network to access the internet, or resources
and services on your network, you can provide them network access through a Guest portal. Employees can
use these Guest portals to access your company’s network, if configured.
There are three default Guest portals:
• Hotspot Guest portal: Network access is granted without requiring any credentials. Usually, an Acceptance
of User Policy (AUP) must be accepted before network access is granted.
Requiring an access code logon is supported by Wireless Setup for the Hotspot and Self-Registration
portals.
• Sponsored-Guest portal: Network access is granted by a sponsor who creates accounts for guests, and
provides the guest with login credentials.
• Self-Registered Guest portal: Guests can create their own account credentials, and may need sponsor
approval before they are granted network access.
Cisco ISE can host multiple Guest portals, including a predefined set of default portals.
• Registration code: Optional. Applies to self-registering guests and is similar to an access code in how it
is provided to the self-registering guests. If the Registration code setting is enabled, self-registering guests
are prompted to enter it on the Self-Registration form.
The username and password can be provided by a sponsor at your company (for sponsored guests), or a
Credentialed Guest portal can be configured to allow guests to register themselves to obtain these credentials.
Note While doing bulk import of user entries in the guest portal, ensure that the phone numbers are provided in
E.164 format. In addition, ensure that the format for the phone number column is set to Text in the Excel file.
Related Topics
Guest Types and User Identity Groups, on page 441
You can also force the user to enter a new password when logging in.
Cisco ISE enables you to create multiple credentialed Guest portals, which you can use to allow guest access
based on different criteria. For example, you might have a portal for monthly contractors that is separate from
the portal used for daily visitors.
Note Client posture assessment in guest flow supports only the Temporal agent.
The Client Provisioning service provides posture assessments and remediations for guests. The Client
Provisioning portal is available only with a Central Web Authorization (CWA) guest deployment. The guest
login flow performs a CWA, and the credentialed Guest portal is redirected to the Client Provisioning portal
after performing acceptable-use-policy and change-password checks. The posture subsystem performs a
Change of Authorization (CoA) on the network access device to reauthenticate the client connection once the
posture has been assessed.
Create Endpoint Identity Required Not required (defined by Not required (defined by
Groups, on page 790 guest type) guest type)
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Click the node and click Edit.
Step 3 Under the General Settings tab, enable the Policy Service toggle button.
Step 4 Check the Enable Session Services check box.
Step 5 Click Save.
Step 1
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.
Step 3 Add a system certificate and assign it to a certificate group tag that you want to use for the portal.
This certificate group tag will be available to select during portal creation or editing.
Step 4 Choose Work Centers > Guest Access > Portals & Components > Guest Portals > Create or Edit > Portal Settings.
Step 5 Select the specific certificate group tag from the Certificate group tag drop-down list that is associated with the newly
added certificate.
Note To work with passive identity services, which enable you to receive and share authenticated user identities,
see Additional Passive Identity Service Providers, on page 649.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources.
Step 2 Choose one of these options:
• Certificate Authentication Profile for certificate-based authentications.
• Active Directory to connect to an Active Directory as an external identity source. See Active Directory as an External
Identity Source, on page 603 for more details.
• LDAP to add an LDAP identity source. See LDAP, on page 690 for more details.
• RADIUS Token to add a RADIUS Token server. See RADIUS Token Identity Sources, on page 712 for more details.
• RSA SecurID to add an RSA SecurID server. See RSA Identity Sources, on page 718 for more details.
• SAML Id Providers to add an identity provider (IdP), such as Oracle Access Manager. See SAMLv2 Identity
Provider as an External Identity Source, on page 724 for more details.
• Social Login to add a Social Login, such as Facebook, as an external identity source. See Social Login for
Self-Registered Guests, on page 455 for more details.
employee is either reconnected using the token from the last logon with this SAML IDP, or logs in on that
SAML site. That allows the same portal to handle both guests and employees from a single SSID.
The following steps show how to configure a Guest portal that calls another portal which is configured to use
a SAML IDP for authentication.
Step 1 Configure an external identity source. See SAMLv2 Identity Provider as an External Identity Source, on page 724 for
more details.
Step 2 Create a guest portal for the SAML provider. Set the Authentication method in Portal Settings to the SAML provider.
The user will not see this portal, it is just a placeholder to direct the user to the SAML IDP logon page. Other portals can
be configured to redirect to this sub-portal, as described next.
Step 3 Create a guest portal with the option to redirect to the guest portal for the SAML provider portal that you just created.
This is the main portal, which will redirect to the sub-portal.
You may want to customize the look of this portal to make it look like the SAML provider.
a) On the Login Page Settings page of the main portal, check Allow the following identity-provider guest portal to
be used for login.
b) Select the guest portal that you configured to use with the SAML provider.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Identity
Source Sequences > Add.
Step 2 Enter a name for the identity source sequence. You can also enter an optional description.
Step 3 Check the Select Certificate Authentication Profile check box and choose a certificate authentication profile for
certificate-based authentication.
Step 4 Choose the database or databases that you want to include in the identity source sequence in the Selected List field.
Step 5 Rearrange the databases in the Selected list field in the order in which you want Cisco ISE to search the databases.
Step 6 If a selected identity store cannot be accessed for authentication, choose one of the following options in the Advanced
Search List area:
• Do not access other stores in the sequence and set the AuthenticationStatus attribute to ProcessError
• Treat as if the user was not found and proceed to the next store in the sequence
While processing a request, Cisco ISE searches these identity sources in sequence. Ensure that you have the identity
sources in the Selected list field listed in the order in which you want Cisco ISE to search them.
Step 7 Click Submit to create the identity source sequence that you can then use in policies.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Groups >
Endpoint Identity Groups.
Step 2 Click Add.
Step 3 Enter the Name for the endpoint identity group that you want to create (do not include spaces in the name of the endpoint
identity group).
Step 4 Enter the Description for the endpoint identity group that you want to create.
Step 5 Click the Parent Group drop-down list to choose an endpoint identity group to which you want to associate the newly
created endpoint identity group.
Step 6 Click Submit.
What to do next
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Guest Portals > Create, Edit or Duplicate.
Step 2 If creating a new portal, in the Create Guest Portal dialog box, select Sponsored-Guest Portal as the portal type and
click Continue.
Step 3 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name that you use here is not used for any other end-user portals.
Step 4 Use the Language File drop-down menu to export and import language files to use with the portal.
Step 5 Update the default values for ports, Ethernet interfaces, certificate group tags, identity source sequences, authentication
method, and so on in Portal Settings, and define behavior that applies to the overall portal.
Step 6 Update the following settings, which apply to each of the specific pages:
• Login Page Settings: Specify guest credential and login guidelines. If you select the Allow guests to create their
accounts option, users will be able to create their own guest accounts. If this option is not selected, sponsors will
be required to create guest accounts.
Note Login Page Settings option will be disabled if you have selected an identity provider (IdP) in the Authentication
Method field.
• Acceptable Use Policy (AUP) Page Settings: Add a separate AUP page and define the acceptable use policy
behavior for guests, including employees who use the credentialed Guest portals.
• Employee Change Password Settings: Require guests to change their password after the first time they log in.
• Guest Device Registration Settings: Select whether Cisco ISE automatically registers guest devices or displays a
page where guests can manually register their devices.
• BYOD Settings: Let employees use their personal devices to access the network.
• Post-Login Banner Page Settings: Notify guests of additional information before they are granted network access.
• Guest Device Compliance Settings: Route guests to the Client Provisioning page and require them to first download
the posture agent.
• VLAN DHCP Release Page Settings: Release the guest device IP address from the guest VLAN and renew it to
access another VLAN on the network.
• Authentication Success Settings: Specify what guests should see once they are authenticated.
• Support Information Page Settings: Help guests provide information that the Help Desk can use to troubleshoot
network access issues.
Step 7 Click Save. A system-generated URL displays as the Portal test URL, which you can use to access the portal and test
it.
What to do next
Note The test portal does not support RADIUS sessions, so you won't see the entire portal flow for all portals.
BYOD and Client Provisioning are examples of portals that depend on RADIUS sessions. For example, a
redirect to an external URL will not work. If you have more than one PSN, ISE chooses the first active PSN.
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Guest Portals > Create, Edit or Duplicate..
Step 2 If creating a new portal, in the Create Guest Portal dialog box, select Self-Registered Guest Portal as the portal type
and click Continue.
Step 3 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name that you use here is not used for any other end-user portals.
Step 4 Use the Language File drop-down menu to export and import language files to use with the portal.
Step 5 In Portal Settings, update the default values for ports, Ethernet interfaces, certificate group tags, identity source sequences,
authentication method,, and other settings that define behavior of this portal.
For more information about Portal Settings fields, see Portal Settings for Credentialed Guest Portals, on page 499.
Step 6 Update the following settings, which apply to each of the specific pages:
• Login Page Settings: Specify guest credential and login guidelines. For more information, see Login Page Settings
for Credentialed Guest Portals, on page 501.
• Self-Registration Page Settings: Specify the information self-registering guests will read and should enter on the
Self-Registration form, in addition to the guest experience after they have submitted the form.
• Acceptable Use Policy (AUP) Page Settings: Add a separate AUP page and define the acceptable use policy
behavior for guests, including employees who use the credentialed Guest portals. For more information, see Acceptable
Use Policy (AUP) Page Settings for Credentialed Guest Portals, on page 505.
• Employee Change Password Settings: Require guests to change their password after the first time they log in.
• Guest Device Registration Settings: Select whether Cisco ISE automatically registers guest devices or displays a
page where guests can manually register their devices.
• BYOD Settings: Let employees use their personal devices to access the network. For more information, see BYOD
Settings for Credentialed Guest Portals, on page 507.
• Post-Login Banner Page Settings: Display additional information after the user successfully logs in, and before
they are granted network access.
• Guest Device Compliance Settings: Redirects guests to the Client Provisioning page for posture assessment. For
more information, see Guest Device Compliance Settings for Credentialed Guest Portals, on page 508.
• VLAN DHCP Release Page Settings: Release the guest device IP address from the guest VLAN and renew it to
access another VLAN on the network. For more information, see BYOD Settings for Credentialed Guest Portals,
on page 507.
• Authentication Success Settings: Specify where to direct guests after they are authenticated. If you redirect a Guest
to an external URL after authentication, there may be a delay while the URL address is resolved and the session is
redirected. For more information, see Authentication Success Settings for Guest Portals, on page 509.
• Support Information Page Settings: Help guests provide information that the Help Desk can use to troubleshoot
network access issues.
Step 7 Click Save. A system-generated URL displays as the Portal test URL, which you can use to access the portal and test
it.
What to do next
Note The test portal does not support RADIUS sessions, so you won't see the entire portal flow for all portals.
BYOD and Client Provisioning are examples of portals that depend on RADIUS sessions. For example, a
redirect to an external URL will not work. If you have more than one PSN, ISE chooses the first active PSN.
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use.
• Sponsor email addresses listed below: Cisco ISE sends emails to all the provided email addresses.
When one of those sponsors clicks the approve or deny link, they are directed to their sponsor portal.
That sponsor enters their credentials, which are verified. If the sponsor group that they belong to allows
them to approve the guest account, they can approve the account. If credentials fail, then Cisco ISE
notifies the sponsor to log on to the sponsor portal, and approve the account manually.
Considerations
• If your are upgrading or restoring the database from previous version of Cisco ISE, you must manually
insert approve or deny links. Open the Self-Registered guest portal and choose the Portal Page
Customization tab. Scroll down and choose the Approval Request Email window. Click Insert
Approve/Deny Links in the Email Body section of that window.
• Only Sponsor portals that authenticate with Active Directory and LDAP are supported. The sponsor
group that the sponsor maps to must contain the Active Directory group that the sponsor belongs to.
• When there is a list of sponsors, the customization from the first portal is used, even if that is not the
portal that the sponsor logs on to.
• The sponsor must use an HTM-capable email client to use the approve and deny links.
• If the email address for the sponsor is not for a valid sponsor, the approval email is not sent.
For more information about single-click sponsor approval, see the Cisco ISE community resource: ISE Single
Click Sponsor Approval FAQ. This document also has a link to a video that explains the entire process.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest > Configure > Guest Portals.
Select the self-registered portal that you want to configure for email account approval links.
Step 2 Expand the Self-Registration Page Settings tab.
Step 3 Check Require self-registered guests to be approved.
Approve/Deny Link Settings section appears. It also populates the email configuration of the Approval Request Email
with approve and deny links.
Enter the following details:
• Require self-registered guests to be approved: Specify that the self-registering guests using this portal require
approval from a sponsor before receiving their guest credentials. Clicking this option displays more options for how
sponsors approve a self-registered guest.
• Allow guests to login automatically from self-registration after sponsor's approval: A self-registered guest
will be logged in automatically after sponsor approval.
• Email approval request to:
• Sponsor email addresses listed below: Enter one or more email addresses of sponsors designated as
approvers, or a mailer, to which all guest approval requests should be sent. If the email address is not valid,
approval fails.
• Person being visited: Require sponsor to provide credentials for authentication field is displayed,
and the Required option in Fields to include is enabled (if it was previously disabled). These fields are
displayed on the Self-Registration form requesting this information from the self-registering guests. If the
email address is not valid, approval fails.
source sequence, which is used to identify the sponsor. Portals are used in the order they are listed. The
first portal in the list determines the style and customization used in the sponsor portal.
Authorize Portals
When you authorize a portal, you are setting up the network authorization profiles and rules for network
access.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization >
Authorization Profiles.
Step 2 Create an authorization profile using the name of the portal that you want to authorize for use.
What to do next
You should create a portal authorization policy rule that uses the newly created authorization profile.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets to create a new authorization policy
rule under Standard policies.
Step 2 For Conditions, select an endpoint identity group that you want to use for the portal validation. For example, for the
Hotspot Guest portal, select the default GuestEndpoints endpoint identity group and, for the MDM portal, select the
default RegisteredDevices endpoint identity group.
Note Reauthenticate and Terminate CoA types are supported by Hotspot Guest portals. You can use Network
Access:UseCase EQUALS Guest Flow as one of the validation conditions in the Hotspot Guest authorization
policy only when Reauthentication CoA type is chosen in the Hotspot Guest Portal.
Step 3 For Permissions, select the portal authorization profile that you created.
Note While creating an authorization condition using a dictionary attribute with the MAC option enabled, such as
RADIUS.Calling-Station-ID, you must use a Mac operator (for example, Mac_equals) to support different
MAC formats.
Choose Policy > Policy Sets, and create a new authorization rule at the top of the list that redirects the Guest user to a
credentialed portal when the AUP period has expired. Use conditions to compare LastAUPAcceptanceHours against the
desired maximum hours, for example, LastAUPAcceptanceHours > 8. You can check for a range of hours from 1 to 999.
What to do next
To verify that the endpoint has received the AUP settings:
1. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identities > Endpoints.
2. Click an endpoint to verify that the endpoint has the time that the AUP was last accepted
(AUPAcceptedTime).
This example shows how to force AUP on a hotspot portal every 24 hours.
1. If the user accepted AUP more than 24 hours ago, then the must accept AUP (start over).
2. If the user accepted AUP less than 24 hours ago, continue the session.
3. On the first access to the network (MAB), they must accept AUP.
The same rules can be used with a credentialed portal, as long as you enable AUP for that portal.
Note • To ensure communication of the guest AUP page to the endpoint, add the LastAUPAcceptanceHours
condition to the Redirection Authorization Rule for guest portal as follows:
If AUP <= "X hours": Add in the Permit Access Rule
If AUP > "X hours": Add in the Redirection Rule
• New users can configure the Redirection Authorization rule without the LastAUPAcceptanceHours
condition.
Guest Remember Me
This feature enables Cisco ISE to show a guest's username instead of MAC address in reports and logs.
When a guest first authenticates, the MAC address of user device is saved in the endpoint group, and the
username is used in reports. If the user disconnects, and then reconnects to the network, the MAC address is
already in the endpoint group, so the user does not have to log back in again (authenticate). In this case, the
username is not available, so the MAC address is used in reporting and logs.
Cisco ISE keeps the portal user ID, and uses it in some reporting. To disable this feature, go to Guest >
Settings > Logging. It is enabled by default on new installations.
For more information about Remember Me logging issues, see the following Cisco ISE community resource:
ISE 2.3+ Remember Me guest using guest endpoint group logging display.
For more information about configuring remember me, see the Cisco ISE Guest Access Deployment guide:
https://communities.cisco.com/docs/DOC-77590
For more information about which reporting methods are supported in each release, see the release notes for
that release.
Sponsor Portals
The Sponsor portal is one of the primary components of Cisco ISE guest services. Using the Sponsor portal,
sponsors can create and manage temporary accounts for authorized visitors to securely access the corporate
network or the Internet. After creating a guest account, sponsors also can use the Sponsor portal to provide
account details to the guest by printing, emailing, or texting. Before providing self-registering guests access
to the company network, sponsors may be requested via email to approve their guests’ accounts.
3. If the sponsor belongs to a sponsor group, then that sponsor gets the permissions from that group. A
sponsor can belong to more than one sponsor group, in which case the permissions from those groups are
combined. If the sponsor does not belong to any sponsor group, then the login to the sponsor portal fails.
Sponsor groups and their permissions are independent of the sponsor portals. The same algorithm for matching
sponsor groups is used, regardless of which sponsor portal the sponsor logs in to.
Note An ISE administrator authorized from an external identity store, such as Active Directory, can be part of a
Sponsor group. However, internal administrator accounts, for example, the default "admin" account, cannot
be part of a Sponsor group.
from the guest. A Sponsor with the same privileges who logs on to the sponsor portal, and searches for
those accounts, can send notification.
This step requires that the FQDN that you configured on the sponsor portal's Portal Behavior and Flow
Settings window is in your DNS server.
If you are accessing the Sponsor portal through a NAT firewall, the connection uses port 9002.
• In the Administrators console, on the Sponsor Portal configuration window. Click Guest Access > Portals
& Components > Sponsor Portals, open a sponsor portal, and click the Portal Test URL link to the
right of the Description field.
• In a browser, by opening the URL (FQDN) configured in the sponsor portal's Portal Settings window,
which must be defined in your DNS server.
What to do Next
For information abouit how to use the Sponsor portal, see the Sponsor Portal User Guide for your version of
ISE https://www.cisco.com/c/en/us/support/security/identity-services-engine/
products-installation-guides-list.html.
Sponsor Groups
Sponsor groups control the permissions given to a sponsor when using any Sponsor portal. If a sponsor is a
member of a sponsor group, then the sponsor receives the permissions defined in the group.
A sponsor is considered to be a member of a sponsor group if both of the following are true:
1. The sponsor belongs to at least one of the Member Groups defined in the sponsor group. A Member Group
can be a User Identity Group, or a group selected from an external identity source, such as Active Directory.
2. The sponsor satisfies all of the Other Conditions specified in the sponsor group. The Other Conditions,
which are optional, are conditions defined on dictionary attributes. These conditions are similar in behavior
to those used in an Authorization Policy.
A sponsor can be a member of more than one sponsor group. If so, the sponsor receives the combined
permissions from all of those groups, as follows:
• An individual permission such as "Delete guests' accounts" is granted if it is enabled in any of the groups.
• The sponsor can create guests using the Guest Types in any of the groups.
• The sponsor can create guests at the locations in any of the groups.
• For a numeric value such as a batch size limit, the largest value from the groups is used.
If a sponsor is not a member of any sponsor group, then the sponsor is not permitted to log in to any sponsor
portal.
• ALL_ACCOUNTS: Sponsors can manage all guest accounts.
• GROUP_ACCOUNTS: Sponsors can manage the guest accounts created by sponsors from the same
Sponsor Group.
• OWN_ACCOUNTS: Sponsors can manage only the Guest accounts that they created.
You can customize the features available to particular sponsor groups to limit or expand the functionality of
the Sponsor portal.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Identities >
Users. Assign the internal sponsor user account to the appropriate user identity group.
Note The default Sponsor Groups have the default Identity Group Guest_Portal_Sequence assigned to them.
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Sponsor Groups > Create, Edit or Duplicate and click Members. Map the sponsor user identity groups to sponsor
groups.
What to do next
You can also create additional user identity groups specific to your organization to use with sponsors. Choose
Administration > Identity Management > Groups > User Identity Groups.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals and Components
> Sponsor Groups > Create, Edit or Duplicate.
Step 2 Enter the Sponsor group name and Description.
Step 3 Enter the following details in the Match Criteria section:
• Member Groups: Click Members to select one or more user (identity) groups and groups from external identity
sources, and add those groups. In order for a user to be a member of this sponsor group, they must belong to at
least one of the configured groups.
• Other conditions: Click Create New Condition to build one or more conditions that a sponsor must match to be
included in this sponsor group. You can use authentication attributes from Active Directory, LDAP, SAML, and
ODBC identity stores, but not RADIUS Token or RSA SecurID stores. You can also use internal user attributes.
Conditions have an attribute, and operator, and a value.
• To create a condition using the internal dictionary attribute Name, prefix the identity group name with User
Identity Groups. For example:
InternalUser:Name EQUALS bsmith
This means that only internal users with the Name "bsmith" can belong to this sponsor group.
• To create a condition using the ExternalGroups attribute of an Active Directory instance, select the AD
“Primary Group” for the sponsor users you want to match. For example, AD1:LastName EQUALS Smith is
true if the user’s name is Smith.
In addition to matching one or more of the configured member groups, a sponsor must also match all the conditions
you create here. If an authenticating sponsor user meets the matching criteria for multiple sponsor groups, then that
user is granted permissions as follows:
• An individual permission, such as Delete guests' accounts is granted if it is enabled in any of the matching groups.
• The sponsor can create guests using the Guest Types in any of the matching groups.
• The sponsor can create guests using the Guest Types in any of the matching groups.
• The sponsor can create guests at the locations in any of the matching groups.
• For a numeric value such as a batch size limit, the largest value from the matching groups is used.
You can create Matching Criteria that contain Member Groups only, or Other Conditions only. If you only specify
Other Conditions, then membership of a sponsor in the sponsor group is determined solely by matching dictionary
attributes.
Step 4 To specify which guest types that sponsors based on this sponsor group can create, click This sponsor group can
create accounts using these guest types, and select one or more guest types.
You can create more guest types to assign to this sponsor group by clicking the link under Create Guest Types at.
After you create a new guest type, save, close, and reopen the sponsor group before you can select that new guest type.
Step 5 Use Select the locations that guests will be visiting to specify the locations (used to set the guest time zones) that
sponsors in this sponsor group can choose from when creating guest accounts.
You can add more locations to choose from by clicking the link under Configure guest locations at and adding guest
locations. After you create a new guest location, save, close, and reopen the sponsor group before you can select that
new guest location.
This does not restrict guests from logging in from other locations.
Step 6 Under Automatic guest notification, check Automatically email guests upon account creation if email address is
available if you want to save your sponsors the step of clicking Notify after creating a user. This causes a window to
popup saying that an email was sent. Checking this also adds a header to the sponsor portal that says Guest notifications
are sent automatically.
Step 7 Under Sponsor Can Create, configure options that sponsors in this group have for creating guest accounts.
• Multiple guest accounts assigned to specific guests (Import): Enable the sponsor to create multiple guest
accounts by importing guest details such as first name and last name from a file.
If this option is enabled, the Import option appears on the Create Accounts window of the Sponsor portal. The
Import option is only available on desktop browsers (not mobile), such as Internet Explorer, Firefox, Safari, and
so forth
• Limit to batch of: If this sponsor group is allowed to create multiple accounts simultaneously, specify the number
of guest accounts that can be created in a single import operation.
Although a sponsor can create a maximum of 10,000 accounts, we recommend that you limit the number of
accounts you create, due to potential performance issues.
• Multiple guest accounts to be assigned to any guests (Random): Enable the sponsor to create multiple random
guest accounts as placeholders for guests who are not known as yet, or to create many accounts quickly.
If this option is enabled, the Random option appears on the Create Accounts window of the Sponsor portal.
• Default username prefix: Specify a username prefix that sponsors can use when creating multiple random guest
accounts. If specified, this prefix appears in the Sponsor Portal when creating random guest accounts. In addition,
if Allow sponsor to specify a username prefix is:
• Enabled: The sponsor can edit the default prefix in the Sponsor portal.
• Not enabled: The sponsor cannot edit the default prefix in the Sponsor portal.
If you do not specify a username prefix or allow the sponsor to specify one, then the sponsor will not be able to
assign username prefixes in the Sponsor portal.
• Allow sponsor to specify a username prefix: If this sponsor group is allowed to create multiple accounts
simultaneously, specify the number of guest accounts that can be created in a single import operation.
Although a sponsor can create a maximum of 10,000 accounts, we recommend that you limit the number of
accounts you create, due to potential performance issues.
Step 8 Under Sponsor Can Manage, you can restrict which guests accounts the members of this sponsor group can view and
manage.
• Only accounts sponsor has created: Sponsors in this group can view and manage only the guest accounts that
they have created, which is based on the Sponsor’s email account.
• Accounts created by members of this sponsor group: Sponsors in this group can view and manage the guest
accounts created by any sponsor in this sponsor group.
• All guest accounts: Sponsors view and manage all pending guest accounts.
Step 9 Under Sponsor Can, you can provide more privileges related to guest passwords and accounts to the members of this
sponsor group.
• Update guests' contact information (email, Phone Number): For guest accounts that they can manage, allow
the sponsor to change a guest's contact information
• View/print guests' passwords: When this option is enabled, the sponsor can print passwords for guests. The
sponsor can see the passwords for guests on the Manage Accountswindow and in the details for a guest. When
this is not checked, the sponsor can't print the password, but the user can still get the password through email or
SMS, if configured.
• Send SMS notifications with guests’ credentials: For guest accounts that they can manage, allow the sponsor
to send SMS (text) notifications to guests with their account details and login credentials.
• Reset guest account passwords: For guest accounts that they can manage, allow the sponsor to reset passwords
for guests to a random password generated by Cisco ISE.
• Extend guests’ accounts: For guest accounts that they can manage, allow the sponsor to extend them beyond
their expiration date. The sponsor is automatically copied on email notifications sent to guests regarding their
account expiration.
• Delete guests’ accounts: For guest accounts that they can manage, allow the sponsor to delete the accounts, and
prevent guests from accessing your company's network.
• Suspend guests’ accounts: For guest accounts that they can manage, allow the sponsor to suspend their accounts
to prevent guests from logging in temporarily.
This action also issues a Change of Authorization (CoA) Terminate to remove the suspended guests from the
network.
• Require sponsor to provide a reason: Require the sponsor to provide an explanation for suspending the
guest accounts.
• Approve and view requests from self-registering guests: Sponsors who are included in this Sponsor Group can
either view all pending account requests from self-registering guests (that require approval), or only the requests
where the user entered the Sponsor's email address as the person being visited. This feature requires that the portal
used by the Self-registering guest has Require self-registered guests to be approved checked, and the Sponsor's
email is listed as the person to contact. This feature also requires that the Email attribute be properly configured
in the Sponsor's identity source.
• Any pending accounts: A sponsor belonging to this group an approve and review accounts that were created
by any sponsor.
• Only pending accounts assigned to this sponsor: A sponsor belonging to this group can only view and approve
accounts that they created.
• Access Cisco ISE guest accounts using the programmatic interface (Guest REST API): For guest accounts
that they can manage, allow the sponsor to access guest accounts using the Guest REST API programming interface.
These settings determine which fields display and are required for guest accounts when they are created on
the sponsor portal. This configuration applies to Known, Random, and Imported guest types. The template
that the sponsor downloads to import new users is created dynamically, so that only the fields set in Known
Guests are included.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Click the node and click Edit.
Step 3 Under the General Settings tab, enable the Policy Service toggle button.
Step 4 Check the Enable Session Services check box.
Step 5 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.
Step 2 Add a system certificate and assign it to a certificate group tag that you want to use for the portal.
This certificate group tag will be available to select during portal creation or editing.
Step 3 Choose Work Centers > Guest Access > Portals & Components > Sponsor Portals > Create or Edit > Portal
Settings.
Step 4 Select the specific certificate group tag from the Certificate Group Tag drop-down list that is associated with the newly
added certificate.
Note To work with passive identity services, which enable you to receive and share authenticated user identities,
see Additional Passive Identity Service Providers, on page 649.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Identity
Source Sequences > Add.
Step 2 Enter a name for the identity source sequence. You can also enter an optional description.
Step 3 Check the Select Certificate Authentication Profile check box and choose a certificate authentication profile for
certificate-based authentication.
Step 4 Choose the database or databases that you want to include in the identity source sequence in the Selected List field.
Step 5 Rearrange the databases in the Selected list field in the order in which you want Cisco ISE to search the databases.
Step 6 If a selected identity store cannot be accessed for authentication, choose one of the following options in the Advanced
Search List area:
• Do not access other stores in the sequence and set the AuthenticationStatus attribute to ProcessError
• Treat as if the user was not found and proceed to the next store in the sequence
While processing a request, Cisco ISE searches these identity sources in sequence. Ensure that you have the identity
sources in the Selected list field listed in the order in which you want Cisco ISE to search them.
Step 7 Click Submit to create the identity source sequence that you can then use in policies.
Cisco ISE provides you with a default Sponsor portal that you can use without having to create another one.
However, you can create a new Sponsor portal, or you can edit or duplicate an existing one. You can delete
any of these portals, except the default Sponsor portal. IPv6 is not supported in Sponsor portal logins.
Any changes that you make to the Page Settings on the Portal Behavior and Flow Settings tab are reflected
in the graphical flow in the Sponsor Flow diagram. If you enable a page, such as the AUP page, it appears in
the flow and the sponsor will experience it in the portal. If you disable it, it is removed from the flow and the
next enabled page displays for the sponsor.
Step 1 Configure the Portal Settings page, as described in Portal Settings for Sponsor Portals, on page 512.
Ensure that the portal name that you use here is not used for any other end-user portals.
Step 2 Configure the Login Settings page , as described in Login Settings for Sponsor Portals, on page 515.
Step 3 Configure the Acceptable Use Policy (AUP) Page Settings page, as described in Acceptable Use Policy (AUP) Settings
for Sponsor Portals, on page 515 .
Step 4 Configure the Sponsor Change Password Settings option, as described in Sponsor Change Password Settings for Sponsor
Portals, on page 516.
Step 5 Configure the Post-Login Banner Page Settings page, as described in Post-Login Banner Settings for Sponsor Portals,
on page 516.
Step 6 Click Sponsor Portal Application Settings if you want to customize the portal.
Step 7 Click Save.
This configuration applies to Known, Random, and Imported guest types. The template that the sponsor
downloads to import new users is created dynamically, so that only the fields set in Known Guests are included.
This requirement is because Microsoft does not support Kerberos SSO with 2-way trusts across Active
Directory forests.
The sponsor user must be logged onto Windows.
Kerberos authentication is NOT supported for the Guest portal.
Configuring Kerberos
To enable Kerberos on the Sponsor portal, check the Allow Kerberos SSO check box in the Sponsor Settings
and Customization window.
The sponsor's browser must also be configured properly. The following sections explain how to manually
configure each browser.
Note The username in the Active Directory and User Principle Name must match. The SSO will depend on the
User Principle Name to identify the session of the user.
While accessing the sponsor portal using the sponsor portal FQDN from your browser, Cisco ISE redirects
the request to the PSN FQDN instead of the configured sponsor portal FQDN.
For example, if the sponsor portal FQDN is sponsor.example.com and the PSN FQDN is psn.example.com,
when you try accessing https://sponsor.example.com from your browser, you will be redirected to
https://ise.example.com:8445/sponsorportal/PortalSetup.action?portal=b7e7d773-7bb3-442b-a50b-42837c12248a.
This behavior occurs only when you enable the Allow Kerberos SSO option.
To Manually Configure Firefox
1. Enter about:config in the address bar.
2. Ignore warnings that appear, and click to continue.
3. Search for negotiate in the search bar.
4. Add the FQDN to network.negotiate-auth.delegation-uris and
network.negotiate-auth.trusted-uris. The list of URLs for each attribute is separated by commas.
8. Scroll down to the Security section and check the Enable Integrated Windows Authentication check
box.
9. Restart the computer.
Troubleshooting
• Run set user in the command prompt to verify that the machine is tied to proper AD domain.
• Run klist in the command prompt to see list of cached Kerberos tickets and the hostnames.
• Look at the SPNEGO token data. The NTLM password-based token string is much shorter than Kerberos
token string; the correct token string should not fit on one line.
• Use Wireshark using the filter kerberos to capture Kerberos request, if it exists.
Note When the Kerberos SSO option is enabled, the user needs to access the sponsor portal by the node FQDN for
Kerberos SSO to function properly. If a portal FQDN is configured for the sponsor portal, when the user
connects to the portal FQDN, the user will be redirected to the portal by its node FQDN.
Problem
The following error message appears when a sponsor tries to log in to the Sponsor portal:
Causes
• The sponsor has entered invalid credentials.
• The sponsor is not valid because the user record is not present in the database (Internal Users or Active
Directory).
• The sponsor group to which the sponsor belongs is disabled.
• The Sponsor's user account is not a member of an active/enabled Sponsor Group, which means the
Sponsor user's Identity Group is not a member of any Sponsor Group.
• The sponsor’s internal user account is disabled (suspended).
Solution
• Verify the user’s credentials.
• Enable the sponsor group.
• Reinstate the user account if disabled.
• Add the sponsor user's Identity Group as a member of a Sponsor Group.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > Reports.
Step 2 Choose Guest or Endpoints and Users to view the various guest, sponsor, and endpoint related reports
Step 3 Choose the data with which you want to search using the Filters drop-down list.
Step 4 Select the Time Range during which you want to view the data.
Step 5 Click Run.
Metrics Dashboard
Cisco ISE provides an at-a-glance view of Authenticated Guests and Active Endpoints in the network in a
metrics dashboard that appears on the Cisco ISE Home page.
Click the number displayed in Active Endpoints to launch the Live Sessions window that displays the details
of the endpoints with active sessions.
Note For Hotspot flow, the endpoints are not displayed in the Authenticated Guests dashlet.
This report collects all guest activity and provides details about the websites that guest users visit. You can
use this report for security auditing purposes to see when guest users accessed the network and what they did
on it. To view the guests’ Internet activity, such as the URLs of the websites that they visited, you must first:
• Enable the passed authentications logging category. In the Cisco ISE GUI, click the Menu icon ( )
and choose Administration > System > Logging > Logging Categories and select Passed authentications.
• Enable these options on the firewall used for guest traffic:
• Inspect HTTP traffic and send data to Cisco ISE Monitoring node. Cisco ISE requires only the IP
address and accessed URL for the Guest Activity report; so, limit the data to include just this
information, if possible.
• Send syslogs to Cisco ISE Monitoring node.
To view this window, click the Menu icon ( ) and choose Operations > Reports > Guest Access Reports >
Sponsor Login and Audit.
Note During redirection, if the browser opens more than one tab, Cisco ISE redirects
to every tab. The user can log in to the portal, but Cisco ISE can't authorize the
session, and the user fails to gain access. To work around this issue, the user must
close all but one tab on the browser.
• Local Web Authentication (Local WebAuth): Applies to the Credentialed Guest portals. The guest
connects to a switch for a wired connections, or a wireless LAN controller (WLC) for a wireless
connection. The network access device (NAD) directs them to web pages for authentication. The guest
enters a username and password on the Credentialed Guest portals to authenticate.
• Device Registration Web Authentication (Device Registration WebAuth): Applies only to the Hotspot
Guest portal. Cisco ISE registers and authorizes the guest device before Web authentication. When guests
connect to a wired or wireless NAD, they are directed to the Hotspot Guest portal. Guests get network
access without providing credentials (username and password).
Note webauth-vrf-aware command is supported only in IOS XE 3.7E, IOS 15.2(4)E or later versions. Other switches
do not support WebAuth URL redirect in virtual routing and forwarding (VRF) environment. In such cases,
as a workaround, you can add a route in the global routing table to leak the traffic back into the VRF.
If the guest device is connected to a NAD, the guest service interaction takes the form of a MAC Authentication
Bypass (MAB) request that leads to a Guest portal Central WebAuth login. The following is an outline of the
subsequent Central Web Authentication (Central WebAuth) process, which applies to both wireless and wired
network access devices.
1. The guest device connects to the NAD through a hard-wired connection. There is no 802.1X supplicant
on the guest device.
2. An authentication policy with a service type for MAB allows a MAB failure to continue and return a
restricted network profile containing a url-redirect for the Central WebAuth user interface.
3. The NAD is configured to authenticate MAB requests to the Cisco ISE RADIUS server.
4. The Cisco ISE RADIUS server processes the MAB request and does not find an endpoint for the guest
device.
This MAB failure resolves to the restricted network profile and returns the url-redirect value in the
profile to the NAD in an access-accept. To support this function, ensure that an authorization policy
exists and features the appropriate wired or wireless MAB (under compound conditions) and, optionally,
“Session:Posture Status=Unknown” conditions. The NAD uses this value to redirect all guest HTTPS
traffic on the default port 8443 to the url-redirect value.
The standard URL value in this case is:
https://ip:port/guestportal/gateway?sessionId=NetworkSessionId&portal=<PortalID>&action=cwa
5. The guest device initiates an HTTP request to redirect URL via a web browser.
6. The NAD redirects the request to the url-redirect value returned from the initial access-accept.
7. The gateway URL value with action CWA redirects to the Guest portal login page.
8. The guest enters their login credentials and submits the login form.
9. The guest server authenticates the login credentials.
10. Depending on the type of flow, the following occurs:
• If it is a non-posture flow (authentication without further validation), where the Guest portal is not
configured to perform client provisioning, the guest server sends a CoA to the NAD. This CoA
causes the NAD to reauthenticate the guest device using the Cisco ISE RADIUS server. A new
access-accept is returned to the NAD with the configured network access. If client provisioning is
not configured and the VLAN needs to be changed, the Guest portal performs VLAN IP renew.
The guest does not have to re-enter login credentials. The username and password entered for the
initial login are used automatically.
• If it is a posture flow, where the Guest portal is configured to perform client provisioning, the guest
device web browser displays the Client Provisioning page for posture agent installation and
compliance. (You can also optionally configure the client provisioning resource policy to feature
a “NetworkAccess:UseCase=GuestFlow” condition.)
The Guest portal redirects to the Client Provisioning portal (because there is no client provisioning or posture
agent for Linux), which in turn redirects back to a guest authentication servlet to perform optional IP
release/renew and then CoA.
With redirection to the Client Provisioning portal, the Client Provisioning service downloads a non-persistent
web agent to the guest device and performs a posture check of the device. You can optionally configure the
posture policy with a “NetworkAccess:UseCase=GuestFlow” condition.
If the guest device is non-compliant, ensure that you have configured an authorization policy that features
“NetworkAccess:UseCase=GuestFlow” and “Session:Posture Status=NonCompliant” conditions.
When the guest device is compliant, ensure that you have an authorization policy configured with the conditions
“NetworkAccess:UseCase=GuestFlow” and “Session:Posture Status=Compliant.” From here, the Client
Provisioning service issues a CoA to the NAD. This CoA causes the NAD to reauthenticate the guest using
the Cisco ISE RADIUS server. A new access-accept is returned to the NAD with the configured network
access.
Note “NetworkAccess:UseCase=GuestFlow” can also apply for Active Directory and LDAP users who log in as
guests.
3. After the Acceptable Use Policy (AUP) and change password are processed, both of which are optional,
the Guest portal redirects the browser of the guest device to post the login credentials on the NAD.
4. The NAD makes a RADIUS request to the Cisco ISE RADIUS server to authenticate and authorize the
guest.
<meta http-equiv="REFRESH"
content="0;url=https://ip:port/portal/PortalSetup.action?switch_url=wired">
</HEAD>
<BODY>
<center>
Redirecting ... Login
<br>
<br>
<a href="https://ip:port/portal/PortalSetup.action?switch_url=wired">ISE Guest Portal</a>
</center>
</BODY>
</HTML>
The custom login page is a public web form, hence consider these guidelines:
• The login form must accept user entries for the username and password and must show them as uname
and pwd.
• The custom login page should follow best practices for a web form, such as page timeout, hidden password,
and prevention of redundant submissions.
Step 1 To specify the use of your custom authentication proxy web pages, first store your custom HTML files on the switch
flash memory. To copy your HTML files to the switch flash memory, run the following command on the switch:
copy tftp/ftp flash
Step 2 After copying your HTML files to the switch, perform the following commands in global configuration mode:
ip admission proxy http login page file Specifies the location in the switch memory file system of
device:login-filename the custom HTML file to use in place of the default login
page. The device: is flash memory.
ip admission proxy http success page file Specifies the location of the custom HTML file to use in
device:success-filename place of the default login success page.
ip admission proxy http failure page file Specifies the location of the custom HTML file to use in
device:fail-filename place of the default login failure page.
ip admission proxy http login expired page file Specifies the location of the custom HTML file to use in
device:expired-filename place of the default login expired page.
Step 3 Configure the customized authentication proxy web pages following the guidelines provided by the switch.
Step 4 Verify the configuration of a custom authentication proxy web page, as shown in the following example:
In this scenario, the guest connects to the network with a wireless connection. See Figure 14: Wireless Device
Registration Web Authentication Flow for an example of the Device Registration WebAuth process flow.
The following is an outline of the subsequent Device Registration WebAuth process, which is similar for both
wireless and wired connections:
1. The network access device (NAD) sends a redirect to the Hotspot Guest portal.
2. If the MAC address of the guest device is not in any endpoint identity group or is not marked with an
Acceptable Use Policy (AUP) accepted attribute set to true, Cisco ISE responds with a URL redirection
specified in an authorization profile.
3. The URL redirection presents the guest with an AUP page (if enabled) when the guest attempts to access
any URL.
• If the guest accepts the AUP, the endpoint associated with their device MAC address is assigned to
the configured endpoint identity group. This endpoint is now marked with an AUP accepted attribute
set to true, to track the guest acceptance of the AUP.
• If the guest does not accept the AUP or if an error occurs, for instance, while creating or updating
the endpoint, an error message displays.
4. Based on the Hotspot Guest portal configuration, a post-access banner page (if enabled) with additional
information may appear.
5. After the endpoint is created or updated, a Change of Authorization (CoA) termination is sent to the NAD.
6. After the CoA, the NAD re-authenticates the guest connection with a new MAC Auth Bypass (MAB)
request. The new authentication finds the endpoint with its associated endpoint identity group, and returns
the configured access to the NAD.
7. Based on the Hotspot Guest portal configuration, the guest is directed to the URL to which they requested
access, or to a custom URL specified by the administrator, or to an Authentication Success Page.
The CoA type for both wired and wireless is Termination CoA. You can configure the Hotspot Guest portal
to perform VLAN DHCP Release (and renew), thereby re-authorizing the CoA type for both wired and wireless
to Change of Auth.
VLAN DHCP Release support is available for Windows devices only. It is not available for mobile devices.
If the device being registered is mobile and the VLAN DHCP Release option is enabled, the guest is requested
to manually renew their IP address. For mobile device users, we recommend using Access Control Lists
(ACLs) on the WLC, rather than using VLANs.
Note The test portal does not support RADIUS sessions, so you won't see the entire
portal flow for all portals. BYOD and Client Provisioning are examples of portals
that depend on RADIUS sessions. For example, a redirect to an external URL
will not work. If you have more than one PSN, Cisco ISE chooses the first active
PSN.
• Language File: Each portal type supports 15 languages by default, which are available as individual
properties files bundled together in a single zipped language file. Export or import the zipped language
file to use with the portal. The zipped language file contains all the individual language files that you
can use to display text for the portal.
The language file contains the mapping to the particular browser locale setting along with all of the string
settings for the entire portal in that language. A single language file contains all the supported languages,
so that it can easily be used for translation and localization purposes.
If you change the browser locale setting for one language, the change is applied to all the other end-user
web portals. For example, if you change the French.properties browser locale from fr,fr-fr,fr-ca to fr,fr-fr
in the Hotspot Guest portal, the changes also apply to the My Devices portal.
An alert icon displays when you customize any of the text on the Portal Page Customizations tab. The
alert message reminds you that any changes made to one language while customizing the portal must
also be added to all the supported languages properties files. You can manually dismiss the alert icon
using the drop-down list option; or it is automatically dismissed after you import the updated zipped
language file.
• Sponsor portal: Port 8444, Interface 0, Certificate tag A and Blocked List portal: Port 8444,
Interface 0, Certificate group A.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s
HTTPS traffic.
• Endpoint Identity Group: Choose an endpoint identity group to track guest devices. Cisco ISE provides
the GuestEndpoints endpoint identity group to use as a default. You can also create more endpoint
identity groups if you choose to not use the default.
Choose an endpoint identity group to track employee devices. Cisco ISE provides the RegisteredDevices
endpoint identity group to use as a default. You can also create more endpoint identity groups if you
choose to not use the default.
• Purge Endpoints in this Identity Group when they Reach __ Days: Specify the number of days after
which the device is purged from the Cisco ISE database. Purging is done on a daily basis and the purge
activity is synchronized with the overall purge timing. The change is applied globally for this endpoint
identity group.
If changes are made to the Endpoint Purge Policy based on other policy conditions, this setting is no
longer available for use.
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display
language of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback
Language is used as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the
browser locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User
Browser Locale option.
Acceptable Use Policy (AUP) Page Settings for Hotspot Guest Portals
To view this window, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals &
Components > Guest Portals > Create, Edit or Duplicate > Portal Behavior and Flow Settings >
Acceptable Use Policy (AUP) Page Settings.
• Include an AUP Page: Display your company’s network-usage terms and conditions on a separate page
to the user.
• Require an Access Code: Assign an access code as the login credential that multiple guests should use
to gain access to the network. An access code is primarily a locally known code that is given to physically
present guests (either visually via a whiteboard or verbally by a lobby ambassador). It would not be
known and used by someone outside the premises to access the network.
You can use this option in addition to the usernames and passwords that are provided as the login
credentials to individual guests.
• Require scrolling to end of AUP—Ensure that the user has read the AUP completely. The Accept
button activates only after the user has scrolled to the end of the AUP. Configure when the AUP appears
to the user.
When configuring the Hotspot Guest Portals flow, the AUP access code is reliant on Endpoint Identity Group
device registration.
The AUP access code page will appear only after the MAC address has been removed from the Endpoint
Identity Group tied to the hotspot portal configuration. An endpoint is either manually deleted from the
database through the Context Visibility page on Cisco ISE, or it is purged by way of the Endpoint Purge
feature and configured endpoint purge policies.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP address.
• Authentication Method: Choose which identity source sequence or Identity Provider (IdP) to use for
user authentication. The identity source sequence is a list of identity stores that are searched in sequence
to verify user credentials.
Cisco ISE includes a default identity source sequence for sponsor portals, Sponsor_Portal_Sequence.
To configure IdP, choose Administration > Identity Management > External Identity Sources >
SAML Id Providers.
To configure an identity source sequence, choose Administration > Identity Management > Identity
Source Sequences.
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display
language of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback
Language is used as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the
browser locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User
Browser Locale option.
• Show registration form after social login: This allows the user to change the information provided
by Facebook.
• Require guests to be approved: This informs the user that a sponsor must approve their account,
and will send them credentials for login.
• Allow guests to change password after login: Allow guests to change their password after successfully
authenticating and accepting the AUP, if it is required. If guests change their passwords, sponsors cannot
provide guests with their login credentials if lost. The sponsor can only reset the guest’s password back
to a random password.
Note Internal users logged in through the guest portal cannot reset their passwords.
• Allow the following identity-provider guest portal to be used for login: Checking this option and
selecting a SAML Id identity provider adds a link for that SAML Id to this portal. This sub-portal can
be configured to look like the SAML IDP that the user is providing credentials for.
• Allow social login: Allow this portal to use a social media type for user login. For more information
about configuring social login, see Social Login for Self-Registered Guests, on page 455.
this field does not display in the portal for guests to view. Also, Location is disabled in the list of
Fields to include.
• SMS Service Provider: Select which SMS providers to display on the Self-Registration form to
enable self-registering guests to choose their own SMS provider. You can then use the guest’s SMS
service to send them SMS notifications, which minimize expenses for your company. If you only
selected one SMS provider for the guest to use, this field will not display on the Self-Registration
form.
• Person being visited: This is a text field, so if you want to use it, instruct your guests what kind of
information to enter into this field.
• Custom Fields: Select the custom fields that you previously created to collect more data from the
self-registering guests. Then check which fields are mandatory for the guests to complete in order
to submit the Self-Registration form and receive a guest account. These fields are listed in alphabetical
order by name. You create these fields on Work Centers > Guest Access > Settings > Custom
Fields to add more custom fields.
• Include an AUP: Display your company’s network-usage terms and conditions, either as text on
the page currently being displayed for the user or as a link that opens a new tab or window with
AUP text.
• Require acceptance: Ensure that the user has read the AUP completely. This configures an
Accept button on the self-registration page. If you configured AUP as on page, then you can
also disable the Accept button until after the user has scrolled to the end of the AUP.
• Only allow guests with an email address from: Specify an allowed list of domains which the
self-registering guests can use in Email Address to create email addresses, for example, cisco.com.
If you leave this field blank, any email address is valid, except for domains listed in Do not allow guests
with email address from.
• Do not allow guests with an email address from: Specify a blocked list of domains which the
self-registering guests cannot use in Email Address to create email addresses, for example, czgtgj.com.
• Require self-registered guests to be approved: Specify that the self-registering guests using this portal
require approval from a sponsor before receiving their guest credentials. Clicking this option displays
more options for how sponsors approve a self-registered guest.
• Allow guests to login automatically from self-registration after sponsor's approval: A
self-registered guest will be logged in automatically after sponsor approval.
• Email approval request to:
• Sponsor email addresses listed below: Enter one or more email addresses of sponsors
designated as approvers, or a mailer, to which all guest approval requests should be sent. If the
email address is not valid, approval fails.
• Person being visited: Require sponsor to provide credentials for authentication field is
displayed, and the Required option in Fields to include is enabled (if it was previously
disabled). These fields are displayed on the Self-Registration form requesting this information
from the self-registering guests. If the email address is not valid, approval fails.
• Require sponsor to provide credentials for authentication: Check this to force the sponsor
to enter credentials to approve the account, even if it is not required by the configuration in
this section. This field is only visible if Require self-registered guests to be approved is set
to person being visited.
• Sponsor is matched to a Sponsor Portal to verify approval privileges: Click Details to
select the portals that are searched to verify that the sponsor is a valid system user, a member
of a sponsor group, and that the members of that group have authority to approve the account.
Each sponsor portal has an identity source sequence, which is used to identify the sponsor.
Portals are used in the order they are listed. The first portal in the list determines the style and
customization used in the sponsor portal.
• After registration submission, direct guest to: Choose where the self-registered guest is directed after
successfully registering.
• Self-Registration Success page: Direct successfully self-registered guests to the Self-Registration
Success window, which displays the fields and messages you have specified on Self Registration
Success Page Settings.
It may not be desirable to display all the information, because the system may be awaiting account
approval (if enabled on this window) or delivering the login credentials to an email address or phone
number based on the allowed list and blocked list domains specified on this window.
If you enabled Allow guests to log in directly from the Self-Registration Success page in
Self-Registration Success Page Settings, successfully self-registered guests can log in directly
from this window. If it is not enabled, they are directed to the portal's Login window after the
Self-Registration Success window is displayed.
• Login page with instructions about how to obtain login credentials: Direct successfully
self-registered guests back to the portal’s Login window and display a message, such as “Please
wait for your guest credentials to be delivered either via email, SMS, or print format and proceed
with logging in.”
To customize the default message, click the Portal Page Customization tab and select
Self-Registration Page Settings.
The system may be awaiting account approval (if enabled on this window) or delivering the login
credentials to an email address or phone number based on the allowed list and blocked list domains
specified on this window.
• URL: Direct successfully self-registered guests to the specified URL while waiting for their account
credentials to be delivered.
The system may be awaiting account approval (if enabled on this window) or delivering the login
credentials to an email address or phone number based on the allowed list and blocked list domains
specified on this window.
Allow guest to send information to self using Check the options by which the successfully
self-registered guest can send credential information
to themselves: Print, Email, or SMS.
Include an AUP (on page/as link) Display your company’s network-usage terms and
conditions, either as text on the window currently
being displayed for the user or as a link that opens a
new tab or window with AUP text.
Require scrolling to end of AUP This field displays if you chose the AUP on page
option.
Ensure that the user has read the AUP completely.
The Accept button is enabled only after the user has
scrolled to the end of the AUP.
Allow guests to log in directly from the Display a Login button at the bottom of the
Self-Registration Success page Self-Registration Success page. This enables the guest
to bypass the Login page and automatically deliver
the login credentials to the portal and display the next
page in the portal flow (for instance, the AUP page).
Acceptable Use Policy (AUP) Page Settings for Credentialed Guest Portals
To view this window, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals &
Components > Guest Portals > Create, Edit or Duplicate > Portal Behavior and Flow Settings >
Acceptable Use Policy (AUP) Page Settings.
• Include an AUP Page: Display your company’s network-usage terms and conditions on a separate page
to the user.
• Use Different AUP for Employees: Display a different AUP and network-usage terms and conditions
for employees only. If you choose this option, you cannot also choose Skip AUP for employees.
• Skip AUP for Employees: Employees are not required to accept an AUP before accessing the network.
If you choose this option, you cannot also choose Use different AUP for employees.
• Require Scrolling to End of AUP: This option displays only if Include an AUP on page is enabled.
Ensure that the user has read the AUP completely. The Accept button activates only after the user has
scrolled to the end of the AUP. Configure when the AUP appears to the user.
• On First Login only: Display an AUP the first time the user logs into the network or portal.
• On Every Login: Display an AUP every time the user logs into the network or portal.
• Every __ Days (starting at first login): Display an AUP periodically after the user first logs into
the network or portal.
Note Internal users logged in through the guest portal cannot reset their passwords.
An authorization rule can now be created to allow access to endpoints in that identity group, so that web
authentication is no longer required.
If the maximum number of registered devices is reached, the system automatically deletes the first
registered device, registers the device the guest is trying to log in with, and notifies them. Choose Work
Centers > Guest Access > Portals & Components > Guest Types to change the maximum number of
devices with which a guest can register.
• Allow Guests to Register Devices: Guests can register their devices manually by providing a name,
description and MAC address. The MAC address is associated with an endpoint identity group.
If the maximum number of registered devices is reached, the guest is required to delete at least one device
before being allowed to register another device.
Allow employees to choose to get guest access only Let employees access your guest network and avoid
additional provisioning and registration that may be
required to access your corporate network.
Display Device ID Field During Registration Display the device ID to the user during the
registration process, even though the device ID is
pre-configured and cannot be changed while using
the BYOD portal.
• If you enabled Allow employees to use personal devices on the network in the BYOD Settings,
the employee is redirected to the BYOD flow and will not undergo client provisioning.
• If you enabled both Allow employees to use personal devices on the network and Allow employees
to choose to get guest access only in the BYOD Settings, and the employee chooses guest access,
they are routed to the Client Provisioning page.
For Windows, MAC, and Android devices, control is given to the Self-Provisioning Wizard app, which
does provisioning. Therefore, these devices are not redirected to the originating URL. However, iOS
(dot1X) and unsupported devices (that are allowed network access) are redirected to this URL.
• Authentication Success page: Notification of successful authentication of the user.
• URL: After successfully authenticating to the network, redirect the user's browser to the specified URL,
such as your company’s website.
Note If you redirect a Guest to an external URL after authentication, there may be a delay while the URL address
is resolved and the session is redirected. Make sure that the redirect URL is allowed to work on port 8443 of
the PSN by the access-control list on the NAD and by authorization profiles configured in ISE for that NAD.
Browser User Agent Include the browser details such as the product name
and version, layout engine, and version of the user
agent originating the request on the Support
Information window.
Policy Server Include the IP address of the ISE Policy Service Node
(PSN) that is serving this portal on the Support
Information window.
Display Label with no Value Display all selected field labels on the Support
Information window, even if the information that
they would contain is non-existent. For example, if
the failure code is unknown, display Failure Code,
even if it is blank.
Display Label with Default Value Display this text in any selected field on the Support
Information window, if the information that they
would contain is non-existent. For example, if you
enter Not Available in this field, and the failure code
is unknown, the Failure Code field displays Not
Available.
Note The test portal does not support RADIUS sessions, so you won't see the entire
portal flow for all portals. BYOD and Client Provisioning are examples of portals
that depend on RADIUS sessions. For example, a redirect to an external URL
will not work. If you have more than one PSN, Cisco ISE chooses the first active
PSN.
• Language File: Each portal type supports 15 languages by default, which are available as individual
properties files bundled together in a single zipped language file. Export or import the zipped language
file to use with the portal. The zipped language file contains all the individual language files that you
can use to display text for the portal.
The language file contains the mapping to the particular browser locale setting along with all of the string
settings for the entire portal in that language. A single language file contains all the supported languages,
so that it can easily be used for translation and localization purposes.
If you change the browser locale setting for one language, the change is applied to all the other end-user
web portals. For example, if you change the French.properties browser locale from fr,fr-fr,fr-ca to fr,fr-fr
in the Hotspot Guest portal, the changes also apply to the My Devices portal.
An alert icon displays when you customize any of the text on the Portal Page Customizations tab. The
alert message reminds you that any changes made to one language while customizing the portal must
also be added to all the supported languages properties files. You can manually dismiss the alert icon
using the drop-down list option; or it is automatically dismissed after you import the updated zipped
language file.
• Sponsor portal: Port 8444, Interface 1, Certificate group A and Blocked List portal: Port 8444,
Interface 0, Certificate group B.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s
HTTPS traffic.
• Fully Qualified Domain Name (FQDN): Enter at least one unique FQDN or hostname for the Sponsor
or MyDevices portal. For example, you can enter sponsorportal.yourcompany.com,sponsor,
so that when the user enters either of those into a browser, the sponsor portal displays. Separate names
with commas, but do not include spaces between entries.
If you change the default FQDN, then also do the following:
• Update your DNS so that the FQDN of the new URL resolves to a valid Policy Services Node (PSN)
IP address. Optionally, this address could point to a load balancer virtual IP address that serves a
pool of PSNs.
• To avoid certificate warning messages due to name mismatches, include the FQDN of the customized
URL, or a wildcard, in the subject alternative name (SAN) attribute of the local server certificate
of the Cisco ISE PSN. If the Allow Kerberos SSO option is enabled for the sponsor portal, you
must include the FQDN of the Cisco ISE PSN, or a wildcard, in the SAN attribute of the local server
certificate used by the portal.
• Authentication Method: Choose which identity source sequence or Identity Provider (IdP) to use for
user authentication. The identity source sequence is a list of identity stores that are searched in sequence
to verify user credentials.
Cisco ISE includes a default identity source sequence for sponsor portals, Sponsor_Portal_Sequence.
To configure IdP, choose Administration > Identity Management > External Identity Sources >
SAML Id Providers.
To configure an identity source sequence, choose Administration > Identity Management > Identity
Source Sequences.
• Idle Timeout: Enter the time in minutes that you want Cisco ISE to wait before it logs out the user if
there is no activity in the portal. The valid range is from 1 to 30 minutes.
• Allow Kerberos: Use Kerberos to authenticate a sponsor for access to the sponsor portal. Kerberos SSO
is performed inside the secure tunnel after the browser establishes the SSL connection with ISE.
Kerberos authentication requires the following items to be in the same domain:
• Sponsor's PC
• ISE PSN
• FQDN configured for this sponsor portal
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display
language of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback
Language is used as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the
browser locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User
Browser Locale option.
• SSIDs Available to Sponsors: Enter the names or the SSIDs (Session Service Identifiers) of the networks
that a sponsor can notify guests as the correct networks to connect to for their visit.
Require scrolling to end of AUP Ensure that the user has read the AUP completely.
The Accept button is enabled only after the user has
scrolled to the end of the AUP.
On First Login only Display an AUP when the user logs into the network
or portal for the first time only.
On Every Login Display an AUP each time the user logs into the
network or portal.
Every __ Days (starting at first login) Display an AUP periodically after the user first logs
into the network or portal.
Policy Server Include the IP address of the ISE Policy Service Node
(PSN) that is serving this portal on the Support
Information window.
Display Label with no Value Display all selected field labels on the Support
Information window, even if the information that
they would contain is non-existent. For example, if
the failure code is unknown, display Failure Code,
even if it is blank.
Display Label with Default Value Display this text in any selected field on the Support
Information window, if the information that they
would contain is non-existent. For example, if you
enter Not Available in this field, and the failure code
is unknown, the Failure Code field displays Not
Available.
Under Page Customizations, you can customize the messages, titles, content, instructions, and field and
button labels that appear on the Manage and Approve tabs of the Sponsor portal.
These include the accounts (registered and pending) summary and detailed views, the pop-up dialogs that
display based on the operations the sponsor performs on guest accounts such as edit, extend, suspend and so
on, and also general portal and account action messages.
After configuring these global settings, you can use them as needed when configuring specific Guest and
Sponsor portals, guest types, and sponsor groups.
The following tabs are on the Portal settings page:
• Guest Account Purge Policy: Schedule when to purge guest accounts that have expired. For more
information, see Schedule When to Purge Expired Guest Accounts, on page 446.
• Custom Fields: Add custom fields to use in Guest portals, to retrieve additional information from users.
For more information, see Add Custom Fields for Guest Account Creation, on page 447.
• Guest Email Settings: Decide whether to email notifications to guests about changes in their account.
For more information, see Specify Email Addresses and SMTP Servers for Email Notifications, on page
448.
• Guest Locations and SSIDs: Configure the Locations and the Service Set Identifiers (SSIDs) of the
networks that guests can use at these Locations. For more information, see Assign Guest Locations and
SSIDs, on page 448.
• Guest Username Policy: Configure how guest user names are created. For more information, see Set
the Guest Username Policy, on page 451 and Rules for Guest Password Policies, on page 449.
• Guest Password Policy: Define the guest password policies for all Guest and Sponsor portals. For more
information, see Set the Guest Password Policy and Expiration, on page 450.
• Logging: Guest users are tracked by the MAC address of their device. When guest users are displayed
in reports, the username is the MAC address. If you select this option, reports will show the portal user
ID as the username, instead of the MAC address. For more information about this option, see Guest
Remember Me, on page 473.
Note The account purge policy checks for expired guest accounts, and sends expiration
notification. This policy runs every 20 minutes, so if you set the account duration
to less than 20 mins, it is possible that expiration notices may not be sent out
before the account is purged.
You can specify the duration time and the days of the week when access is provided to the guests
of this Guest Type by using the Allow access only on these days and times option.
• The days of the week that you select limits access to the dates that are selectable in the Sponsor's
calendar.
• Maximum account duration is enforced in the sponsor portal, when the Sponsor picks duration
and dates.
The settings you make here for access time affect the time settings that are available on the sponsor portal
when creating a guest account. For more information, see Configuring the Time Settings Available to
Sponsors , on page 484.
• Logon Options
• Maximum simultaneous logins: Enter the maximum number of user sessions that users assigned
to this Guest Type can have running concurrently.
• When guest exceeds limit: When you select Maximum simultaneous logins, you must also select
the action to take when a user connects after the maximum number of login is reached.
• Disconnect the oldest connection
• Disconnect the newest connection: If you select Redirect user to a portal page showing an
error message, an error message is displayed for a configurable amount of time, then the
session is disconnected, and the user is redirected to the Guest portal. The error page's content
is configured on the Portal Page Customization dialog, on the Messages > Error Messages
window.
• Maximum devices guests can register: Enter the maximum number of devices that can be registered
to each Guest. You can set the limit to a number lower than what is already registered for the Guests
of this Guest Type. This only affects newly created Guest accounts. When a new device is added,
and the maximum is reached, the oldest device is disconnected.
• Endpoint identity group for guest device registration: Choose an endpoint identity group to
assign to guest devices. Cisco ISE provides the GuestEndpoints endpoint identity group to use as
a default. You can also create more endpoint identity groups if you choose to not use the default.
• Allow guest to bypass the Guest portal: Allows users to bypass the credentialed guest-type captive
portal (web authentication page), and access the network by providing credentials to wired and
wireless (dot1x) supplicants or VPN clients. Guest accounts change to the Active state, bypassing
the Awaiting Initial Login state and the AUP page, even if the AUP is required.
If you do not enable this setting, users must first log in through the credentialed Guest captive portal
before they are able to access other parts of the network.
• Sponsor Groups: Specify the sponsor groups whose members can create a guest account using this guest
type. Delete the sponsor groups that you do not want to have access to this guest type.
• Other conditions: Click Create New Condition to build one or more conditions that a sponsor
must match to be included in this sponsor group. You can use authentication attributes from Active
Directory, LDAP, SAML, and ODBC identity stores, but not RADIUS Token or RSA SecurID
stores. You can also use internal user attributes. Conditions have an attribute, and operator, and a
value.
• To create a condition using the internal dictionary attribute Name, prefix the identity group
name with User Identity Groups. For example:
InternalUser:Name EQUALS bsmith
This means that only internal users with the Name "bsmith" can belong to this sponsor group.
• This sponsor group can create accounts using these guest types: Specify the guest types that the
members in this sponsor group can use when creating guest accounts. For a sponsor group to be enabled,
it must have at least one guest type that it can use.
If you assign only one guest type to this sponsor group, you can choose not to display it in the Sponsor
portal because it is the only valid guest type available for use. Choose Work Centers > Guest Access >
Portals & Components > Sponsor Portal > Page Customization > Create Accounts > Guest Types >
Settings. Check Hide guest type if only one is available to sponsor to enable this option.
• Select the locations that guests will be visiting: Select the locations that can be assigned to guests while
creating their accounts. This helps define the valid time zones for these guest accounts and specifies all
the time parameters that apply to the guest, such as valid access times. This does not prevent guests from
connecting to the network from other locations.
For a sponsor group to be enabled, it must have at least one location that it can use.
If you assign only one location to this sponsor group, it will be the only valid time zone for the guest
accounts created by its members. By default, it does not display in the Sponsor portal.
If you do not specify a username prefix or allow the sponsor to specify one, then the sponsor will not be
able to assign username prefixes in the Sponsor portal.
• Allow sponsor to specify a username prefix: If this sponsor group is allowed to create multiple accounts
simultaneously, specify the number of guest accounts that can be created in a single import operation.
Although a sponsor can create a maximum of 10,000 accounts, we recommend that you limit the number
of accounts you create, due to potential performance issues.
• Start date can be no more than __ days into the future: Specify the number of days within which
sponsors have to set as the start date for the multiple guest accounts they have created.
Note Regardless of the group membership, all sponsors can see all pending accounts, unless you check Approve
and view requests from self-registering guests with the option Only pending accounts assigned to this
sponsor under Sponsor Can.
Sponsor Can
• Update guests' contact information (email, Phone Number): For guest accounts that they can manage,
allow the sponsor to change a guest's contact information
• View/print guests' passwords: When this option is enabled, the sponsor can print passwords for guests.
The sponsor can see the passwords for guests on the Manage Accountswindow and in the details for a
guest. When this is not checked, the sponsor can't print the password, but the user can still get the password
through email or SMS, if configured.
• Send SMS notifications with guests’ credentials: For guest accounts that they can manage, allow the
sponsor to send SMS (text) notifications to guests with their account details and login credentials.
• Reset guest account passwords: For guest accounts that they can manage, allow the sponsor to reset
passwords for guests to a random password generated by Cisco ISE.
• Extend guests’ accounts: For guest accounts that they can manage, allow the sponsor to extend them
beyond their expiration date. The sponsor is automatically copied on email notifications sent to guests
regarding their account expiration.
• Delete guests’ accounts: For guest accounts that they can manage, allow the sponsor to delete the
accounts, and prevent guests from accessing your company's network.
• Suspend guests’ accounts: For guest accounts that they can manage, allow the sponsor to suspend their
accounts to prevent guests from logging in temporarily.
This action also issues a Change of Authorization (CoA) Terminate to remove the suspended guests from
the network.
• Require sponsor to provide a reason: Require the sponsor to provide an explanation for suspending
the guest accounts.
• Approve and view requests from self-registering guests: Sponsors who are included in this Sponsor
Group can either view all pending account requests from self-registering guests (that require approval),
or only the requests where the user entered the Sponsor's email address as the person being visited. This
feature requires that the portal used by the Self-registering guest has Require self-registered guests to
be approved checked, and the Sponsor's email is listed as the person to contact. This feature also requires
that the Email attribute be properly configured in the Sponsor's identity source.
• Any pending accounts: A sponsor belonging to this group an approve and review accounts that were
created by any sponsor.
• Only pending accounts assigned to this sponsor: A sponsor belonging to this group can only view
and approve accounts that they created.
• Access Cisco ISE guest accounts using the programmatic interface (Guest REST API): For guest
accounts that they can manage, allow the sponsor to access guest accounts using the Guest REST API
programming interface.
End-User Portals
Cisco ISE provides web-based portals for three primary sets of end users:
• Guests who need to temporarily access your enterprise network using the Guest portals (Hotspot and
credentialed Guest portals).
• Employees who are designated as sponsors who can create and manage guest accounts using the Sponsor
portal.
• Employees who are using their personal devices on the enterprise network using the various non-guest
portals such as the Bring Your Own Device (BYOD), Mobile Device Management (MDM), and My
Devices portals.
Customization Methods
There are several different ways to customize the end user portals pages, which require different levels of
knowledge.
• Basic: You can modify the portal Customization page:
• Upload banners and logos
• Change some colors (except for buttons)
• Change the text on the screens, and the language used on the entire portal
• Intermediate
• Use the minieditor to add HTML and Javascript
Note Before you can enter HTML in a minieditor, click the HTML icon.
• Use the jQuery mobile theme roller to change the color of all page elements
• Advanced
• Manually modify properties and CSS files.
After you customize your portal, you can create multiple portals (of the same type) by duplicating it. For
example, if you customized your Hotspot Guest portal for one business entity, you can duplicate it and make
minor changes to create custom Hotspot Guest portals for other business entities.
thisisaverylonglineoftextthatwillexceedthewidthoftheplacethatyouwanttoputitsousethisstructure
</p>
• When you use HTML or javascript to customize portal pages, make sure that you use valid syntax. Cisco
ISE doesn’t validate the tags and code that you enter into a minieditor. Invalid syntax may cause problems
during the portal flow.
elements and areas of the portals. You can even choose the language in which you want to view the custom
changes as you make them.
When you design images to replace the logos and banner, make the images as close to the following pixel
size as you can:
Note that ISE resizes the images to fit the portal, but images that are too small may not look right after resizing.
To perform advanced customization, such as changing the page layout or adding video clips or advertisements
to your portal pages, you can use your own custom CSS files.
These types of changes within a specific portal are applied globally to all the pages of that portal. Changes to
the page layout can be applied either globally or to just one specific page in the portal.
Tip You can View Your Customization, on page 533 as you make the updates.
• You cannot use this option to change the color scheme in any of the custom portal themes that you may
have imported for use with this portal. You must edit the custom theme CSS file to change its color
settings.
• After changing the colors in a portal theme, if you select another portal theme from the Portal Theme
drop-down menu, the changes are lost in the original portal theme and it reverts to its default colors.
• If you tweak the colors of a portal theme with an already modified color scheme and then reset its colors
before saving it, the color scheme reverts to its default colors and any previous modifications are lost.
Step 2 Select one of the default themes from the Portal Theme drop-down list.
Step 3 Click Tweaks to override some of the color settings in the selected default portal theme.
a) Change the color settings for the banner and page backgrounds, text, and labels.
b) If you want to revert to the theme’s default color scheme, click Reset Colors.
c) Click OK if you want to view the color changes in Preview.
Step 4 Click Save.
Step 2 From the View In drop-down list, choose the language in which you want to view the text while customizing the page.
The drop-down list includes all languages in the language file associated with the specific portal.
What to do next
Make sure that you update any changes made in the selected language while customizing the portal page into
all the supported language properties files.
Step 2 Under Images, click any of the logos, icons, and image buttons and upload your custom images.
Step 3 Click Save.
Step 2 Change the Banner title that appears on every portal page.
Step 3 Include these links for the guests who use your portals:
• Help—Online help (provided for only the Sponsor and My Devices portals).
• Contact—Technical support (set up the Support Information page to enable this).
Step 4 Add a disclaimer or a copyright notice in the Footer Elements to appear on the bottom of every portal page.
Step 5 Click Save.
Step 2 Under Pages, choose the page that you want to change.
Step 3 Under Page Customizations, update any of the displayed UI elements. All pages contain Browser Page Title, Content
Title, Instructional Text, Content, and two Optional Content text blocks. The fields in the Content area are specific
to each page.
Step 2 Under Pages, choose the page that you want to change.
Step 3 Under Page Customizations, in the Instructional Text and Optional Content text blocks, you can:
• Change the font, size, and color of the text.
• For Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals
& Components > Sponsor Portals > Edit > Portal Page Customization > Pages.
• For Device portals, click the Menu icon ( ) and choose Administration > Device Portal
Management > (any Portals) > Edit > Portal Page Customization > Pages.
Use these variables when creating templates for portal content and guest notifications to enable consistency
in the information presented to the portal users (guests, sponsors, and employees). Substitute text with the
variable names listed here for each of the portals in the Instructional Text , Optional Content 1, and Optional
Content 2 text boxes.
Company ui_company
Password ui_password
SSID ui_ssid
Use to specify the wireless network that a guest can
use to connect to the network.
Username ui_user_name
Username ui_sponsor_user_name
Use to specify the username of the user logged into
the portal.
Note The test portal does not support RADIUS sessions, so you won't see the entire portal flow for all portals. BYOD
and Client Provisioning are examples of portals that depend on RADIUS sessions. If you have more than one
PSN, Cisco ISE chooses the first active PSN.
The path column in the list of files displays the URL to the file on this server, which you can use to reference
it outside the mini-editor. If the file is an image, when you click the link, it opens a new window that displays
the image.
Uploaded files can be referenced by all portal types, except the Admin portal, in the mini-editors under Portal
Page Customization. To insert the file into a mini-editor, click Insert File. Toggle to the HTML Source
view, and you will see the inserted file surrounded by the appropriate HTML tags.
You can also view the displayable uploaded files in your browser from outside of ISE, for testing. The URL
is https://ise_ip:8443/portal/customFiles/filename.
Depending on your expertise and requirements, you can perform various types of advanced customization.
You can use predefined variables to enable consistency in displayed information, add advertisements to your
portal pages, use HTML, CSS and Javascript code to customize your content, and modify the portal page
layout.
You modify the portal by adding HMTL, CSS, and javascript into the content boxes on the Portal Page
Customization tab of each portal. This document has examples of customization with HTML and CSS.
Examples using javascript are on the ISE community here: http://cs.co/ise-community. More HTML, CSS,
and Javascript examples are on the ISE community here:
https://community.cisco.com/t5/security-documents/how-to-ise-web-portal-customization-options/ta-p/3619042.
Note TAC does not support Javascript customizations of Cisco ISE portals. If you are having problems with
Javascript customizations, please post your questions to the ISE community
https://community.cisco.com/t5/identity-services-engine-ise/bd-p/5301j-disc-ise.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Settings >
Portal Customization.
Step 2 Verify that Enable portal customization with HTML is checked by default. This setting enables you to include HTML
tags in the Instructional Text, Optional Content 1 and Optional Content 2 fields.
Step 3 Check Enable portal customization with HTML and Javascript if you want to do advanced JavaScript customization
by including <script> tags in the Instructional Text, Optional Content 1 and Optional Content 2 fields.
its name and the uniqueness of the theme’s name. You can however edit the blue theme.css file, save it as red
theme.css, import the new file, and name it as Red.
You cannot apply additional swatches, unless you add HTML code (to the Optional Content, for example)
with elements that use the newly added swatches.
To edit the default Cisco-provided CSS files or create new files based on the CSS classes and structures
defined in the default themes, use the required version of jQuery Mobile ThemeRoller (Release 1.3.2).
For additional information on swatches and themes in jQuery Mobile ThemeRoller, see "Theming Overview"
in Creating a Custom Theme with ThemeRoller. Use the online help in jQuery Mobile ThemeRoller to learn
how to download, import, and share your custom themes.
For tutorials on how to use HTML, CSS, and Javascript code to customize the text and content that appears
on your portal pages, visit Codecademy.
The following screen shows a guest portal logon error (swatch C) along with a button that takes an action
from the user (swatch B), and the rest of the screen is Swatch A.
Step 1 Export an existing theme from the portal you wish to change by clicking the Configuration tab on the portal.
Step 2 Choose Advanced Customization > Export/Import Themes.
Step 3 In the Custom Theming dialog, export the theme you want to update.
Step 4 Open that theme in a text editor, select all, and copy.
Step 5 Paste that text (CSS) into the jQuery web site's Import Theme field.
Step 6 Make your changes in the jQuery Mobil web-based application.
Step 7 Export the updated theme from the jQuery website (the export format is ZIP).
Step 8 Unzip the updated theme, and extract the updated theme in themes folder to your PC. The name of the theme is the one
you provided on the jQuery website.
Step 9 Import the extracted CSS theme file into your portal in the portal configuration page's Custom Theming dialog.
You can switch back and forth between the old theme and the new theme by clicking the Portal Theme drop-down list
on the Portal Configuration window.
Note This information applies only to the credentialed Guest portals after the guests log in.
You can also specify locations when you add devices such as switches and Wireless LAN Controllers (WLCs)
to a network. This location is also available as a CSS class that you can use to apply different CSS styles to
portal pages depending on the network device's location.
For example, if a WLC is assigned to Seattle and guests are redirected to Cisco ISE from the Seattle-WLC,
the following CSS class is available on every portal page: device-location-my-locations-usa-seattle.
Related Topics
Customize Greetings Based on Guest Location, on page 545
Step 2 From the Advanced Customization drop-down list, choose Export/Import Themes.
Step 3 In the Custom Theming dialog box, use the drop-down list to select the theme that you want to customize.
Step 4 Click Export Theme CSS to download a default theme.css file to customize.
Step 5 Click Save to save the file to your desktop.
Step 1 Import the downloaded portal theme.css file contents into the jQuery Mobile ThemeRoller tool.
Tip You can View Your Customization, on page 549 as you make your changes.
Step 11 When your new theme.css file is ready, you can import it into Cisco ISE.
Step 2 Under Pages, choose the page that you want to update.
Step 3 Under Page Customizations, use the mini-editor provided with the Optional Content text blocks to add links to portal
pages.
Step 4 Click the Create Link button.
Link Properties dialog box appears.
Step 5 Enter the URL and the text you want to hyperlink in the Description window for the URL.
For the link to work correctly, include the protocol identifier in the URL. For example, use http://www.cisco.com instead
of www.cisco.com.
Step 5 At the point where you want to substitute a variable for the text, click Insert Variable.
A list of variables appears in the pop-up menu.
Step 6 Select the variable that you want to substitute in your text.
For example, choose First name to display each guest’s first name in the welcome message. The variable $ui_first_name$
is inserted at your cursor position:
Welcome to our company’s Guest portal,$ui_first_name$.
This is the welcome message that would appear on the portal welcome page for guests whose first name is John: Welcome
to our company’s Guest portal, John.
Step 7 Continue to use the list of variables as needed until you have completed entering the information in the text boxes.
Step 8 Click Save.
You can use the Toggle HTML Source option to view the HTML tags that were applied to the text that you formatted
using the mini-editor.
Step 2 Under Pages, choose the page that you want to update.
Step 3 Under Page Customizations, use the mini-editor provided with the Instructional Text, Optional Content 1, and
Optional Content 2 fields to enter and view source code.
Step 4 Click Toggle HTML Source.
Step 5 Enter your source code.
For example, to underline your text, enter:
<p style="text-decoration:underline;">Welcome to Cisco!</p>
Important When inserting an external URL in the HTML code, make sure that you enter the absolute (entire) URL path,
including “http” or “https”.
Related Topics
Enable Advanced Portal Customization, on page 535
Step 2 Under Pages, choose the page that you want to update.
Step 3 Under Page Customizations, use the mini-editor provided with the Instructional Text, Optional Content 1, and
Optional Content 2 fields to enter and view source code.
Step 4 Click Toggle HTML Source.
Step 5 Enter your source code.
For example, to include a product advertisement and its image using HTML code on the Hotspot Guest portal post-access
banner, enter this code in the Optional Content 1 text box on the Post-Access Banner page:
<p style="text-decoration:underline;">Optimized for 10/40/100 Campus Services!</p>
<img src="http://www.static-cisco.com/assets/prod/root/catalyst_6800.jpg" width="100%" />
Note When inserting an external URL in the HTML code, make sure that you enter the absolute (entire) URL path,
including “http” or “https”.
Step 2 Under Pages, choose the page that you want to update.
Step 3 Under Page Customizations, use the mini-editor provided with the Instructional Text, Optional Content 1, and
Optional Content 2 fields to enter and view source code.
Step 4 Click Toggle HTML Source.
Step 5 Enter your source code.
For example, to implement carousel advertising using product images on the Guest portals, enter the following HTML
and Javascript code in the Optional Content 1 field on the Post-Access Banner (for Hotspot portals) or Post Login
Banner (for credentialed Guest portals) window:
<script>
var currentIndex = 0;
setInterval(changeBanner, 5000);
function changeBanner(){
var bannersArray = ["<img src='http://www.cisco.com/c/en/us/products/routers/index/_jcr_content/
content_parsys/overview/layout-overview/gd12v2/gd12v2-left/n21v1_cq/
n21v1DrawerContainer.img.jpg/1379452035953.jpg' width='100%'/>",
"<img src='http://www.cisco.com/c/en/us/products/routers/index/_jcr_content/
content_parsys/overview/layout-overview/gd12v2/gd12v2-left/n21v1_cq_0/
n21v1DrawerContainer.img.jpg/1400748629549.jpg' width='100%' />",
"<img src='http://www.cisco.com/c/en/us/products/routers/index/_jcr_content/
content_parsys/overview/layout-overview/gd12v2/gd12v2-left/n21v1_cq_1/
n21v1DrawerContainer.img.jpg/1376556883237.jpg' width='100%'/>"
];
var div = document.getElementById("image-ads");
if(div){
currentIndex = (currentIndex<2) ? (currentIndex+1) : 0;
div.innerHTML = bannersArray[currentIndex];
}
}
</script>
<style>
.grey{
color: black;
background-color: lightgrey;
}
</style>
<div class="grey" id="image-ads">
<img src='http://www.cisco.com/c/en/us/products/routers/index/_jcr_content/
content_parsys/overview/layout- overview/gd12v2/gd12v2-left/n21v1_cq/
n21v1DrawerContainer.img.jpg/1379452035953.jpg'/>
</div>
For example, to implement carousel advertising using text product descriptions on the Guest portals, enter the following
HTML and Javascript code in the Optional Content 2 field on the Post-Access Banner (for Hotspot portals) or Post
Login Banner (for credentialed Guest portals) window:
<script>
var currentIndex = 0;
setInterval(changeBanner, 2000);
function changeBanner(){
var bannersArray = ["Optimize branch services on a single platform while delivering an optimal
application experience across branch and WAN infrastructure", "Transform your Network Edge to
deliver high-performance, highly secure, and reliable services to unite campus, data center,
and branch networks", "Differentiate your service portfolio and increase revenues by delivering
end-to-end scalable solutions and subscriber-aware services"];
Note When inserting an external URL in the HTML code, you must enter the absolute (entire) URL path, including
“http” or “https”.
• For Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals &
Components > Sponsor Portals > Edit > Portal Page Customization.
Guests will see a different message after successful logon, depending on their specific location.
Step 2 Under Pages, choose the page that you want to update.
Step 3 Under Page Customizations, use the mini-editor provided with the Optional Content 1 field to enter and view HTML
source code.
Step 4 Click Toggle HTML Source.
Step 5 Enter your source code.
For example, to include a device type-based greeting on the AUP page, enter this code in the Optional Content 1 field
on the AUP window:
<style>
.custom-greeting {
display: none;
}
.cisco-ise-desktop .custom-desktop-greeting {
display: block;
}
.cisco-ise-mobile .custom-mobile-greeting {
display: block;
}
</style>
<div class="custom-greeting custom-mobile-greeting">
Try our New Dark French Roast! Perfect on the Go!
</div>
<div class="custom-greeting custom-desktop-greeting">
We brough back our Triple Chocolate Muffin!
Grab a seat and dig in!
</div>
Users will see a different greeting on the AUP page depending on the type of device they used to gain access to the
network or portal.
Step 1 Add the following CSS code to the bottom of the custom theme.css file that you create and plan to apply to your portal.
This changes the AUP page layout. The Optional Content 1 field appears as a side bar in the desktop and mobile device
mode.
#page-aup .cisco-ise-optional-content-1 {
margin-bottom: 5px;
}
@media all and ( min-width: 60em ) {
#page-aup .cisco-ise-optional-content-1 {
float: left;
margin-right: 5px;
width: 150px;
}
#page-aup .cisco-ise-main-content {
float: left;
width: 800px;
}
#page-aup .cisco-ise-main-content h1,
#page-aup .cisco-ise-main-content p {
margin-right: auto;
margin-left: -200px;
}
}
You can then add links using HTML code in the Optional Content 1 field for the AUP window for that portal.
• For Guest portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portal & Components >
Guest Portals > Edit > Portal Page Customization.
• For Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portal & Components >
Sponsor Portals > Edit > Portal Page Customization.
• For Device portals, click the Menu icon ( ) and choose Administration > Device Portal Management > (any
Portals) > Edit > Portal Page Customization.
Step 3 Under Pages, choose the page for which you want to include a side bar.
Step 4 Under Page Customizations, use the mini-editor provided with the Optional Content 1 field to enter and view source
code.
Step 5 Click Toggle HTML Source.
Step 6 Enter your source code.
For example, to include a side bar for the AUP window, enter this code in the Optional Content 1 field on the AUP
window:
<ul data-role="listview">
<li>Rent a Car</li>
<li>Top 10 Hotels</li>
<li>Free Massage</li>
<li>Zumba Classes</li>
</ul>
What to do next
You can customize other pages by entering different text or HTML code in the Optional Content fields.
Step 2 From the Advanced Customization drop-down list, choose Export/Import Themes.
Step 3 In the Custom Theming dialog box, click Browse to find your new theme.css file.
Step 4 Enter a Theme Name for the new file.
What to do next
You can apply this custom portal theme to the portal that you want to customize.
1. Choose the updated theme from the Portal Themes drop-down list to apply to the entire portal.
2. Click Save.
Step 2 From the Advanced Customization drop-down list, choose Delete Themes.
Step 3 Select the portal theme that you want to delete from the Theme Name drop-down list.
Step 4 Click Delete and then Save.
Note The test portal does not support RADIUS sessions, so you won't see the entire portal flow for all portals. BYOD
and Client Provisioning are examples of portals that depend on RADIUS sessions. If you have more than one
PSN, Cisco ISE chooses the first active PSN.
2. On the Portal Page Customization tab, select the language that you want to edit in the view in drop-down
list.
3. Change content, headings, and fonts as desired.
4. Save that portal configuration, and repeat this flow for the other languages that you want to update.
Note Only some of the dictionary keys in the language properties files support HTML in their values (text).
Step 2 Click Language File and choose Export from the drop-down list.
Step 3 Save the zipped language file to your desktop.
Step 1 Use any editor that displays UTF-8 (such as Notepad ++) to open the predefined language file for the portal type to which
you want to add or delete languages.
If you want to add or delete languages for more than one portal type, use all the appropriate portal properties files.
Step 2 To add a new language, save an existing language properties file as the new language properties file using the same
naming convention of the other files in the zipped language file. For example, to create a new Japanese language properties
file, save the file as Japanese.properties (LanguageName.properties).
Step 3 Associate the new language with its browser locale by specifying the browser local value in the first line of the new
language properties file. For example, LocaleKeys= ja,ja-jp (LocaleKeys=browser locale value) should be the first line
in the Japanese.properties file.
Step 4 Update all the values (text) of the dictionary keys in the new language properties file.
You cannot change the dictionary keys. You can update only their values.
Note Only some of the dictionary keys support HTML in their values (text).
What to do next
1. Zip all the properties files (new and existing) and create a new zipped language file. Do not include any
folders or directories.
Note When using a Mac, extracting the ZIP file produces a DS store. When you compress the language file after
editing, do not include the DS store in the ZIP. To learn methods of extracting the DS store, see
https://superuser.com/questions/198569/compressing-folders-on-a-mac-without-the-ds-store.
2. Use a new name or its original name for the zipped language file.
3. Import the zipped language file into the specific portal you exported it from.
Note Ensure that you do not copy and paste customization content from Word files. Alternately, choose File > Save
As and save the Word file in HTML format. You can then copy and paste customization content from the
HTML file.
Step 2 Click Language File and choose Import from the drop-down list.
Step 3 Browse to find the new zipped language file on your desktop.
Step 4 Import it back for the portal type from where you exported it.
What to do next
To display the changed text or the new language you added, select the specific language from the View In
drop-down list.
You can also customize email notifications to sponsors requesting that they approve a self-registering guest
trying to gain access to the network. Additionally, you can customize the default error messages that display
to guests and sponsors.
• Configure support for email notifications to guests. In the Cisco ISE GUI, click the Menu icon ( ) and
choose Work Centers > Guest Access > Settings > Guest Email Settings. Check Enable email
notifications to guests.
• Ensure that Enable portal customization with HTML is enabled by default in Administration >
System > Admin Access > Settings > Portal Customization.
Step 1 For Self-Registered Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals
& Components > Sponsor Portals > Edit > Portal Page Customization > Notify Guests > Email Notification.
Step 2 You can change the default Logo (Email) that was specified under Global Page Customizations.
Step 3 Specify the Subject and Email body. Use predefined variables to specify the guest account information to be included
in the email message. Use the mini-editor and HTML tags to customize the text.
Step 4 Under Settings, you can:
• Send username and password separately in different emails. If you select this option, two separate tabs appear in
Page Customizations for customizing the Username Email and Password Email notifications.
• Send Test Email to your email address to preview your customization on all devices to ensure that the information
appears as it should.
• Set up an account with a third-party SMS gateway. In the Cisco ISE GUI, click the Menu icon ( ) and
choose Administration > Systems > Settings > SMS Gateway. Cisco ISE sends the text messages as
email messages to the gateway, which forwards the messages via the SMS provider to the specified user.
• Ensure that Enable portal customization with HTML is enabled by default in Administration >
System > Admin Access > Settings > Portal Customization.
Step 1 For Self-Registered Guest or Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access >
Portals & Components > Guest or Sponsor Portals > Edit > Portal Page Customization > SMS Receipt or SMS
Notification.
Step 2 Use the mini-editor and HTML tags to customize the Message Text. Use predefined variables to specify the guest account
information to be included in the SMS text message.
Step 3 Under Settings, you can:
• Send username and password separately in different text messages. If you select this option, two separate tabs
appear in Page Customizations for customizing the Username Message and Password Message notifications.
• Send Test Message to a cell phone to preview your customization to ensure that the information appears as it should.
Note Within each portal, the print notification logo is inherited from the email notification logo setting.
Step 1 For Self-Registered Guest and Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access >
Portals & Components > Guest or Sponsor Portals > Edit > Portal Page Customization > Print Receipt or Print
Notification.
Step 2 Specify the Print Introduction Text. Use predefined variables to specify the guest account information to be included
in the email message. Use the mini-editor and HTML tags to customize the text.
Step 3 Preview your customization in the thumbnail or click Print Preview. You cannot view any HTML customization in the
thumbnail.
If you select the Print Preview option, a window appears from which you can print the account details to ensure that the
information appears as it should.
Step 4 Click Save and then Close.
• Configure support for email notifications to guests. In the Cisco ISE GUI, click the Menu icon ( ) and
choose Work Centers > Guest Access > Settings > Guest Email Settings. Check Enable email
notifications to guests.
• If you want a sponsor to approve self-registered account requests, check Require self-registered guests
to be approved under Self-Registration Page Settings on the Portal Behavior and Flow Settings tab.
That enables the Approval Request Email tab under Notifications in Portal Page Customization,
where you can customize the email that goes to the sponsor.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Configure > Self-Registered Guest Portals > Edit > Portal Page Customization > Approval Request Email. Here
you can:
Step 2 Do the following:
a) Change the default Logo that is specified under Global Page Customizations.
b) Specify the Subject and Email body. Use predefined variables to specify the guest account information to be included
in the email message. Use the mini-editor and HTML tags to customize the text. For example, to include a link to
the Sponsor portal in the request approval email, click Create a Link and add the FQDN to the Sponsor portal.
c) Preview your customization on all devices using Send Test Email to ensure that it appears as it should.
d) Click Save and then Close.
Step 3 Customize the content of the approval email sent by the sponsor:
a) Choose Work Centers > Guest Access > Portals & Components > Sponsor Portals.
b) Click Portal Page Customization.
c) Click the Email Notification tab and enter the required details.
Step 2 From the View In drop-down list, choose the language in which you want to view the text while customizing the messages.
The drop-down list includes all the languages in the language file associated with a specific portal. Make sure that you
update any changes made while customizing the portal page into the supported languages properties files.
Step 3 Update the error message text. You can search for specific error messages by typing in keywords such as aup to find
AUP related error messages.
Step 4 Click Save and Close.
• For Sponsor portals, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals
& Components > Sponsor Portals > Edit > Portal Page Customization > Pages.
• For Device portals, click the Menu icon ( ) and choose Administration > Device Portal
Management > (any Portals) > Edit > Portal Page Customization > Pages.
Use this information when you enter content in the titles, text boxes, instructions, field and button labels, and
other visual elements of the portal page the you are customizing. These updates are applied only to the specific
page that you are customizing.
Note Whether you enter single-byte or multi-byte characters, you can only enter the maximum number of characters
identified for a field. Multi-byte characters do not affect the character limit.
Field Fields Field Labels: Field Labels: Field Input Values: Field Input Values:
Category Minimum Maximum Minimum Maximum
Characters Characters Characters Characters
Common Banner title 256
page
elements
Footer 0 2000
elements
Instructional 0 2000
Text
Optional 0 2000
Content 1
Optional 0 2000
Content 2
Field Fields Field Labels: Field Labels: Field Input Values: Field Input Values:
Category Minimum Maximum Minimum Maximum
Characters Characters Characters Characters
Button labels 0 64
Check box 0 64
labels
Tab labels 0 64
Registration 1 20
Code field
Username 1 64
fields
Password 1 256
fields
Phone Number 0 64
field
Device ID 12 17
field
Portal Customization
You can customize the appearance of the end-user web portals and the guest experience. If you have experience
with the cascading style sheet (CSS) language and with Javascript, you can use the jQuery Mobile ThemeRoller
application to customize portal themes by changing the portal page layout.
You can view all the fields by exporting the CSS theme or language properties from the required portal page.
See Export a Portal’s Default Theme CSS File for more information.
cisco-ise-body Contains all page elements that are not part of the
banner.
cisco-ise-optional-content-1 Empty by default. You can add text, links, and HTML
and Javascript code.
cisco-ise-optional-content-2 Empty by default. You can add text, links, and HTML
and Javascript code.
You can customize the text that displays on a portal, including the content in the Instructional Text, Content,
Optional Content 1, and Optional Content 2 fields. Some of these fields have default content and some are
empty.
Only some of these dictionary keys associated with these fields support HTML in their values (text).
Note This is not a complete list of the dictionary keys in the files.
• key.blacklist.ui_reject_message
HTML Support for Bring Your Own Device Portals Language Files
To view this window, click the Menu icon ( ) and choose Administration > Device Portal Management >
BYOD Portals > Edit > Portal Page Customization > Pages. You can use the View HTML Source icon
in the mini-editor and add HTML code in your content.
These dictionary keys in the portal's language properties files support HTML in their text.
Note This is not a complete list of the dictionary keys in the files.
• key.guest.ui_contact_instruction_message
• key.guest.ui_byod_welcome_optional_content_1
• key.guest.ui_byod_welcome_optional_content_2
• key.guest.ui_byod_reg_limit_message
• key.guest.ui_byod_reg_content_message
• key.guest.ui_byod_success_manual_reconnect_message
• key.guest.ui_byod_install_winmac_instruction_message
• key.guest.ui_byod_install_optional_content_1
• key.guest.ui_byod_reg_optional_content_2
• key.guest.ui_byod_install_optional_content_2
• key.guest.ui_byod_reg_optional_content_1
• key.guest.ui_byod_reg_instruction_message
• key.guest.ui_byod_welcome_aup_text
• key.guest.ui_contact_optional_content_2
• key.guest.ui_contact_optional_content_1
• key.guest.ui_byod_install_ios_instruction_message
• key.guest.ui_byod_welcome_instruction_message
• key.guest.ui_error_optional_content_2
• key.guest.ui_error_optional_content_1
• key.guest.ui_byod_welcome_renew_cert_message
• key.guest.ui_byod_install_android_instruction_message
• key.guest.ui_byod_install_instruction_message
• key.guest.ui_byod_welcome_config_device_message
• key.guest.ui_byod_success_message
• key.guest.ui_byod_success_unsupported_device_message
• key.guest.ui_byod_success_optional_content_1
• key.guest.ui_byod_success_optional_content_2
• key.guest.ui_error_instruction_message
Note This is not a complete list of the dictionary keys in the files.
• key.manualcertprov.ui_login_instruction_message
• key.manualcertprov.ui_aup_instruction_message
• key.manualcertprov.ui_changepwd_instruction_message
• key.manualcertprov.ui_post_access_instruction_message
• key.manualcertprov.ui_status_csv_invalid_instruction_message
• key.manualcertprov.ui_login_optional_content_1
• key.manualcertprov.ui_login_optional_content_2
• key.manualcertprov.ui_aup_optional_content_1
• key.manualcertprov.ui_aup_optional_content_2
• key.manualcertprov.ui_changepwd_optional_content_1
• key.manualcertprov.ui_changepwd_optional_content_2
• key.manualcertprov.ui_post_access_optional_content_1
• key.manualcertprov.ui_post_access_optional_content_2
• key.manualcertprov.ui_landing_instruction_message
• key.manualcertprov.ui_status_page_single_generated_content
• key.manualcertprov.ui_status_generated_content
Note This is not a complete list of the dictionary keys in the files.
• key.guest.ui_client_provision_agent_installed_instructions_without_java_message
• key.guest.ui_contact_instruction_message
• key.guest.ui_success_message
• key.guest.ui_client_provision_unable_to_detect_message
• key.guest.ui_client_provision_instruction_message
• key.guest.ui_client_provision_agent_installation_message
• key.guest.ui_client_provision_posture_agent_check_message
• key.guest.ui_vlan_instruction_message
• key.guest.ui_client_provision_agent_installation_instructions_with_no_java_message
• key.guest.ui_success_instruction_message
• key.guest.ui_vlan_optional_content_1
• key.guest.ui_vlan_optional_content_2
• key.guest.ui_contact_optional_content_2
• key.guest.ui_contact_optional_content_1
• key.guest.ui_contact_optional_content_1
• key.guest.ui_client_provision_posture_check_compliant_message
• key.guest.ui_client_provision_optional_content_2
• key.guest.ui_client_provision_optional_content_1
• key.guest.ui_error_optional_content_2
• key.guest.ui_error_optional_content_1
• key.guest.ui_client_provision_posture_check_non_compliant_message
• key.guest.ui_vlan_install_message
• key.guest.ui_success_optional_content_1
• key.guest.ui_success_optional_content_2
• key.guest.ui_client_provision_posture_agent_scan_message
Note This is not a complete list of the dictionary keys in the files.
• key.guest.ui_contact_instruction_message
• key.guest.ui_login_optional_content_1
• key.guest.ui_login_optional_content_2
• key.guest.ui_client_provision_unable_to_detect_message
• key.guest.ui_client_provision_instruction_message
• key.guest.ui_device_reg_optional_content_2
• key.guest.ui_device_reg_optional_content_1
• key.guest.ui_byod_success_manual_reconnect_message
• key.guest.ui_byod_reg_optional_content_2
• key.guest.ui_byod_reg_optional_content_1
• key.guest.ui_client_provision_agent_installation_instructions_with_no_java_message
• key.guest.ui_success_instruction_message
• key.guest.ui_max_devices_instruction_message
• key.guest.ui_max_devices_optional_content_1
• key.guest.ui_self_reg_results_instruction_message
• key.guest.notification_credentials_email_body
• key.guest.ui_max_devices_optional_content_2
• key.guest.ui_contact_optional_content_2
• key.guest.ui_contact_optional_content_1
• key.guest.ui_byod_install_ios_instruction_message
• key.guest.ui_changepwd_instruction_message
• key.guest.ui_client_provision_posture_check_compliant_message
• key.guest.ui_aup_instruction_message
• key.guest.ui_changepwd_optional_content_2
• key.guest.ui_changepwd_optional_content_1
• key.guest.ui_self_reg_results_optional_content_2
• key.guest.ui_self_reg_results_optional_content_1
• key.guest.ui_device_reg_instruction_message
• key.guest.ui_byod_welcome_renew_cert_message
• key.guest.ui_vlan_execute_message
• key.guest.ui_byod_install_android_instruction_message
• key.guest.ui_client_provision_posture_check_non_compliant_message
• key.guest.ui_byod_install_instruction_message
• key.guest.ui_device_reg_max_reached_message
• key.guest.ui_byod_success_message
• key.guest.ui_byod_success_unsupported_device_message
• key.guest.ui_byod_success_optional_content_1
• key.guest.ui_byod_success_optional_content_2
• key.guest.ui_aup_employee_text
• key.guest.ui_client_provision_agent_installed_instructions_without_java_message
• key.guest.ui_success_message
• key.guest.ui_byod_welcome_optional_content_1
• key.guest.ui_byod_welcome_optional_content_2
• key.guest.ui_self_reg_optional_content_2
• key.guest.ui_self_reg_optional_content_1
• key.guest.ui_byod_reg_limit_message
• key.guest.notification_credentials_print_body
• key.guest.ui_byod_reg_content_message
• key.guest.ui_client_provision_agent_installation_message
• key.guest.ui_post_access_message
• key.guest.ui_vlan_instruction_message
• key.guest.ui_byod_install_winmac_instruction_message
• key.guest.ui_aup_guest_text
• key.guest.ui_byod_install_optional_content_1
• key.guest.ui_byod_install_optional_content_2
• key.guest.ui_byod_reg_instruction_message
• key.guest.ui_aup_optional_content_1
• key.guest.ui_aup_optional_content_2
• key.guest.ui_self_reg_aup_text
• key.guest.ui_login_instruction_message
• key.guest.ui_vlan_optional_content_1
• key.guest.ui_vlan_optional_content_2
• key.guest.ui_self_reg_results_aup_text
• key.guest.ui_device_reg_register_message
• key.guest.ui_byod_welcome_instruction_message
• key.guest.ui_client_provision_optional_content_2
• key.guest.ui_self_reg_instruction_message
• key.guest.ui_vlan_install_message
• key.guest.ui_success_optional_content_1
• key.guest.ui_success_optional_content_2
• key.guest.ui_post_access_instruction_message
• key.guest.ui_post_access_optional_content_2
• key.guest.ui_post_access_optional_content_1
• key.guest.ui_byod_welcome_config_device_message
• key.guest.ui_client_provision_posture_agent_scan_message
Note This is not a complete list of the dictionary keys in the files.
• key.guest.ui_contact_instruction_message
• key.guest.ui_success_message
• key.guest.ui_post_access_message
• key.guest.ui_vlan_instruction_message
• key.guest.ui_success_instruction_message
• key.guest.ui_aup_optional_content_1
• key.guest.ui_aup_optional_content_2
• key.guest.ui_vlan_unsupported_error_message
• key.guest.ui_vlan_optional_content_1
• key.guest.ui_vlan_optional_content_2
• key.guest.ui_contact_optional_content_2
• key.guest.ui_contact_optional_content_1
• key.guest.ui_aup_instruction_message
• key.guest.ui_aup_hotspot_text
• key.guest.ui_vlan_execute_message
• key.guest.ui_vlan_install_message
• key.guest.ui_success_optional_content_1
• key.guest.ui_success_optional_content_2
• key.guest.ui_post_access_instruction_message
• key.guest.ui_post_access_optional_content_2
• key.guest.ui_post_access_optional_content_1
Note This is not a complete list of the dictionary keys in the files.
• key.mydevices.ui_add_optional_content_1
• key.mydevices.ui_add_optional_content_2
• key.mydevices.ui_post_access_instruction_message
• key.mydevices.ui_edit_instruction_message
• key.mydevices.ui_contact_optional_content_2
• key.mydevices.ui_contact_optional_content_1
• key.mydevices.ui_changepwd_optional_content_1
• key.mydevices.ui_changepwd_optional_content_2
• key.mydevices.ui_post_access_message
• key.mydevices.ui_home_instruction_message
• key.mydevices.ui_edit_optional_content_1
• key.mydevices.ui_edit_optional_content_2
• key.mydevices.ui_add_instruction_message
• key.mydevices.ui_post_access_optional_content_2
• key.mydevices.ui_post_access_optional_content_1
• key.mydevices.ui_error_instruction_message
• key.mydevices.ui_actions_instruction_message
• key.mydevices.ui_home_optional_content_2
• key.mydevices.ui_aup_optional_content_1
• key.mydevices.ui_aup_optional_content_2
• key.mydevices.ui_home_optional_content_1
• key.mydevices.ui_changepwd_instruction_message
• key.mydevices.ui_contact_instruction_message
• key.mydevices.ui_aup_employee_text
• key.mydevices.ui_login_optional_content_2
• key.mydevices.ui_login_optional_content_1
• key.mydevices.ui_login_instruction_message
• key.mydevices.ui_error_optional_content_1
• key.mydevices.ui_error_optional_content_2
• key.mydevices.ui_aup_instruction_message
Note This is not a complete list of the dictionary keys in the files.
• key.sponsor.ui_aup_instruction_message
• key.sponsor.ui_create_random_instruction_message
• key.sponsor.ui_home_instruction_message
• key.sponsor.ui_post_access_instruction_message
• key.sponsor.notification_credentials_print_body
• key.sponsor.ui_aup_sponsor_text
• key.sponsor.ui_create_accounts_access_info_instruction_message
• key.sponsor.ui_login_instruction_message
• key.sponsor.notification_credentials_email_body
• key.sponsor.ui_create_known_instruction_message
• key.sponsor.ui_create_import_instruction_message
• key.sponsor.ui_suspend_account_instruction_message
• key.sponsor.ui_post_access_message
• key.sponsor.ui_login_optional_content_2
• key.sponsor.ui_login_optional_content_1
• key.sponsor.notification_credentials_email_password_body
• key.sponsor.ui_contact_optional_content_2
• key.sponsor.ui_contact_optional_content_1
• key.sponsor.ui_login_aup_text
• key.sponsor.ui_changepwd_instruction_message
• key.sponsor.ui_create_accounts_guest_type_instruction_message
• key.sponsor.ui_changepwd_optional_content_1
• key.sponsor.ui_changepwd_optional_content_2
• key.sponsor.notification_credentials_email_username_body
• key.sponsor.ui_aup_optional_content_1
• key.sponsor.ui_aup_optional_content_2
• key.sponsor.ui_post_access_optional_content_1
• key.sponsor.ui_post_access_optional_content_2
• key.sponsor.ui_contact_instruction_message
During the authentication process, Cisco ISE is designed to “fall back” and attempt to perform authentication
from the internal identity database, if communication with the external identity store has not been established
or if it fails. In addition, whenever an administrator for whom you have set up external authentication launches
a browser and initiates a login session, the administrator still has the option to request authentication via the
Cisco ISE local database by choosing Internal from the Identity Store drop-down list in the login dialog
box.
Administrators who belong to a Super Admin group, and are configured to authenticate and authorize using
an external identity store, can also authenticate with the external identity store for Command Line Interface
(CLI) access.
Note You can configure this method of providing external administrator authentication only via the Admin portal.
Cisco ISE CLI does not feature these functions.
If your network does not already have one or more existing external identity stores, ensure that you have
installed the necessary external identity stores and configured Cisco ISE to access those identity stores.
In addition to providing authentication via an external identity store, your network may also require you to
use a Common Access Card (CAC) authentication device.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authentication.
Step 2 On the Authentication Method tab, click Password Based and choose one of the external identity sources you have
already configured. For example, the Active Directory instance that you have created.
Step 3 Configure any other specific password policy settings that you want for administrators who authenticate using an external
identity store.
Step 4 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Administrators
> Admin Groups.
The External Groups Mapped column displays the number of external groups that are mapped to internal RBAC roles.
You can click the number corresponding to a admin role to view the external groups (for example, if you click 2 displayed
against Super Admin, the names of two external groups are displayed).
Step 5 From the External Groups drop-down list box, choose the Active Directory group that you want to map for this external
administrator group.
Click the “+” sign to map additional Active Directory groups to this external administrator group.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access >
Administrators > Admin Users .
Step 2 Click Add and select Create An Admin User.
Step 3 Check the Read Only check box to create a Read-Only administrator.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources to configure the external authentication source.
Step 2 Click the required external identity source, such as Active Directory or LDAP, and then retrieve the groups from the
selected identity source.
Step 3 Choose Administration > System > Admin Access > Authentication to map the authentication method for the admin
access with the identity source.
Step 4 Choose Administration > System > Admin Access > Administrators > Admin Groups and select Read Only Admin
group.
Step 5 Check the External check box and select the required external groups for whom you intend to provide read-only privileges.
Step 6 Click Save.
An external group that is mapped to a Read-Only Admin group cannot be assigned to any other admin group.
Configure Menu Access and Data Access Permissions for External Administrator Group
You must configure menu access and data access permissions that can be assigned to the external administrator
group.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Permissions.
Step 2 Click one of the following:
• Menu Access: All administrators who belong to the external administrator group can be granted permission at the
menu or submenu level. The menu access permission determines the menus or submenus that they can access.
• Data Access: All administrators who belong to the external administrator group can be granted permission at the
data level. The data access permission determines the data that they can access.
Step 3 Specify menu access or data access permissions for the external administrator group.
Step 4 Click Save.
Note You cannot modify an existing (system-preset) RBAC policy to specify these new external attributes. If you
have an existing policy that you would like to use as a template, you must duplicate that policy, rename it,
and then assign the new attributes.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access > Authorization >
RBAC Policy.
Step 2 Specify the rule name, external administrator group, and permissions.
Remember that the appropriate external administrator group must be assigned to the correct administrator user IDs. Ensure
that the administrator is associated with the correct external administrator group.
If you log in as an administrator, and the Cisco ISE RBAC policy is not able to authenticate your administrator identity,
Cisco ISE displays an “unauthenticated” message, and you cannot access the Admin portal.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Admin Access >
Administrators > Admin Users.
Step 2 Ensure that the administrator username in the external RSA identity store is also present in Cisco ISE. Ensure that you
click the External option under Password.
Note You do not need to specify a password for this external administrator user ID, nor are you required to apply any
specially configured external administrator group to the associated RBAC policy.
Upon logging in, the administrator sees only the menu and data access items that are specified in the RBAC
policy.
Name Enter a name for the LDAP instance. This value is used in searches to obtain the subject
DN and attributes. The value is of type string and the maximum length is 64 characters.
Description Enter a description for the LDAP instance. This value is of type string, and has a
maximum length of 1024 characters.
Schema You can choose any one of the following built-in schema types or create a custom
schema:
• Active Directory
• Sun Directory Server
• Novell eDirectory
You can click the arrow next to Schema to view the schema details.
If you edit the attributes of the predefined schema, Cisco ISE automatically creates
a Custom schema.
Note The following fields can be edited only when you choose the Custom schema.
Subject Objectclass Enter a value to be used in searches to obtain the subject DN and attributes. The value
is of type string and the maximum length is 256 characters.
Subject Name Enter the name of the attribute containing the username in the request. The value is of
Attribute type string and the maximum length is 256 characters.
Note The subject name attributes that are configured should be an indexed one in
the external ID store.
Group Name • CN: To retrieve the LDAP Identity Store Groups based on Common Name.
Attribute
• DN: To retrieve the LDAP Identity Store Groups based on Distinguished Name.
Certificate Enter the attribute that contains the certificate definitions. For certificate-based
Attribute authentication, these definitions are used to validate certificates that are presented by
clients.
Group Objectclass Enter a value to be used in searches to specify the objects that are recognized as groups.
The value is of type string and the maximum length is 256 characters.
Group Map Specifies the attribute that contains the mapping information. This attribute can be a
Attribute user or group attribute based on the reference direction that is chosen.
Subject Objects Click this option if the subject objects contain an attribute that specifies the group to
Contain Reference which they belong.
To Groups
Group Objects Click this option if the group objects contain an attribute that specifies the subject.
Contain Reference This value is the default value.
To Subjects
Subjects in Groups (Only available when you enable the Group Objects Contain Reference To Subjects
Are Stored in option) Specifies how members are sourced in the group member attribute and defaults
Member Attribute to the DN.
As
User Info By default, predefined attributes are used to collect user information (such as, first
Attributes name, last name, email, telephone, locality, and so on) for the following built-in schema
types:
• Active Directory
• Sun Directory Server
• Novell eDirectory
If you edit the attributes of the predefined schema, Cisco ISE automatically creates a
Custom schema.
You can also select the Custom option from the Schema drop-down list to edit the user
information attributes based on your requirements.
Note The subject name attributes that are configured should be an indexed one in the external ID store.
Enable Secondary Check this option to enable the secondary LDAP server to be used as a backup if the
Server primary LDAP server fails. If you check this check box, you must enter configuration
parameters for the secondary LDAP server.
Hostname/IP Enter the IP address or DNS name of the machine that is running the LDAP software.
The hostname can contain from 1 to 256 characters or a valid IP address expressed as
a string. The only valid characters for hostnames are alphanumeric characters (a to z,
A to Z, 0 to 9), the dot (.), and the hyphen (-).
Port Enter the TCP/IP port number on which the LDAP server is listening. Valid values
are from 1 to 65,535. The default is 389, as stated in the LDAP specification. If you
do not know the port number, you can find this information from the LDAP server
administrator.
Specify server for Check this check box to configure primary and secondary LDAP server hostnames/IP
each ISE node and their ports for each PSN.
When this option is enabled, a table listing all the nodes in the deployment is displayed.
You need to select the node and configure the primary and secondary LDAP server
hostname/IP and their ports for the selected node.
Access Anonymous Access: Click to ensure that searches on the LDAP directory occur
anonymously. The server does not distinguish who the client is and will allow the
client read access to any data that is configured as accessible to any unauthenticated
client. In the absence of a specific policy permitting authentication information to be
sent to a server, a client should use an anonymous connection.
Authenticated Access: Click to ensure that searches on the LDAP directory occur
with administrative credentials. If so, enter information for the Admin DN and Password
fields.
Admin DN Enter the DN of the administrator. The Admin DN is the LDAP account that has
permission to search all required users under the User Directory Subtree and to search
groups. If the administrator specified does not have permission to see the group name
attribute in searches, group mapping fails for users who are authenticated by that LDAP
server.
Secure Click to use SSL to encrypt communication between Cisco ISE and the primary LDAP
Authentication server. Verify that the Port field contains the port number used for SSL on the LDAP
server. If you enable this option, you must choose a root CA.
LDAP Server Root Choose a trusted root certificate authority from the drop-down list to enable secure
CA authentication with a certificate.
Server Timeout Enter the number of seconds that Cisco ISE waits for a response from the primary
LDAP server before determining that the connection or authentication with that server
has failed. Valid values are 1 to 99. The default is 10.
Max. Admin Enter the maximum number of concurrent connections (greater than 0) with LDAP
Connections administrator account permissions that can run for a specific LDAP configuration.
These connections are used to search the directory for users and groups under the User
Directory Subtree and the Group Directory Subtree. Valid values are 1 to 99. The
default is 20.
Force reconnect Check this check box and enter the desired value in the Seconds field to force the
every N seconds server to renew LDAP connection at the specified time interval. The valid range is
from 1 to 60 minutes.
Test Bind to Server Click to test and ensure that the LDAP server details and credentials can successfully
bind. If the test fails, edit your LDAP server details and retest.
Failover
Always Access Click this option if you want Cisco ISE to always access the primary LDAP server
Primary Server first for authentications and authorizations.
First
Failback to If the primary LDAP server that Cisco ISE attempts to contact cannot be reached,
Primary Server Cisco ISE attempts to contact the secondary LDAP server. If you want Cisco ISE to
After use the primary LDAP server again, click this option and enter a value in the text box.
Subject Search Enter the DN for the subtree that contains all subjects. For example:
Base
o=corporation.com
If the tree containing subjects is the base DN, enter:
o=corporation.com
or
dc=corporation,dc=com
as applicable to your LDAP configuration. For more information, refer to your LDAP
database documentation.
Group Search Base Enter the DN for the subtree that contains all groups. For example:
ou=organizational unit, ou=next organizational unit, o=corporation.com
If the tree containing groups is the base DN, type:
o=corporation.com
or
dc=corporation,dc=com
as applicable to your LDAP configuration. For more information, refer to your LDAP
database documentation.
Search for MAC Enter a MAC Address format for Cisco ISE to use for search in the LDAP database.
Address in Format MAC addresses in internal identity sources are sourced in the format xx-xx-xx-xx-xx-xx.
MAC addresses in LDAP databases can be sourced in different formats. However,
when Cisco ISE receives a host lookup request, Cisco ISE converts the MAC address
from the internal format to the format that is specified in this field.
Use the drop-down list to enable searching for MAC addresses in a specific format,
where <format> can be any one of the following:
• xxxx.xxxx.xxxx
• xxxxxxxxxxxx
• xx-xx-xx-xx-xx-xx
• xx:xx:xx:xx:xx:xx
The format you choose must match the format of the MAC address sourced in the
LDAP server.
Strip Start of Enter the appropriate text to remove domain prefixes from usernames.
Subject Name Up
If Cisco ISE finds the delimiter character that is specified in this field in the username,
To the Last
it strips all characters from the beginning of the username through the delimiter
Occurrence of the
character. If the username contains more than one of the characters that are specified
Separator
in the <start_string> box, Cisco ISE strips characters through the last occurrence of
the delimiter character. For example, if the delimiter character is the backslash (\) and
the username is DOMAIN\user1, Cisco ISE submits user1 to an LDAP server.
Note The <start_string> cannot contain the following special characters: the pound
sign (#), the question mark (?), the quotation mark (“), the asterisk (*), the
right angle bracket (>), and the left angle bracket (<). Cisco ISE does not allow
these characters in usernames.
Strip End of Enter the appropriate text to remove domain suffixes from usernames.
Subject Name from
If Cisco ISE finds the delimiter character that is specified in this field in the username,
the First
it strips all characters from the delimiter character through the end of the username. If
Occurrence of the
the username contains more than one of the characters that are specified in this field,
Separator
Cisco ISE strips characters starting with the first occurrence of the delimiter character.
For example, if the delimiter character is @ and the username is user1@domain, then
Cisco ISE submits user1 to the LDAP server.
Note The <end_string> box cannot contain the following special characters: the
pound sign (#), the question mark (?), the quotation mark ("), the asterisk (*),
the right angle bracket (>), and the left angle bracket (<). Cisco ISE does not
allow these characters in usernames.
Add Choose Add > Add Group to add a new group or choose Add > Select Groups From
Directory to select the groups from the LDAP directory.
If you choose to add a group, enter a name for the new group. If you are selecting from
the directory, enter the filter criteria, and click Retrieve Groups. Check the check
boxes next to the groups that you want to select and click OK. The groups that you
have selected will appear in the Groups window.
Add Choose Add > Add Attribute to add a new attribute or choose Add > Select Attributes
From Directory to select attributes from the LDAP server.
If you choose to add an attribute, enter a name for the new attribute. If you are selecting
from the directory, enter the username and click Retrieve Attributes to retrieve the
attributes. Check the check boxes next to the attributes that you want to select, and
then click OK.
Enable Password Check this check box to enable the user to change the password in case of password
Change expiry or password reset while using PAP protocol for device admin and RADIUS
EAP-GTC protocol for network access. User authentication fails for the unsupported
protocols. This option also enables the user to change the password on their next login.
Related Topics
LDAP Directory Service, on page 690
LDAP User Authentication, on page 692
LDAP User Lookup, on page 695
Add LDAP Identity Sources, on page 695
Description Enter a description for the RADIUS token server. The maximum number of characters
is 1024.
SafeWord Server Check this check box if your RADIUS identity source is a SafeWord server.
Enable Secondary Check this check box to enable the secondary RADIUS token server for Cisco ISE to
Server use as a backup in case the primary fails. If you check this check box, you must
configure a secondary RADIUS token server.
Always Access Click this option if you want Cisco ISE to always access the primary server first.
Primary Server
First
Fallback to Click this option to specify the amount of time in minutes that Cisco ISE can
Primary Server authenticate using the secondary RADIUS token server if the primary server cannot
after be reached. After this time elapses, Cisco ISE reattempts to authenticate against the
primary server.
Primary Server
Host IP Enter the IP address of the primary RADIUS token server. This field can take as input
a valid IP address that is expressed as a string. Valid characters that are allowed in this
field are numbers and dot (.).
Authentication Enter the port number on which the primary RADIUS token server is listening.
Port
Server Timeout Specify the time in seconds that Cisco ISE should wait for a response from the primary
RADIUS token server before it determines that the primary server is down.
Connection Specify the number of attempts that Cisco ISE should make to reconnect to the primary
Attempts server before moving on to the secondary server (if defined) or dropping the request
if a secondary server is not defined.
Secondary Server
Host IP Enter the IP address of the secondary RADIUS token server. This field can take as
input a valid IP address that is expressed as a string. Valid characters that are allowed
in this field are numbers and dot (.).
Shared Secret Enter the shared secret configured on the secondary RADIUS token server for this
connection.
Authentication Enter the port number on which the secondary RADIUS token server is listening. Valid
Port values are from 1 to 65,535. The default is 1812.
Server Timeout Specify the time in seconds that Cisco ISE should wait for a response from the
secondary RADIUS token server before it determines that the secondary server is
down.
Connection Specify the number of attempts that Cisco ISE should make to reconnect to the
Attempts secondary server before dropping the request.
Related Topics
RADIUS Token Identity Sources, on page 712
Add a RADIUS Token Server, on page 716
Enter Next Token Enter a text string to request the next token.
Code
Choose PIN Type Enter a text string to request the PIN type.
Accept System PIN Enter a text string to accept the system-generated PIN.
Re-enter PIN Enter a text string to request the user to re-enter the PIN.
Display System Enter a text string to label the system PIN message.
PIN Message
Display System Enter a text string to inform the user to remember the new PIN.
PIN Reminder
Must Enter Enter a message that instructs users to enter only numbers for the PIN.
Numeric Error
Must Enter Alpha Enter a message that instructs users to enter only alphanumeric characters for PINs.
Error
PIN Accepted Enter a message that the users see when their PIN is accepted by the system.
Message
PIN Rejected Enter a message that the users see when the system rejects their PIN.
Message
User Pins Differ Enter a message that the users see when they enter an incorrect PIN.
Error
System PIN Enter a message that the users see when the system accepts their PIN.
Accepted Message
Bad Password Enter a message that the users see when the PIN that they specify does not fall within
Length Error the range specified in the PIN length policy.
Related Topics
RSA Identity Sources, on page 718
Cisco ISE and RSA SecurID Server Integration, on page 719
Add RSA Identity Sources, on page 721
User Identity
User identity is like a container that holds information about a user and forms their network access credentials.
Each user’s identity is defined by data and includes: a username, e-mail address, password, account description,
associated administrative group, user group, and role.
User Groups
User groups are a collection of individual users who share a common set of privileges that allow them to
access a specific set of Cisco ISE services and functions.
• GuestType_Daily
• GuestType_SocialLogin
• GuestType_Weekly
• Own_Accounts
User Role
A user role is a set of permissions that determine what tasks a user can perform and what services they can
access on the Cisco ISE network. A user role is associated with a user group. For example, a network access
user.
You can also specify the default parameter. The values that you add in the Display field are displayed
while adding or editing a Network Access or Admin user.
• Float
• Password: You can specify the maximum string length.
• Long: You can configure the minimum and maximum value.
• IP: You can specify a default IPv4 or IPv6 address.
• Boolean: You can set either True or False as the default value.
• Date: You can select a date from the calendar and set it as the default value. The date is displayed in
yyyy-mm-dd format.
Check the Mandatory check box if you want to make an attribute mandatory while adding or editing a
Network Access or Admin user. You can also set default values for the custom attributes.
The custom attributes can be used in the authentication policies. The data type and the allowable range that
you set for the custom attributes are applied to the custom attribute values in the policy conditions.
Remember Some characters are considered invalid for Attribute Names and Attribute Values. Using the following
characters for Attribute Names and Attribute Values is restricted.
• Attribute Value: @, =, +, or - (do not use these characters at the beginning of an attribute name or value)
• Attribute Name: ^, =, , \, ", `, |, : (do not use these characters anywhere in the string)
• Password Change Delta: Specifies the minimum number of characters that must change when changing
the current password to a new password. Cisco ISE does not consider changing the position of a character
as a change. For Example, if the password delta is 3, and the current password is "?Aa1234?", then
"?Aa1567?" ("5","6" and "7" are the three new characters) is a valid new password. "?Aa1562?" fails,
because "?","2", and "?" characters are in the current password. "Aa1234??" fails, because even though
the character positions changed, the same characters are in the current password.
Password change delta also considers the previous X passwords, where X is the value of Password must
be different from the previous versions. If your password delta is 3, and your password history is 2,
then you must change the four characters that are not a part of the past two passwords.
• Dictionary words: Check this check box to restrict the use of any dictionary word, its characters in
reverse order, or its letters replaced with other characters.
Substitution of "$" for "s", "@" for "a", "0" for "o", "1" for "l", "!" for "i", "3" for "e", is not permitted.
For example, "Pa$$w0rd".
• Default Dictionary: Choose this option to use the default Linux dictionary in Cisco ISE. The default
dictionary contains approximately 480,000 English words.
• Custom Dictionary: Choose this option to use your customized dictionary. Click Choose File to
select a custom dictionary file. The text file must be of newline-delimited words, .dic extension,
and size less than 20 MB.
• You can use the Password Lifetime section to update the password reset interval and reminder. To set
the lifetime of a password, check the Change password every __ days (valid range 1 to 3650) check
box, and enter the number of days in the input field. A user account can be disabled if a user does not
change the password in the specified time by selecting the Disable User Account option. Choose the
Require password change on next login to prompt the user to change their password the next time they
login to Cisco ISE.
To send a reminder email for password reset, check the Display Reminder __ Days Prior to Password
Expiration check box and enter the number of days before which a reminder email should be sent to the
email address configured for the network access user. While creating a network access user, you can add
the email address in the Administration > Identity Management > Identities > Users > Add Network
Access User window to send an email notification for password reset.
Note • The reminder email is sent from the following email address:
iseadminportal@<ISE-Primary-FQDN>. You must explicitly permit access
for this sender.
• By default, the reminder email has the following content: Your network
access password will expire on <password expiry date and time>. Please
contact your system administrator for assistance.
From Cisco ISE Release 3.2, you can customize the email content after the
Please contact your system administrator for assistance portion of the email
notification.
• Lock/Suspend Account with Incorrect Login Attempts: Use this option to suspend or lock an account
if the login attempt failed for the specified number of times. The valid range is from 3 to 20.
• Account Disable Policy: Configure the rules about when to disable an existing user account. See Disable
User Accounts Globally for more information.
Related Topics
User Account Custom Attributes, on page 587
To Add Users, on page 590
• Administration > System > Admin Access > Administrators > Admin Users.
• Settings > Account Settings > Change Password.
Step 1 Choose Administration > Identity Management > Identities > Users.
You can also create users by accessing the Work Centers > Device Administration > Identities > Users window.
Step 4 Click Submit to create a new user in the Cisco ISE internal database.
Step 1 Choose Administration > Identity Management > Identities > Users.
Step 2 Check the check box that corresponds to the user(s) whose data you want to export.
Step 3 Click Export Selected.
Step 4 In the Key field, enter a key for encrypting the password.
Step 5 Click Start Export to create a users.csv file.
Step 6 Click OK to export the users.csv file.
Note If the CSV file contains custom attributes, the data type and the allowable range that you set for the custom
attributes will be applied to the custom attribute values during import.
Step 1 Choose Administration > Identity Management > Identities > Users.
Step 2 Click Import to import users from a comma-delimited text file.
If you do not have a comma-delimited text file, click Generate a Template to create a CSV file with the heading rows
filled in.
Step 3 In the File field, enter the filename containing the usernames to import, or click Browse and navigate to the location
where the file is present.
Step 4 Check the Create new user(s) and update existing user(s) with new data check box to create new users and update
existing user details.
Step 5 Click Save.
We recommend that you do not delete all the network access users at a time, because this may lead to CPU
spike and the services to crash, especially if you are using a very large database.
Endpoint Settings
The following table describes the fields on the Endpoints window, which you can use to create endpoints
and assign policies for endpoints. To view this window, click the Menu icon ( ) and choose Work Centers >
Network Access > Identities > Endpoints.
MAC Address Enter the MAC address in hexadecimal format to create an endpoint statically.
The MAC address is the device identifier for the interface that is connected to the Cisco
ISE enabled network.
Static Assignment Check this check box when you want to create an endpoint statically in the Endpoints
window and the status of static assignment is set to static.
You can toggle the status of static assignment of an endpoint from static to dynamic
or from dynamic to static.
Policy Assignment (Disabled by default unless the Static Assignment is checked) Choose a matching
endpoint policy from the Policy Assignment drop-down list.
You can do one of the following:
• If you do not choose a matching endpoint policy, but use the default endpoint
policy Unknown, then the static assignment status is set to dynamic for the
endpoint that allows dynamic profiling of an endpoint.
• If you choose a matching endpoint policy other than Unknown, then the static
assignment status is set to static for that endpoint and the Static Assignment
check box is automatically checked.
Static Group Check this check box when you want to assign an endpoint to an identity group
Assignment statically.
In you check this check box, the profiling service does not change the endpoint identity
group the next time during evaluation of the endpoint policy for these endpoints, which
were previously assigned dynamically to other endpoint identity groups.
If you uncheck this check box, then the endpoint identity group is dynamic as assigned
by the ISE profiler based on policy configuration. If you do not choose the Static Group
Assignment option, then the endpoint is automatically assigned to the matching identity
group the next time during evaluation of the endpoint policy.
Identity Group Choose an endpoint identity group to which you want to assign the endpoint.
Assignment
You can assign an endpoint to an identity group when you create an endpoint statically,
or when you do not want to use the Create Matching Identity Group option during
evaluation of the endpoint policy for an endpoint.
Cisco ISE includes the following system created endpoint identity groups:
• Blocked List
• GuestEndpoints
• Profiled
• Cisco IP-Phone
• Workstation
• RegisteredDevices
• Unknown
Related Topics
Identified Endpoints, on page 788
Create Endpoints with Static Assignments of Policies and Identity Groups, on page 784
Connection Settings
Port Enter the port number of the LDAP server. You can use the default port 389 to import
from an LDAP server, and the default port 636 to import from an LDAP server over
SSL.
Note Cisco ISE supports any configured port number. The configured value should
match the LDAP server connection details.
Enable Secure Check the Enable Secure Connection check box to import from an LDAP server over
Connection SSL.
Anonymous Bind You must enable either the Anonymous Bind check box, or enter the LDAP
administrator credentials from the slapd.conf configuration file.
Admin DN Enter the distinguished name (DN) configured for the LDAP administrator in the
slapd.conf configuration file.
Admin DN format example: cn=Admin, dc=cisco.com, dc=com
Password Enter the password configured for the LDAP administrator in the slapd.conf
configuration file.
Query Settings
MAC Address Enter the query filter, which is used for importing the MAC address, for example,
objectClass ieee802Device.
MAC Address Enter the returned attribute name for import, for example, macAddress.
Attribute Name
Profile Attribute Enter the name of the LDAP attribute. This attribute holds the policy name for each
Name endpoint entry that is defined in the LDAP server.
When you configure the Profile Attribute Name field, consider the following:
• If you do not specify this LDAP attribute in the Profile Attribute Name field or
configure this attribute incorrectly, then endpoints are marked “Unknown” during
an import operation, and these endpoints are profiled separately to the matching
endpoint profiling policies.
• If you configure this LDAP attribute in the Profile Attribute Name field, the
attribute values are validated to ensure that the endpoint policy matches with an
existing policy in Cisco ISE, and endpoints are imported. If the endpoint policy
does not match with an existing policy, then those endpoints will not be imported.
Time Out Enter the time in seconds. The valid range is from 1 to 60 seconds.
Related Topics
Identified Endpoints, on page 788
Import Endpoints from LDAP Server, on page 787
Step 1 Choose Administration > Identity Management > Groups > Identity Groups > User Identity Groups > Add.
You can also create a user identity group by accessing the Work Centers > Device Administration > User Identity
Groups > Identity Groups > User Identity Groups > Add page.
Step 2 Enter values in the Name and Description fields. Supported characters for the Name field are space # $ & ‘ ( ) * + - . /
@_.
Step 3 Click Submit.
Related Topics
User Identity Groups, on page 586
Step 1 Choose Administration > Identity Management > Groups > Identity Groups > User Identity Groups.
Step 2 Check the check box that corresponds to the user identity group that you want to export, and click Export.
Step 1 Choose Administration > Identity Management > Groups > Identity Groups > User Identity Groups.
Step 2 Click Generate a Template to get a template to use for the import file.
Step 3 Click Import to import network access users from a comma-delimited text file.
Step 4 Check the Overwrite existing data with new data check box if you want to both add a new user identity group and
update existing user identity groups.
Step 5 Click Import.
Step 6 Click Save to save your changes to the Cisco ISE database.
Name Enter the name of the endpoint identity group that you want to create.
Description Enter a description for the endpoint identity group that you want to create.
Parent Group Choose an endpoint identity group from the Parent Group drop-down list to which
you want to associate the newly created endpoint identity group.
Related Topics
Identified Endpoints Grouped in Endpoint Identity Groups, on page 791
Create Endpoint Identity Groups, on page 790
Step 1 Choose Administration > System > Settings > Max Sessions > User.
If the maximum number of sessions is configured at both the user and group level, the smaller value will have
precedence. For example, if the maximum session value for a user is set as 10 and the maximum session value
of the group to which the user belongs is set as 5, the user can have a maximum of 5 sessions only.
Note The maximum concurrent session count is managed by the PSN in which it is configured. This count is not
synchronized among the PSNs. If the authentication is done in Cisco ISE, where the maximum concurrent
sessions per user or group is configured, and authorization is done in a different proxy server, then the maximum
concurrent session limit is applicable only in the Cisco ISE and is not applied to the proxy server.
Maximum concurrent session count is implemented in the runtime process and the data is stored only in the
memory. If the PSN is restarted, the maximum concurrent session counters are reset.
Maximum concurrent session count is case insensitive with respect to usernames irrespective of the Network
Access Device used (when the same PSN node is used)
Step 1 Choose Administration > System > Settings > Max Sessions > Group.
All the configured identity groups are listed.
Step 2 Click the Edit icon next to the group that you want to edit and enter the values for the following:
• Maximum number of concurrent sessions permitted for that group. If the maximum number of sessions for a group
is set as 100, the total count of all sessions established by all members of that group cannot exceed 100.
Note Group-level session limits are applied based on the group hierarchy.
• Maximum number of concurrent sessions permitted for each user in that group. This option overrides the maximum
number of sessions for a group.
If you want to set the maximum number of concurrent sessions for a group or maximum concurrent sessions for the users
in a group as Unlimited, leave the Max Sessions for Group/Max Sessions for User in Group field blank, click the Tick
icon, and then click Save. By default, both these values are set as Unlimited.
Step 1 Choose Administration > System > Settings > Max Sessions > Counter Time Limit.
Step 2 Select one of the following options:
• Unlimited: Check this check box if you do not want to set any timeout or time limit for the sessions.
• Delete sessions after: You can enter the timeout value for concurrent sessions in minutes, hours, or days. When a
session exceeds the time limit, Cisco ISE deletes the session from the counter and updates the session count, thereby
allowing new sessions. Users will not be logged out if their sessions exceed the time limit.
You can reset the session count from the RADIUS Live Logs window. Click the Actions icon displayed on
the Identity, Identity Group, or Server column to reset the session count. When you reset a session, the session
is deleted from the counter (thereby allowing new sessions). Users will not be disconnected if their sessions
are deleted from the counter.
When you migrate from Cisco Secure ACS to Cisco ISE, the account disable policy settings specified for a
network access user in Cisco Secure ACS is migrated to Cisco ISE.
Note A collection filter configured for any Filter Type filters out the authentication syslog messages that are sent
to the monitoring node. For more information, see the topic "Collection Filters" in the chapter "Maintain and
Monitor" in the Cisco ISE Administrator Guide.
If you configure a collection filter (Administration > System > Logging > Collection Filter) for any Attribute
and Filter Type; and you have also selected the Disable account after n days of inactivity check box
(Administration > Identity Management > User Authentication Settings > Disable Account Policy), your
account might be disabled as a result of the syslog messages of successful authentication not being relayed
to the monitoring node.
Step 1 Choose Administration > Identity Management > Identities > Users.
Step 2 Click Add to create a new user or check the check box next to an existing user and click Edit to edit the existing user
details.
Step 3 Check the Disable account if the date exceeds check box and select the date.
This option allows you to disable the user account when the configured date exceeds at user level. You can configure
different expiry dates for different users as required. This option overrules the global configuration for each individual
user. The configured date can either be the current system date or a future date.
Note You are not allowed to enter a date earlier than the current system date.
Step 4 Click Submit to configure the account disable policy for an individual user.
Step 1 Choose Administration > Identity Management > Settings > User Authentication Settings > Account Disable Policy.
Step 2 Perform one of the following actions:
• Check the Disable account if date exceeds check box and select the appropriate date in yyyy-mm-dd format. This
option allows you to disable the user account after the configured date. The Disable account if date exceeds setting
at user level takes precedence over this global configuration.
• Check the Disable account after n days of account creation or last enable check box and enter the number of
days. This option disables the user account when the account creation date or last access date exceeds the specified
number of days. Administrators can manually enable the disabled user accounts, which reset the number of days
count.
• Check the Disable account after n days of inactivity check box and enter the number of days. This option disables
the user account when the account is inactive for the specified number of days.
The following table lists authentication protocols and the external identity sources that they support.
Credentials are stored differently, depending on the external data source connection type, and the features
used.
• When joining an Active Directory Domain (but not for Passive ID), the credentials that are used to join
are not saved. Cisco ISE creates an AD computer account, if it does not exist, and uses that account to
authenticate users.
• For LDAP and Passive ID, the credentials that are used to connect to the external data source are also
used to authenticate users.
Note To work with passive identity services, which enable you to receive and share authenticated user identities,
see Additional Passive Identity Service Providers, on page 649.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources.
Step 2 Choose one of these options:
• Certificate Authentication Profile for certificate-based authentications.
• Active Directory to connect to an Active Directory as an external identity source. See Active Directory as an External
Identity Source, on page 603 for more details.
• LDAP to add an LDAP identity source. See LDAP, on page 690 for more details.
• RADIUS Token to add a RADIUS Token server. See RADIUS Token Identity Sources, on page 712 for more details.
• RSA SecurID to add an RSA SecurID server. See RSA Identity Sources, on page 718 for more details.
• SAML Id Providers to add an identity provider (IdP), such as Oracle Access Manager. See SAMLv2 Identity
Provider as an External Identity Source, on page 724 for more details.
• Social Login to add a Social Login, such as Facebook, as an external identity source. See Social Login for
Self-Registered Guests, on page 455 for more details.
Note As per the current design, if authentication is done against an external ID store, then the internal user identity
group name cannot be configured in authorization policy. In order to use internal user identity group for
authorization, authentication policy must be configured to authenticate against Internal Users ID store and
password type, which can be either internal or external, must be selected in user configuration.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > Certificate Authentication Profile > Add.
Step 2 Enter the name and an optional description for the certificate authentication profile.
Step 3 Select an identity store from the drop-down list.
Basic certificate checking does not require an identity source. If you want binary comparison checking for the certificates,
you must select an identity source. If you select Active Directory as an identity source, subject and common name and
subject alternative name (all values) can be used to look up a user.
Step 4 Select the use of identity from Certificate Attribute or Any Subject or Alternative Name Attributes in the Certificate.
This will be used in logs and for lookups.
If you choose Any Subject or Alternative Name Attributes in the Certificate, Active Directory UPN will be used as
the username for logs and all subject names and alternative names in a certificate will be tried to look up a user. This
option is available only if you choose Active Directory as the identity source.
Step 5 Choose when you want to Match Client Certificate Against Certificate In Identity Store. For this you must select an
identity source (LDAP or Active Directory.) If you select Active Directory, you can choose to match certificates only to
resolve identity ambiguity.
• Never: This option never performs a binary comparison.
• Only to resolve identity ambiguity: This option performs the binary comparison of client certificate to certificate
on account in Active Directory only if ambiguity is encountered. For example, several Active Directory accounts
matching to identity names from certificate are found.
• Always perform binary comparison: This option always performs the binary comparison of client certificate to
certificate on account in identity store (Active Directory or LDAP).
Step 6 Click Submit to add the certificate authentication profile or save the changes.
Authentication Features
Protocols
EAP-FAST and User and machine authentication with the ability to change passwords using EAP-FAST
password based and PEAP with an inner method of MS-CHAPv2 and EAP-GTC
Protected Extensible
Authentication
Protocol (PEAP)
Authentication Features
Protocols
Active Directory Attribute and Group Retrieval for Use in Authorization Policies
Cisco ISE retrieves user or machine attributes and groups from Active Directory for use in authorization
policy rules. These attributes can be used in Cisco ISE policies and determine the authorization level for a
user or machine. Cisco ISE retrieves user and machine Active Directory attributes after successful authentication
and can also retrieve attributes for an authorization that is independent of authentication.
Cisco ISE may use groups in external identity stores to assign permissions to users or computers; for example,
to map users to sponsor groups. You should note the following restrictions on group memberships in Active
Directory:
• Policy rule conditions may reference any of the following: a user’s or computer’s primary group, the
groups of which a user or computer is a direct member, or indirect (nested) groups.
• Domain local groups outside a user’s or computer’s account domain are not supported.
Note You can use the value of the Active Directory attribute, msRadiusFramedIPAddress, as an IP address. This
IP address can be sent to a network access server (NAS) in an authorization profile. The
msRADIUSFramedIPAddress attribute supports only IPv4 addresses. Upon user authentication, the
msRadiusFramedIPAddress attribute value fetched for the user will be converted to IP address format.
Attributes and groups are retrieved and managed per join point. They are used in authorization policy (by
selecting first the join point and then the attribute). You cannot define attributes or groups per scope for
authorization, but you can use scopes for authentication policy. When you use a scope in authentication policy,
it is possible that a user is authenticated via one join point, but attributes and/or groups are retrieved via another
join point that has a trust path to the user's account domain. You can use authentication domains to ensure
that no two join points in one scope have any overlap in authentication domains.
During the authorization process in a multi join point configuration, Cisco ISE will search for join points in
the order in which they listed in the authorization policy, only until a particular user has been found. Once a
user has been found the attributes and groups assigned to the user in the join point, will be used to evaluate
the authorization policy.
In a multi join point configuration, if authentication is successful for the same identity from each of the join
points individually, then this authentication fails if it is done against the identity source sequence
"All_AD_Join_Points".
In a multi join point configuration, if Active Directory group retrieval is successful for the same identity from
each of the join points individually, then Active Directory group retrieval fails if:
• different join points are used for authentication and authorization.
• authentication uses EAP-TLS without Binary Comparison (Match Client Certificate Against Certificate
In Identity Store is set to Never in the Certificate Authentication Profile) and there is an unmatched
authorization rule with a different join point ahead of the matched authorization rule.
• authentication uses EAP-TLS without Binary Comparison (Match Client Certificate Against Certificate
In Identity Store is set to Never in Certificate Authentication Profile) and Machine Access Restriction
(MAR) is enabled with the endpoint using a different join point within the MAR period, from the join
point in the current matched authorization rule.
Note See Microsoft-imposed limits on the maximum number of usable Active Directory groups:
http://technet.microsoft.com/en-us/library/active-directory-maximum-limits-scalability(v=WS.10).aspx
An authorization policy fails if the rule contains an Active Directory group name with special characters such
as /, !, @, \, #, $, %, ^, &, *, (, ), _, +, or ~.
Admin user login through Active Directory might fail if the admin username contains $ character.
If you configure a Boolean attribute (for example, msTSAllowLogon) as String type, the Boolean value of
the attribute in the Active Directory or LDAP server will be set for the String attribute in Cisco ISE. You can
change the attribute type to Boolean or add the attribute manually as Boolean type.
• MS-CHAP and PAP authentications check if the user is disabled, locked out, expired or out of logon
hours and the authentication fails if any of these conditions are true.
• EAP-TLS authentications checks if the user is disabled or locked out and the authentication fails if any
of these conditions are met.
Caution The Resource Owner Password Credentials (ROPC) flow in Cisco ISE is a controlled introduction feature.
We recommend that you thoroughly test this feature in a test environment before using it in a production
environment.
Resource Owner Password Credentials (ROPC) is an OAuth 2.0 grant type that allows Cisco ISE to carry out
authorization and authentication in a network with cloud-based identity providers.
Using the ROPC flow, Cisco ISE validates a user’s credentials with a cloud-based identity source. The ROPC
flow supports plaintext authentication protocols.
Cisco ISE currently supports Microsoft Entra ID through the ROPC flow.
Configure an Application for Resource Owner Password Credentials Flow in Microsoft Entra ID
Step 15 To enable the ROPC flow for this application, click Authentication in the left menu pane. In the Advanced Settings
area, ensure that the toggle button is set to Yes.
Step 16 To add a groups claim to the app, click Token Configuration in the left menu pane.
Step 17 Click + Add Groups Claim.
Step 18 In the Edit Groups Claim dialog box, check the Security groups check box.
Step 19 Click Save.
Step 20 To enable the use of APIs, click API Permissions in the left menu pane.
Step 21 Click + Add A Permission.
Step 22 In the Microsoft APIs area, click Microsoft Graph.
Step 23 Click Application Permissions.
Step 24 In the Group drop-down area, check the Group.Read.All check box.
Step 25 Click Add Permissions.
Step 26 Click Grant Admin Consent for <user>, and then click Yes.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Settings >
REST ID Store Settings.
Step 2 Click Enabled, and then click Submit.
Step 3 Verify the status of the REST Auth Service through the following CLI command in your ISE node:
show application status ise
If the message REST Auth Service running is displayed in the response, REST ID Store Settings is successfully
enabled. You can now proceed with configuring the ROPC flow.
Step 4 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > REST (ROPC).
Step 5 Click Add.
Step 6 In the new window displayed, enter a value in the Name field.
Step 7 From the REST Identity Provider drop-down list, choose the identity source to be configured.
Step 8 Enter the required values for the fields Client ID, Client Secret, and Tenant ID, from the information saved when
configuring Microsoft Entra ID in the preceding task.
Step 9 Click Test Connection to check if Cisco ISE is able to connect to the chosen identity source.
Step 10 Click Load Groups to import user groups from the connected identity source. You can then choose a specific group
from the Groups drop-down list.
Step 11 (Optional) Enter a value in the Username Suffix field to authenticate the users of a Microsoft Entra ID tenant by their
user names.
For example, if the Azure Active Directory User Private Name (UPN) of a user is [email protected],
the suffix is the separator and the domain name is @myTest.onMicrosoft.com.
Note Cisco ISE does not support Microsoft Active Directory servers that reside behind a network address translator
and have a Network Address Translation (NAT) address.
Note The credentials that are used for the join or leave operation are not stored in Cisco ISE. Only the newly created
Cisco ISE machine account credentials are stored.
The Network access: Restrict clients allowed to make remote calls to SAM security policy in Microsoft
Active Directory has been revised. Hence, Cisco ISE might not able to update its machine account password
every 15 days. If the machine account password is not updated, Cisco ISE will no longer authenticate users
through Microsoft Active Directory. You will receive the AD: ISE password update failed alarm on your
Cisco ISE dashboard to notify you of this event.
Note This issue happens in Windows Server 2016 Active Directory or later and Windows 10 version 1607 due to
the restriction in them. To overcome this restriction, when you are integrating Windows Server 2016 Active
Directory or later or Windows 10 version 1607 with Cisco ISE, you much set the registry value in the following
registry from non-zero to blank to give access to all:
Registry:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\restrictremotesam This
allows Cisco ISE to update its machine account password.
The security policy allows users to enumerate users and groups in the local Security Accounts Manager (SAM)
database and in Microsoft Active Directory. To ensure Cisco ISE can update its machine account password,
check that your configurations in Microsoft Active Directory are accurate. For more information on the
Windows operating systems and Windows Server versions affected, what this means for your network, and
what changes may be needed, see:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/
network-access-restrict-clients-allowed-to-make-remote-sam-calls
DNS Server
While configuring your DNS server, make sure that you take care of the following:
• The DNS servers that you configure in Cisco ISE must be able to resolve all forward and reverse DNS
queries for the domains that you want to use.
• The Authoritative DNS server is recommended to resolve Active Directory records, as DNS recursion
can cause delays and have significant negative impact on performance.
• All DNS servers must be able to answer SRV queries for DCs, GCs, and KDCs with or without additional
Site information.
• Cisco recommends that you add the server IP addresses to SRV responses to improve performance.
• Avoid using DNS servers that query the public Internet. They can leak information about your network
when an unknown name has to be resolved.
Note If you see operational issues when Cisco ISE is connected to Active Directory, see the AD Connector Operations
Report under Operations > Reports.
You must perform the following tasks to configure Active Directory as an external identity source.
1. Add an Active Directory Join Point and Join Cisco ISE Node to the Join Point, on page 612
2. Configure Authentication Domains, on page 617
3. Configure Active Directory User Groups, on page 618
4. Configure Active Directory User and Machine Attributes, on page 619
5. (Optional) Modify Password Changes, Machine Authentications, and Machine Access Restriction Settings,
on page 619
Add an Active Directory Join Point and Join Cisco ISE Node to the Join Point
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > Active Directory.
Step 2 Click Add and enter the domain name and identity store name from the Active Directory Join Point Name settings.
Step 3 Click Submit.
A pop-up appears asking if you want to join the newly created join point to the domain. Click Yes if you want to join
immediately.
If you clicked No, then saving the configuration saves the Active Directory domain configuration globally (in the primary
and secondary policy service nodes), but none of the Cisco ISE nodes are joined to the domain yet.
Step 4 Check the check box next to the new Active Directory join point that you created and click Edit, or click on the new
Active Directory join point from the navigation pane on the left. The deployment join/leave table is displayed with all
the Cisco ISE nodes, the node roles, and their status.
Step 5 In case the join point was not joined to the domain during Step 3, check the check box next to the relevant Cisco ISE
nodes and click Join to join the Cisco ISE node to the Active Directory domain.
You must do this explicitly even though you saved the configuration. To join multiple Cisco ISE nodes to a domain in a
single operation, the username and password of the account to be used must be the same for all join operations. If different
username and passwords are required to join each Cisco ISE node, the join operation should be performed individually
for each Cisco ISE node.
Step 6 Enter the Active Directory username and password in the Join Domain dialog box.
It is strongly recommended that you choose Store credentials, in which case your administrator's user name and password
will be saved in order to be used for all Domain Controllers (DC) that are configured for monitoring.
The user used for the join operation should exist in the domain itself. If it exists in a different domain or subdomain, the
username should be noted in a UPN notation, such as [email protected].
• You might not be able to join Cisco ISE with an Active Directory domain if the DNS service (SRV)
records are missing (the domain controllers do not advertise their SRV records for the domain that you
are trying to join to).
• The AD machine account name that is created will not match the Cisco ISE hostname if the hostname
contains more than 15 characters. In this case, the machine account name will be created in the following
format:
first_8_characters_of(hostname) + "-" + 6 random characters + "$"
For the machine account name and the hostname to match, the hostname must have 15 characters or less.
• Even if the AD credentials used to join Cisco ISE and AD are no longer valid, the join point between
Cisco ISE and AD remains unchanged.
Step 1 Choose Work Centers > PassiveID > Providers and then from the left panel choose Active Directory.
Step 2 Check the check box next to the Active Directory join point that you created and click Edit. The deployment join/leave
table is displayed with all the Cisco ISE nodes, the node roles, and their statuses.
Step 3 Note To add a new Domain Controller (DC) for Passive Identity services, you need the login credentials of that DC.
The DC failover mechanism is managed based on the DC priority list, which determines the order in which
the DCs are selected in case of failover. If a DC is offline or not reachable due to some error, its priority is
decreased in the priority list. When the DC comes back online, its priority is adjusted accordingly (increased)
in the priority list.
You can also choose to use the standalone option for MSPRC while creating an agent. However, the standalone
agent will not be backed up by a secondary agent, in case of agent failure and the domain controller events
cannot be monitored.
While upgrading from Cisco ISE 2.x to 3.0 version, if the member server is updated with existing agents, the
agent version is displayed as 2.0.0.1 in the Version column in the Agents window. To view this window,
click the Menu icon ( ) and choose Work Centers > Passive ID > Providers > Agents .
When the agent is installed on the domain controller directly, ensure that the monitoring user is a member of
the Event Log Readers group.
When the agent is installed on the AD domain member server, you must do the following:
• Ensure that the monitoring user is a member of the Event Log Readers group.
• If you have configured high availability, open UDP port 9095 in the firewall between the server pair.
• Ensure that the DNS servers configured in Cisco ISE are able to resolve the forward (A) and reverse
(PTR) records of the Windows member servers. You must add the required details, if missing.
Irrespective of whether the agent is installed directly on the server or a member server, enable the following
firewall rules for Remote Event Log Management group on the domain controller, to allow the server to access
the event logs of the domain controller.
• Remote Event Log Management (NP-in)
• Remote Event Log Management (RPC)
• Remote Event Log Management (RPC-EPMAP)
If this is done after the agent is installed, you must restart the agent service on the server.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Passive ID > Providers > Agents.
Step 2 Click Add.
Step 3 In the Agents window, click Deploy New Agent, if you want to deploy new agents or click Register Existing Agents,
if you want to register an existing agent.
If you choose the Register Existing Agent option, a request from a supported registered client may be dropped due to
the unsupported protocol. In such events, you need to configure the Cisco ISE client with a supported protocol.
Step 5 Enter the Host FQDN URL in the Host FQDN field.
Step 6 Enter the User Name and Password.
The user account must have the permission to connect remotely to install the PIC agent.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > PassiveID > Providers > Active
Directory.
Step 2 In the Active Directory window, click Add.
Step 3 In the Connection section, enter the Join Point Name and Active Directory Domain for the domain controller.
Step 4 Click Submit.
The following message is displayed:
Would you like to Join all ISE Nodes to this Active Directory Domain?
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Check the checkbox next to the Active Directory join point that you created and click Edit. The deployment join/leave
table is displayed with all the Cisco ISE nodes, the node roles, and their statuses.
Step 3 Check the checkbox next to the Cisco ISE node and click Leave.
Step 4 Enter the Active Directory username and password, and click OK to leave the domain and remove the machine account
from the Cisco ISE database.
If you enter the Active Directory credentials, the Cisco ISE node leaves the Active Directory domain and deletes the
Cisco ISE machine account from the Active Directory database.
Note To delete the Cisco ISE machine account from the Active Directory database, the Active Directory credentials
that you provide here must have the permission to remove machine account from domain.
Step 5 If you do not have the Active Directory credentials, check the No Credentials Available checkbox, and click OK.
If you check the Leave domain without credentials checkbox, the primary Cisco ISE node leaves the Active Directory
domain. The Active Directory administrator must manually remove the machine account that was created in Active
Directory during the time of the join.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click Active Directory join point.
Step 3 Click the Authentication Domains tab.
A table appears with a list of your trusted domains. By default, Cisco ISE permits authentication against all trusted
domains.
Step 4 To allow only specified domains, uncheck Use all Active Directory domains for authentication check box.
Step 5 Check the check box next to the domains for which you want to allow authentication, and click Enable Selected. In the
Authenticate column, the status of this domain changes to Yes.
You can also disable selected domains.
Step 6 Click Show Unusable Domains to view a list of domains that cannot be used. Unusable domains are domains that Cisco
ISE cannot use for authentication due to reasons such as one-way trust, selective authentication and so on.
What to do next
Configure Active Directory user groups.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click the Groups tab.
Step 3 Do one of the following:
a) Choose Add > Select Groups From Directory to choose an existing group.
b) Choose Add > Add Group to manually add a group. You can either provide both group name and SID or provide
only the group name and press Fetch SID.
Do not use double quotes (”) in the group name for the user interface login.
Step 4 If you are manually selecting a group, you can search for them using a filter. For example, enter admin* as the filter
criteria and click Retrieve Groups to view user groups that begin with admin. You can also enter the asterisk (*) wildcard
character to filter the results. You can retrieve only 500 groups at a time.
Step 5 Check the check boxes next to the groups that you want to be available for use in authorization policies and click OK.
Step 6 If you choose to manually add a group, enter a name and SID for the new group.
Step 7 Click OK.
Step 8 Click Save.
Note If you delete a group and create a new group with the same name as original, you must click Update SID Values
to assign new SID to the newly created group. After an upgrade, the SIDs are automatically updated after the first
join.
What to do next
Configure Active Directory user attributes.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click the Attributes tab.
Step 3 Choose Add > Add Attribute to manually add a attribute, or choose Add > Select Attributes From Directory to
choose a list of attributes from the directory.
Cisco ISE allows you to configure the AD with IPv4 or IPv6 address for user authentication when you manually add the
attribute type IP.
Step 4 If you choose to add attributes from the directory, enter the name of a user in the Sample User or Machine Account
field, and click Retrieve Attributes to obtain a list of attributes for users. For example, enter administrator to obtain a
list of administrator attributes. You can also enter the asterisk (*) wildcard character to filter the results.
Note When you enter an example username, ensure that you choose a user from the Active Directory domain to which
the Cisco ISE is connected. When you choose an example machine to obtain machine attributes, be sure to prefix
the machine name with “host/” or use the SAM$ format. For example, you might use host/myhost. The example
value displayed when you retrieve attributes are provided for illustration only and are not stored.
Step 5 Check the check boxes next to the attributes from Active Directory that you want to select, and click OK.
Step 6 If you choose to manually add an attribute, enter a name for the new attribute.
Step 7 Click Save.
Modify Password Changes, Machine Authentications, and Machine Access Restriction Settings
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Check the check box next to the relevant Cisco ISE node and click Edit .
Step 3 Click the Advanced Settings tab.
Step 4 Modify as required, the Password Change, Machine Authentication, and Machine Access Restrictions (MARs) settings.
Step 5 Check the Enable dial-in check check box to check the dial-in permissions of the user during authentication or query.
The result of the check can cause a reject of the authentication in case the dial-in permission is denied.
Step 6 Check the Enable callback check for dial-in clients check box if you want the server to call back the user during
authentication or query. The IP address or phone number used by the server can be set either by the caller or the network
administrator. The result of the check is returned to the device on the RADIUS response.
Step 7 Check the Use Kerberos for Plain Text Authentications check box if you want to use Kerberos for plain-text
authentications. The default and recommended option is MS-RPC.
For more information, see the following Cisco ISE Community pages:
• https://community.cisco.com/t5/policy-and-access/mar-why-is-it-useful/td-p/3213527
• https://community.cisco.com/t5/policy-and-access/ise-2-1-mar-aging-time-eap-tls/td-p/3209628
Related Topics
Configure Active Directory as an External Identity Source, on page 612
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Select the Join point.
Step 3 Click the Advanced Settings tab.
Step 4 Under the Schema section, select the Custom option from the Schema drop-down list. You can update the user information
attributes based on your requirements. These attributes are used to collect user information, such as, first name, last name,
email, telephone, locality, and so on.
Predefined attributes are used for the Active Directory schema (built-in schema). If you edit the attributes of the predefined
schema, Cisco ISE automatically creates a custom schema.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click Scope Mode.
A default scope called Initial_Scope is created, and all the current join points are placed under this scope.
Step 3 To create more scopes, click Add.
Identity Rewrite
Identity rewrite is an advanced feature that directs Cisco ISE to manipulate the identity before it is passed to
the external Active Directory system. You can create rules to change the identity to a desired format that
includes or excludes a domain prefix and/or suffix or other additional markup of your choice.
Identity rewrite rules are applied on the username or hostname received from the client, before being passed
to Active Directory, for operations such as subject searches, authentication, and authorization queries. Cisco
ISE will match the condition tokens and when the first one matches, Cisco ISE stops processing the policy
and rewrites the identity string according to the result.
During the rewrite, everything enclosed in square bracket [ ] (such as [IDENTITY]) is a variable that is not
evaluated on the evaluation side but instead added with the string that matches that location in the string.
Everything without the brackets is evaluated as a fixed string on both the evaluation side and the rewrite side
of the rule.
The following are some examples of identity rewrite, considering that the identity entered by the user is
ACME\jdoe:
• If identity matches ACME\[IDENTITY], rewrite as [IDENTITY].
The result would be jdoe. This rule instructs Cisco ISE to strip all usernames with the ACME prefix.
• If the identity matches ACME\[IDENTITY], rewrite as [IDENTITY]@ACME.com.
The result would be [email protected]. This rule instructs Cisco ISE to change the format from prefix
for suffix notation or from NetBIOS format to UPN formats.
• If the identity matches ACME\[IDENTITY], rewrite as ACME2\[IDENTITY].
The result would be ACME2\jdoe. This rule instructs Cisco ISE to change all usernames with a certain
prefix to an alternate prefix.
• If the identity matches [ACME]\jdoe.USA, rewrite as [IDENTITY]@[ACME].com.
The result would be jdoe\ACME.com. This rule instructs Cisco ISE to strip the realm after the dot, in
this case the country and replace it with the correct domain.
• If the identity matches E=[IDENTITY], rewrite as [IDENTITY].
The result would be jdoe. This is an example rule that can be created when an identity is from a certificate,
the field is an email address, and Active Directory is configured to search by Subject. This rule instructs
Cisco ISE to remove ‘E=’.
• If the identity matches E=[EMAIL],[DN], rewrite as [DN].
This rule will convert certificate subject from [email protected], CN=jdoe, DC=acme, DC=com to
pure DN, CN=jdoe, DC=acme, DC=com. This is an example rule that can be created when identity is
taken from a certificate subject and Active Directory is configured to search user by DN . This rule
instructs Cisco ISE to strip email prefix and generate DN.
The following are some common mistakes while writing the identity rewrite rules:
Identity rewrite rules are always applied within the context of an Active Directory join point. Even if a scope
is selected as the result of an authentication policy, the rewrite rules are applied for each Active Directory
join point. These rewrite rules also applies for identities taken from certificates if EAP-TLS is being used.
Note This configuration task is optional. You can perform it to reduce authentication failures that can arise because
of various reasons such as ambiguous identity errors.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click the Advanced Settings tab.
Step 3 Under the Identity Rewrite section, choose whether you want to apply the rewrite rules to modify usernames.
Step 4 Enter the match conditions and the rewrite results. You can remove the default rule that appears and enter the rule according
to your requirement. Cisco ISE processes the policy in order, and the first condition that matches the request username
is applied. You can use the matching tokens (text contained in square brackets) to transfer elements of the original
username to the result. If none of the rules match, the identity name remains unchanged. You can click the Launch Test
button to preview the rewrite processing.
domain, Cisco ISE will wait for all responses in order to ensure that there is no identity ambiguity. This might
be a lengthy process, subject to the number of domains, latency in the network, load, and so on.
Note This configuration task is optional. You can perform it to reduce authentication failures that can arise because
of various reasons such as ambiguous identity errors.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click the Advanced Settings tab.
Step 3 Define the following settings for identity resolution for usernames or machine names under the Identity Resolution
section. This setting provides you advanced control for user search and authentication.
The first setting is for the identities without a markup. In such cases, you can select any of the following options:
• Reject the request: This option will fail the authentication for users who do not have any domain markups, such
as a SAM name. This is useful in case of multi join domains where Cisco ISE will have to look up for the identity
in all the joined global catalogs, which might not be very secure. This option forces the users to use names with
domain markups.
• Only search in the “Authentication Domains” from the joined forest: This option will search for the identity
only in the domains in the forest of the join point which are specified in the authentication domains section. This is
the default option.
• Search in all the “Authentication Domains” sections: This option will search for the identity in all authentication
domains in all the trusted forests. This might increase latency and impact performance.
The selection is made based on how the authentication domains are configured in Cisco ISE. If only specific authentication
domains are selected, only those domains will be searched (for both “joined forest” or “all forests” selections).
The second setting is used if Cisco ISE cannot communicate with all Global Catalogs (GCs) that it needs to in order to
comply with the configuration specified in the “Authentication Domains” section. In such cases, you can select any of
the following options:
• Proceed with available domains: This option will proceed with the authentication if it finds a match in any of the
available domains.
• Drop the request: This option will drop the authentication request if the identity resolution encounters some
unreachable or unavailable domain.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Choose one of the following options:
• To run the test on all join points, choose Advanced Tools > Test User for All Join Points.
• To run the test for a specific join point, select the joint point and click Edit. Select the Cisco ISE node and click
Test User.
Step 3 Enter the username and password of the user (or host) in Active Directory.
Step 4 Choose the authentication type. Password entry in Step 3 is not required if you choose the Lookup option.
Step 5 Select the Cisco ISE node on which you want to run this test, if you are running this test for all join points.
Step 6 Check the Retrieve Groups and Attributes check boxes if you want to retrieve the groups and attributes from Active
Directory.
Step 7 Click Test.
The result and steps of the test operation are displayed. The steps can help to identify the failure reason and troubleshoot.
You can also view the time taken (in milliseconds) for Active Directory to perform each processing step (for authentication,
lookup, or fetching groups/attributes). Cisco ISE displays a warning message if the time taken for an operation exceeds
the threshold.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Check the checkbox next to the configured Active Directory.
Step 3 Check and ensure that the Local Node status is listed as Not Joined.
Step 4 Click Delete.
You have removed the configuration from the Active Directory database. If you want to use Active Directory at a later
point in time, you can resubmit a valid Active Directory configuration.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click Node View.
Step 3 Select a node from the ISE Node drop-down list.
The table lists the status of Active Directory by node. If there are multiple join points and multiple Cisco ISE nodes in a
deployment, this table may take several minutes to update.
Step 4 Click the join point Name link to go to that Active Directory join point page and perform other specific actions.
Step 5 Click the link in the Diagnostic Summary column to go to the Diagnostic Tools page to troubleshoot specific issues.
The diagnostic tool displays the latest diagnostics results for each join point per node.
Step 1 Choose Administration > Identity Management > External Identity Sources > Active Directory.
Step 2 Click the Advanced Tools drop-down and choose Diagnostic Tools.
Step 3 Select a Cisco ISE node to run the diagnosis on.
If you do not select a Cisco ISE node then the test is run on all the nodes.
Step 5 You can run the diagnostic tests either on demand or on a scheduled basis.
• To run tests immediately, choose Run Tests Now.
• To run the tests at an scheduled interval, check the Run Scheduled Tests check box and specify the start time and
the interval (in hours, days, or weeks) at which the tests must be run. When this option is enabled, all the diagnostic
tests are run on all the nodes and instances and the failures are reported in the Alarms dashlet in the Home dashboard.
Step 6 Click View Test Details to view the details for tests with Warning or Failed status.
This table allows you to rerun specific tests, stop running tests, and view a report of specific tests.
Step 1 Choose Administration > System > Logging > Debug Log Configuration.
Step 2 Click the radio button next to the Cisco ISE Policy Service node from which you want to obtain Active Directory debug
information, and click Edit.
Step 3 Click the Active Directory radio button, and click Edit.
Step 4 Choose DEBUG from the drop-down list next to Active Directory. This will include errors, warnings, and verbose logs.
To get full logs, choose TRACE.
Step 5 Click Save.
Alarms
The following alarms are triggered for Active Directory errors and issues:
• Configured nameserver not available
• Joined domain is unavailable
• Authentication domain is unavailable
Reports
You can monitor Active Directory related activities through the following two reports:
• RADIUS Authentications report: This report shows detailed steps of the Active Directory authentication
and authorization. You can find this report here: Operations > Reports > Endpoints and Users >
RADIUS Authentications.
• AD Connector Operations report: The AD Connector Operations report provides a log of background
operations performed by AD connector, such as Cisco ISE server password refresh, Kerberos ticket
management, DNS queries, DC discovery, LDAP, and RPC connections management. If you encounter
any Active Directory failures, you can review the details in this report to identify the possible causes.
You can find this report here: Operations > Reports > Diagnostics > AD Connector Operations.
Note To modify this default behavior, change the value of the "IdentityLookupField" flag as mentioned in the
"Configure Attributes for Active Directory Identity Search" section.
• Comment: Describe what you are changing, for example: Changing the default behavior to SAM
and CN
Step 1 Open the Group Policy management editor as shown in the following illustration.
Step 2 Create a new policy and enter a descriptive name for it or add to an existing domain policy.
In example below, we used Wired Autoconfiguration for the policy name.
Step 3 Check the Define this policy setting check box, and click the Automatic radio button for the service startup mode as
shown in the following illustration.
Step 4 Apply the policy at the desired organizational unit or domain Active Directory level.
Configure Odyssey 5.X Supplicant for EAP-TLS Machine Authentications Against Active Directory
If you are using the Odyssey 5.x supplicant for EAP-TLS machine authentications against Active Directory,
you must configure the following in the supplicant.
Note You must configure all the domain controllers in all the domains.
1. Set up Active Directory join points and domain controllers from ISE (see Add an Active Directory Join
Point and Join Cisco ISE Node to the Join Point, on page 612).
2. Perform the following steps from Active Directory:
• Configure Active Directory for Passive Identity service, on page 631
• Set the Windows Audit Policy, on page 634
3. (Optional) Troubleshoot automatic configurations performed by ISE on Active Directory with these steps:
• Set Permissions when Microsoft Active Directory Users are in Domain Admin Group, on page 634
• Permissions for Microsoft Active Directory Users Not in Domain Admin Group, on page 635
• Permissions to Use DCOM on the Domain Controller, on page 636
Step 1 Make sure relevant Microsoft patches are installed on the Active Directory domain controllers.
Step 2 Make sure the Active Directory logs the user login events in the Windows Security Log.
Verify that the Audit Policy settings (part of the Group Policy Management settings) allows successful logons to generate
the necessary events in the Windows Security Log (this is the default Windows setting, but you must explicitly ensure
that this setting is correct).
Step 3 You must have an Active Directory user with sufficient permissions for ISE to connect to the Active Directory. The
following instructions show how to define permissions either for admin domain group user or none admin domain group
user:
• Permissions Required when an Active Directory User is a Member of the Domain Admin Group
• Permissions Required when an Active Directory User is Not a Member of the Domain Admin Group
Step 4 The Active Directory user used by ISE can be authenticated either by NT Lan Manager (NTLM) v1 or v2. You need to
verify that the Active Directory NTLM settings are aligned with ISE NTLM settings to ensure successful authenticated
connection between ISE and the Active Directory Domain Controller. The following table shows all Microsoft NTLM
options, and which ISE NTLM actions are supported. If ISE is set to NTLMv2, all six options described in are supported.
If ISE is set to support NTLMv1, only the first five options are supported.
Table 68: Supported Authentication Types Based on ISE and AD NTLM Version Settings
Step 5 Make sure that you have created a firewall rule to allow traffic to dllhost.exe on Active Directory domain controllers.
You can either turn the firewall off, or allow access on a specific IP (ISE IP address) to the following ports:
• TCP 135: General RPC Port. When doing asynchronous RPC calls, the service listening on this port tells the client
which port the component servicing this request is using.
• UDP 137: Netbios Name Resolution
• UDP 138: Netbios Datagram Service
• TCP 139: Netbios Session Service
• TCP 445: SMB
Higher ports are assigned dynamically or you can configure them manually. We recommend that you add
%SystemRoot%\System32\dllhost.exe as a target. This program manages ports dynamically.
All firewall rules can be assigned to specific IP (ISE IP).
Step 1 Choose Start > Programs > Administrative Tools > Group Policy Management.
Step 2 Navigate under Domains to the relevant domain and expand the navigation tree.
Step 3 Choose Default Domain Controller Policy, right click and choose Edit.
The Group Policy Management Editor appears.
Step 4 Choose Default Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security
Settings.
• For Windows Server 2003 or Windows Server 2008 (non-R2), choose Local Policies > Audit Policy. For the two
Policy items, Audit Account Logon Events and Audit Logon Events, ensure that the corresponding Policy Setting
either directly or indirectly includes the Success condition. To include the Success condition indirectly, the Policy
Setting must be set to Not Defined, indicating that the effective value will be inherited from a higher level domain,
and the Policy Setting for that higher level domain must be configured to explicitly include the Success condition.
• For Windows Server 2008 R2 and Windows 2012, choose Advanced Audit Policy Configuration > Audit Policies >
Account Logon. For the two Policy items, Audit Kerberos Authentication Service and Audit Kerberos Service
Ticket Operations, ensure that the corresponding Policy Setting either directly or indirectly includes the Success
condition, as described above.
Note Cisco ISE uses RC4 cipher in Kerberos protocol while communicating with Active Directory, unless this
encryption type is disabled in Active Directory Domain Controller configuration. You can use the Network
Security: Configure Encryption Types Allowed for Kerberos option in Active Directory to configure the
allowed encrytion types for Kerberos protocol.
Step 5 If any Audit Policy item settings have been changed, you should then run gpupdate /force to force the new settings to
take effect.
Set Permissions when Microsoft Active Directory Users are in Domain Admin
Group
For Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2, the Domain Admin
group does not have full control of certain registry keys in the Windows operating system by default. The
Microsoft Active Directory administrator must give the Microsoft Active Directory user full control permissions
on the following registry keys:
• HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
• HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
• Windows 2003R2
• Windows 2008
To grant full control, the Microsoft Active Directory admin must first take ownership of the key:
Step 1 Right-click the key icon and choose the Owner tab.
Step 2 Click Permissions.
Step 3 Click Advanced.
Permissions for Microsoft Active Directory Users Not in Domain Admin Group
For Windows Server 2012 R2, give the Microsoft AD user full control permissions on the following registry
keys:
• HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
• HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
Use the following commands in Windows PowerShell to check if full permission is given to the registry keys:
• get-acl -path
"Microsoft.PowerShell.Core\Registry::HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}"
| format-list
• get-acl-path
"hklm:\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}" |
format-list
The following permissions are required when a Microsoft AD user is not in the Domain Admin group, but is
in the Domain Users group:
• Add registry keys to allow Cisco ISE to connect to the domain controller.
• Permissions to Use DCOM on the Domain Controller, on page 636
• Set Permissions for Access to WMI Root and CIMv2 Namespace, on page 904
These permissions are only required for the following Microsoft AD versions:
• Windows 2003
• Windows 2003R2
• Windows 2008
• Windows 2008 R2
• Windows 2012
• Windows 2012 R2
• Windows 2016
Add Registry Keys to Allow Cisco ISE to Connect to the Domain Controller
You must manually add some registry keys to the domain controller to allow Cisco ISE to connect as a domain
user, and retrieve login authentication events. An agent is not required on the domain controllers or on any
machines in the domain.
The following registry script shows the keys to add. You can copy and paste this into a text file, save the file
with a .reg extension, and double click the file to make the registry changes. To add registry keys, the user
must be an owner of the root key.
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"AppID"="{76A64158-CB41-11D1-8B02-00600806D9B6}"
[HKEY_CLASSES_ROOT\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"DllSurrogate"=" "
[HKEY_CLASSES_ROOT\Wow6432Node\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"DllSurrogate"=" "
Make sure that you include two spaces in the value of the DllSurrogate key. If the registry is manually updated,
you must include only the two spaces and do not include the quotes. While updating the registry manually,
ensure that quotes are not included for AppID, DllSurrogate, and its values.
Retain the empty lines as shown in the preceding script, including the empty line at the end of the file.
Use the following commands in the Windows command prompt to confirm if the registry keys are created
and have the correct values:
• reg query "HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}" /f
"{76A64158-CB41-11D1-8B02-00600806D9B6}" /e
Figure 17: Local and Remote Accesses for Launch and Activation Permissions
Easy Connect
Easy Connect enables you to easily connect users from a wired endpoint to a network in a secure manner and
monitor those users by authenticating them through an Active Directory Domain Controller and not by Cisco
ISE. With Easy Connect, Cisco ISE collects user authentication information from the Active Directory Domain
Controller. Easy Connect connects to a Windows system (Active Directory) using the MS WMI interface and
queries logs from the Windows event messaging, hence it currently only supports Windows-installed endpoints.
Easy Connect supports wired connections using MAB, which is much easier to configure than 802.1X. Unlike
802.1X, with Easy Connect and MAB:
• You don't need to configure supplicants
• You don't need to configure PKI
• ISE issues a CoA after the external server (AD) authenticates the user
In both cases, users authenticated with Active Directory (AD) are shown in the Cisco ISE live sessions view,
and can be queried from the session directory using Cisco pxGrid interface by third-party applications. The
known information is the user name, IP address, the AD DC host name, and the AD DC NetBios name. For
more information about pxGrid, see Cisco pxGrid Node, on page 194.
Once you have set up Easy Connect, you can then filter certain users, based on their name or IP address. For
example, if you have an administrator from IT services who logs in to an endpoint in order to assist the regular
user with that endpoint, you can filter out the administrator activity so it does not appear in Live Sessions,
but rather only the regular user of that endpoint will appear. To filter passive identity services, see Filter
Passive Identity Services, on page 684.
Easy Connect requires configuration in ISE, while the Active Directory Domain server must also have the
correct patches and configuration based on instructions and guidelines issued by Microsoft. For information
about configuring the Active Directory domain controller for Cisco ISE, see Active Directory Requirements
to Support Easy Connect and Passive Identity services, on page 631
Note MAC address lookup is not done for a MAB request when the Radius service-type is set to call-check. Therefore
the return to the request is access-accept. This is the default configuration.
1. The user connects to the NAD from a wired endpoint (such as a PC for example).
2. The NAD (which is configured for MAB) sends an access request to Cisco ISE. Cisco ISE responds with
access, based on user configuration, allowing the user to access AD. Configuration must allow at least
access to DNS, DHCP, and AD.
3. The user logs in to the domain and a security audit event is sent to Cisco ISE.
4. ISE collects the MAC address from RADIUS and the IP address and domain name, as well as accounting
information (login information) about the user, from the security audit event.
5. After all data is collected and merged in the session directory, Cisco ISE issues a CoA to the NAD (based
on the appropriate policy managed in the policy service node), and the user is provided access by the
NAD to the network based on that policy.
For more information about configuring Enforcement mode, see Configure Easy Connect Enforcement Mode,
on page 641.
For more information about configuring Easy Connect Visibility mode, see Configure Easy Connect Visibility
Mode, on page 642 .
Note Passive Identity Service can be enabled on multiple nodes, but Easy Connect can only operate on one node
at a time. If you enable the service for multiple nodes, ISE will automatically determine which node to use
for the active Easy Connect session.
Step 1 Choose Administration > System > Deployment, open a node, and under General Settings, enable Enable Passive
Identity Service.
Step 2 Configure an Active Directory join point and domain controller to be used by Easy Connect. For more information, see
Active Directory Requirements to Support Easy Connect and Passive Identity services, on page 631.
Step 3 (Optional) Choose Administration > Identity Management > External Identity Sources > Active Directory. Click
the Groups tab, and add the Active Directory groups you plan to use in your authorization policies.
The Active Directory groups that you map for the Domain Controller are dynamically updated in the PassiveID dictionary
and can then be used when you set up your policy conditions rules.
Step 4 Note Passive Identity Tracking must be enabled for all profiles used for Easy Connect authorization in order for the
Easy Connect process to run properly and enable ISE to issue a CoA.
Choose Policy > Policy Elements > Results > Authorization > Authorization Profiles. For any profiles to be used by
Easy Connect, open the profile and enable Passive Identify Tracking.
Step 5 Choose Policy > Policy Elements > Conditions > Authorization > Simple Conditions, to create rules for Easy Connect.
Click Add and define the condition:
a) Enter a name and description.
b) From Attribute, go to the PassiveID dictionary and select either PassiveID_Groups to create a condition for domain
controller groups, or select PassiveID_user to create a condition for individual users.
c) Enter the correct operation.
d) Enter the user name or group name to be included in the policy.
Step 6 Click Submit.
Step 1 Choose Administration > System > Deployment, open a node, and under General Settings, enable Enable Passive
Identity Service.
Step 2 Configure an Active Directory join point and domain controller to be used by Easy Connect. For more information, see
Active Directory Requirements to Support Easy Connect and Passive Identity services, on page 631.
(AD DC), maps the user login information to the relevant IP addresses in use and then shares that mapping
information with any of the subscriber security products that you have configured.
Note For information about the FMC and Stealthwatch releases that are validated with ISE, see Cisco Identity
Services Engine Network Component Compatibility.
The following diagram illustrates the high-level flow offered by Cisco ISE.
Figure 21: High Level Flow
After setting up an initial provider and subscriber, you can easily create additional providers (see Additional
Passive Identity Service Providers, on page 649) and manage your passive identification from the different
providers in the PassiveID work center.
Note The Active Directory agents are only supported on Windows Server 2008 and
higher.
In addition, configure the Active Directory probe in order to use AD user groups when collecting user
information. You can use AD user groups for the AD, Agents, SPAN, and Syslog probes. For more information
about AD groups, see Configure Active Directory User Groups, on page 618.
Step 1 Choose Work Centers > PassiveID. From the Passive Identity Connector Overview screen, click Passive Identity
Wizard.
Step 5 Click Next. Select the DCs to be monitored. If you choose Custom, then from the next screen select the specific DCs for
monitoring. When finished, click Next.
Step 6 Click Exit to complete the wizard.
What to do next
When you finish configuring Active Directory as your initial provider, you can easily configure additional
provider types as well. For more information, see Additional Passive Identity Service Providers, on page 649.
Furthermore, you can now also configure a subscriber, designated to receive the user identity information that
is collected by any of the providers you have defined.
Table 69: Active Directory Join Point Name Settings and Join Domain Window
Active Directory The domain name for the Active Directory Domain to which this node is connected.
Domain
Domain This is the user principal name or the user account name for the Active Directory user
Administrator with administrator priveleges.
Store Credentials It is strongly recommended that you choose Store credentials, in which case your
administrator's user name and password will be saved in order to be used for all Domain
Controllers (DC) that are configured for monitoring.
For the Endpoint probe, you must choose Store credentials.
ISE Node Role Indicates whether the node is the Primary or Secondary node in the installation.
Status Indicates whether the node is actively joined to the Active Directory domain.
Domain Controller For nodes that are joined to Active Directory, this column indicates the specific Domain
Controller to which the node is connected in the Active Directory Domain.
Site When an Active Directory forest is joined with ISE, this field indicates the specific
Active Directory site within the forest as it appears in the Active Directory Sites and
Services area.
Field Description
Domain The fully qualified domain name of the server on which the domain controller is located.
Site When an Active Directory forest is joined with ISE, this field indicates the specific
Active Directory site within the forest as it appears in the Active Directory Sites and
Services area.
Monitor Using Monitor Active Directory domain controllers for user identity information by one of
these methods:
• WMI: Monitor Active Directory directly with the WMI infrastructure.
• Agent name: If you have defined agents to monitor Active Directory for user
information, select the Agent protocol and choose the agent from the dropdown
list that you would like to use. For more information about agents, see Active
Directory Agents, on page 653.
Description Enter a unique description for this domain controller in order to easily identiy it.
User Name The administrator's user name for accessing Active Directory.
Protocol Monitor Active Directory domain controllers for user identity information by one of
these methods:
• WMI: Monitor Active Directory directly with the WMI infrastructure.
• Agent name: If you have defined agents to monitor Active Directory for user
information, select the Agent protocol and choose the agent from the dropdown
list that you would like to use. For more information about agents, see Active
Directory Agents, on page 653.
Active Directory groups are defined and managed from Active Directory and the groups for the Active
Directory that is joined to this node can be viewed from this tab. For more information about Active Directory,
see https://msdn.microsoft.com/en-us/library/bb742437.aspx.
User session aging The amount of time the user can be logged in. The Passive Identity service identifies
time new user login events from the DC, however the DC does not report when the user
logs off. The aging time enables Cisco ISE to determine the time interval for which
the user is logged in.
NTLM Protocol You can select either NTLMv1 or NTLMv2 as the communications protocol between
settings Cisco ISE and the DC. NTLMv2 is the recommended default.
The table below provides details about all of the provider and probe types available from ISE. For more
information about Active Directory, see Active Directory as a Probe and a Provider, on page 645.
You can define these provider types:
Provider Type Description Source System Technology User Identity Document Link
(Probe) (Provider) Information
Collected
Active Directory A highly secure Active Directory WMI • User name Active
(AD) and precise Domain Directory as a
source, as well as Controller • IP address Probe and a
the most • Domain Provider, on
common, from page 645
which to receive
user information.
As a probe, AD
works with WMI
technology to
deliver
authenticated
user identities.
In addition, AD
itself, rather than
the probe,
functions as a
source system (a
provider) from
which other
probes retrieve
user data as well.
Provider Type Description Source System Technology User Identity Document Link
(Probe) (Provider) Information
Collected
Always runs in
the background
in addition to
other configured
probes, in order
to verify whether
the user is still
connected.
API providers Gather user Any system RESTful APIs. • User name API Providers,
identity programmed to User identity sent on page 657
information from communicate to subscribers in • IP address
any system with a REST API JSON format. • Port range
programmed to client.
communicate • Domain
with a RESTful
API client, using
the RESTful API
service offered
by ISE.
Note pxGrid sends 200 events per second for session topics to avoid overloading the clients. If the publisher sends
more than 200 events, the additional events are queued and sent in next batch.
If pxGrid consistently receives more than 200 events per second for a prolonged period of time, it might
consume more memory than usual for storing the backlog events. This might affect the performance of pxGrid.
Note Even if you are running the AD agent on a member server, it still queries the Active Directory for the login
requests.
• Ensure Microsoft .NET Framework is updated for the machine designated for the agents, to a minimum
of version 4.0. For more information about the .NET framework, see https://www.microsoft.com/net/
framework.
• Active Passive ID and pxGrid services. For more information, see Initial Setup and Configuration, on
page 644.
• Create an AD join point and add at least one domain controller. For more information about creating
join points, see Active Directory as a Probe and a Provider, on page 645.
Use AD user groups for the AD, Agents, SPAN and Syslog probes. For more information about AD
groups, see Configure Active Directory User Groups, on page 618.
Step 1 Choose Work Centers > PassiveID > Providers and then choose Agents from the left panel.
Step 2 To add a new agent, click Add from the top of the table.
Step 3 To create the new agent and automatically install it on the host that you indicate in this configuration, select Deploy
New Agent.
Step 4 Complete all mandatory fields in order to configure the client correctly. For more information, see Active Directory
Agent Settings, on page 656.
Step 5 Click Deploy.
The agent is automatically installed on the host according to the domain that you indicated in the configuration, and
the settings are saved. The agent now also appears in the Agents table and can be applied to monitor specified domain
controllers, as described in the following steps.
Step 6 Choose Work Centers > PassiveID > Providers and then choose Active Directory from the left panel to view all
currently configured join points.
Step 7 Click the link for the join point from which you would like to enable the agent you created.
Step 8 Choose the Passive ID tab to configure the domain controllers that you added as part of the prerequisites.
Step 9 Select the domain controller that you would like to monitor with the agent you created and click Edit.
Step 10 From the Protocol drop-down list, select Agent
Step 11 Select the agent you created from the Agent drop-down list. Enter the user name and password credentials of the agent
that you created, and click Save.
The user name and password credentials are used to install the agent on the domain controller. Finally, when you click
on Deploy, the picagent.exe is copied from /opt/pbis/bin to the specified Windows machine.
• Configure reverse lookup for the relevant DNS servers from the server side. For more information about
the DNS server configuration requirements for ISE, see DNS Server, on page 611
• Ensure Microsoft .NET Framework is updated for the machine designated for the agents, to a minimum
of version 4.0. For more information about the .NET framework, see https://www.microsoft.com/net/
framework.
• Active Passive ID and pxGrid services. For more information, see Initial Setup and Configuration, on
page 644.
• Create an AD join point and add at least one domain controller. For more information about creating
join points, see Active Directory as a Probe and a Provider, on page 645.
Use AD user groups for the AD, Agents, SPAN and Syslog probes. For more information about AD
groups, see Configure Active Directory User Groups, on page 618.
Step 1 Choose Work Centers > PassiveID > Providers and then choose Agents from the left panel.
Step 2 Click Download Agent to download the picagent-installer.zip file for manual installation.
The file is downloaded to your standard Windows Download folder.
Step 3 Place the zip file on the designated host machine and run the installation.
Step 4 From the ISE GUI, again choose Work Centers > PassiveID > Providers and then choose Agents from the left panel.
Step 5 To configure a new agent, click Add from the top of the table.
Step 6 To configure the agent that you have already installed on the host machine, select Register Existing Agent.
Step 7 Complete all mandatory fields in order to configure the client correctly. For more information, see Active Directory
Agent Settings, on page 656.
Step 8 Click Save.
The agent settings are saved. The agent now also appears in the Agents table and can be applied to monitor specified
domain controllers, as described in the following steps.
Step 9 Choose Work Centers > PassiveID > Providers and then choose Active Directory from the left panel to view all
currently configured join points.
Step 10 Click the link for the join point from which you would like to enable the agent you created.
Step 11 Choose the Passive ID tab to configure the domain controllers that you added as part of the prerequisites.
Step 12 Select the domain controller that you would like to monitor with the agent you created and click Edit.
Step 13 From the Protocol drop-down list, select Agent.
Step 14 Select the agent you created from the Agent drop-down list. Enter the user name and password to connect to the agent,
and click Save
The user account must have the necessary permissions to read security events. A user account for a WMI-based agent
must have WMI/DCOM permissions.
Host The fully qualified domain name of the host on which the agent is installed.
Monitoring This is a comma separated list of domain controllers that the specified agent is
monitoring.
Field Description
Deploy New Agent • Deploy New Agent: Install a new agent on the specified host.
or Register
Note The user must have Domain User and Domain Admin privileges to deploy
Existing Agent
an agent on the specified host.
• Register Existing Agent: Manually install the agent on the host and then configure
that agent from this screen for Passive Identity service to enable the service.
Name Enter a name by which you can easily recognize the agent.
Description Enter a description by which you can easily recognize the agent.
Host FQDN This is the fully qualified domain name for the host on which the agent is installed
(register existing agent), or is to be installed (automatic deployment).
User Name Enter your user name in order to access the host on which to install the agent. Passive
Identity service uses these credentials in order to install the agent for you.
The user account must have permissions to connect remotely and install the PIC agent.
Password Enter your user password in order to access the host on which to install the agent.
Passive Identity service uses these credentials in order to install the agent for you.
API Providers
The API Providers feature in Cisco ISE enables you to push user identity information from your customized
program or from the terminal server (TS)-Agent to the built-in ISE passive identity services REST API service.
In this way, you can customize a programmable client from your network to send user identities that were
collected from any network access control (NAC) system to the service. Furthermore, the Cisco ISE API
provider enables you to interface with network applications such as the TS-Agent on a Citrix server, where
all users have the same IP address but are assigned unique ports.
For example, an agent running on a Citrix server that provides identity mappings for users authenticated
against an Active Directory (AD) server can send REST requests to ISE to add or delete a user session whenever
a new user logs in or off. ISE then takes the user identity information, including the IP address and assigned
ports, delivered from the client and sends it to pre-configured subscribers, such as the Cisco Firepower
Management Center (FMC).
The ISE REST API framework implements the REST service over the HTTPS protocol (no client certificate
validation necessary) and the user identity information is delivered in JSON (JavaScript Object Notation)
format. For more information about JSON, see http://www.json.org/ .
The ISE REST API service parses user identities and in addition, maps that information to port ranges, in
order to distinguish between the different users logged in simultaneously to one system. Everytime a port is
allocated to a user, the API sends a message to ISE.
4. See Configure a Bridge to the ISE REST Service for Passive Identity Services, on page 658.
Note To configure the API Provider to work with a TS-Agent add the TS-Agent information when creating a bridge
from ISE to that agent, and then consult with the TS-Agent documentation for information about sending API
calls.
5. Generate an authentication token and send add and remove requests to the API service.
Configure a Bridge to the ISE REST Service for Passive Identity Services
In order to enable the ISE REST API service to receive information from a specific client, you must first
define the specific client from Cisco ISE. You can define multiple REST API clients with different IP addresses.
Step 1 Choose Work Centers > PassiveID > Providers and then choose API Providers from the left panel
The API Providers table is displayed, including status information for each existing client.
Step 2 To add a new client, click Add from the top of the table.
Step 3 Complete all mandatory fields in order to configure the client correctly. For more information, see API Provider Settings,
on page 659.
Step 4 Click Submit.
The client configuration is saved and the screen displays the updated API Providers table. The client can now send posts
to the ISE REST service.
What to do next
Set up your customized client to post authentication tokens and user identities to the ISE REST service. See
Send API Calls to the Passive ID REST Service, on page 658.
Step 1 Enter the Cisco ISE URL in the address bar of your browser (for example, https://<ise hostname or ip address>/admin/)
Step 2 Enter the username and password that you specified and configured from the API Providers window. For more information,
see Configure a Bridge to the ISE REST Service for Passive Identity Services, on page 658.
Step 3 Press Enter.
Step 4 Enter the API call in the URL Address field of the target node.
Step 5 Click Send to issue the API call.
What to do next
See API Calls, on page 659 for more information and details about the different API calls, their schemas and
their results.
Note The full API definition and object schemas can be retrieved with a request call as follows:
• For the full API specifications (wadl)—https://YOUR_ISE:9094/application.wadl
• For the API model and object schemas—https://YOUR_ISE:9094/application.wadl/xsd0.xsd
Field Description
Name Enter a unique name for this client that distinguishes it quickly and easily from other
clients.
Status Select Enabled to enable the client to interact with the REST services immediately
upon completing configuration.
Host/ IP Enter the IP address for the client host machine. Ensure you have properly configured
the DNS server, including configuring reverse lookup for the client machine from ISE.
User name Create a unique user name to be used when posting to the REST service.
Password Create a unique password to be used when posting to the REST service.
API Calls
Use these API calls to manage user identity events for Passive Identity services with Cisco ISE.
The request should contain the BasicAuth authorization header. Provide the API provider's credentials
as previously created from the ISE-PIC GUI. For more information see API Provider Settings, on page
659.
• Response Header
The header includes the X-auth-access-token. This is the token to be used when posting additional REST
requests.
• Response Body
HTTP 204 No Content
SPAN
SPAN is a Passive Identity service that allows you to quickly and easily enable Cisco ISE to listen to the
network and retrieve user information without having to configure Active Directory to work directly with
Cisco ISE. SPAN sniffs network traffic, specifically examining Kerberos messages, extracts user identity
information also stored by Active Directory and sends that information to ISE. ISE then parses the information,
ultimately delivering user name, IP address and domain name to the subscribers that you have also already
configured from ISE.
In order for SPAN to listen to the network and extract Active Directory user information, ISE and Active
Directory must both be connected to the same switch on the network. In this way, SPAN can copy and mirror
all user identity data from Active Directory.
With SPAN, user information is retrieved in the following way:
1. The user endpoint logs in to the network.
2. Log in and user data are stored in Kerberos messages.
3. When the user logs in and the user data passes through the switch, SPAN mirrors the network data.
4. Cisco ISE listens to the network for user information and retrieves the mirrored data from the switch.
5. Cisco ISE parses the user information and updates passive ID mappings.
6. Cisco ISE delivers the parsed user information to the subscribers.
Before you begin, ensure you have activated Passive ID and pxGrid services. Only nodes for which Passive
ID has been turned on will appear in the list of available interfaces for configuring SPAN. For more information,
see Initial Setup and Configuration, on page 644.
In addition, you must:
• Ensure Active Directory is configured on your network.
• Run a CLI on the switch in the network that is also connected to Active Directory in order to ensure the
switch can communicate with ISE.
• Configure the switch to mirror the network from AD.
• Configure a dedicated ISE network interface card (NIC) for SPAN. This NIC is used only for SPAN
traffic.
• Ensure the NIC that you have dedicated to SPAN is activated via the command line interface.
• Create a VACL that sends only Kerberos traffic into the SPAN port.
Step 1 Choose Work Centers > PassiveID > Providers and then choose SPAN from the left panel to configure SPAN.
Step 2 Note We recommend that the GigabitEthernet0 network interface card (NIC) remain available and that you select any
other available NIC for configuring SPAN. GigabitEthernet0 is used for system management purposes.
Enter a meaningful description (optional), select status Enabled, and choose the nodes and the relevant NICs that will
be used to listen to the network switch. For more information, see SPAN Settings, on page 662.
Step 3 Click Save.
The SPAN configuration is saved and ISE-PIC ISE is now actively listening to network traffic.
SPAN Settings
From each node that you have deployed, quickly and easily configure ISE to receive user identities by installing
SPAN on a client network.
Field Description
Description Enter a unique description to remind you of which nodes and interfaces are currently
enabled.
Status Select Enabled to enable the client immediately upon completing configuration.
Interface NIC Select one or more of the nodes installed for ISE, and then for each selected node,
choose the node interface that is to listen to the network for information.
Note We recommend that the GigabitEthernet0 NIC remain available and that you
select any other available NIC for configuring SPAN. GigabitEthernet0 is
used for system management purposes.
Syslog Providers
Passive Identity service parses syslog messages from any client (identity data provider) that delivers syslog
messages, including regular syslog messages (from providers such as InfoBlox, Blue Coat, BlueCat, and
Lucent) as well as DHCP syslog messages, and sends back user identity information, including MAC addresses.
This mapped user identity data is then delivered to subscribers.
You can specify the syslog clients from which to receive the user identity data (see Configure Syslog Clients,
on page 663). While configuring the provider, you must specify the connection method (TCP or UDP) and the
syslog template to be used for parsing.
Note When TCP is the configured connection type, if there is a problem with the message header and the host name
cannot be parsed, ISE attempts to match the IP address received in the packet to the IP address of any of the
providers in the list of providers that have already been configured for Syslog messages in ISE. To view this
list, choose Work Centers > PassiveID > Providers > Syslog Providers. We recommend that you check
the message headers and customize if necessary to guarantee parsing succeeds. For more information about
customizing headers, see Customize Syslog Headers, on page 668.
The syslog probe sends syslog messages that are received to the ISE parser, which maps the user identity
information, and publishes that information to ISE. ISE then delivers the parsed and mapped user identity
information to the Passive Identity service subscribers.
To parse syslog messages for user identity from ISE-PIC ISE:
• Configure syslog clients from which to receive user identity data. See Configure Syslog Clients, on page
663.
• Customize a single message header. See Customize Syslog Headers, on page 668.
• Customize message bodies by creating templates. See Customize the Syslog Message Body, on page
668.
• Use the message templates pre-defined in ISE when configuring your syslog client as the message template
used for parsing, or base your customized header or body templates on these pre-defined templates. See
Work with Syslog Predefined Message Templates, on page 672.
Step 1 Choose Work Centers > PassiveID > Providers and then choose Syslog Providers from the left panel.
The Syslog Providers table is displayed, including status information for each existing client.
Step 2 To configure a new syslog client, click Add from the top of the table.
Step 3 Complete all mandatory fields (see Syslog Settings, on page 664 for more details) and create a message template if
necessary (see Customize the Syslog Message Body, on page 668 for more details) to configure the client correctly.
Step 4 Click Submit.
Syslog Settings
Configure Cisco ISE to receive user identities, including MAC addresses, by way of syslog messages from
a specific client. You can define multiple providers with different IP addresses.
Status Select Enabled to enable the client immediately upon completing configuration.
Connection Type Enter UDP or TCP to indicate the channel by which ISE listens for syslog messages.
Note When TCP is the configured connection type, if there is a problem with the
message header and the host name cannot be parsed, then Cisco ISE attempts
to match the IP address received in the packet to the IP address of any of the
providers in the list of providers that have already been configured for Syslog
messages in Cisco ISE.
To view this list, choose Work Centers > PassiveID > Providers > Syslog
Providers. We recommend that you check the message headers and customize
if necessary to ensure that parsing succeeds. For more information about
customizing headers, see Customize Syslog Headers, on page 668.
Note DHCP syslog messages do not contain user names. Therefore, these messages
are delivered from the parser with a delay so that Cisco ISE can first check
users registered in the local session directory (displayed from Live Sessionss)
and attempt to match those users by their IP addresses to the IP addresses
listed in the DHCP syslog messages received, in order to correctly parse and
deliver user identity information.
If the data received from a DHCP syslog message cannot be matched to any
of the currently logged in users, then the message is not parsed and user identity
is not delivered.
For information about templates, see Work with Syslog Predefined Message Templates,
on page 672.
Default Domain If the domain is not identified in the syslog message for the specific user, this default
domain is automatically assigned to the user in order to ensure that all users are assigned
a domain.
With the default domain or with the domain that was parsed from the message, the
user name is appended to username@domain, thereby including that domain, in order
to get more information about the user and user groups.
Note DHCP syslog messages do not contain user names. Therefore, these messages are delivered from the parser
with a delay so that Cisco ISE can first check users registered in the local session directory (displayed from
Live Sessionss) and attempt to match those users by their IP addresses to the IP addresses listed in the DHCP
syslog messages received, in order to correctly parse and deliver user identity information. If the data received
from a DHCP syslog message cannot be matched to any of the currently logged in users, then the message is
not parsed and user identity is not delivered.
The delay necessary to properly match, parse and map details from DHCP messages cannot be applied to
customized templates, and therefore it is not recommended that DHCP message templates be customized.
Instead, use any of the pre-defined DHCP templates.
Note DHCP syslog messages do not contain user names. Therefore, these messages are delivered from the parser
with a delay so that Cisco ISE can first check users registered in the local session directory (displayed from
Live Sessionss) and attempt to match those users by their IP addresses to the IP addresses listed in the DHCP
syslog messages received, to correctly parse and deliver user identity information. If the data received from
a DHCP syslog message cannot be matched to any of the currently logged in users, then the message is not
parsed and user identity is not delivered.
The delay necessary to properly match, parse and map details from DHCP messages cannot be applied to
customized templates, and therefore it is not recommended that DHCP message templates be customized.
Instead, use any of the pre-defined DHCP templates.
Create and edit syslog message body templates from within the syslog client configuration screen.
Note You can only edit your own customized templates. Pre-defined templates offered by the system cannot be
changed.
Step 1 Choose Work Centers > PassiveID > Providers and then choose Syslog Providers from the left panel.
The Syslog Providers table is displayed, including status information for each existing client.
Step 2 Click Add to add a new syslog client or Edit to update an already configured client. For more information about configuring
and updating syslog clients, see Configure Syslog Clients, on page 663.
Step 3 In the Syslog Providers window, click New to create a new message template. To edit an existing template, select the
template from the dropdown list and click Edit.
Step 4 Complete all mandatory fields.
For information about how to enter the values correctly, see Syslog Customized Template Settings and Examples, on
page 670.
Step 5 Click Test to ensure the message is correctly parsed based on the strings you have entered.
Step 6 Click Save.
Note You can only customize a single header. After you customize a header, when you click Custom Header and
create a template, only the newest configuration is saved.
Step 1 Choose Work Centers > PassiveID > Providers and then choose Syslog Providers from the left panel.
The Syslog Providers table is displayed, including status information for each existing client.
Step 2 Click Custom Header to open the Syslog Custom Header screen.
Step 3 In the Paste sample syslog field, enter an example of the header format in your syslog messages. For example, copy
and paste this header from one of your messages: <181>Oct 10 15:14:08 Cisco.com.
Step 4 In the Separator field, indicate whether words are separated by spaces or tabs.
Step 5 In the Position of hostname in header field, indicate which place in the header is the host name. For example, in the
header offered above, the host name is the fourth word in the header. Enter 4 to indicate this.
The Hostname field displays the host name based on the details indicated in the first three fields. For example, if the
header example in Paste sample syslog is as follows:
<181>Oct 10 15:14:08 Cisco.com
The separator is indicated as Space and the Position of hostname in header is entered as 4.
The Hostname will automatically appear as Cisco.com, which is the fourth word in the header phrase pasted in the Paste
sample syslog field.
If the host name is incorrectly displayed, check the data you have entered in the Separator and Position of hostname
in header fields.
This example is as in the following screen capture:
Figure 23: Customize Syslog Headers
The customized header configuration is saved and added to the header types that are used by the parser whenever messages
are received.
Note Most of the pre-defined templates use regular expressions. Customized templates should also use regular
expressions.
Field Description
Paste sample syslog Enter an example of the header format in your syslog messages. For example, copy
and paste this header:
<181>Oct 10 15:14:08 Hostname Message
Position of Indicate which place in the header is the host name. For example, in the header offered
hostname in header above, the host name is the fourth word in the header. Enter 4 to indicate this.
Hostname Displays the hostname based on the details indicated in the first three fields. For
example, if the header example in Paste sample syslog is as follows:
<181>Oct 10 15:14:08 Hostname Message
The separator is indicated as Space and the Position of hostname in header is entered
as 4.
The Hostname will automatically appear as Hostname.
If the host name is incorrectly displayed, check the data you have entered in the
Separator and Position of hostname in header fields.
Mapping Operations New Mapping A regular expression that describes the kind of
mapping used with this template to add a new user.
For example, enter "logged on from" in this field to
indicate a new user that has logged on to the F5
VPN.
Note Most of the predefined templates use regular expressions, and customized templates should also use regular
expressions.
Message Headers
There are two header types recognized by the parser, for all message types (new and remove), for all client
machines. These headers are as follows:
• <171>Host message
• <171>Oct 10 15:14:08 Host message
Once received, the header is parsed for host name, which can be IP address, hostname, or full FQDN.
Headers can also be customized. To customize your headers, see Customize Syslog Headers, on page 668.
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
%ASA-6-109005 [UserA,10.0.0.11]
Authentication
succeeded for user
UserA from
10.0.0.11/100 to
10.10.11.11/20 on
interface eth1/1
%ASA-6-602303
IPSEC: An direction
tunnel_type SA
(SPI=spi) between
local_IP and
10.0.0.11 (UserA)
has been created.
%ASA-6-721016
(device) WebVPN
session for client
user UserA, IP
10.0.0.11 has been
created.
%ASA-6-603104
PPTP Tunnel
created, tunnel_id is
number,
remote_peer_ip is
remote_address,
ppp_virtual_interface_id
is number,\
client_dynamic_ip
is 10.0.0.11,ffg123
#% UserA is UserA,
MPPE_key_strength
is string
%ASA-6-603106
L2TP Tunnel
created, tunnel_id is
number,
remote_peer_ip is
remote_address,
ppp_virtual_interface_id
is number,\
client_dynamic_ip
is 10.0.0.11, UserA
is user
%ASA-6-802001
User UserA IP
10.100.1.1 OS
os_name UDID
number MDM
action session
started.
%ASA-6-713228: [UserA,172.16.0.11]
Group = xyz, UserA
Note The parsed IP address from this message type is the private IP address, as
= xxxx227, IP =
indicated in the message.
192.168.0.11,
Assigned private IP
address 172.16.0.11
to remote user
%ASA-4-722051: [UserA,172.16.0.12]
Group
Note The parsed IP address from this message type is the IPv4 address.
<DfltGrpPolicy>
User <UserA> IP
<172.16.0.12> IPv4
Address
<172.16.0.21> IPv6
address <::>
assigned to session
Body Message
%ASA-4-113019 Group = group, UserA = UserA, IP = 10.1.1.1, Session disconnected. Session Type: type,
Duration:\ duration, Bytes xmt: count,Bytes rcv: count, Reason: reason
%ASA-4-717052 Group group name User UserA IP 10.1.1.1 Session disconnected due to periodic certificate
authentication failure. Subject Name id subject name Issuer Name id issuer name\ Serial Number id serial
number
%ASA-6-602304 IPSEC: An direction tunnel_type SA (SPI=spi) between local_IP and 10.1.1.1 (UserA)
has been deleted.
Body Message
%ASA-6-721018 WebVPN session for client user UserA, IP 10.1.1.1 has been deleted.
%ASA-4-722049 Group group User UserA IP 10.1.1.1 Session terminated: SVC not enabled or invalid
image on the ASA
%ASA-4-722050 Group group User UserA IP 10.1.1.1 Session terminated: SVC not enabled for the user.
%ASA-6-802002 User UserA IP 10.1.1.1 OS os_name UDID number MDM action session terminated.
%ASA-3-716057 Group group User UserA IP 10.1.1.1 Session terminated, no type license available.
%ASA-3-722046 Group group User UserA IP 10.1.1.1 Session terminated: unable to establish tunnel.
%ASA-4-113035 Group group User UserA IP 10.1.1.1 Session terminated: AnyConnect not enabled or
invalid AnyConnect image on the ASA.
%ASA-6-721018 WebVPN session for client user UserA, IP 10.1.1.1 has been deleted.
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body
Nov 7 23:37:32 xx-campus1 dhcpd: DHCPACK on 172.16.0.13 to nn:xx:nn:ca:xx:nn via 172.16.0.17
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body
Apr 10 09:33:58 Oct 2 08:28:32 abc.xyz.org security[nnnnn]: [UserA@vendor-abcr] User UserA logged
on from 172.16.0.21 to \ 172.16.0.12 Sid = xyz\
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body Message
Nov 15 11:37:26 user1-lnx dhcpd[3179]: DHCPACK on 10.0.0.14 to nn:xx:xx:nx:nn:nn
(android-df67ddcbb1271593) via eth2 relay 10.0.0.24 lease-duration 3600
Body Message
07-11-2016 23:37:32 Daemon.Info 10.0.10.2 Jul 12 10:42:26 10.0.10.2 dhcpd[26083]: DHCPEXPIRE
10.0.10.100 has expired
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body Message
Nov 11 23:37:32 dhcpsrv dhcpd: DHCPACK on 10.0.10.100 to 00:0c:29:a2:18:34 (win10) via eth1
Body Message
Nov 11 23:37:32 dhcpsrv dhcpd: DHCPEXPIRE 10.0.10.100 has expired
Nov 11 23:37:32 dhcpsrv dhcpd: DHCPRELEASE of 10.0.10.100 from 00:0c:29:a2:18:34 (win10) via eth1
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body Message
Nov 11 23:37:32
10,07/21/16,16:55:22,Assign,10.0.10.123,win10.IDCSPAN.Local,000C29912E5D,,724476048,0,,,,0x4D53465420352E30,MSFT,5.0
Body Message
Nov 11 23:37:32
12,07/21/16,16:55:18,Release,10.0.10.123,win10.IDCSPAN.Local,000C29912E5D,,3128563632,\ 0,,,,,,,,,0
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
Body Message
Apr 10 09:33:58 nac Safe*Connect:
authenticationResult|xxx.xx.xxx.xxx|xxx.xx.xxx.xxx|UserA|true|Resnet-Macs|TCNJ-Chain|001b63b79018|MAC
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
• IP—ip ([A-F0-9a-f:.]+)
Body Message
2013-04-01 14:06:05 info ah auth: Station 1cab:a7e6:cf7f ip 10.5.50.52 UserA UserA
Syslog Blue Coat Pre-Defined Templates—Main Proxy, Proxy SG, Squid Web Proxy
The system supports the following message types for Blue Coat:
• BlueCoat Main Proxy
• BlueCoat Proxy SG
• BlueCoat Squid Web Proxy
The supported syslog message format and types for Bluecoat messages are as described below.
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
The following table describes the different regular expression structures used per client for new mapping
messages.
The following table describes the different known regular expression structure examples used per client for
remove mapping messages.
The supported syslog message format and types for ISE and ACS are as described below.
Headers
Headers supported by the parser are identical for all clients, as described in Work with Syslog Predefined
Message Templates, on page 672.
DHCP_GrantLease|:DHCP_RenewLease
Once received, the body is parsed for user details as follows:
[00:0C:29:91:2E:5D,10.0.0.11]
Body Message
DHCP:subtype=0:Single:$IGNORE_N$ DHCP_GrantLease: Host=$HOSTNAME$ P=10.0.0.11 MAC=
00:0C:29:91:2E:5D
Body Message
DHCP:subtype=0:Single:$IGNORE_N$ Delete Lease: IP=10.0.0.11 $IGNORE_N$
Step 1 Choose Work Centers > PassiveID > Providers and then from the left panel choose Mapping Filters.
Step 2 Choose Providers > Mapping Filters.
Step 3 Click Add, enter the Username and or IP address of the user you want to filter and click Submit.
Step 4 To view the non-filtered users that are currently logged into the Monitoring session directory, choose Operations >
RADIUS Livelog.
Endpoint Probe
In addition to the customized providers that you can configure the Endpoint probe is enabled in ISE when the
Passive Identity service is activated and always runs in the background. The Endpoint probe periodically
checks whether each specific user is still logged in to the system.
Note In order to ensure Endpoint runs in the background, you must first configure an initial Active Directory join
point and ensure you choose to Store Credentials. For more information about configuring the Endpoint
probe, see Work with the Endpoint Probe, on page 686.
To manually check for endpoint status go to Live Sessions , from the Actions column, click Show Actions
and choose Check current user, as in the following figure.
Figure 24: Check Current User
For more information about endpoint user status, and manually running the check, see RADIUS Live Sessions,
on page 415.
When the Endpoint probe recognizes that a user has connected, if 4 hours have passed since the last time the
session was updated for the specific endpoint, it checks whether that user is still logged in and collects the
following data:
• MAC address
• Operating system version
Note In order to ensure Endpoint runs in the background, you must first configure an
initial Active Directory join point, which enables the Endpoint probe to run even
when the Active Directory probe is not fully configured.
Step 1 Choose Work Centers > Passive ID > Providers and then choose Endpoint Probes.
Step 2 Click Add to create a new Endpoint probe.
Step 3 Complete the mandatory fields, ensuring you select Enable from the Status field, and click Submit. See Endpoint Probe
Settings, on page 686 for more information.
Description Enter a unique description that explains the use for this probe.
Host Name Choose a PSN for this probe from the list of available PSNs in your deployment.
Subnets Enter the subnet range for the group of endpoints that should be checked by this probe.
Use standard subnet mask ranges and separate subnet addresses with commas.
For example: 10.56.14.111/32,2.55.2.0/16,2.2.3.0/16,1.2.3.4/32
Each range must be unique and separate from all other ranges. For example, you cannot
enter the following ranges for the same probe because they overlap with each other:
2.2.2.0/16,2.2.3.0/16
Subscribers
The Passive Identity services use Cisco pxGrid services to deliver authenticated user identities that are collected
from various providers and stored by the Cisco ISE session directory, to other network systems such as Cisco
Stealthwatch or Cisco Firepower Management Center (FMC).
In the following figure, the pxGrid node collects user identities from external providers. Those identities are
parsed, mapped and formatted. pxGrid takes those formatted user identities and sends them to Passive Identity
service subscribers.
Figure 25: Passive Identity Service Flow
Subscribers connected to Cisco ISE must register to use the pxGrid services. Subscribers should adopt the
pxGrid Client Library available from Cisco through the pxGrid SDK to become the clients. A subscriber can
log in to pxGrid using a unique name and certificate-based mutual authentication. Once they have sent a valid
certificate, Cisco pxGrid subscribers are automatically approved by ISE.
Subscribers can connect to either a configured pxGrid server hostname or an IP Address. We recommend that
you use hostname to avoid unnecessary errors, particularly to ensure the DNS queries work properly.
Capabilities are information topics or channels that are created on pxGrid for subscribers to publish and
subscribe. In Cisco ISE, only SessionDirectory and IdentityGroup are supported. You can view capability
information that is available from the publisher through publish, directed query, or bulk download query, by
navigating to Subscribers in the Capabilities tab.
To enable subscribers to receive information from ISE, you must:
1. Optionally, generate a certificate from the subscriber's side.
2. Generate pxGrid Certificates for Subscribers, on page 688 from the PassiveID work center.
3. Enable Subscribers, on page 689. Either perform this step, or automatically enable approvals, in order to
allow subscribers to receive user identities from ISE. See Configure Subscriber Settings, on page 689.
Step 1 ChooseWork Centers > PassiveID > Subscribers and go to the Certificates tab.
Step 2 Select one of the following options from the I want to drop-down list:
• Generate a single certificate without a certificate signing request: You must enter the Common Name (CN) if
you select this option. In the Common Name field, enter the pxGrid FQDN which includes pxGrid as the prefix. For
example, www.pxgrid-ise.ise.net. Or, alternatively, use wildcards. For example, *.ise.net
• Generate a single certificate with a certificate signing request: You must enter the Certificate Signing Request
details if you select this option.
• Generate bulk certificates: You can upload a CSV file that contains the required details.
• Download Root Certificate Chain: Download the ISE public root certificates in order to add them to the pxGrid
client's trusted certificate store. The ISE pxGrid node only trusts the newly signed pxGrid client certificate and
vice-versa, eliminating the need for outside certificate authorities.
Note This field is not displayed if you have selected the Generate Bulk Certificate option.
Step 6 Select one of the following options from the Certificate Download Format drop-down list:
• Certificate in Private Enhanced Electronic Mail (PEM) format, key in PKCS8 PEM format (including
certificate chain): The root certificate, the intermediate CA certificates, and the end entity certificate are represented
in the PEM format. PEM formatted certificate are BASE64-encoded ASCII files. Each certificate starts with the
"--------BEGIN CERTIFICATE-----" tag and ends with the "-------END CERTIFICATE----" tag. The end entity’s
private key is stored using PKCS* PEM. It starts with the "-----BEGIN ENCRYPTED PRIVATE KEY----" tag and
ends with the "-----END ENCRYPTED PRIVATE KEY----" tag.
• PKCS12 format (including certificate chain; one file for both the certificate chain and key): A binary format
to store the root CA certificate, the intermediate CA certificate, and the end entity 's certificate and private key in
one encrypted file.
Enable Subscribers
You must perform this task, or alternatively automatically enable approvals, in order to allow subscribers to
receive user identities from Cisco ISE. See Configure Subscriber Settings, on page 689.
Step 1 Choose Work Centers > PassiveID > Subscribers and ensure you are viewing the Clients tab.
Step 2 Check the checkbox next to the subscriber and click Approve.
Step 3 Click Refresh to view the latest status.
• Allow Password Based Account Creation: Check this checkbox to enable username/password based authentication
for pxGrid clients. If this option is enabled, the pxGrid clients cannot be automatically approved.
A pxGrid client can register itself with the pxGrid controller by sending the username via REST API. The pxGrid
controller generates a password for the pxGrid client during client registration. The administrator can approve or
deny the connection request.
LDAP
Lightweight Directory Access Protocol (LDAP) is a networking protocol defined by RFC 2251 for querying
and modifying directory services that run on TCP/IP. LDAP is a lightweight mechanism for accessing an
X.500-based directory server.
Cisco ISE integrates with an LDAP external database, which is also called an identity source, by using the
LDAP protocol.
LDAP Failover
Cisco ISE supports failover between a primary LDAP server and a secondary LDAP server. A failover occurs
when an authentication request fails because Cisco ISE could not connect to an LDAP server because it is
down or is otherwise unreachable.
If you establish failover settings and the first LDAP server that Cisco ISE attempts to contact cannot be
reached, Cisco ISE always attempts to contact a second LDAP server. If you want Cisco ISE to use the first
LDAP server again, you must enter a value in the Failback Retry Delay text box.
Note Cisco ISE always uses the primary LDAP server to obtain groups and attributes for use in authorization
policies from the Admin portal, so the primary LDAP server must be accessible when you configure these
items. Cisco ISE uses the secondary LDAP server only for authentications and authorizations at run time,
according to the failover configuration.
To authenticate a user, Cisco ISE sends a bind request to the LDAP server. The bind request contains the DN
and password of the user in clear text. If the DN and password of the user match the username and password
in the LDAP directory, then the user is authenticated.
When Active Directory is used as LDAP, UPN names are used for user authentication. When Sun ONE
Directory Server is used as LDAP, SAM names are used for user authentication
Note • Cisco ISE sends two searchRequest messages for every user authentication. This does not impact Cisco
ISE authorization or network performance. The second LDAP request is to make sure the Ciso ISE is
talking to the right identity.
• Cisco ISE as a DNS client, uses only the first IP returned in the DNS response to perform the LDAP
bind.
We recommend that you protect the connection to the LDAP server using Secure Sockets Layer (SSL).
Note Password change is supported for LDAP only if there are remaining grace logins for the account after the
password has expired. If password change is successful, the LDAP server's bindResponse is LDAP_SUCCESS,
and includes the remaining grace logins control field in the bindResponse message. If the bindResponse
message contains any additional control fields (other than remaining grace logins), Cisco ISE might not be
able to decode the message.
• Users or computers must be direct members of the group defined in the policy conditions to match the
policy rule.
• The defined group may not be a user’s or computer’s primary group. This restriction is applicable only
when Active Directory is configured as an LDAP store.
• Subjects Refer to Groups: The subject objects contain an attribute that specifies the group to which they
belong.
LDAP identity sources contain the following parameters for group membership information retrieval:
• Reference direction: This parameter specifies the method to use when determining group membership
(either groups to subjects or subjects to groups).
• Group map attribute: This parameter indicates the attribute that contains group membership information.
• Group object class: This parameter determines that certain objects are recognized as groups.
• Group search subtree: This parameter indicates the search base for group searches.
• Member type option: This parameter specifies how members are stored in the group member attribute
(either as DNs or plain usernames).
For unsigned integers and IPv4 attributes, Cisco ISE converts the strings that it has retrieved to the
corresponding data types. If conversion fails or if no values are retrieved for the attributes, Cisco ISE logs a
debug message, but the authentication or lookup process does not fail.
You can optionally configure default values for the attributes that Cisco ISE can use when the conversion
fails or when Cisco ISE does not retrieve any values for the attributes.
The following errors are logged as external resource errors, indicating a possible problem with the LDAP
server:
• A connection error occurred
• The timeout expired
• The server is down
• The server is out of memory
The following error is logged as an Invalid Password error, where the user exists, but the password sent is
invalid:
• An invalid password was entered
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > LDAP > Add.
Step 2 Enter the values.
Step 3 Click Submit to create an LDAP instance.
Name Enter a name for the LDAP instance. This value is used in searches to obtain the subject
DN and attributes. The value is of type string and the maximum length is 64 characters.
Description Enter a description for the LDAP instance. This value is of type string, and has a
maximum length of 1024 characters.
Schema You can choose any one of the following built-in schema types or create a custom
schema:
• Active Directory
• Sun Directory Server
• Novell eDirectory
You can click the arrow next to Schema to view the schema details.
If you edit the attributes of the predefined schema, Cisco ISE automatically creates
a Custom schema.
Note The following fields can be edited only when you choose the Custom schema.
Subject Objectclass Enter a value to be used in searches to obtain the subject DN and attributes. The value
is of type string and the maximum length is 256 characters.
Subject Name Enter the name of the attribute containing the username in the request. The value is of
Attribute type string and the maximum length is 256 characters.
Note The subject name attributes that are configured should be an indexed one in
the external ID store.
Group Name • CN: To retrieve the LDAP Identity Store Groups based on Common Name.
Attribute
• DN: To retrieve the LDAP Identity Store Groups based on Distinguished Name.
Certificate Enter the attribute that contains the certificate definitions. For certificate-based
Attribute authentication, these definitions are used to validate certificates that are presented by
clients.
Group Objectclass Enter a value to be used in searches to specify the objects that are recognized as groups.
The value is of type string and the maximum length is 256 characters.
Group Map Specifies the attribute that contains the mapping information. This attribute can be a
Attribute user or group attribute based on the reference direction that is chosen.
Subject Objects Click this option if the subject objects contain an attribute that specifies the group to
Contain Reference which they belong.
To Groups
Group Objects Click this option if the group objects contain an attribute that specifies the subject.
Contain Reference This value is the default value.
To Subjects
Subjects in Groups (Only available when you enable the Group Objects Contain Reference To Subjects
Are Stored in option) Specifies how members are sourced in the group member attribute and defaults
Member Attribute to the DN.
As
User Info By default, predefined attributes are used to collect user information (such as, first
Attributes name, last name, email, telephone, locality, and so on) for the following built-in schema
types:
• Active Directory
• Sun Directory Server
• Novell eDirectory
If you edit the attributes of the predefined schema, Cisco ISE automatically creates a
Custom schema.
You can also select the Custom option from the Schema drop-down list to edit the user
information attributes based on your requirements.
Note The subject name attributes that are configured should be an indexed one in the external ID store.
Enable Secondary Check this option to enable the secondary LDAP server to be used as a backup if the
Server primary LDAP server fails. If you check this check box, you must enter configuration
parameters for the secondary LDAP server.
Hostname/IP Enter the IP address or DNS name of the machine that is running the LDAP software.
The hostname can contain from 1 to 256 characters or a valid IP address expressed as
a string. The only valid characters for hostnames are alphanumeric characters (a to z,
A to Z, 0 to 9), the dot (.), and the hyphen (-).
Port Enter the TCP/IP port number on which the LDAP server is listening. Valid values
are from 1 to 65,535. The default is 389, as stated in the LDAP specification. If you
do not know the port number, you can find this information from the LDAP server
administrator.
Specify server for Check this check box to configure primary and secondary LDAP server hostnames/IP
each ISE node and their ports for each PSN.
When this option is enabled, a table listing all the nodes in the deployment is displayed.
You need to select the node and configure the primary and secondary LDAP server
hostname/IP and their ports for the selected node.
Access Anonymous Access: Click to ensure that searches on the LDAP directory occur
anonymously. The server does not distinguish who the client is and will allow the
client read access to any data that is configured as accessible to any unauthenticated
client. In the absence of a specific policy permitting authentication information to be
sent to a server, a client should use an anonymous connection.
Authenticated Access: Click to ensure that searches on the LDAP directory occur
with administrative credentials. If so, enter information for the Admin DN and Password
fields.
Admin DN Enter the DN of the administrator. The Admin DN is the LDAP account that has
permission to search all required users under the User Directory Subtree and to search
groups. If the administrator specified does not have permission to see the group name
attribute in searches, group mapping fails for users who are authenticated by that LDAP
server.
Secure Click to use SSL to encrypt communication between Cisco ISE and the primary LDAP
Authentication server. Verify that the Port field contains the port number used for SSL on the LDAP
server. If you enable this option, you must choose a root CA.
LDAP Server Root Choose a trusted root certificate authority from the drop-down list to enable secure
CA authentication with a certificate.
Server Timeout Enter the number of seconds that Cisco ISE waits for a response from the primary
LDAP server before determining that the connection or authentication with that server
has failed. Valid values are 1 to 99. The default is 10.
Max. Admin Enter the maximum number of concurrent connections (greater than 0) with LDAP
Connections administrator account permissions that can run for a specific LDAP configuration.
These connections are used to search the directory for users and groups under the User
Directory Subtree and the Group Directory Subtree. Valid values are 1 to 99. The
default is 20.
Force reconnect Check this check box and enter the desired value in the Seconds field to force the
every N seconds server to renew LDAP connection at the specified time interval. The valid range is
from 1 to 60 minutes.
Test Bind to Server Click to test and ensure that the LDAP server details and credentials can successfully
bind. If the test fails, edit your LDAP server details and retest.
Failover
Always Access Click this option if you want Cisco ISE to always access the primary LDAP server
Primary Server first for authentications and authorizations.
First
Failback to If the primary LDAP server that Cisco ISE attempts to contact cannot be reached,
Primary Server Cisco ISE attempts to contact the secondary LDAP server. If you want Cisco ISE to
After use the primary LDAP server again, click this option and enter a value in the text box.
Subject Search Enter the DN for the subtree that contains all subjects. For example:
Base
o=corporation.com
If the tree containing subjects is the base DN, enter:
o=corporation.com
or
dc=corporation,dc=com
as applicable to your LDAP configuration. For more information, refer to your LDAP
database documentation.
Group Search Base Enter the DN for the subtree that contains all groups. For example:
ou=organizational unit, ou=next organizational unit, o=corporation.com
If the tree containing groups is the base DN, type:
o=corporation.com
or
dc=corporation,dc=com
as applicable to your LDAP configuration. For more information, refer to your LDAP
database documentation.
Search for MAC Enter a MAC Address format for Cisco ISE to use for search in the LDAP database.
Address in Format MAC addresses in internal identity sources are sourced in the format xx-xx-xx-xx-xx-xx.
MAC addresses in LDAP databases can be sourced in different formats. However,
when Cisco ISE receives a host lookup request, Cisco ISE converts the MAC address
from the internal format to the format that is specified in this field.
Use the drop-down list to enable searching for MAC addresses in a specific format,
where <format> can be any one of the following:
• xxxx.xxxx.xxxx
• xxxxxxxxxxxx
• xx-xx-xx-xx-xx-xx
• xx:xx:xx:xx:xx:xx
The format you choose must match the format of the MAC address sourced in the
LDAP server.
Strip Start of Enter the appropriate text to remove domain prefixes from usernames.
Subject Name Up
If Cisco ISE finds the delimiter character that is specified in this field in the username,
To the Last
it strips all characters from the beginning of the username through the delimiter
Occurrence of the
character. If the username contains more than one of the characters that are specified
Separator
in the <start_string> box, Cisco ISE strips characters through the last occurrence of
the delimiter character. For example, if the delimiter character is the backslash (\) and
the username is DOMAIN\user1, Cisco ISE submits user1 to an LDAP server.
Note The <start_string> cannot contain the following special characters: the pound
sign (#), the question mark (?), the quotation mark (“), the asterisk (*), the
right angle bracket (>), and the left angle bracket (<). Cisco ISE does not allow
these characters in usernames.
Strip End of Enter the appropriate text to remove domain suffixes from usernames.
Subject Name from
If Cisco ISE finds the delimiter character that is specified in this field in the username,
the First
it strips all characters from the delimiter character through the end of the username. If
Occurrence of the
the username contains more than one of the characters that are specified in this field,
Separator
Cisco ISE strips characters starting with the first occurrence of the delimiter character.
For example, if the delimiter character is @ and the username is user1@domain, then
Cisco ISE submits user1 to the LDAP server.
Note The <end_string> box cannot contain the following special characters: the
pound sign (#), the question mark (?), the quotation mark ("), the asterisk (*),
the right angle bracket (>), and the left angle bracket (<). Cisco ISE does not
allow these characters in usernames.
Add Choose Add > Add Group to add a new group or choose Add > Select Groups From
Directory to select the groups from the LDAP directory.
If you choose to add a group, enter a name for the new group. If you are selecting from
the directory, enter the filter criteria, and click Retrieve Groups. Check the check
boxes next to the groups that you want to select and click OK. The groups that you
have selected will appear in the Groups window.
Add Choose Add > Add Attribute to add a new attribute or choose Add > Select Attributes
From Directory to select attributes from the LDAP server.
If you choose to add an attribute, enter a name for the new attribute. If you are selecting
from the directory, enter the username and click Retrieve Attributes to retrieve the
attributes. Check the check boxes next to the attributes that you want to select, and
then click OK.
Enable Password Check this check box to enable the user to change the password in case of password
Change expiry or password reset while using PAP protocol for device admin and RADIUS
EAP-GTC protocol for network access. User authentication fails for the unsupported
protocols. This option also enables the user to change the password on their next login.
Related Topics
LDAP Directory Service, on page 690
LDAP User Authentication, on page 692
LDAP User Lookup, on page 695
Add LDAP Identity Sources, on page 695
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > LDAP.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > LDAP.
Step 2 Check the check box next to the LDAP instance that you want to edit and click Edit.
Step 3 Click the Connection tab to configure the primary and secondary servers.
Step 4 Enter the values as described in LDAP Identity Source Settings.
Step 5 Click Submit to save the connection parameters.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > LDAP.
Step 2 Check the check box next to the LDAP instance that you want to edit and click Edit.
Step 3 Click the Directory Organization tab.
Step 4 Enter the values as described in LDAP Identity Source Settings.
Step 5 Click Submit to save the configuration.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > LDAP.
Step 2 Check the check box next to the LDAP instance that you want to edit and click Edit.
Step 3 Click the Groups tab.
Step 4 Choose Add > Add Group to add a new group or choose Add > Select Groups From Directory to select the groups
from the LDAP directory.
a) If you choose to add a group, enter a name for the new group.
b) If you are selecting from the directory, enter the filter criteria, and click Retrieve Groups. Your search criteria can
contain the asterisk (*) wildcard character.
Step 5 Check the check boxes next to the groups that you want to select and click OK.
The groups that you have selected will appear in the Groups page.
Note Active Directory built-in groups are not supported when Active Directory is configured as LDAP Identity
Store in Cisco ISE.
Step 1 Choose Administration > Identity Management > External Identity Sources > LDAP.
Step 2 Check the check box next to the LDAP instance that you want to edit and click Edit.
Step 3 Click the Attributes tab.
Step 4 Choose Add > Add Attribute to add a new attribute or choose Add > Select Attributes From Directory to select
attributes from the LDAP server.
a) If you choose to add an attribute, enter a name for the new attribute.
b) If you are selecting from the directory, enter an example user and click Retrieve Attributes to retrieve the user’s
attributes. You can use the asterisk (*) wildcard character.
Cisco ISE allows you to configure the LDAP server with IPv4 or IPv6 address for user authentication when you manually
add the attribute type IP.
Step 5 Check the check boxes next to the attributes that you want to select, then click OK.
Step 6 Click Submit to save the attribute selections.
We recommend that you use TLS v1 with the strongest encryption and ciphers that Cisco ISE supports.
To enable Cisco ISE to communicate securely with the LDAP identity source:
Step 1 Import the full Certificate Authority (CA) chain of the CA that issued the server certificate to the LDAP server in to Cisco
ISE (Administration > System > Certificates > Trusted Certificates).
The full CA chain refers to the root CA and intermediate CA certificates; not the LDAP server certificate.
Step 2 Configure Cisco ISE to use secure authentication when communicating with the LDAP identity source (Administration
> Identity Management > External Identity Sources > LDAP; be sure to check the Secure Authentication check
box in the Connection Settings tab).
Step 3 Select the root CA certificate in the LDAP identity store.
Configuring Cisco ISE to authenticate against an ODBC-compliant database does not affect the configuration
of the database. To manage your database, refer to your database documentation.
Note Cisco ISE does not support encryption with ODBC. Hence, ODBC connections are not secured.
Note If ODBC is used as the lookup source for authorization, ensure that the ODBC database and incoming request
MAB format are same.
The groups that are returned in the output parameters are not used in Cisco ISE. Only the groups that are
retrieved by the Fetch Groups stored procedure are used in Cisco ISE. The account information is included
only in the authentication audit log.
The following table lists the mapping between the result codes returned by the ODBC database stored procedure
and Cisco ISE authentication result codes:
Result code (returned by the Description Cisco ISE authentication result code
stored procedure)
1 CODE_UNKNOWN_USER UnknownUser
2 CODE_INVALID_PASSWORD Failed
3 CODE_UNKNOWN_USER_OR_INVALID_PASSWORD UnknownUser
4 CODE_INTERNAL_ERROR Error
Note Cisco ISE performs the actual authentication or lookup operation based on this mapped authentication result
code.
You can use the stored procedures to fetch groups and attributes from the ODBC database.
Here is a sample procedure that returns recordset for plain text password authentication (for Microsoft SQL
Server):
CREATE PROCEDURE [dbo].[ISEAuthUserPlainReturnsRecordset]
@username varchar(64), @password varchar(255)
AS
BEGIN
IF EXISTS( SELECT username
FROM NetworkUsers
WHERE username = @username
AND password = @password )
SELECT 0,11,'give full access','No Error'
FROM NetworkUsers
WHERE username = @username
ELSE
SELECT 3,0,'odbc','ODBC Authen Error'
END
Here is a sample procedure that returns recordset for plain text password fetching (for Microsoft SQL Server):
CREATE PROCEDURE [dbo].[ISEFetchPasswordReturnsRecordset]
@username varchar(64)
AS
BEGIN
IF EXISTS( SELECT username
FROM NetworkUsers
WHERE username = @username)
SELECT 0,11,'give full access','No Error',password
FROM NetworkUsers
WHERE username = @username
ELSE
SELECT 3,0,'odbc','ODBC Authen Error'
END
Here is a sample procedure that returns recordset for Lookup (for Microsoft SQL Server):
CREATE PROCEDURE [dbo].[ISEUserLookupReturnsRecordset]
@username varchar(64)
AS
BEGIN
IF EXISTS( SELECT username
FROM NetworkUsers
WHERE username = @username)
SELECT 0,11,'give full access','No Error'
FROM NetworkUsers
WHERE username = @username
ELSE
SELECT 3,0,'odbc','ODBC Authen Error'
END
Here is a sample procedure that returns parameters for plain text password authentication (for Microsoft SQL
Server):
CREATE PROCEDURE [dbo].[ISEAuthUserPlainReturnsParameters]
@username varchar(64), @password varchar(255), @result INT OUTPUT, @group varchar(255)
OUTPUT, @acctInfo varchar(255) OUTPUT, @errorString varchar(255) OUTPUT
AS
BEGIN
IF EXISTS( SELECT username
FROM NetworkUsers
WHERE username = @username
AND password = @password )
SELECT @result=0, @group=11, @acctInfo='give full access', @errorString='No Error'
FROM NetworkUsers
WHERE username = @username
ELSE
SELECT @result=3, @group=0, @acctInfo='odbc', @errorString='ODBC Authen Error'
END
Here is a sample procedure that returns parameters for plain text password fetching (for Microsoft SQL Server):
CREATE PROCEDURE [dbo].[ISEFetchPasswordReturnsParameters]
@username varchar(64), @result INT OUTPUT, @group varchar(255) OUTPUT, @acctInfo
varchar(255) OUTPUT, @errorString varchar(255) OUTPUT, @password varchar(255) OUTPUT
AS
BEGIN
IF EXISTS( SELECT username
FROM NetworkUsers
WHERE username = @username)
SELECT @result=0, @group=11, @acctInfo='give full access', @errorString='No Error',
@password=password
FROM NetworkUsers
WHERE username = @username
ELSE
SELECT @result=3, @group=0, @acctInfo='odbc', @errorString='ODBC Authen Error'
END
Here is a sample procedure that returns parameters for Lookup (for Microsoft SQL Server):
Here is a sample procedure that fetches groups from Microsoft SQL Server:
CREATE PROCEDURE [dbo].[ISEGroupsH]
@username varchar(64), @result int output
AS
BEGIN
if exists (select * from NetworkUsers where username = @username)
begin
set @result = 0
select 'accountants', 'engineers', 'sales','test_group2'
end
else
set @result = 1
END
Here is a sample procedure that fetches all the groups of all the users if the username is "*" (for Microsoft
SQL Server):
ALTER PROCEDURE [dbo].[ISEGroupsH]
@username varchar(64), @result int output
AS
BEGIN
if @username = '*'
begin
-- if username is equal to '*' then return all existing
groups
set @result = 0
select 'accountants', 'engineers',
'sales','test_group1','test_group2','test_group3','test_group4'
end
else
if exists (select * from NetworkUsers where username = @username)
begin
set @result = 0
select 'accountants'
end
else
set @result = 1
END
Here is a sample procedure that fetches attributes from Microsoft SQL Server:
CREATE PROCEDURE [dbo].[ISEAttrsH]
@username varchar(64), @result int output
AS
BEGIN
if exists (select * from NetworkUsers where username = @username)
begin
set @result = 0
select phone as phone, username as username, department as
department, floor as floor, memberOf as memberOf, isManager as isManager from NetworkUsers
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources.
Step 2 Click ODBC.
Step 3 Click Add.
Step 4 In the General tab, enter a name and description for the ODBC identity source.
Step 5 In the Connection tab, enter the following details:
• Hostname or IP address of the ODBC database. If you are using a nonstandard TCP port for the database, you can
specify the port number in the following format: hostname or IP address:port
• Name of the ODBC database
• Admin username and password (Cisco ISE connects to the database using these credentials)
• Server timeout in seconds (default is 5 seconds)
• Connection attempts (default is 1)
• Database type. Choose one of the following:
• MySQL
• Oracle
• PostgreSQL
• Microsoft SQL Server
• Sybase
Step 6 Click Test Connection to check the connectivity with the ODBC database and to verify the existence of the stored
procedures for the configured use cases.
Step 7 In the Stored Procedures tab, enter the following details:
• Stored Procedure Type: Specify the type of output that your database provides:
• Returns Recordset: The database returns a recordset in response to an ODBC query.
• Returns Parameters: The database returns a set of named parameters in response to an ODBC query.
• Plain Text Password Authentication: Enter the name of the stored procedure that runs on the ODBC server for
plain text password authentication. Used for PAP, EAP-GTC inner method, and TACACS.
• Plain Text Password Fetching: Enter the name of the stored procedure that runs on the ODBC server to fetch
plain text passwords. Used for CHAP, MS-CHAPv1/v2, LEAP, EAP-MD5, EAP-MSCHAPv2 inner method, and
TACACS.
• Check Username or Machine Exists: Enter the name of the stored procedure that runs on the ODBC server for
User/MAC address lookup. Used for MAB and fast reconnect of PEAP, EAP-FAST, and EAP-TTLS.
• Fetch Groups: Enter the name of the stored procedure that retrieves the groups from the ODBC database.
• Fetch Attributes: Enter the name of the stored procedure that retrieves the attributes and their values from the
ODBC database.
• Advanced Settings: Click this option to use the attributes under the following dictionaries as input parameters in
the Fetch Attributes stored procedure (in addition to the username and password):
• RADIUS
• Device
• Network Access
Note You can use only the following attributes in the Network Access dictionary: AuthenticationMethod,
Device IP Address, EapAuthentication, EapTunnel, ISE Host Name, Protocol, UserName, VN, and
WasMachineAuthenticated.
In the Attribute Name in Stored Procedure field, specify the attribute name that is used in the stored procedure.
You can configure the stored procedures to retrieve the following output parameters from the ODBC database:
• ACL
• Security Group
• VLAN (name or number)
• Web-redirect ACL
• Web-redirect portal name
You can use these attributes to configure the authorization profiles. These attributes are listed in the Common
Tasks section in the Authorization Profiles window (under Policy > Policy Elements > Results). The following
are a few sample use case scenarios where you can use these attributes:
• To configure an authorization profile to use the VLAN that is returned from the ODBC database, based on
the specified input attributes (MAC address, username, called-station-ID, or device location), instead of
manually specifying the VLAN for each authorization profile.
• To configure an authorization profile to block access for the calling station IDs that are blocked in the ODBC
identity store.
• To configure an authorization profile to retrieve the web-redirect ACL or web-redirect portal name from the
ODBC database, based on the MAC address, username, called-station-ID, or device location.
While configuring an authorization policy, you can select the security groups that are retrieved from the ODBC
database in the Policy Sets window.
Note While using the Advanced Settings option, a new table named user_attributes_detail is created in the
ODBC database to store the additional details. You must set the data type as VARCHAR2 for all the output
parameters. Otherwise, the stored procedure might fail during the Union and Compilation process. For
example, if SGTNAME is set as VARCHAR2 and VLANNUMBER is set as NUMBER, compilation of
the following stored procedure might fail:
select ATTR_NAME, value from ATTRIBUTES where user_id=userid
union
select 'SGTNAME', SGTNAME from user_attributes_detail where USER_ID = userid
and user_attributes_detail.DEVICELOCATIONS=ise_DEVICETYPE
union
select 'VLANNUMBER', VLANNUMBER from user_attributes_detail where USER_ID =
userid and user_attributes_detail.DEVICELOCATIONS=ise_DEVICETYPE;
• Search for MAC Address in Format: The incoming MAC address is normalized based on the selected MAC
format.
Step 8 Add the required attributes in the Attributes tab. While adding an attribute, you can specify how the attribute name
should appear in the authorization policy rules.
You can also fetch the attributes from the ODBC database. These attributes can be used in the authorization policies.
Step 9 Add the user groups in the Groups tab. You can also fetch the groups from the ODBC database by specifying the
username or MAC address. These groups can be used in authorization policies.
You can rename the groups and attributes. By default, the name that is displayed in the Name in ISE field is same as
that in ODBC database, however, you can modify this name. This name is used in the authorization policies.
Note If you have configured input attributes, you must do the following while duplicating an ODBC identity store.
Otherwise, input parameters might be lost in the duplicated ODBC identity store.
1. Click Advance Settings.
2. Verify whether the input parameters are set properly.
3. Click OK to save these input parameters in the duplicated ODBC identity store.
Note The Process Host Lookup option must be enabled for MAB authentication. We recommend that you don’t
configure the RADIUS token server that is used as the external identity source, for MAB authentication,
because the devices that are using MAB authentication cannot generate an OTP or a RADIUS token (which
is required for RADIUS token server authentication). Hence, the authentication will fail. You can use the
external RADIUS server option to process the MAB requests.
Cisco ISE caches the results of successful authentications to process user lookup requests for these features.
For every successful authentication, the name of the authenticated user and the retrieved attributes are cached.
Failed authentications are not written to the cache.
The cache is available in the memory at runtime and is not replicated between Cisco ISE nodes in a distributed
deployment. You can configure the Time to Live (TTL) limit for the cache through the Admin portal. Starting
with ISE 2.6, you may choose to enable the identity caching option and set the aging time in minutes. The
option is disabled by default and when enabled, the cache will be available in the memory for the specified
amount of time.
Unknown User Authentication failed and the Fail on Reject option is set to false.
Description Enter a description for the RADIUS token server. The maximum number of characters
is 1024.
SafeWord Server Check this check box if your RADIUS identity source is a SafeWord server.
Enable Secondary Check this check box to enable the secondary RADIUS token server for Cisco ISE to
Server use as a backup in case the primary fails. If you check this check box, you must
configure a secondary RADIUS token server.
Always Access Click this option if you want Cisco ISE to always access the primary server first.
Primary Server
First
Fallback to Click this option to specify the amount of time in minutes that Cisco ISE can
Primary Server authenticate using the secondary RADIUS token server if the primary server cannot
after be reached. After this time elapses, Cisco ISE reattempts to authenticate against the
primary server.
Primary Server
Shared Secret Enter the shared secret that is configured on the primary RADIUS token server for
this connection.
Authentication Enter the port number on which the primary RADIUS token server is listening.
Port
Server Timeout Specify the time in seconds that Cisco ISE should wait for a response from the primary
RADIUS token server before it determines that the primary server is down.
Connection Specify the number of attempts that Cisco ISE should make to reconnect to the primary
Attempts server before moving on to the secondary server (if defined) or dropping the request
if a secondary server is not defined.
Secondary Server
Host IP Enter the IP address of the secondary RADIUS token server. This field can take as
input a valid IP address that is expressed as a string. Valid characters that are allowed
in this field are numbers and dot (.).
Shared Secret Enter the shared secret configured on the secondary RADIUS token server for this
connection.
Authentication Enter the port number on which the secondary RADIUS token server is listening. Valid
Port values are from 1 to 65,535. The default is 1812.
Server Timeout Specify the time in seconds that Cisco ISE should wait for a response from the
secondary RADIUS token server before it determines that the secondary server is
down.
Connection Specify the number of attempts that Cisco ISE should make to reconnect to the
Attempts secondary server before dropping the request.
Related Topics
RADIUS Token Identity Sources, on page 712
Add a RADIUS Token Server, on page 716
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration External Identity Sources > RADIUS
Token > Add.
Step 2 Enter the values in the General and Connection tabs.
Note We strongly recommend that you enable this option only when you use a protocol that supports encryption of the
passcode, for example, EAP-FAST-GTC. For information on supported authentication protocols for RADIUS
Token server, see RADIUS Token Server-Supported Authentication Protocols, on page 712
Step 5 Check the Enable Identity Caching check box if you want to allow processing of requests that do not perform
authentication against the server.
You can enable the identity caching option and set the aging time in minutes. The default value is 120 minutes. The valid
range is from 1 to 1440 minutes. The results and attributes obtained from the last successful authentication are retained
in the cache for the specified time period.
This option is disabled by default.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > RADIUS Token.
Step 2 Check the check box next to the RADIUS token server or servers that you want to delete, then click Delete.
Step 3 Click OK to delete the RADIUS token server or servers that you have selected.
If you select multiple RADIUS token servers for deleting, and one of them is used in an identity source sequence, the
delete operation fails and none of the RADIUS token servers are deleted.
You can integrate with RSA SecurID authentication technology in any one of the following ways:
• Using the RSA SecurID agent: Users are authenticated with their username and passcode through the
RSA native protocol.
• Using the RADIUS protocol: Users are authenticated with their username and passcode through the
RADIUS protocol.
The RSA SecurID token server in Cisco ISE connects with the RSA SecurID authentication technology by
using the RSA SecurID Agent.
Cisco ISE supports only one RSA realm.
This section describes the processes that are involved in connecting Cisco ISE with the RSA SecurID server
as an external identity source. For more information on RSA servers, please refer to the RSA documentation.
Note If authentications fail after upgrading to a latest release of Cisco ISE, reset the RSA secret.
Enter Next Token Enter a text string to request the next token.
Code
Choose PIN Type Enter a text string to request the PIN type.
Accept System PIN Enter a text string to accept the system-generated PIN.
Re-enter PIN Enter a text string to request the user to re-enter the PIN.
Display System Enter a text string to label the system PIN message.
PIN Message
Display System Enter a text string to inform the user to remember the new PIN.
PIN Reminder
Must Enter Enter a message that instructs users to enter only numbers for the PIN.
Numeric Error
Must Enter Alpha Enter a message that instructs users to enter only alphanumeric characters for PINs.
Error
PIN Accepted Enter a message that the users see when their PIN is accepted by the system.
Message
PIN Rejected Enter a message that the users see when the system rejects their PIN.
Message
User Pins Differ Enter a message that the users see when they enter an incorrect PIN.
Error
System PIN Enter a message that the users see when the system accepts their PIN.
Accepted Message
Bad Password Enter a message that the users see when the PIN that they specify does not fall within
Length Error the range specified in the PIN length policy.
Related Topics
RSA Identity Sources, on page 718
Cisco ISE and RSA SecurID Server Integration, on page 719
Add RSA Identity Sources, on page 721
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > RSA SecurID > Add.
Step 2 Click Browse to choose the new or updated sdconf.rec file from the system that is running your client browser.
When you create the RSA identity source for the first time, the Import new sdconf.rec file field will be a mandatory field.
From then on, you can replace the existing sdconf.rec file with an updated one, but replacing the existing file is optional.
Step 3 Enter the server timeout value in seconds. Cisco ISE will wait for a response from the RSA server for the amount of time
specified before it times out. This value can be any integer from 1 to 199. The default value is 30 seconds.
Step 4 Check the Reauthenticate on Change PIN check box to force a reauthentication when the PIN is changed.
Step 5 Click Save.
Cisco ISE also supports the following scenarios:
• Configuring the Options File for a Cisco ISE Server and Resetting SecurID and sdstatus.12 Files.
• Configuring Authentication Control Options for RSA Identity Source.
Configure the Options File for a Cisco ISE Server and Resetting SecurID and sdstatus.12 Files
Step 4 Click the radio button next to the sdopts.rec file for a particular Cisco ISE server, and click Update Options File.
The existing file is displayed in the Current File region.
a) Click the drop-down arrow and choose Remove on Submit in the Reset securid File and Reset sdstatus.12 File
columns.
Note The Reset sdstatus.12 File field is hidden from your view. Using the vertical and horizontal scroll bars in the
innermost frame, scroll down and then to your right to view this field.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > RSA SecurID > Add.
Step 2 Click the Authentication Control tab.
Step 3 Choose one of the following:
• Treat Rejects as “authentication failed”—Choose this option if you want the rejected requests to be treated as failed
authentications.
• Treat Rejects as “user not found”—Choose this option if you want the rejected requests to be treated as user not
found errors.
Step 4 Check the Enable Passcode Caching check box if you want Cisco ISE to store the passcode in the cache after the first
successful authentication and use the cached user credentials for the subsequent authentications if they happen within
the configured time period.
Enter the number of seconds for which the passcode must be stored in the cache in the Aging Time field. Within this
period of time, the user can perform more than one authentication with the same passcode. The default value is 30 seconds.
The valid range is from 1 to 300 seconds.
Note Cisco ISE clears the cache after the first failed authentication. The user must enter a new, valid passcode.
Note We strongly recommend that you enable this option only when you use a protocol that supports encryption of the
passcode, for example, EAP-FAST-GTC.
Step 5 Check the Enable Identity Caching check box if you want to allow processing of requests that do not perform
authentication against the server.
You can enable the identity caching option and set the aging time in minutes. The default value is 120 minutes. The valid
range is from 1 to 1440 minutes. The results and attributes obtained from the last successful authentication are retained
in the cache for the specified time period.
This option is disabled by default.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > RSA SecurID.
Step 2 Click Prompts.
Step 3 Enter the values as described in RSA SecurID Identity Source Settings.
Step 4 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources > RSA SecurID.
Step 2 Click Prompts.
Step 3 Click the Messages tab.
Step 4 Enter the values as described in RSA SecurID Identity Source Settings.
Step 5 Click Submit.
• It reduces password fatigue by removing the need for entering different user name and password
combinations.
• It improves productivity because you spend less time re-entering credentials for the same identity.
• It transfers the authentication from your system that hosts the applications to a third party system.
• It reduces costs as fewer help desk calls are made for password reset, thereby leading to more savings.
The IdP is an authentication module that creates, maintains, and manages identity information for users,
systems, or services. The IdP stores and validates the user credentials and generates a SAML response that
allows the user to access the service provider protected resources.
Note You must be familiar with your IdP service, and ensure that it is currently installed and operational.
You cannot select IdP as external identity source for BYOD portal, but you can select an IdP for a guest portal
and enable BYOD flow.
Cisco ISE is SAMLv2 compliant and supports all SAMLv2 compliant IdPs that use Base64-encoded certificates.
The IdPs listed below have been tested with Cisco ISE:
• Oracle Access Manager (OAM)
• Oracle Identity Federation (OIF)
• SecureAuth
• PingOne
• PingFederate
• Microsoft Entra ID
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > External Identity Sources > SAML
Id Providers.
Step 2 Click Add.
Step 3 In the SAML Identity Provider window displayed, enter the Id Provider Name and Description in the General tab.
Step 4 Click Submit.
Step 5 In the Identity Provider Config tab, import the relevant metadata.xml file, and click Submit.
1. Self-registered Guest Portals and Sponsored Guest Portals (Work Centers > Guest Access > Portals
and Components)
2. Certificate Provisioning Portals (Administration > Device Portal Management > Certificate
Provisoning > Certificate Provisioning Portal)
Step 1 In the portal customization window of the portal you are configuring, click Portal Settings.
Step 2 In the drop-down section that is displayed, go to Authentication Method section and use the menu to select the SAML
IP Provider you added.
Step 3 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > External Identity Sources > SAML Id
Providers. Select the IdP that you have just linked to a portal, and click Edit.
Step 2 (Optional) If you are using a load balancer to optimize the load on Cisco ISE nodes, you can add its details in the Service
Provider Info tab to simplify the configuration of IdPs. Software or hardware load balancers can be added.
The load balancer should be able to forward requests to the Cisco ISE nodes in the deployment using the port specified
in the Portal Settings window.
When a load balancer is added, its URL alone is provided in the service provider metadata file. If a load balancer is not
present, multiple AssertionConsumerService URLs are included in the service provider metadata file.
Note We recommend that you avoid using the same IP address of the load balancer at the portal FQDN setting.
Step 3 In the Service Provider Info tab, click Export to export the service provider metadata file. The exported metadata
includes the signing certificate of Cisco ISE, which is identical to the chosen portal's certificate.
The exported metadata zip folder includes a Readme file that contains basic instructions for configuring each IdP (including,
Microsoft Entra ID, PingOne, PingFederate, SecureAuth, and OAM)
You must re-export the service provider metadata if there are any changes in the following:
• Registration of a new Cisco ISE node.
• Hostname or IP Address of a node.
• Fully qualified domain name (FQDN) of My Devices, Sponsor, or Certificate Provisioning portal.
• Port or interface settings.
• Associated load balancer.
If the updated metadata is not re-exported, the IdP may reject a user authentication request.
Step 4 Go to your IdP portal and log in as Admin user, and import the service provider metadata file that you just exported from
Cisco ISE. You need to first unzip the exported folder and a metadata file with the name of the portal. The metadata file
includes the Provider ID and Binding URI.
Step 5 Return to the Cisco ISE portal.
Step 6 (Optional) In the Groups tab of the SAML Identity Provider window, add the required user groups.
Enter the assertion attribute that specifies the group membership of users in the Group Membership Attribute field.
Step 7 (Optional) Add the user attributes in the Attributes tab to specify how the attribute appears in the assertions returned
from the IdP.
The name you specify in the Name in ISE field will appear in policy rules.
The following data types are supported for the attributes:
• String
• Integer
• IPv4
• Boolean
Email attribute From the drop-down list, select the assertion attribute which returns the email address of the user.
The email attribute must be configured if you plan to filter (limit) the list of sponsored guests to be
approved by a sponsor.
Logout Settings Check the Sign Logout Requests check box if you want logout requests to be signed. This option
is not displayed if the IdP being configured is Oracle Access Manager or Oracle Identity Federation.
Note SecureAuth does not support SAML logout.
The following options are displayed only when configuring Oracle Access Manager or Oracle
Identity Federation IdPs, and a load balancer is not configured:
• Logout URL: Enter the URL for the page to which a user is redirected to terminate an SSO
session, when they log out of either the Sponsor or the My Devices portal.
• Redirect Parameter Name: When the SSO session is terminated, the user is brought back to
the IdP’s login page.The redirect parameter name may differ based on the IdP, for example,
end_url or returnURL. This field is case sensitive.
Option Description
If the logout does not work as expected, check the IdP’s documentation for details on using logout
URLs and redirect parameter names.
Authentication Use this section to edit SAML IdP authentication context class reference. Cisco ISE SAML requests
Context have typically used PasswordProtectedTransport authentication method in SAML request headings.
This resulted in authentication failure in the case of multi-factor authentications being used.
To avoid this, you can use AuthnContextClassRef SAML Element section to specify an
authentication method. If you are unsure of the authentication method used, we recommend that
you leave this section empty to avoid authentication failures.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Ext Id Sources >
SAML Id Providers.
Step 2 Check the check box next to the IdP that you want to delete, and then click Delete.
Step 3 Click OK to delete the IdP that you have selected.
Note Cisco ISE does not support SAML responses with encrypted assertions. If this is configured in the IdP, you
will see the following error message in ISE: FailureReason=24803 Unable to find 'username' attribute
assertion.
If the authentication fails, we recommend that you check the "DetailedInfo" attribute in the authentication
log. This attribute provides additional information regarding the cause of failure.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Identity
Source Sequences > Add.
Step 2 Enter a name for the identity source sequence. You can also enter an optional description.
Step 3 Check the Select Certificate Authentication Profile check box and choose a certificate authentication profile for
certificate-based authentication.
Step 4 Choose the database or databases that you want to include in the identity source sequence in the Selected List field.
Step 5 Rearrange the databases in the Selected list field in the order in which you want Cisco ISE to search the databases.
Step 6 If a selected identity store cannot be accessed for authentication, choose one of the following options in the Advanced
Search List area:
• Do not access other stores in the sequence and set the AuthenticationStatus attribute to ProcessError
• Treat as if the user was not found and proceed to the next store in the sequence
While processing a request, Cisco ISE searches these identity sources in sequence. Ensure that you have the identity
sources in the Selected list field listed in the order in which you want Cisco ISE to search them.
Step 7 Click Submit to create the identity source sequence that you can then use in policies.
Step 1 Choose Administration > Identity Management > Identity Source Sequences.
Step 2 Check the check box next to the identity source sequence or sequences that you want to delete, then click Delete.
Step 3 Click OK to delete the identity source sequence or sequences.
Authentications Dashlet
From the Authentications dashlet, you can drill down to find more information including failure reasons.
Choose Operations > RADIUS Livelog to view real-time authentication summary. For more information
about RADIUS Live Logs, see RADIUS Live Logs, on page 412.
for all endpoints on your network, and pass them to the Profiler analyzer, where the known endpoints are
classified according to their associated policies and identity groups.
The Profiler Feed service allows administrators to retrieve new and updated endpoint profiling policies and
the updated OUI database as a feed from a designated Cisco feed server through a subscription in to Cisco
ISE.
Attribute Value Enter the value for the attribute that you have chosen. For Attribute Names that contain
pre-defined Attribute Values, this option displays a drop-down list with the pre-defined
values, and you can choose a value.
System Type Profiling conditions can be any one of the following types:
• Cisco Provided: Profiling conditions that are provided by Cisco ISE when
deployed are identified as Cisco Provided. You cannot edit or delete them from
the system.
• Administrator Created: Profiling conditions that you create as an administrator
of Cisco ISE are identified as Administrator Created.
Related Topics
Cisco ISE Profiling Service, on page 732
Profiler Conditions, on page 757
Profiler Feed Service, on page 793
Create a Profiler Condition, on page 772
ISE. Cisco ISE then grants permission to the endpoints to access the resources in your network based on the
result of the policy evaluation.
The profiling service:
• Facilitates an efficient and effective deployment and ongoing management of authentication by using
IEEE standard 802.1X port-based authentication access control, MAC Authentication Bypass (MAB)
authentication, and Network Admission Control (NAC) for any enterprise network of varying scale and
complexity.
• Identifies, locates, and determines the capabilities of all of the attached network endpoints regardless of
endpoint types.
• Protects against inadvertently denying access to some endpoints.
Profiler Dashboard
The Profiler dashboard (Work Centers > Profiler > Endpoint Classification) is a centralized monitoring tool
for the profiles, endpoints, and assets in your network. The dashboard represents data in both graphical and
table formats. The Profiles dashlet displays the logical and endpoint profiles that are currently active in the
network. The Endpoints dashlet displays the identity group, PSNs, OS types of the endpoints that connect to
your network. The Assets dashlet displays flows such as Guest, BYOD, and Corporate. The table displays
the various endpoints that are connected and you can also add new endpoints.
Endpoint Cache
• maxEndPointsInLocalDb = 100000 (endpoint objects in cache)
• endPointsPurgeIntervalSec = 300 (endpoint cache purge thread interval in seconds)
• numberOfProfilingThreads = 8 (number of threads)
The limit is applicable to all profiler internal event handlers. A monitoring alarm is triggered when queue size
limit is reached.
Event Handlers
• NetworkDeviceEventHandler: For network device events, in addition to filtering duplicate Network
Access Device (NAD) IP addresses, which are already cached.
• ARPCacheEventHandler: For ARP Cache events.
Martian IP Addresses
Martian IP addresses are not displayed in Context Visibility > Endpoints and Work Centers > Profiler >
Endpoint Classification windows as the RADIUS parser removes such addresses before they reach the
profiling service. Martian IP addresses are a security concern as they are vulnerable to attacks. However,
martian IP addresses are displayed in MnT logs for auditing purposes. This behaviour stands true in the case
of multicast IP addresses as well. For more information on Martian IP addresses, see
https://www.cisco.com/assets/sol/sb/Switches_Emulators_v2_3_5_xx/help/250/index.html#page/tesla_250_olh/martian_addresses.html
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Choose a Cisco ISE node that assumes the Policy Service persona.
Step 3 Click Edit in the Deployment Nodes page.
Step 4 On the General Settings tab, check the Policy Service check box. If the Policy Service check box is unchecked, both
the session services and the profiling service check boxes are disabled.
Step 5 Perform the following tasks:
a) Check the Enable Session Services check box to run the Network Access, Posture, Guest, and Client Provisioning
session services.
b) Check the Enable Profiling Services check box to run the profiling service.
c) Check the Enable Device Admin Service check box to run the device administration service to control and audit an
enterprise's network devices.
Step 6 Click Save to save the node configuration.
NetFlow Probe
Cisco ISE profiler implements Cisco IOS NetFlow Version 9. We recommend using NetFlow Version 9,
which has additional functionality needed to enhance the profiler to support the Cisco ISE profiling service.
You can collect NetFlow Version 9 attributes from the NetFlow-enabled network access devices to create an
endpoint, or update an existing endpoint in the Cisco ISE database. You can configure NetFlow Version 9 to
attach the source and destination MAC addresses of endpoints and update them. You can also create a dictionary
of NetFlow attributes to support NetFlow-based profiling.
For more information on the NetFlow Version 9 Record Format, see Table 6, “NetFlow Version 9 Field Type
Definitions” of the NetFlow Version 9 Flow-Record Format document.
In addition, Cisco ISE supports NetFlow versions earlier than Version 5. If you use NetFlow Version 5 in
your network, then you can use Version 5 only on the primary network access device (NAD) at the access
layer because it will not work anywhere else.
Cisco IOS NetFlow Version 5 packets do not contain MAC addresses of endpoints. The attributes that are
collected from NetFlow Version 5 cannot be directly added to the Cisco ISE database. You can discover
endpoints by using their IP addresses, and append the NetFlow Version 5 attributes to endpoints, which can
be done by combining IP addresses of the network access devices and IP addresses obtained from the NetFlow
Version 5 attributes. However, these endpoints must have been previously discovered with the RADIUS or
SNMP probe.
The MAC address is not a part of IP flows in earlier versions of NetFlow Version 5, which requires you to
profile endpoints with their IP addresses by correlating the attributes information collected from the network
access devices in the endpoints cache.
For more information on the NetFlow Version 5 Record Format, see Table 2, “Cisco IOS NetFlow Flow
Record and Export Format Content Information” of the NetFlow Services Solutions Guide.
DHCP Probe
The Dynamic Host Configuration Protocol probe in your Cisco ISE deployment allows the Cisco ISE profiling
service to reprofile endpoints based only on new requests of INIT-REBOOT and SELECTING message types.
Though other DHCP message types such as RENEWING and REBINDING are processed, they are not used
for profiling endpoints. Any attribute parsed out of DHCP packets is mapped to endpoint attributes.
HTTP Probe
In HTTP probe, the identification string is transmitted in an HTTP request-header field User-Agent, which
is an attribute that can be used to create a profiling condition of IP type, and to check the web browser
information. The profiler captures the web browser information from the User-Agent attribute along with
other HTTP attributes from the request messages, and adds them to the list of endpoint attributes.
Cisco ISE listens to communication from the web browsers on both port 80 and port 8080. Cisco ISE provides
many default profiles, which are built in to the system to identify endpoints based on the User-Agent attribute.
HTTP probe is enabled by default. Multiple ISE services such as CWA, Hotspot, BYOD, MDM, and Posture
rely on URL-redirection of the client's web browser. The redirected traffic includes the RADIUS session ID
of the connected endpoint. When a PSN terminates these URL-redirected flows, it has visibility into the
decrypted HTTPS data. Even when the HTTP probe is disabled on the PSN, the node will parse the browser
user agent string from the web traffic and correlate the data to the endpoint based on its associated session
ID. When browser strings are collected through this method, the source of the data is listed as Guest Portal
or CP (Client Provisioning) rather than HTTP Probe.
pxGrid Probe
The pxGrid probe leverages Cisco pxGrid for receiving endpoint context from external sources. Prior to Cisco
ISE 2.4, Cisco ISE served only as a publisher and shared various context information such as session identity
and group information as well as configuration elements to external subscribers. With the introduction of the
pxGrid probe in Cisco ISE 2.4, other solutions serve as the publishers and Cisco ISE Policy Service nodes
become the subscribers.
The pxGrid probe is based on pxGrid v2 specification using the Endpoint Asset topic
/topic/com.cisco.endpoint.asset with Service Name com.cisco.endpoint.asset. The following table displays
the topic attributes all of which are preceded by the prefix asset.
In addition to the attributes commonly used to track networked assets such as device MAC address
(assetMacAddress) and IP address (assetIpAddress), the topic allows vendors to publish unique endpoint
information as Custom Attributes (assetCustomAttributes). The use of Endpoint Custom Attributes in Cisco
ISE makes the topic extensible to a variety of use cases without requiring schema updates for each new set
of unique vendor attributes shared over pxGrid.
RADIUS Probe
You can configure Cisco ISE for authentication with RADIUS, where you can define a shared secret that you
can use in client-server transactions. With the RADIUS request and response messages that are received from
the RADIUS servers, the profiler can collect RADIUS attributes, which can be used for profiling endpoints.
Cisco ISE can function as a RADIUS server, and a RADIUS proxy client to other RADIUS servers. When it
acts as a proxy client, it uses external RADIUS servers to process RADIUS requests and response messages.
The RADIUS probe also collects attributes sent in RADIUS accounting packets by device sensors. For more
information, see Attributes Collection from Cisco IOS Sensor-Embedded Switches, on page 752 and
Configuration Checklist for Cisco IOS Sensor-Enabled Network Access Devices, on page 752.
The RADIUS probe is running by default, even for systems not configured for Profiling Service to ensure
ISE can track endpoint authentication and authorization details for use in Context Visibility Services.
The RADIUS probe and Profiling Services are also used to track the creation and update times for registered
endpoints for purposes of purge operations.
Note When an accounting stop is received, it triggers the Cisco ISE to reprofile the corresponding endpoint if it
was originally profiled with an IP address. Therefore if you have custom profiles for endpoints profiled with
IP addresses, the only way to meet the total certainty factor for these profiles is to match on the corresponding
IP address.
-O Enables OS detection
-sU UDP scan
-p <port Scans only specified ports. For example, U:161, 162
ranges>
oN Normal output
oX XML output
SNMP Read Only Community Strings for NMAP Manual Subnet Scan
The NMAP manual subnet scan is augmented with an SNMP Query whenever the scan discovers that UDP
port 161 is open on an endpoint that results in more attributes being collected. During the NMAP manual
subnet scan, the Network Scan probe detects whether SNMP port 161 is open on the device. If the port is
open, an SNMP Query is triggered with a default community string (public) with SNMP version 2c.
If the device supports SNMP and the default Read Only community string is set to public, you can obtain the
MAC address of the device from the MIB value “ifPhysAddress”.
In addition, you can configure additional SNMP Read Only community strings separated by a comma for the
NMAP manual network scan in the Profiler Configuration window. You can also specify new Read Only
community strings for an SNMP MIB walk with SNMP versions 1 and 2c. For information on configuring
SNMP Read Only community strings, see Setup CoA, SNMP RO Community, and Endpoint Attribute Filter,
on page 746.
DNS Probe
The Domain Name Service (DNS) probe in your Cisco ISE deployment allows the profiler to lookup an
endpoint and get the fully qualified domain name (FQDN). After an endpoint is detected in your Cisco
ISE-enabled network, a list of endpoint attributes is collected from the NetFlow, DHCP, DHCP SPAN, HTTP,
RADIUS, or SNMP probes.
When you deploy Cisco ISE in a standalone or in a distributed environment for the first time, you are prompted
to run the setup utility to configure the Cisco ISE appliance. When you run the setup utility, you will configure
the Domain Name System (DNS) domain and the primary nameserver (primary DNS server), where you can
configure one or more nameservers during setup. You can also change or add DNS nameservers later after
deploying Cisco ISE using the CLI commands.
You can configure SNMP settings in the new network access devices (NADs) in the Network Devices list
page. The polling interval that you specify in the SNMP query probe or in the SNMP settings in the network
access devices query NADs at regular intervals.
You can turn on and turn off SNMP querying for specific NADs based on the following configurations:
• SNMP query on Link up and New MAC notification turned on or turned off
• SNMP query on Link up and New MAC notification turned on or turned off for Cisco Discovery Protocol
information
• SNMP query timer for once an hour for each switch by default
For an iDevice, and other mobile devices that do not support SNMP, the MAC address can be discovered by
the ARP table, which can be queried from the network access device by an SNMP Query probe.
Attribute Setting
LLDP global state Disabled
LLDP holdtime 120 seconds
(before discarding)
LLDP timer (packet 30 seconds
update frequency)
LLDP 2 seconds
reinitialization delay
LLDP tlv-select Enabled to send and receive all TLVs.
LLDP interface state Enabled
LLDP receive Enabled
LLDP transmit Enabled
Attribute Setting
LLDP Enabled to send all LLDP-MED TLVs
med-tlv-select
Example 1
lldpCacheCapabilities S
lldpCapabilitiesMapSupported S
Example 2
lldpCacheCapabilities B;T
lldpCapabilitiesMapSupported B;T
Example 3
Note Cisco ISE does not support SNMP Traps that are received from the Wireless LAN Controllers (WLCs) and
Access Points (APs).
You can enable the AD probe under Administration > System > Deployment > Profiling Configuration.
When this probe is enabled, Cisco ISE fetches the AD attributes for a new endpoint as soon as it receives a
hostname. The hostname is typically learned from the DHCP or DNS probes. Once successfully retrieved,
ISE does not attempt to query AD again for the same endpoint until a the rescan timer expires. This is to limit
the load on AD for attribute queries. The rescan timer is configurable in the Days Before Rescan field
(Administration > System > Deployment > Profiling Configuration > Active Directory). If there is
additional profiling activity on the endpoint, the AD is queried again.
The following AD probe attributes can be matched in the Policy > Policy Elements > Profiling using the
ACTIVEDIRECTORY condition. AD attributes collected using the AD Probe appear with the prefix “AD”
in the endpoint details on the Context Visibility > Endpoints window.
• AD-Host-Exists
• AD-Join-Point
• AD-Operating-System
• AD-OS-Version
• AD-Service-Pack
Note Not all probes are enabled by default. Some probes are partially enabled even when they are not explicitly
enabled by a check mark. The profiling configuration is currently unique to each PSN. We recommend that
each PSN in the deployment should be configured with identical profiler configuration settings.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Choose a Cisco ISE node that assumes the Policy Service persona.
Step 3 Click Edit in the Deployment Nodes page.
Step 4 On the General Settings tab, check the Policy Service check box. If the Policy Service check box is unchecked, both
the session services and the profiling service check boxes are disabled.
Step 5 Check the Enable Profiling Services check box.
Step 6 Click the Profiling Configuration tab.
Step 7 Configure the values for each probe.
Step 8 Click Save to save the probe configuration.
Note If you have multiple active sessions on a single port, the profiling service issues a CoA with the Reauth
option even though you have configured CoA with the Port Bounce option. This function avoids disconnecting
other sessions, a situation that might occur with the Port Bounce option.
Step 3 Enter new SNMP community strings separated by a comma for the NMAP manual network scan in the Change Custom
SNMP Community Strings field, and re-enter the strings in the Confirm Custom SNMP Community Strings field
for confirmation.
The default SNMP community string used is public. Click Show in the Current Custom SNMP Community Strings
section to verify this.
Step 4 Check the Endpoint Attribute Filter check box to enable endpoint attribute filtering.
On enabling the EndPoint Attribute Filter, the Cisco ISE profiler only keeps allowed attributes and discards all other
attributes. For more information, see Global Setting to Filter Endpoint Attributes, on page 750 and Attribute Filters for
ISE Database Persistence and Performance, on page 749 sections. As a best practice, we recommend you to enable
Endpoint Attribute Filter in production deployments.
Step 5 Check the Enable Probe Data Publisher check box if you want Cisco ISE to publish endpoint probe data to pxGrid
subscribers that need this data to classify endpoints onboarding on ISE. The pxGrid subscriber can pull the endpoint
records from Cisco ISE using bulk download during initial deployment phase. Cisco ISE sends the endpoint records to
the pxGrid subscriber whenever they are updated in PAN. This option is disabled by default.
When you enable this option, ensure that the pxGrid persona is enabled in your deployment.
• An endpoint profiling policy has changed and the policy is used in an authorization policy: When an
endpoint profiling policy changes, and the policy is included in a logical profile that is used in an
authorization policy. The endpoint profiling policy may change due to the profiling policy match or when
an endpoint is statically assigned to an endpoint profiling policy, which is associated to a logical profile.
In both the cases, the profiling service issues a CoA, only when the endpoint profiling policy is used in
an authorization policy.
• Profiler CoA is suppressed when the Suppress Profiler CoA for endpoints in Logical Profile option
is used for the configured logical profile in the Authorization Profile. Profiler CoA will be triggered for
all other endpoints by default.
• Global No CoA Setting overrides Policy CoA—Global No CoA overrides all configuration settings in
endpoint profiling policies as there is no CoA issued in Cisco ISE irrespective of CoA configured per
endpoint profiling policy.
Note No CoA and Reauth CoA configurations are not affected, and the profiler service
applies the same CoA configuration for wired and wireless endpoints.
The isebootstrap log (isebootstrap-yyyymmdd-xxxxxx.log) contains messages that handles the creation of
dictionaries and with filtering of attributes from the dictionaries. You can also configure to log a debug message
when endpoints go through the filtering phase to indicate that filtering has occurred.
The Cisco ISE profiler invokes the following endpoint attribute filters:
• A DHCP filter for both the DHCP Helper and DHCP SPAN contains all the attributes that are not
necessary and they are removed after parsing DHCP packets. The attributes after filtering are merged
with existing attributes in the endpoint cache for an endpoint.
• An HTTP filter is used for filtering attributes from HTTP packets, where there is no significant change
in the set of attributes after filtering.
• A RADIUS filter is used once the syslog parsing is complete and endpoint attributes are merged into the
endpoint cache for profiling.
• SNMP filter for SNMP Query includes separate CDP and LLDP filters, which are all used for
SNMP-Query probe.
Note To add an new attribute to the allowed list, the administrator needs to create a new profiler condiion and policy
that uses the attribute. This new attribute will be automatically added to the allowed list of stored and replicated
attributes.
AAA-Server BYODRegistration
EndPointPolicy EndPointPolicyID
EndPointProfilerServer EndPointSource
FQDN FirstCollection
Framed-IP-Address IdentityGroup
IdentityGroupID IdentityStoreGUID
IdentityStoreName L4_DST_PORT
LastNmapScanTime MACAddress
MatchedPolicy MatchedPolicyID
NADAddress NAS-IP-Address
NAS-Port-Id NAS-Port-Type
NmapScanCount NmapSubnetScanID
OS Version OUI
PolicyVersion PortalUser
PostureApplicable Product
RegistrationTimeStamp —
StaticAssignment StaticGroupAssignment
User-Agent cdpCacheAddress
cdpCacheCapabilities cdpCacheDeviceId
cdpCachePlatform cdpCacheVersion
ciaddr dhcp-class-identifier
dhcp-requested-address host-name
hrDeviceDescr ifIndex
ip lldpCacheCapabilities
lldpCapabilitiesMapSupported lldpSystemDescription
operating-system sysDescr
161-udp —
ConfigurationChecklistforCiscoIOSSensor-EnabledNetworkAccessDevices
This section summarizes a list of tasks that you must configure in the Cisco IOS sensor-enabled switches and
Cisco ISE to collect DHCP, CDP, and LLDP attributes directly from the switch:
• Ensure that the RADIUS probe is enabled in Cisco ISE.
• Ensure that network access devices support an IOS sensor for collecting DHCP, CDP, and LLDP
information.
• Ensure that network access devices run the following CDP and LLDP commands to capture CDP and
LLDP information from endpoints:
cdp enable
lldp run
• Ensure that session accounting is enabled separately by using the standard AAA and RADIUS commands.
For example, use the following commands:
aaa new-model
aaa accounting dot1x default start-stop group radius
• Be sure that you disable the Cisco IOS Device Classifier (local analyzer) in the network access devices.
Enter the following command:
Note This command prevents network access devices from sending two identical
RADIUS accounting messages per change.
Note You must install the Cisco ISE certificate in Cisco IND, and install the Cisco IND certificate in ISE, before
you activate pxGrid in Cisco IND.
1. Choose Administration > Deployment. Edit the PSN that you plan to use as pxGrid consumer, and
enable pxGrid. This PSN is the one that creates endpoints from pxGrid data published by Cisco IND and
profiling.
2. Choose Administration > pxGrid Services to verify that pxGrid is running. Then click the Certificates
tab, and fill in the certificate fields. Click Create to issue the certificate and download the certificate.
• For I want to, select “Generate a single certificate (without a certificate signing request), Common
Name, and enter a name for the Cisco IND you are connecting with.
• For Certificate Download Format, choose PKS12 format.
• For Certificate Password, create a password.
Note The ISE internal CA must be enabled. If your browser blocks popups, you won’t be able to download the
certificate. Unzip the certificate to make the PEM file available for the next step.
3. In Cisco IND, choose Settings > pxGrid, and click Download .pem IND certificate. Keep
this window open.
4. In Cisco ISE, choose Administration > pxGrid Services > All Clients. When you see the Cisco IND
pxGrid client, approve it.
5. In Cisco IND, move the slider to enable pxGrid. Another screen opens, where you define the location of
the ISE node, the name of the certificate that you entered for this pxGrid server in ISE, and the password
you provided. Click Upload Certificate, and locate the ISE pxGrid PEM file.
6. In ISE, choose Administration > Certificates > Trusted Certificates. Click Import and enter the path
to the certificate you got from Cisco IND.
7. In Cisco IND, click Activate.
8. In Cisco ISE, choose Adminstration > Deployment. Select the PSN you are using for the Cisco IND
connection, select the Profiling window, and enable the pxGrid probe.
9. The pxGrid connection between ISE and Cisco IND is now active. Verify that by displaying the IoT
endpoints that Cisco IND has found.
Cisco ISE performs unsigned classification of IoT devices. Cisco ISE does not store the MUD attributes; the
attributes are only used in the current session. In the Context and Visibility > Endpoints window, you can
filter IoT devices by the Endpoint Profile field.
The following devices support sending MUD data to Cisco ISE:
• Cisco Catalyst 3850 Series Switches running Cisco IOS XE Version 16.9.1 & 16.9.2
• Cisco Catalyst Digital Building Series Switches running Cisco IOS Version 15.2(6)E2
• Cisco Industrial Ethernet 4000 Series Switches running Cisco IOS Version 15.2(6)E2
• Internet of Things (IoT) devices with embedded MUD functionality
Cisco ISE supports the following profiling protocols and profiling probes:
• LLDP and Radius - TLV 127
• DHCP - Option 161
As more IoT devices are classified, all devices of the same category or group with same MUD-URL are
assigned to the same endpoint group. For example, if a Molex light connects, and is classified, a profiler group
is created for that Molex light. As more Molex lights of the same type (with the same MUD-URL) are classified,
they inherit the same classification or endpoint identity group.
Profiler Conditions
Profiling conditions are policy elements and are similar to other conditions. However unlike authentication,
authorization, and guest conditions, the profiling conditions can be based on a limited number of attributes.
The Profiler Conditions page lists the attributes that are available in Cisco ISE and their description.
Profiler conditions can be one of the following:
• Cisco Provided: Cisco ISE includes predefined profiling conditions when deployed and they are identified
as Cisco Provided in the Profiler Conditions window. You cannot delete Cisco Provided profiling
conditions.
You can also find Cisco Provided conditions in the System profiler dictionaries in the following location:
Policy > Policy Elements > Dictionaries > System.
For example, MAC dictionary. For some products, the OUI (Organizationally Unique Identifier) is an
unique attribute that you can use it first for identifying the manufacturing organization of devices. It is
a component of the device MAC address. The MAC dictionary contains the MACAddress and OUI
attributes.
• Administrator Created: Profiler conditions that you create as an administrator of Cisco ISE or predefined
profiling conditions that are duplicated are identified as Administrator Created. You can create a profiler
condition of DHCP, MAC, SNMP, IP, RADIUS, NetFlow, CDP, LLDP, and NMAP types using the
profiler dictionaries in the Profiler Conditions window.
Although, the recommended upper limit for the number of profiling policies is 1000, you can stretch up to
2000 profiling policies.
Step 1 Choose Policy > Policy Elements > Results > Profiling > Network Scan (NMAP) Actions. Alternatively, you
can choose Work Centers > Profiler > Policy Elements > NMAP Scan Actions.
Step 2 Click Add.
Step 3 Enter a name and description for the network scan action that you want to create.
Step 4 Check one or more check boxes when you want to scan an endpoint for the following:
• Scan OS: To scan for an operating system
• Scan SNMP Port: To scan SNMP ports (161, 162)
• Scan Common Port: To scan common ports.
• Scan Custom Ports: To scan custom ports.
• Scan Include Service Version Information: To scan the version information, which may contain detailed description
of the device.
• Run SMB Discovery Script: To scan SMB ports (445 and 139) to retrieve information such as the OS and computer
name.
• Skip NMAP Host Discovery: To skip the initial host discovery stage of the NMAP scan.
Note The Skip NMAP Host Discovery option is selected by default for automatic NMAP scan, however, you must
select it to run manual NMAP scan.
The following NMAP command scans a subnet and sends the output to nmapSubnet.log:
nmap -O -sU -p U:161,162 -oN /opt/CSCOcpm/logs/nmapSubnet.log
--append-output -oX - <subnet>
-O Enables OS detection
-sU UDP scan
-p <port Scans only specified ports. For example, U:161, 162
ranges>
oN Normal output
oX XML output
1 3 4 6 7 9 13 17 19
20 21 22 23 24 25 26 30 32
33 37 42 43 49 53 70 79 80
81 82 83 84 85 88 89 90 99
Common Ports
The following table lists the common ports that NMAP uses for scanning.
Note For SMB discovery, be sure to enable the Windows file sharing option in the endpoint.
If a NMAP scan is triggered after the classification of an endpoint, the profiler always skips the host discovery
of the endpoint. However, if a manual scan action is triggered after enabling the Skip NMAP Host Discovery
Scan, then host discovery is skipped.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Profiling > Network
Scan (NMAP) Actions.
Step 2 Enter the Action Name and Description.
Step 3 Check the Run SMB Discovery Script checkbox.
Step 4 Click Add to create the network access users.
What to do next
You should configure the profiler policy using the SMB scan action.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Add.
Step 2 Enter the Name and Description.
Step 3 In the drop-down, select the scan action (for example, SMBScanAction) that you had created.
What to do next
You should add a new condition using the SMB attribute.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Add.
Step 2 Enter the Name (for example, Windows-7Workstation) and Description.
Step 3 In the Network Scan (NMAP) Action drop-down, select None.
Step 4 In the Parent Policy drop-down choose the Microsoft-Workstation policy.
Node Choose the ISE node from which the NMAP scan is run.
Manual Scan Enter the range of subnet IP addresses of endpoints for which you want to run the
Subnet NMAP scan.
Configure NMAP You will be directed to the Work Centers > Profiler > Settings > NMAP Scan
Scan Subnet Subnet Exclusions window. Specify the IP address and subnet mask that should be
Exclusions At excluded. If there is a match, the NMAP scan is not run.
Specify Scan Select the required scan options: OS, SNMP Port, Common Ports, Custom Ports,
Options Include Service Version Information, Run SMB Discovery Script, Skip NMAP Host
Discovery. See Create a New Network Scan Action for more information.
Select an Existing Displays the Existing NMAP Scan Actions drop-down list that displays the default
NMAP Scan profiler NMAP scan actions.
Reset to Default Click this option to restore default settings (all scan options are checked).
Scan Options
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Profiler > Manual Scans > Manual
NMAP Scan.
Step 2 In the Node drop-down list, select the ISE node from which you intend to run the NMAP scan.
Step 3 In the Manual Scan Subnet text box, enter the subnet address whose endpoints you intend to check for open ports.
Step 4 Select one of the following:
a) Choose Specify Scan Options, and on the right side of the page, choose the required scan options. Refer to the Create
a New Network Scan Action page for more information.
b) Choose Select An Existing NMAP Scan Action to select the default NMAP scan action, such as
MCAFeeEPOOrchestratorClientScan.
Step 5 Click Run Scan.
Cisco ISE provides an in-built NMAP scan action (MCAFeeEPOOrchestratorClientscan) to check if the
McAfee agent is running on an endpoint using NMAP McAfee script on the configured port. You can also
create new NMAP scan options using the custom ports (for example, 8082). You can configure a new NMAP
scan action using the McAfee ePO software by following the steps below:
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Profiler > Policy Elements > Network
Scan (NMAP) Actions.
Step 2 Click Add.
Step 3 Enter the Action Name and Description.
Step 4 In the Scan Options, select Custom Ports.
Step 5 In the Custom Ports dialog box, add the required TCP port. The 8080 TCP port is enabled by default for McAfee ePO.
Step 6 Check the Include Service Version Information checkbox.
Step 1 In your McAfee ePO server, check the recommended settings to facilitate the communication between the McAfee ePO
agent and the ISE server.
Figure 26: McAfee ePO Agent Recommended Options
Step 2 Verify that the Accept Connections Only From The ePO Server is unchecked.
Configure Profiler Policies Using the McAfee ePO NMAP Scan Action
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Add.
Step 2 Enter the Name and Description.
Step 3 In the Network Scan (NMAP) Action drop-down list, select the required action (for example,
MCAFeeEPOOrchestratorClientscan).
Step 4 Create the parent profiler policy (for example, Microsoft-Workstation containing a rule to check if the DHCP class
identifier contains the MSFT attribute).
Step 5 Create a new policy (for example CorporateDevice) within the parent NMAP McAfee ePO policy (for example,
Microsoft-Workstation) to check if the McAfee ePO agent is installed on the endpoint.
Endpoints that meet the condition are profiled as corporate devices. You can use the policy to move endpoints profiled
with McAfee ePO agent to a new VLAN.
You can create a maximum of 100 endpoint custom attributes. The types of endpoint custom attributes
supported are: Int, String, Long, Boolean, and Float.
You can add values for the endpoint custom attributes in the Context Directory > Endpoints > Endpoint
Classification window.
Use cases for endpoint custom attributes include, to allow or block devices based on certain attributes or to
assign certain privileges based on the authorization.
Note You must have a Cisco ISE Advantage license to add custom attributes to the endpoints.
The following steps show how to create an authorization policy using endpoint custom attributes.
f) In the Edit Endpoint dialog box, in the Custom Attribute area enter the required attribute values (for example,
deviceType = Apple-iPhone).
g) Click Save.
Step 2 Create an authorization policy using the custom attributes and values.
a) Choose Policy > Policy Sets.
b) Create the authorization policy by selecting the custom attributes from the Endpoints dictionary (for example, Rule
Name: Corporate Devices, Conditions:EndPoints:deviceType Contains Apple-iPhone, Permissions: then PermitAccess).
c) Click Save.
Related Topics
Profiler Endpoint Custom Attributes, on page 770
Step 1 Choose Policy > Policy Elements > Conditions > Profiling > Add.
Step 2 Enter values for the fields as described in the Endpoint Profiling Policies Settings, on page 773.
Step 3 Click Submit to save the profiler condition.
Step 4 Repeat this procedure to create more conditions.
Certainty Factor
The minimum certainty metric in the profiling policy evaluates the matching profile for an endpoint. Each
rule in an endpoint profiling policy has a minimum certainty metric (an integer value) associated to the profiling
conditions. The certainty metric is a measure that is added for all the valid rules in an endpoint profiling policy,
which measures how each condition in an endpoint profiling policy contributes to improve the overall
classification of endpoints.
The certainty metric for each rule contributes to the overall matching of the endpoint profiles into a specific
category of endpoints. The certainty metric for all the valid rules are added together to form the matching
certainty. It must exceed the minimum certainty factor that is defined in an endpoint profiling policy. By
default, the minimum certainty factor for all new profiling policy rules and predefined profiling policies is
10.
Name Enter the name of the endpoint profiling policy that you want to create.
Description Enter the description of the endpoint profiling policy that you want to create.
Policy Enabled By default, the Policy Enabled check box is checked to associate a matching profiling
policy when you profile an endpoint.
When unchecked, the endpoint profiling policy is excluded when you profile an
endpoint.
Minimum Enter the minimum value that you want to associate with the profiling policy. The
Certainty Factor default value is 10.
Exception Action Choose an exception action, which you want to associate with the conditions when
defining a rule in the profiling policy.
The default is NONE. The exception actions are defined in the following location:
Policy > Policy Elements > Results > Profiling > Exception Actions.
Network Scan Choose a network scan action from the list, which you want to associate with the
(NMAP) Action conditions when defining a rule in the profiling policy, if required.
The default is NONE. The exception actions are defined in the following location:
Policy > Policy Elements > Results > Profiling > Network Scan (NMAP) Actions.
Create an Identity Check one of the following options to create an endpoint identity group:
Group for the
• Yes, create matching Identity Group
policy
• No, use existing Identity Group hierarchy
No, use existing Check this check box to assign endpoints to the matching parent endpoint identity
Identity Group group using hierarchical construction of profiling policies and identity groups.
hierarchy
This option allows you to make use of the endpoint profiling policies hierarchy to
assign endpoints to one of the matching parent endpoint identity groups, as well as to
the associated endpoint identity groups to the parent identity group.
For example, endpoints that match an existing profile are grouped under the appropriate
parent endpoint identity group. Here, endpoints that match the Unknown profile are
grouped under Unknown, and endpoints that match an existing profile are grouped
under the Profiled endpoint identity group. For example,
• If endpoints match the Cisco-IP-Phone profile, then they are grouped under the
Cisco-IP-Phone endpoint identity group.
• If endpoints match the Workstation profile, then they are grouped under the
Workstation endpoint identity group.
The Cisco-IP-Phone and Workstation endpoint identity groups are associated to
the Profiled endpoint identity group in the system.
Parent Policy Choose a parent profiling policy that are defined in the system to which you want to
associate the new endpoint profiling policy.
You can choose a parent profiling policy from which you can inherit rules and
conditions to its child.
Associated CoA Choose one of the following CoA types that you want to associate with the endpoint
Type profiling policy:
• No CoA
• Port Bounce
• Reauth
• Global Settings that is applied from the profiler configuration set in Administration
> System > Settings > Profiling
Rules One or more rules that are defined in endpoint profiling policies determine the matching
profiling policy for endpoints, which allows you to group endpoints according to their
profiles.
One or more profiling conditions from the policy elements library are used in rules for
validating endpoint attributes and their values for the overall classification.
Conditions Click the plus [+] sign to expand the Conditions anchored overlay, and click the minus
[-] sign, or click outside the anchored overlay to close it.
Click Select Existing Condition from Library or Create New Condition (Advanced
Option) .
Select Existing Condition from Library: You can define an expression by selecting
Cisco predefined conditions from the policy elements library.
Create New Condition (Advanced Option): You can define an expression by selecting
attributes from various system or user-defined dictionaries.
You can associate one of the following with the profiling conditions:
• An integer value for the certainty factor for each condition
• Either an exception action or a network scan action for that condition
Choose one of the following predefined settings to associate with the profiling condition:
• Certainty Factor Increases: Enter the certainty value for each rule, which can be
added for all the matching rules with respect to the overall classification.
• Take Exception Action: Triggers an exception action that is configured in the
Exception Action field for this endpoint profiling policy.
• Take Network Scan Action: Triggers a network scan action that is configured in
the Network Scan (NMAP) Action field for this endpoint profiling policy.
Related Topics
Cisco ISE Profiling Service, on page 732
Create Endpoint Profiling Policies, on page 776
Endpoint Context Visibility Using UDID Attribute, on page 806
Note When you choose to create an endpoint policy in the Profiling Policies window,
do not use the Stop button on your web browsers. This action leads to the
following: stops loading the New Profiler Policy window, loads other list pages
and the menus within the list pages when you access them, and prevents you from
performing operations on all the menus within the list pages except the Filter
menus. You might need to log out of Cisco ISE, and then log in again to perform
operations on all the menus within the list pages.
You can create a similar characteristic profiling policy by duplicating an endpoint profiling policy through
which you can modify an existing profiling policy instead of creating a new profiling policy by redefining all
conditions.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Profiling Policies.
Step 2 Click Add.
Step 3 Enter a name and description for the new endpoint policy that you want to create. The Policy Enabled check box is
checked by default to include the endpoint profiling policy for validation when you profile an endpoint.
Step 4 Enter a value for the minimum certainty factor within the valid range 1 to 65535.
Note The following considerations must be taken into account when you create custom profiling policies:
• If the same attributes configured in the custom policy are already configured to be evaluated by a default
profiling policy, and if the default profiling policy has a greater certainty factor (CF) than the custom
policy, then the custom profiling policy will never be asigned to any endpoint. This is because a profiling
policy that has higher increases of CF will take precedence over any other with lower increases of the CF.
• Many default profiling policies are configured for incremental CF increases by 10, 20 and 30.
Step 5 Click the arrow next to the Exception Action drop-down list to associate an exception action or click the arrow next
to the Network Scan (NMAP) Action drop-down list to associate a network scan action.
Step 6 Choose one of the following options for Create an Identity Group for the policy:
• Yes, create matching Identity Group
• No, use existing Identity Group hierarchy
Step 7 Click the arrow next to the Parent Policy drop-down list to associate a parent policy to the new endpoint policy.
Step 8 Choose a CoA type to be associated in the Associated CoA Type drop-down list.
Step 9 Click in the rule to add conditions and associate an integer value for the certainty factor for each condition or associate
either an exception action or a network scan action for that condition for the overall classification of an endpoint.
Step 10 Click Submit to add an endpoint policy or click the Profiler Policy List link from the New Profiler Policy page to
return to the Profiling Policies page.
• Reauth—This setting overrides the global Port Bounce and Reauth configuration types, and issues
reauthentication CoA.
Note If the profiler global CoA configuration is set to Port Bounce (or Reauth), ensure
that you configure corresponding endpoint profiling policies with No CoA, the
per-policy CoA option so that the BYOD flow does not break for your mobile
devices.
See the summary of configuration below combined for all the CoA types and the actual CoA type issued in
each case based on the global and endpoint profiling policy settings.
Global CoA Type Default CoA Type No coA Type per Port Bounce Type Reauth Type per
set per Policy Policy per Policy Policy
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Profiling > Profiling Policies.
Step 2 Click Import.
Step 3 Click Browse to locate the file that you previously exported and want to import.
Step 4 Click Submit.
Step 5 Click the Profiler Policy List link to return to the Profiling Policies window.
A dialog appears when you want to export endpoint profiling policies, which prompts you to open the
profiler_policies.xml with an appropriate application or save it. This is a file in XML format that you can
open in a web browser, or in other appropriate applications.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Profiling > Profiling Policies.
Step 2 Choose Export, and choose one of the following:
• Export Selected: You can export only the selected endpoint profiling policies in the Profiling Policies window.
• Export Selected with Endpoints: You can export the selected endpoint profiling policies, and the endpoints that
are profiled with the selected endpoint profiling policies.
• Export All: By default, you can export all the profiling policies in the Profiling Policies window.
Step 3 Click OK to export the endpoint profiling policies in the profiler_policies.xml file.
• Administrator Created: Endpoint profiling policies that you create or when you duplicate Cisco-provided
endpoint profiling policies are identified as the Administrator Created type.
We recommend that you create a generic policy (a parent) for a set of endpoints from which its children can
inherit the rules and conditions. If an endpoint has to be classified, then the endpoint profile has to first match
the parent, and then its descendant (child) policies when you are profiling an endpoint.
For example, Cisco-Device is a generic endpoint profiling policy for all Cisco devices, and other policies for
Cisco devices are children of Cisco-Device. If an endpoint has to be classified as a Cisco-IP-Phone 7960, then
the endpoint profile for this endpoint has to first match the parent Cisco-Device policy, its child Cisco-IP-Phone
policy, and then the Cisco-IP-Phone 7960 profiling policy for better classification.
Note Cisco ISE will not overwrite the Administrator Modified policies nor their children policies even if they are
still labeled as Cisco Provided. If an Administrator Modified policy is deleted, it reverts back to the previous
Cisco Provided policy. Next time when Feed Update happens, all children policies are updated.
• For dynamically assigned endpoints, the MATCHEDPROFILEs are identical to the matching endpoint
profiles.
You can determine a matching profiling policy for dynamic endpoints using one or more rules that are defined
in a profiling policy and assign appropriately an endpoint identity group for categorization.
When an endpoint is mapped to an existing policy, the profiling service searches the hierarchy of profiling
policies for the closest parent profile that has a matching group of policies and assigns the endpoint to the
appropriate endpoint policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Profiling > Profiling > Logical Profiles.
Step 2 Click Add.
Step 3 Enter a name and description for the new logical profile in the text boxes for Name and Description.
Step 4 Choose endpoint profiling policies from the Available Policies to assign them in a logical profile.
Step 5 Click the right arrow to move the selected endpoint profiling policies to the Assigned Policies.
Step 6 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Profiling >
Exception Actions.
Step 2 Click Add.
Step 3 Enter a name and description for the exception action in the text boxes for Name and Description.
Step 4 Check the CoA Action check box.
Step 5 Click the Policy Assignment drop-down list to choose an endpoint policy.
Step 6 Click Submit.
Note You cannot add, edit, delete, import, or export MDM Endpoints using this page.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Identities > Endpoints.
Step 2 Click Add.
Step 3 Enter the MAC address of an endpoint in hexadecimal format and separated by a colon.
Step 4 Choose a matching endpoint policy from the Policy Assignment drop-down list to change the static assignment status
from dynamic to static.
Step 5 Check the Static Assignment check box to change the status of static assignment that is assigned to the endpoint from
dynamic to static.
Step 6 Choose an endpoint identity group to which you want to assign the newly created endpoint from the Identity Group
Assignment drop-down list.
Step 7 Check the Static Group Assignment check box to change the dynamic assignment of an endpoint identity group to static.
Step 8 Click Submit.
CUSTOM.<custom attribute — —
name>
The file header has to be in the format as specified in the default import template so that the list of endpoints
appear in this order: MACAddress, EndpointPolicy, IdentityGroup <List of attributes listed above as optional
attributes>. You can create the following file templates:
• MACAddress
• MACAddress, EndPointPolicy
• MACAddress, EndPointPolicy, IdentityGroup
• MACAddress, EndPointPolicy, IdentityGroup, <List of attributes listed above as optional attributes>
All attribute values, except MAC address, are optional for importing endpoints from a CSV file. If you want
to import endpoints without certain values, the values are still separated by a comma. For example,
• MAC1, Endpoint Policy1, Endpoint Identity Group1
• MAC2
• MAC3, Endpoint Policy3
• MAC4, , Endpoint Identity Group4
• MAC5, , Endpoint Identity Group5, MyDescription, MyPortalUser, and so on
To import endpoint custom attributes, you have to create the same custom attributes as in the CSV file in the
Administration > Identity Management > Settings > Endpoint Custom Attributes window using the
correct data types. These attributes have to be prefixed with CUSTOM to differentiate them from endpoint
attributes.
MAC Address Endpoint Profiling Policy Endpoint Profiling Policy Assigned After
Assigned Before Import in Import in Cisco ISE
Cisco ISE
00:00:00:00:01:02 Unknown Xerox-Device
00:00:00:00:01:03 Unknown Xerox-Device
00:00:00:00:01:04 Unknown Xerox-Device
00:00:00:00:01:05 If no profile is assigned to an Xerox-Device
endpoint, then it is assigned to
the Unknown profile, and also
reprofiled to the matching
profile.
For example, if endpoints are assigned to invalid profiles in the file used for import, then they are not imported
because there are no matching profiles in Cisco ISE. See below how endpoints are not imported when they
are assigned to invalid profiles in the CSV file.
MAC Address Endpoint Profiling Policy Endpoint Profiling Policy Assigned After
Assigned Before Import in Import in Cisco ISE
Cisco ISE
00:00:00:00:01:02 Unknown Xerox-Device
00:00:00:00:01:05 If an endpoint such as The endpoint is not imported because there
00:00:00:00:01:05 is assigned is no matching profile in Cisco ISE.
to an invalid profile other than
the profiles that are available in
Cisco ISE, then Cisco ISE
displays a warning message that
the policy name is invalid and
the endpoint will not be
imported.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Context Visibility > Endpoints > Import > Import from
LDAP.
Step 2 Enter the values for the connection settings.
Step 3 Enter the values for the query settings.
Step 4 Click Submit.
Note To import endpoint custom attributes that are exported from one deployment to another, you must create the
same custom attributes in the Administration > Identity Management > Settings > Endpoint Custom
Attributes window and use the same data type as specified in the original deployment.
Export All exports all the endpoints in Cisco ISE, whereas Export Selected exports only the endpoints
selected by the user. By default, the profiler_endpoints.csv is the CSV file and Microsoft Office Excel is the
default application to open the CSV file.
To export the endpoints using a CSV file:
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Context Visibility > Endpoints.
Step 2 From the Export drop-down list, choose one of the following options:
Step 3 Click OK to save the CSV file.
Most of the attributes in the exported spreadsheet are simple. The following attributes require an explanation:
• UpdateTime: The last time that the profiler updated the endpoint, due to a change to an endpoint attribute. The value
is 0 if there have been no updates since the endpoint session started. It will be blank briefly, during an update
• InactivityTime: Time since the endpoint was active.
Identified Endpoints
Cisco ISE displays identified endpoints that connect to your network and use resources on your network in
the Endpoints window. An endpoint is typically a network-capable device that connect to your network
through wired and wireless network access devices and VPN. Endpoints can be personal computers, laptops,
IP phones, smart phones, gaming consoles, printers, fax machines, and so on.
The MAC address of an endpoint, expressed in hexadecimal form, is always the unique representation of an
endpoint, but you can also identify an endpoint with a varying set of attributes and the values associated to
them, called an attribute-value pair. You can collect a varying set of attributes for endpoints based on the
endpoint capability, the capability and configuration of the network access devices and the methods (probes)
that you use to collect these attributes.
Unknown Endpoints
If you do not have a matching profiling policy for an endpoint, you can assign an unknown profiling policy
(Unknown) and the endpoint therefore will be profiled as Unknown. The endpoint profiled to the Unknown
endpoint policy requires that you create a profile with an attribute or a set of attributes collected for that
endpoint. The endpoint that does not match any profile is grouped within the Unknown endpoint identity
group.
When you change endpoint profile definitions in Cisco ISE, all endpoints have to be reprofiled. A Policy
Service node that collects the attributes of endpoints is responsible for reprofiling of those endpoints.
When a Policy Service node starts collecting attributes about an endpoint for which attributes were initially
collected by a different Policy Service node, then the endpoint ownership changes to the current Policy Service
node. The new Policy Service node will retrieve the latest attributes from the previous Policy Service node
and reconcile the collected attributes with those attributes that were already collected.
When a significant attribute changes in the endpoint, attributes of the endpoint are automatically saved in the
Administration node database so that you have the latest significant change in the endpoint. If the Policy
Service node that owns an endpoint is not available for some reasons, then the Administrator ISE node will
reprofile an endpoint that lost the owner and you have to configure a new Policy Service node for such
endpoints.
When an endpoint is edited and saved in the Administration node, the attributes are retrieved from the current
owner of the endpoint.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Groups >
Endpoint Identity Groups.
Step 2 Click Add.
Step 3 Enter the Name for the endpoint identity group that you want to create (do not include spaces in the name of the endpoint
identity group).
Step 4 Enter the Description for the endpoint identity group that you want to create.
Step 5 Click the Parent Group drop-down list to choose an endpoint identity group to which you want to associate the newly
created endpoint identity group.
Step 6 Click Submit.
In addition to the above system created endpoint identity groups, Cisco ISE creates the following endpoint
identity groups, which are associated to the Profiled (parent) identity group. A parent group is the default
identity group that exists in the system:
• Cisco-IP-Phone: An identity group that contains all the profiled Cisco IP phones on your network.
• Workstation: An identity group that contains all the profiled workstations on your network.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Groups >
Endpoint Identity Groups.
Step 2 Choose an endpoint identity group, and click Edit.
Step 3 Click Add.
Step 4 Choose an endpoint in the Endpoints widget to add the selected endpoint in the endpoint identity group.
Step 5 Click the Endpoint Group List link to return to the Endpoint Identity Groups page.
You must ensure that the endpoint profiling policies are either standalone policies (not a parent to other
endpoint profiling policies), or their parent policies of the endpoint profiling policies are not disabled.
The OUI database contains the MAC OUIs assigned to vendors. The OUI list is available here:
http://standards.ieee.org/develop/regauth/oui/oui.txt
Cisco ISE downloads policies and OUI database updates every day at 1:00 A.M of the local Cisco ISE server
time zone. Cisco ISE automatically applies these downloaded feed server policies, and stores the the changes
so that you can revert to the previous state. When you revert to a previous state, the new endpoint profiling
policies are removed and updated endpoint profiling policies are reverted to the previous state. In addition,
the profiler feed service is automatically disabled.
You can also update the feed services manually in offline mode. You can download the updates manually by
using this option if you cannot connect your ISE deployments to Cisco feed service.
Note Updates from the Feed Service are not allowed after the license goes Out of Compliance (OOC) for 45 days
within a 60-day window period. The license is out of compliance when it has expired, or when the usage
exceeds the allowed number of sessions.
You can change the CoA type in a Cisco-provided profiling policy. When the feed service updates that policy,
the CoA type will not be changed, but the rest of that policy's attributes will be still be updated.
Cisco ISE, Release 2.7 and later allow you to manually download OUI updates without downloading policy
updates. If you customized some of your profiler conditions to change more than just the CoA type, you may
not want the profiler feed to replace those conditions. You may still want the OUI updates, so the profiler can
identify new devices as manufacturers add them. The option to download only OUI is available on the Feed
Service portal.
Step 1 Choose Administration > System > Certificates > Trusted Certificates, and check if QuoVadis Root CA 2 is enabled.
Step 2 Choose Work Centers > Profiler > Feeds.
You can also access the option in the Administration > FeedService > Profiler page.
Step 3 Click the Online Subscription Update tab.
Step 4 Click the Test Feed Service Connection button to verify that there is a connection to the Cisco Feed Service, and that
the certificate is valid.
Step 5 Check the Enable Online Subscription Update check box.
Step 6 Enter time in HH:MM format (local time zone of the Cisco ISE server). By default, Cisco ISE feed service is scheduled
at 1.00 AM every day.
Step 7 Check the Notify administrator when download occurs check box and enter your e-mail address in the Administrator
email address text box. Check the Provide Cisco anonymous information to help improve profiling accuracy check
box, if you want to allow Cisco ISE to collect non-sensitive information (that will be used to provide better services and
additional features in forthcoming releases).
Step 8 Click Save.
Step 9 Click Update Now.
Instructs Cisco ISE to contact Cisco feed server for new and updated profiles created since the last feed service update.
This re-profiles all endpoints in the system, which may cause an increase the load on the system. Due to updated endpoint
profiling policies, there may be changes in the authorization policy for some endpoints that are currently connected to
Cisco ISE.
The Update Now button is disabled when you update new and updated profiles created since the last feed service and
enabled only after the download is completed. You must navigate away from the profiler feed service configuration
window and return to this window.
Related Topics
Configure Profiler Feed Services Offline, on page 795
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Profiler > Feeds.
You can also access the option in the Administration > FeedService > Profiler page.
Step 9 Click Download Package and save the file to your local system.
You can upload the saved file to Cisco ISE server to apply the feed updates in the downloaded package.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Profiler > Feeds .
You can also access the option in the Administration > FeedService > Profiler window.
Step 2 Click the Offline Manual Update tab.
Step 3 Click Browse and choose the downloaded profiler feed package.
Step 4 Click Apply Update .
Step 1 Perform Step 1 through Step 5 in the Download Offline Update Package section to go to the Feed Service Partner Portal.
Step 2 Choose Offline Feed > Email Preferences.
Step 3 Check the Enable Notifications checkbox to receive notifications.
Step 4 Choose the number of days from the days drop-down list to set the frequency in which you want to receive the notifications
on new updates.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Profiler > Feeds.
Step 2 Click Go to Update Report Page if you want to view the configuration changes made in the Change Configuration Audit
report.
Step 3 Click Undo Latest.
Profiler Reports
Cisco ISE provides you with various reports on endpoint profiling, and troubleshooting tools that you can use
to manage your network. You can generate reports for historical as well as current data. You may be able to
drill down on a part of the report to view more details. For large reports, you can also schedule reports and
download them in various formats.
You can run the following reports for endpoints from Operations > Reports > Endpoints and Users:
• Endpoint Session History
• Profiled Endpoint Summary
• Endpoint Profile Changes
• Top Authorizations by Endpoint
• Registered Endpoints
If you enable Anomalous Behavior detection, Cisco ISE probes for data, and checks for any contradiction to
the existing data with respect to changes in attributes related to NAS-Port-Type, DHCP Class Identifier, and
Endpoint Policy. If so, an attribute called AnomalousBehavior set to true is added to the endpoint which
helps you to filter and view the endpoints in the Visibility Context page. Audit logs are also generated for the
respective MAC address.
When anomalous behavior detection is enabled, Cisco ISE checks if the following attributes of existing
endpoints have changed:
1. Port-Type—Determines if the access method of an endpoint has changed. This only applies when the
same MAC address that is connected via Wired Dot1x has been used for Wireless Dot1x and visa-versa.
2. DHCP Class Identifier—Determines whether the type of client or vendor of an endpoint has changed.
This only applies when DHCP Class identifier attribute is populated with a certain value and is then
changed to another value. If an endpoint is configured with a static IP, the DHCP Class Identifier attribute
is empty in Cisco ISE. Later on, if another device spoofs the MAC address of this endpoint and uses
DHCP, the Class Identifier changes from an empty value to a specific string. This will not trigger anomalous
behavior detection.
3. Endpoint Policy—Determines if there are significant profile changes. This only applies when the profile
of an endpoint changes from a “Phone” or “Printer” to a “Workstation”.
If you enable Anomalous Behavior Enforcement, a CoA is issued upon detection of the anomalous Behavior,
which can be used to re-authorize the suspicious endpoints, based on the authorization rules configured in the
Profiler Configuration window.
Step 2 Click the arrow icon from the View column corresponding to the Default Policy to open the Set view screen and view
and manage the default authorization policy.
Step 3 From the Actions column on any row, click the cog icon and then from the drop-down list, insert a new authorization
rule by selecting any of the insert or duplicate options, as necessary.
A new row appears in the Policy Sets table.
Step 4 Enter the Rule Name.
Step 5 From the Conditions column, click the (+) symbol.
Step 6 Create the required conditions in the Conditions Studio Page. In the Editor section, click the Click To Add an Attribute
text box, and select the required Dictionary and Attribute (for example, Endpoints.AnomalousBehaviorEqualsTrue).
You can also drag and drop a Library condition to the Click To Add An Attribute text box.
Step 7 Click Use to set the authorization policy rules for endpoints with anomalous behavior.
Step 8 Click Done.
• Click Anomalous Behavior from Home > Summary > Metrics. This action opens a new tab with
Anomalous Behaviour column in the lower pane of the window.
• Choose Context Visibility > Endpoints > Endpoint Classification. You can view the Anomalous
Behaviour column in the lower pane of the window.
• You can create a new Anomalous Behavior column in Authentication view or Compromised Endpoints
view in the Context Visibility window as explained in the following steps:
Step 1 Choose Context Visibility > Endpoints > Authentication or Context Visibility > Endpoints > Compromised Endpoints.
Step 2 Click the Settings icon in the lower pane of the window and check Anomalous Behavior check box..
Step 3 Click Go.
You can view the Anomalous Behavior column in the Authentication or Compromised Endpoints View.
Possible Causes
The client provisioning policy is missing required settings.
Resolution
• Ensure that a client provisioning policy exists in Cisco ISE. If yes, verify the policy identity group,
conditions, and type of agent defined in the policy. Also ensure whether or not there is any agent profile
configured under Policy > Policy Elements > Results > Client Provisioning > Resources > Add >
AnyConnect Posture Profile, even a profile with all default values.
• Try re-authenticating the client machine by bouncing the port on the access switch.
Endpoints
These windows enable you to configure and manage endpoints that connect to your network.
Endpoint Settings
The following table describes the fields on the Endpoints window, which you can use to create endpoints
and assign policies for endpoints. To view this window, click the Menu icon ( ) and choose Work Centers >
Network Access > Identities > Endpoints.
MAC Address Enter the MAC address in hexadecimal format to create an endpoint statically.
The MAC address is the device identifier for the interface that is connected to the Cisco
ISE enabled network.
Static Assignment Check this check box when you want to create an endpoint statically in the Endpoints
window and the status of static assignment is set to static.
You can toggle the status of static assignment of an endpoint from static to dynamic
or from dynamic to static.
Policy Assignment (Disabled by default unless the Static Assignment is checked) Choose a matching
endpoint policy from the Policy Assignment drop-down list.
You can do one of the following:
• If you do not choose a matching endpoint policy, but use the default endpoint
policy Unknown, then the static assignment status is set to dynamic for the
endpoint that allows dynamic profiling of an endpoint.
• If you choose a matching endpoint policy other than Unknown, then the static
assignment status is set to static for that endpoint and the Static Assignment
check box is automatically checked.
Static Group Check this check box when you want to assign an endpoint to an identity group
Assignment statically.
In you check this check box, the profiling service does not change the endpoint identity
group the next time during evaluation of the endpoint policy for these endpoints, which
were previously assigned dynamically to other endpoint identity groups.
If you uncheck this check box, then the endpoint identity group is dynamic as assigned
by the ISE profiler based on policy configuration. If you do not choose the Static Group
Assignment option, then the endpoint is automatically assigned to the matching identity
group the next time during evaluation of the endpoint policy.
Identity Group Choose an endpoint identity group to which you want to assign the endpoint.
Assignment
You can assign an endpoint to an identity group when you create an endpoint statically,
or when you do not want to use the Create Matching Identity Group option during
evaluation of the endpoint policy for an endpoint.
Cisco ISE includes the following system created endpoint identity groups:
• Blocked List
• GuestEndpoints
• Profiled
• Cisco IP-Phone
• Workstation
• RegisteredDevices
• Unknown
Related Topics
Identified Endpoints, on page 788
Create Endpoints with Static Assignments of Policies and Identity Groups, on page 784
Connection Settings
Port Enter the port number of the LDAP server. You can use the default port 389 to import
from an LDAP server, and the default port 636 to import from an LDAP server over
SSL.
Note Cisco ISE supports any configured port number. The configured value should
match the LDAP server connection details.
Enable Secure Check the Enable Secure Connection check box to import from an LDAP server over
Connection SSL.
Anonymous Bind You must enable either the Anonymous Bind check box, or enter the LDAP
administrator credentials from the slapd.conf configuration file.
Admin DN Enter the distinguished name (DN) configured for the LDAP administrator in the
slapd.conf configuration file.
Admin DN format example: cn=Admin, dc=cisco.com, dc=com
Password Enter the password configured for the LDAP administrator in the slapd.conf
configuration file.
Query Settings
MAC Address Enter the query filter, which is used for importing the MAC address, for example,
objectClass ieee802Device.
MAC Address Enter the returned attribute name for import, for example, macAddress.
Attribute Name
Profile Attribute Enter the name of the LDAP attribute. This attribute holds the policy name for each
Name endpoint entry that is defined in the LDAP server.
When you configure the Profile Attribute Name field, consider the following:
• If you do not specify this LDAP attribute in the Profile Attribute Name field or
configure this attribute incorrectly, then endpoints are marked “Unknown” during
an import operation, and these endpoints are profiled separately to the matching
endpoint profiling policies.
• If you configure this LDAP attribute in the Profile Attribute Name field, the
attribute values are validated to ensure that the endpoint policy matches with an
existing policy in Cisco ISE, and endpoints are imported. If the endpoint policy
does not match with an existing policy, then those endpoints will not be imported.
Time Out Enter the time in seconds. The valid range is from 1 to 60 seconds.
Related Topics
Identified Endpoints, on page 788
Import Endpoints from LDAP Server, on page 787
Name Enter the name of the endpoint profiling policy that you want to create.
Description Enter the description of the endpoint profiling policy that you want to create.
Policy Enabled By default, the Policy Enabled check box is checked to associate a matching profiling
policy when you profile an endpoint.
When unchecked, the endpoint profiling policy is excluded when you profile an
endpoint.
Minimum Enter the minimum value that you want to associate with the profiling policy. The
Certainty Factor default value is 10.
Exception Action Choose an exception action, which you want to associate with the conditions when
defining a rule in the profiling policy.
The default is NONE. The exception actions are defined in the following location:
Policy > Policy Elements > Results > Profiling > Exception Actions.
Network Scan Choose a network scan action from the list, which you want to associate with the
(NMAP) Action conditions when defining a rule in the profiling policy, if required.
The default is NONE. The exception actions are defined in the following location:
Policy > Policy Elements > Results > Profiling > Network Scan (NMAP) Actions.
Create an Identity Check one of the following options to create an endpoint identity group:
Group for the
• Yes, create matching Identity Group
policy
• No, use existing Identity Group hierarchy
No, use existing Check this check box to assign endpoints to the matching parent endpoint identity
Identity Group group using hierarchical construction of profiling policies and identity groups.
hierarchy
This option allows you to make use of the endpoint profiling policies hierarchy to
assign endpoints to one of the matching parent endpoint identity groups, as well as to
the associated endpoint identity groups to the parent identity group.
For example, endpoints that match an existing profile are grouped under the appropriate
parent endpoint identity group. Here, endpoints that match the Unknown profile are
grouped under Unknown, and endpoints that match an existing profile are grouped
under the Profiled endpoint identity group. For example,
• If endpoints match the Cisco-IP-Phone profile, then they are grouped under the
Cisco-IP-Phone endpoint identity group.
• If endpoints match the Workstation profile, then they are grouped under the
Workstation endpoint identity group.
The Cisco-IP-Phone and Workstation endpoint identity groups are associated to
the Profiled endpoint identity group in the system.
Parent Policy Choose a parent profiling policy that are defined in the system to which you want to
associate the new endpoint profiling policy.
You can choose a parent profiling policy from which you can inherit rules and
conditions to its child.
Associated CoA Choose one of the following CoA types that you want to associate with the endpoint
Type profiling policy:
• No CoA
• Port Bounce
• Reauth
• Global Settings that is applied from the profiler configuration set in Administration
> System > Settings > Profiling
Rules One or more rules that are defined in endpoint profiling policies determine the matching
profiling policy for endpoints, which allows you to group endpoints according to their
profiles.
One or more profiling conditions from the policy elements library are used in rules for
validating endpoint attributes and their values for the overall classification.
Conditions Click the plus [+] sign to expand the Conditions anchored overlay, and click the minus
[-] sign, or click outside the anchored overlay to close it.
Click Select Existing Condition from Library or Create New Condition (Advanced
Option) .
Select Existing Condition from Library: You can define an expression by selecting
Cisco predefined conditions from the policy elements library.
Create New Condition (Advanced Option): You can define an expression by selecting
attributes from various system or user-defined dictionaries.
You can associate one of the following with the profiling conditions:
• An integer value for the certainty factor for each condition
• Either an exception action or a network scan action for that condition
Choose one of the following predefined settings to associate with the profiling condition:
• Certainty Factor Increases: Enter the certainty value for each rule, which can be
added for all the matching rules with respect to the overall classification.
• Take Exception Action: Triggers an exception action that is configured in the
Exception Action field for this endpoint profiling policy.
• Take Network Scan Action: Triggers a network scan action that is configured in
the Network Scan (NMAP) Action field for this endpoint profiling policy.
Related Topics
Cisco ISE Profiling Service, on page 732
Create Endpoint Profiling Policies, on page 776
Endpoint Context Visibility Using UDID Attribute, on page 806
Note The endpoint must have AnyConnect 4.7 or higher to create the UDID.
• Configure login credentials for Cisco ISE to access MacOS and Windows endpoints with administrative
privileges.
In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings >
Protocols > Endpoint Login Configuration, and configure the following:
• Domain credentials with which Cisco ISE can log into endpoints.
• Local user credentials for Windows and MacOS with which Cisco ISE can log into the endpoints
as a local user.
Domain user has precedence over local user. If you have configured both, and need to run a script
with local user credentials, you must remove domain credentials.
• Windows endpoints must have Windows PowerShell version 5.1 or later installed. PowerShell remoting
must be enabled.
• MacOS endpoints must have Bash installed.
• Both Windows and MacOS endpoints must have cURL version 7.34 or later installed.
• The Windows and MacOS endpoints must be connected to a network and have active sessions in Cisco
ISE.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Context Visibility > Endpoints
Step 2 Click the link icon in the top-right corner of the window, and choose Run Endpoint Scripts from the drop-down list.
The Welcome tab contains a link to the Endpoint Login Configuration window to configure login credentials, if this
is not already done. You can click the Start button at the bottom-right corner of this tab only when login credentials are
configured.
Step 3 In the Select Category tab, you can select endpoints based either on their operating systems, or the applications available
on them. Click the radio button for By OS or By Application to make your choice. Click Next to continue.
Step 4 In the Select Endpoints window, a dashlet displays the filters available for OS type, or application, as applicable. In the
dashlet, click the filter you wish to apply, and all the endpoints for that filter are listed in a table.
• To select all the endpoints for the chosen filter, check the checkbox in the title row of the table.
• To select specific endpoints, check the check box for that entry in the table. To find a specific endpoint from the
table, click the Filter button above the table and choose Quick Filter. You can filter by any of the parameters
displayed to find the required endpoints.
Note If you chose By Application in the Select Categories step, remember to select endpoints belonging to the same
OS type in this step. In the case of application-based scripts, create a script for each OS type and set up a separate
job for each OS type on the Endpoints Scripts Wizard.
Step 5 Click Next after choosing the endpoints on which to run a script.
Step 6 In the Select Scripts tab, click Add.
Step 7 Click Add Script to choose the script from your system. Click Start Upload to add the script to the Select Scripts tab.
Step 8 Check the check box for the script you wish to run and click Next.
Step 9 The Summary tab displays the endpoints selected and the script chosen. Review the selection here and click Back to
change any details. Click Finish to initiate running the scripts.
A pop-up window named Endpoints Script Report is displayed, with the Job ID of this task. Click Endpoint Scripts
provisioning report to be redirected to the window with the details of this task.
To view the reports of jobs run through the Endpoints Scripts Wizard, choose Operations > Reports > Reports >
Endpoints and Users > Endpoint Scripts Provisioning Summary.
Operating System Operating system for which the selected script was
run.
IF-MIB
Object OID
ifIndex 1.3.6.1.2.1.2.2.1.1
ifDescr 1.3.6.1.2.1.2.2.1.2
ifType 1.3.6.1.2.1.2.2.1.3
ifSpeed 1.3.6.1.2.1.2.2.1.5
ifPhysAddress 1.3.6.1.2.1.2.2.1.6
ifAdminStatus 1.3.6.1.2.1.2.2.1.7
ifOperStatus 1.3.6.1.2.1.2.2.1.8
SNMPv2-MIB
Object OID
system 1.3.6.1.2.1.1
sysDescr 1.3.6.1.2.1.1.1.0
sysObjectID 1.3.6.1.2.1.1.2.0
sysUpTime 1.3.6.1.2.1.1.3.0
sysContact 1.3.6.1.2.1.1.4.0
sysName 1.3.6.1.2.1.1.5.0
sysLocation 1.3.6.1.2.1.1.6.0
sysServices 1.3.6.1.2.1.1.7.0
sysORLastChange 1.3.6.1.2.1.1.8.0
sysORTable 1.3.6.1.2.1.1.9.0
IP-MIB
Object OID
ipAdEntIfIndex 1.3.6.1.2.1.4.20.1.2
ipAdEntNetMask 1.3.6.1.2.1.4.20.1.3
Object OID
ipNetToMediaPhysAddress 1.3.6.1.2.1.4.22.1.2
ipNetToPhysicalPhysAddress 1.3.6.1.2.1.4.35.1.4
CISCO-CDP-MIB
Object OID
cdpCacheEntry 1.3.6.1.4.1.9.9.23.1.2.1.1
cdpCacheIfIndex 1.3.6.1.4.1.9.9.23.1.2.1.1.1
cdpCacheDeviceIndex 1.3.6.1.4.1.9.9.23.1.2.1.1.2
cdpCacheAddressType 1.3.6.1.4.1.9.9.23.1.2.1.1.3
cdpCacheAddress 1.3.6.1.4.1.9.9.23.1.2.1.1.4
cdpCacheVersion 1.3.6.1.4.1.9.9.23.1.2.1.1.5
cdpCacheDeviceId 1.3.6.1.4.1.9.9.23.1.2.1.1.6
cdpCacheDevicePort 1.3.6.1.4.1.9.9.23.1.2.1.1.7
cdpCachePlatform 1.3.6.1.4.1.9.9.23.1.2.1.1.8
cdpCacheCapabilities 1.3.6.1.4.1.9.9.23.1.2.1.1.9
cdpCacheVTPMgmtDomain 1.3.6.1.4.1.9.9.23.1.2.1.1.10
cdpCacheNativeVLAN 1.3.6.1.4.1.9.9.23.1.2.1.1.11
cdpCacheDuplex 1.3.6.1.4.1.9.9.23.1.2.1.1.12
cdpCacheApplianceID 1.3.6.1.4.1.9.9.23.1.2.1.1.13
cdpCacheVlanID 1.3.6.1.4.1.9.9.23.1.2.1.1.14
cdpCachePowerConsumption 1.3.6.1.4.1.9.9.23.1.2.1.1.15
cdpCacheMTU 1.3.6.1.4.1.9.9.23.1.2.1.1.16
cdpCacheSysName 1.3.6.1.4.1.9.9.23.1.2.1.1.17
cdpCacheSysObjectID 1.3.6.1.4.1.9.9.23.1.2.1.1.18
cdpCachePrimaryMgmtAddrType 1.3.6.1.4.1.9.9.23.1.2.1.1.19
cdpCachePrimaryMgmtAddr 1.3.6.1.4.1.9.9.23.1.2.1.1.20
cdpCacheSecondaryMgmtAddrType 1.3.6.1.4.1.9.9.23.1.2.1.1.21
Object OID
cdpCacheSecondaryMgmtAddr 1.3.6.1.4.1.9.9.23.1.2.1.1.22
cdpCachePhysLocation 1.3.6.1.4.1.9.9.23.1.2.1.1.23
cdpCacheLastChange 1.3.6.1.4.1.9.9.23.1.2.1.1.24
CISCO-VTP-MIB
Object OID
vtpVlanIfIndex 1.3.6.1.4.1.9.9.46.1.3.1.1.18.1
vtpVlanName 1.3.6.1.4.1.9.9.46.1.3.1.1.4.1
vtpVlanState 1.3.6.1.4.1.9.9.46.1.3.1.1.2.1
CISCO-STACK-MIB
Object OID
portIfIndex 1.3.6.1.4.1.9.5.1.4.1.1.11
vlanPortVlan 1.3.6.1.4.1.9.5.1.9.3.1.3.1
BRIDGE-MIB
Object OID
dot1dTpFdbPort 1.3.6.1.2.1.17.4.3.1.2
dot1dBasePortIfIndex 1.3.6.1.2.1.17.1.4.1.2
OLD-CISCO-INTERFACE-MIB
Object OID
locIfReason 1.3.6.1.4.1.9.2.2.1.1.20
CISCO-LWAPP-AP-MIB
Object OID
cLApEntry 1.3.6.1.4.1.9.9.513.1.1.1
cLApSysMacAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.1
cLApIfMacAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.2
cLApMaxNumberOfDot11Slots 1.3.6.1.4.1.9.9.513.1.1.1.1.3
cLApEntPhysicalIndex 1.3.6.1.4.1.9.9.513.1.1.1.1.4
cLApName 1.3.6.1.4.1.9.9.513.1.1.1.1.5
cLApUpTime 1.3.6.1.4.1.9.9.513.1.1.1.1.6
cLLwappUpTime 1.3.6.1.4.1.9.9.513.1.1.1.1.7
cLLwappJoinTakenTime 1.3.6.1.4.1.9.9.513.1.1.1.1.8
cLApMaxNumberOfEthernetSlots 1.3.6.1.4.1.9.9.513.1.1.1.1.9
cLApPrimaryControlerAddressType 1.3.6.1.4.1.9.9.513.1.1.1.1.10
cLApPrimaryControllerAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.11
cLApSecondaryControlerAddressType 1.3.6.1.4.1.9.9.513.1.1.1.1.12
cLApSecondaryControlerAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.13
cLApTertiaryControlerAddressType 1.3.6.1.4.1.9.9.513.1.1.1.1.14
cLApTertiaryControllerAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.15
cLApLastRebootReason 1.3.6.1.4.1.9.9.513.1.1.1.1.16
cLApEncryptionEnable 1.3.6.1.4.1.9.9.513.1.1.1.1.17
cLApFailoverPriority 1.3.6.1.4.1.9.9.513.1.1.1.1.18
cLApPowerStatus 1.3.6.1.4.1.9.9.513.1.1.1.1.19
cLApTelnetEnable 1.3.6.1.4.1.9.9.513.1.1.1.1.20
cLApSshEnable 1.3.6.1.4.1.9.9.513.1.1.1.1.21
cLApPreStdStateEnabled 1.3.6.1.4.1.9.9.513.1.1.1.1.22
cLApPwrInjectorStateEnabled 1.3.6.1.4.1.9.9.513.1.1.1.1.23
cLApPwrInjectorSelection 1.3.6.1.4.1.9.9.513.1.1.1.1.24
cLApPwrInjectorSwMacAddr 1.3.6.1.4.1.9.9.513.1.1.1.1.25
Object OID
cLApWipsEnable 1.3.6.1.4.1.9.9.513.1.1.1.1.26
cLApMonitorModeOptimization 1.3.6.1.4.1.9.9.513.1.1.1.1.27
cLApDomainName 1.3.6.1.4.1.9.9.513.1.1.1.1.28
cLApNameServerAddressType 1.3.6.1.4.1.9.9.513.1.1.1.1.29
cLApNameServerAddress 1.3.6.1.4.1.9.9.513.1.1.1.1.30
cLApAMSDUEnable 1.3.6.1.4.1.9.9.513.1.1.1.1.31
cLApEncryptionSupported 1.3.6.1.4.1.9.9.513.1.1.1.1.32
cLApRogueDetectionEnabled 1.3.6.1.4.1.9.9.513.1.1.1.1.33
CISCO-LWAPP-DOT11-CLIENT-MIB
Object OID
cldcClientEntry 1.3.6.1.4.1.9.9.599.1.3.1.1
cldcClientMacAddress 1.3.6.1.4.1.9.9.599.1.3.1.1.1
cldcClientStatus 1.3.6.1.4.1.9.9.599.1.3.1.1.2
cldcClientWlanProfileName 1.3.6.1.4.1.9.9.599.1.3.1.1.3
cldcClientWgbStatus 1.3.6.1.4.1.9.9.599.1.3.1.1.4
cldcClientWgbMacAddress 1.3.6.1.4.1.9.9.599.1.3.1.1.5
cldcClientProtocol 1.3.6.1.4.1.9.9.599.1.3.1.1.6
cldcAssociationMode 1.3.6.1.4.1.9.9.599.1.3.1.1.7
cldcApMacAddress 1.3.6.1.4.1.9.9.599.1.3.1.1.8
cldcIfType 1.3.6.1.4.1.9.9.599.1.3.1.1.9
cldcClientIPAddress 1.3.6.1.4.1.9.9.599.1.3.1.1.10
cldcClientNacState 1.3.6.1.4.1.9.9.599.1.3.1.1.11
cldcClientQuarantineVLAN 1.3.6.1.4.1.9.9.599.1.3.1.1.12
cldcClientAccessVLAN 1.3.6.1.4.1.9.9.599.1.3.1.1.13
cldcClientLoginTime 1.3.6.1.4.1.9.9.599.1.3.1.1.14
cldcClientUpTime 1.3.6.1.4.1.9.9.599.1.3.1.1.15
Object OID
cldcClientPowerSaveMode 1.3.6.1.4.1.9.9.599.1.3.1.1.16
cldcClientCurrentTxRateSet 1.3.6.1.4.1.9.9.599.1.3.1.1.17
cldcClientDataRateSet 1.3.6.1.4.1.9.9.599.1.3.1.1.18
CISCO-AUTH-FRAMEWORK-MIB
Object OID
cafPortConfigEntry 1.3.6.1.4.1.9.9.656.1.2.1.1
cafSessionClientMacAddress 1.3.6.1.4.1.9.9.656.1.4.1.1.2
cafSessionStatus 1.3.6.1.4.1.9.9.656.1.4.1.1.5
cafSessionDomain 1.3.6.1.4.1.9.9.656.1.4.1.1.6
cafSessionAuthUserName 1.3.6.1.4.1.9.9.656.1.4.1.1.10
cafSessionAuthorizedBy 1.3.6.1.4.1.9.9.656.1.4.1.1.12
cafSessionAuthVlan 1.3.6.1.4.1.9.9.656.1.4.1.1.14
dot1xAuthAuthControledPortStatus 1.0.8802.1.1.1.1.2.1.1.5
dot1xAuthAuthControledPortControl 1.0.8802.1.1.1.1.2.1.1.6
dot1xAuthSessionUserName 1.0.8802.1.1.1.1.2.4.1.9
HOST-RESOURCES-MIB
Object OID
hrDeviceDescr 1.3.6.1.2.1.25.3.2.1.3
hrDeviceStatus 1.3.6.1.2.1.25.3.2.1.5
LLDP-MIB
Object OID
lldpEntry 1.0.8802.1.1.2.1.4.1.1
lldpTimeMark 1.0.8802.1.1.2.1.4.1.1.1
lldpLocalPortNum 1.0.8802.1.1.2.1.4.1.1.2
lldpIndex 1.0.8802.1.1.2.1.4.1.1.3
lldpChassisIdSubtype 1.0.8802.1.1.2.1.4.1.1.4
lldpChassisId 1.0.8802.1.1.2.1.4.1.1.5
lldpPortIdSubtype 1.0.8802.1.1.2.1.4.1.1.6
lldpPortId 1.0.8802.1.1.2.1.4.1.1.7
lldpPortDescription 1.0.8802.1.1.2.1.4.1.1.8
lldpSystemName 1.0.8802.1.1.2.1.4.1.1.9
lldpSystemDescription 1.0.8802.1.1.2.1.4.1.1.10
ldpCapabilitiesMapSupported 1.0.8802.1.1.2.1.4.1.1.11
lldpCacheCapabilities 1.0.8802.1.1.2.1.4.1.1.12
Note The dataset used for search is based on Endpoint ID as indexes. Therefore, when authentication occurs, it is
mandatory to have Endpoint IDs for the endpoints for those authentications to include them in the search
result set.
You can use the clickable timeline at the top to see major authorization transitions. You can also export the
results in .csv format by using the Export Results option. The report gets downloaded to your browser.
You can click the Endpoint Details link to see more authentication, accounting, and profiler information for
a particular endpoint. The following figure shows an example of endpoint details information displayed for
an endpoint.
• Failure Reason
• Identity Group
• Identity Store
• Network Device name
• Network Device Type
• Operating System
• Posture Status
• Location
• Security Group
• User Type
You should enter at least three characters for any of the search criteria in the Search field to display data.
Note If an endpoint has been authenticated by Cisco ISE, or its accounting update has been received, it can be found
through the global search. Endpoints that have been manually added and are not authenticated by or accounted
for in Cisco ISE will not show up in the search results.
The search result provides a detailed and at-a-glance information about the current status of the endpoint,
which you can use for troubleshooting. Search results display only the top 25 entries. You can use filters to
narrow down the results.
You can use any of the properties in the left panel to filter the results. You can also click on any endpoint to
see more detailed information about the endpoint, such as:
• Session trace
• Authentication details
• Accounting details
• Posture details
• Profiler details
• Client Provisioning details
• Guest accounting and activity
• Monitoring node (MnT node): The MnT node collects, aggregates, and reports data about the end-user
and device activity on the My Devices, Sponsor, and Guest portals. If the primary MnT node fails, the
secondary MnT node automatically becomes the primary MonT node.
Once you configure these general settings, they apply to all BYOD and My Devices portals that you set up
for your company.
Cisco ISE provides you with the ability to host multiple device portals on the Cisco ISE server, including a
predefined set of default portals. The default portal themes have standard Cisco branding that you can customize
through the Administrators portal (Administration > Device Portal Management). You can also choose to
further customize a portal by uploading images, logos, and cascading style sheets (CSS) files that are specific
to your organization.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management.
Step 2 Select the specific device portal that you want to configure.
Alternatively, you can click on Download icon > right click on downloaded file > Keep file on your Microsoft
Edge 93 or Microsoft Edge 94 browser.
If you are using Google Chrome 93 or Google Chrome 95 as your web browser for downloading Network
Setup Assistant (NSA) and AnyConnect wizards, click the Keep option in the download notification to keep
and install the NSA and AnyConnect packages on your system.
Note • BYOD flow is not supported when a device is connected to a network using Network Access Manager
(NAM).
• If you are using the BYOD flow for Android devices, upgrade to Android 11 or enable the Broadcast
SSID option in WLAN configuration.
Related Topics
Create a BYOD Portal, on page 834
Personal Devices on a Corporate Network (BYOD), on page 819
My Devices Portal
Employees can access the My Devices portal directly.
Some network devices that need network access are not supported by native supplicant provisioning and
cannot be registered using the BYOD portal. However, employees can add and register personal devices,
whose operating systems are not supported or do not have web browsers (such as printers, internet radios,
and other devices), using the My Devices portal.
Employees can add and manage new devices by entering the MAC address for the device. When employees
add devices using the My Devices portal, Cisco ISE adds the devices to the Endpoints window
(Administration > Context Visibility > Endpoints) as members of the RegisteredDevices endpoint identity
group (unless already statically assigned to a different endpoint identity group). The devices are profiled like
any other endpoint in Cisco ISE and go through a registration process for network access.
When two MAC addresses from one device are entered into the My Devices portal by a user, profiling
determines that they have the same hostname, and they are merged together as a single entry in Cisco ISE.
For example, a user registers a laptop with wired and wireless addresses. Any operations on that device, such
as delete, acts on both addresses.
When a registered device is deleted from the portal, the DeviceRegistrationStatus and BYODRegistration
attributes change to Not Registered and No, respectively. However, these attributes remain unchanged when
a guest (who is not an employee) registers a device using the Guest Device Registration window in the
credentialed Guest portals, because these BYOD attributes are used only during employee device registration.
Regardless of whether employees register their devices using the BYOD or the My Devices portals, they can
use the My Devices portal to manage them.
Note The My Devices portal is not available when the Administrator's portal is down.
When endpoints are imported from Context visibility, they are not automatically linked to BYOD user accounts.
They must follow the usual BYOD registration process to be added to the My Devices portal.
Related Topics
Create a My Devices Portal, on page 839
If you use Cisco ISE Release 3.0 Patch 6 or later releases, in the case of single or dual SSID BYOD flows, a
BYOD user with an iOS device must carry out the following steps before they connect to the enterprise
network:
1. Go to Settings > Safari.
Note Network Setup Assistant cannot be downloaded to a Windows device, unless the
user of that device has administrative privileges. If you cannot grant end users
administrative privileges, then use your Group Policy object (GPO) to push the
certificate to the user's device, instead of using the BYOD flow.
• iOS devices: The Cisco ISE policy server sends a new profile using Apple’s iOS over the air to the
iOS device, which includes:
• The issued certificate (if configured) is embedded with the iOS device's MAC address and
employee's username.
• A Wi-Fi supplicant profile that enforces the use of EAP-TLS for 802.1X authentication. An
additional profile can be installed on the endpoint device to protect Over-The-Air (OTA)
communication.
Check the Enable if Target Network is Hidden check box only when the actual Wi-Fi network is
hidden. Otherwise, Wi-Fi network configuration may not be provisioned properly for certain iOS
devices, especially in the single SSID flow (where the same Wi-Fi network or SSID is used for both
onboarding and connectivity).
• Android devices: Cisco ISE prompts and routes employee to download the Network Setup Assistant
(NSA) from the Google Play store. After installing the application, the employee can open NSA and
start the setup wizard, which generates the supplicant configuration and issued certificate used to
configure the device.
4. After the user goes through the on boarding flow, Cisco ISE initiates a Change of Authorization (CoA).
This causes the MacOS, Windows, and Android devices to reconnect to the secure 802.1X network. For
single SSID, iOS devices also connect automatically, but for dual SSID, the wizard prompts iOS users to
manually connect to the new network.
You can configure a BYOD flow that does not use supplicants. For more information, see the Cisco ISE
Community Resource document.
An administrator performs an action that disables network access for several devices, such as deleting
or revoking a certificate.
If a user reinstates a stolen device, the status reverts to Not Registered. The user must delete that device,
and add it back. This starts the onboarding process.
• Lost: The user logs on to the My Devices portal, and marks a currently onboarded device as Lost that
causes the following actions:
• The device is assigned to Blocked List identity group.
• Certificates provisioned to the device are not revoked.
• The device status is updated to Lost.
• BYODRegistration status is updated to No.
A lost device still has network access unless you create an authorization policy to block lost devices.
You can use the Blocked List identity group or the endpoint:BYODRegistration attribute in your rule.
For example, IF Endpoint Identity Group is Blocked List AND EndPoints:BYODRegistrations
Equals No THEN BYOD. For more granular access, you can also add
NetworkAccess:EAPAuthenticationMethod Equals PEAP or EAP-TLS or EAP-FAST” ,
InternalUser:IdentityGroup Equals <<group>> to the IF part of the rule.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Settings >
Employee Registered Devices.
Step 2 Enter the maximum number of devices that an employee can register in the Restrict employees to field. By default, this
value is set to 5 devices.
Step 3 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Guest Access > Portals & Components >
Guest Portals.
Step 2 Choose the credentialed Guest portal that you want to allow employees to use to register their devices using native
supplicants and click Edit.
Step 3 Click the Portal Behavior and Flow Settings tab.
Step 4 Under BYOD Settings, check the Allow employees to use personal devices on the network check box.
Step 5 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Settings >
Retry URL.
Step 2 In the Retry URL for Onboarding field, enter the URL to be used to redirect the device back to Cisco ISE.
When a device encounters a problem during the registration process, it tries to reconnect to the internet automatically.
At this point, the URL that you enter here is used to redirect the device back to Cisco ISE (which reinitiates the onboarding
process). The default value is 192.0.2.123.
Step 3 Click Save.
If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Create External Not Required Not Required Not Required Not Required Required
Identity Sources,
on page 830
Create Identity Not Required Not Required Not Required Not Required Required
Source
Sequences, on
page 830
Edit the Blocked Required Not applicable Not applicable Not applicable Not applicable
List Portal
Create a BYOD Not applicable Required Not applicable Not applicable Not applicable
Portal, on page
834
Create a Client Not applicable Not applicable Required Not applicable Not applicable
Provisioning
Portal, on page
836
Create a My Not applicable Not applicable Not applicable Not applicable Required
Devices Portal,
on page 839
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Click the node and click Edit.
Step 3 Under the General Settings tab, enable the Policy Service toggle button.
Step 4 Check the Enable Session Services check box.
Step 5 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > System
Certificates.
Step 2 Add a system certificate and assign it to a certificate group tag that you want to use for the portal.
This certificate group tag will be available to select during portal creation or editing.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > (any
portal) > Create or Edit > Portal Settings.
Step 4 Select the specific certificate group tag from the Certificate Group Tag drop-down list that is associated with the newly
added certificate.
Note • BYOD does not support certificate chains longer than three certificates.
• During BYOD onboarding, certificates are issued twice for iOS devices.
Note To work with passive identity services, which enable you to receive and share authenticated user identities,
see Additional Passive Identity Service Providers, on page 649.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > External
Identity Sources.
Step 2 Choose one of these options:
• Certificate Authentication Profile for certificate-based authentications.
• Active Directory to connect to an Active Directory as an external identity source. See Active Directory as an External
Identity Source, on page 603 for more details.
• LDAP to add an LDAP identity source. See LDAP, on page 690 for more details.
• RADIUS Token to add a RADIUS Token server. See RADIUS Token Identity Sources, on page 712 for more details.
• RSA SecurID to add an RSA SecurID server. See RSA Identity Sources, on page 718 for more details.
• SAML Id Providers to add an identity provider (IdP), such as Oracle Access Manager. See SAMLv2 Identity
Provider as an External Identity Source, on page 724 for more details.
• Social Login to add a Social Login, such as Facebook, as an external identity source. See Social Login for
Self-Registered Guests, on page 455 for more details.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Identity
Source Sequences > Add.
Step 2 Enter a name for the identity source sequence. You can also enter an optional description.
Step 3 Check the Select Certificate Authentication Profile check box and choose a certificate authentication profile for
certificate-based authentication.
Step 4 Choose the database or databases that you want to include in the identity source sequence in the Selected List field.
Step 5 Rearrange the databases in the Selected list field in the order in which you want Cisco ISE to search the databases.
Step 6 If a selected identity store cannot be accessed for authentication, choose one of the following options in the Advanced
Search List area:
• Do not access other stores in the sequence and set the AuthenticationStatus attribute to ProcessError
• Treat as if the user was not found and proceed to the next store in the sequence
While processing a request, Cisco ISE searches these identity sources in sequence. Ensure that you have the identity
sources in the Selected list field listed in the order in which you want Cisco ISE to search them.
Step 7 Click Submit to create the identity source sequence that you can then use in policies.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Identity Management > Groups >
Endpoint Identity Groups.
Step 2 Click Add.
Step 3 Enter the Name for the endpoint identity group that you want to create (do not include spaces in the name of the endpoint
identity group).
Step 4 Enter the Description for the endpoint identity group that you want to create.
Step 5 Click the Parent Group drop-down list to choose an endpoint identity group to which you want to associate the newly
created endpoint identity group.
Step 6 Click Submit.
You can only edit the default portal settings and customize the default message that displays for the portal.
You cannot create a new Blocked List portal, or duplicate or delete the default portal.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Blocked
List Portal > Edit.
Step 2 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name that you use here is not used for any other end-user portals.
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with the
portal.
Step 4 Click the Portal test URL link to open a new browser tab that displays the URL for this portal. Policy Services Node
(PSN) with Policy Services must be turned on. If Policy Services are disabled, the PSN only displays the Admin portal.
Note The test portal does not support RADIUS sessions, so you won't see the entire portal flow for all portals. BYOD
and Client Provisioning are examples of portals that depend on RADIUS sessions. For example, a redirect to an
external URL will not work. If you have more than one PSN, Cisco ISE chooses the first active PSN.
Step 5 Expand Portal Settings. Update the default values for ports, certificate group tags, endpoint identity groups, and so on,
and define behavior that applies to the overall portal.
• HTTPS Port: Enter a port value between 8000 to 8999; the default value is 8443 for all the default portals, except
the Blocked List Portal, which is 8444. If you upgraded with port values outside this range, they are honored until
you modify this window. If you modify this window, update the port setting to comply with this restriction.
If you assign ports used by a non-guest (such as My Devices) portal to a guest portal, an error message appears.
For posture assessments and remediation only, the Client Provisioning portal also uses ports 8905 and 8909. Otherwise,
it uses the same ports assigned to the Guest portal.
Portals assigned to the same HTTPS port can use the same Gigabit Ethernet interface or another interface. If they
use the same port and interface combination, they must use the same certificate group tag. For example:
• Valid combinations include, using the Sponsor portal as an example:
• Sponsor portal: Port 8443, Interface 0, Certificate tag A and My Devices portal: Port 8443, Interface 0,
Certificate group A.
• Sponsor portal: Port 8443, Interface 0, Certificate group A and My Devices portal: Port 8445, Interface
0, Certificate group B.
• Sponsor portal: Port 8444, Interface 1, Certificate group A and Blocked List portal: Port 8444, Interface
0, Certificate group B.
Note We recommend that you use interface 0 for Guest services for best performance. You can either configure
only interface 0 in the Portal Settings, or you can use the CLI command ip host to map a hostname or FQDN
to the IP address of interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to open a portal
is made on the PAN, the PAN looks for an available allowed port on the PSN. You must configure the Ethernet
interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services turned on.
This is a requirement because any of these PSNs can be used for the redirect at the start of the guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when Policy
Services turned on. This is required because any of these PSNs can be used for a redirect at the start of the guest
session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP address to the
FQDN, which is used to match the certificate Subject Name or Alternate Subject Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts to configure
the Bond interface. If that is not successful, perhaps because there was no bond setup on that PSN, then the
PSN logs an error and exits. The PSN will not try to start the portal on the physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs for high
availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded connection
continues the connection. A NIC is selected for a portal based in the Portal Settings configuration. If both
physical NICs and the corresponding bonded NIC are configured, when the PSN attempts to configure the
portal, it first attempts to connect to the Bond interface. If that is not successful, perhaps because there was no
bond setup on that PSN, then the PSN attempts to start the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s HTTPS
traffic.
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display language
of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback Language is used
as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the browser
locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User Browser Locale
option.
Step 6 On the Portal Page Customization tab, customize the page title and message text that appears in the portal when an
unauthorized device is attempting to gain access to the network.
Step 7 Click Save and then Close.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > BYOD >
Create.
Step 2 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name you use here is not used for any other end-user portals.
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with the
portal.
Step 4 Click the Portal Behavior and Flow Settings tab.
Step 5 Expand Portal Settings. Update the default values for ports, certificate group tags, endpoint identity groups, and so on,
and define behavior that applies to the overall portal.
Step 6 Expand Support Information Page Settings. Update the required information here to help employees provide information
that the Help Desk can use to troubleshoot network access issues.
Step 7 Click the Portal Page Customization tab. Scroll down to the Page Customizations area to customize the following end
user portal windows. Choose the portal window you want to customize by clicking the corresponding option listed under
Pagesin the left side menu.
• BYOD Welcome:
• Device Configuration Required: Enter the content to be displayed when the device is redirected to the BYOD
portal for the first time and requires certificate provisioning.
• Certificate Needs Renewal: Enter the content to be displayed when the previous certificate needs to be renewed.
• BYOD Installation:
• Desktop Installation: Enter the content to be displayed when providing installation information for a desktop
device.
• iOS Installation: Enter the content to be displayed when providing installation instructions for an iOS mobile
device.
• Android Installation: Enter the content to be displayed when providing installation instructions for an Android
mobile device.
• BYOD Success:
• Success: Enter the content to be displayed when the device is configured and automatically connected to the
network.
• Success: Manual Instructions: Enter the content to be displayed when the device is successfully configured
and an employee must manually connect to the network.
• Success: Unsupported Device: Enter the content to be displayed when an unsupported device is allowed to
connect to the network.
What to do next
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use.
Users (network access users) who are assigned the Super Admin or ERS Admin role have access to this portal
and can request certificates for others. However, if you create a new internal admin user and assign the Super
Admin or ERS Admin role, the internal admin user will not have access to this portal. You must first create
a network access user and then add the user to the Super Admin or ERS Admin group. Any existing network
access users who are added to the Super Admin or ERS Admin group will have access to this portal.
For other users to be able to access the portal and to generate certificates for themselves, configure the
Certificate Provisioning Portal Settings. To view this window, click the Menu icon ( ) and choose
Administration > Device Portal Management > Certificate Provisioning > Edit > Portal Behavior and
Flow Settings > Portal Settings. Ensure that you choose the appropriate identity source or identity source
sequence under Authentication Method and choose the user group under Configure Authorized Groups.
All users who belong to the groups that you choose will have access to the portal and can generate certificates
for themselves.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Certificate
Provisioning > Create.
Ensure that the portal name that you use here is not used for any other end-user portals.
Step 2 Provide a unique Portal Name and a Description for the portal.
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with the
portal.
Step 4 Click the Portal Behavior and Flow Settings tab.
Step 5 Expand Portal Settings. Update the default values for ports, certificate group tags, endpoint identity groups, and so on,
and define behavior that applies to the overall portal.
Step 6 Click the Portal Page Customization tab. Customize the page title and the message text that appears in the portal.
Step 7 Click Save and then Close.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Client
Provisioning > Create.
Step 2 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with the
portal.
Step 4 Click the Portal Behavior and Flow Settings tab.
Step 5 Expand Portal Settings. Update the default values for ports, certificate group tags, endpoint identity groups, and so on,
and define behavior that applies to the overall portal.
Step 6 Expand Support Information Page Settings. Update the required information here to help employees provide information
that the Help Desk can use to troubleshoot network access issues.
Step 7 Click the Portal Page Customization tab. Scroll down to the Page Customizations area to customize the following end
user portal windows. Choose the portal window you want to customize by clicking the corresponding option listed under
Pagesin the left side menu.
• Client Provisioning Portals:
• Agent Unknown: Enter the content to be displayed when the agent is unknown.
• Checking, Scanning and Compliant: Enter the content to be displayed when the posture agent is successfully
installed and checks, scans and verifies that the device is compliant with posture requirements.
• Non-compliant: Enter the content to be displayed when the posture agent determines that the device is not
compliant with posture requirements.
What to do next
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use.
Related Topics
Authorize Portals, on page 471
Customize Device Portals, on page 841
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Mobile
Device Management > Create, Edit or Duplicate.
Step 2 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name you use here is not used for any other end-user portals.
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with
the portal.
Step 4 Click the Portal Behavior and Flow Settings tab.
Step 5 Expand Portal Settings. Update the default values for ports, certificate group tags, endpoint identity groups, and so
on, and define behavior that applies to the overall portal.
Step 6 Expand Employee Mobile Device Management Settings. Access the link provided to configure third-party MDM
providers and then define the acceptance policy behavior for employees using the MDM portals.
Step 7 Expand Support Information Page Settings. Update the required information here to help employees provide
information that the help desk can use to troubleshoot network access issues.
Step 8 Click the Portal Page Customization tab.
Step 9 Customize the Content Area messages that appears in the MDM portal during the device enrollment process.
• Unreachable: Enter the content to be displayed when the selected MDM system cannot be reached.
• Non-compliant: Enter the content to be displayed when the device being enrolled is not compliant with the
requirements of the MDM system.
• Continue: Enter the content to be displayed when the device should try connecting to the network in case of
connectivity issues.
• Enroll: Enter the content to be displayed when the device requires the MDM agent and needs to be enrolled in
the MDM system.
What to do next
You must authorize the portal in order to use it. You can also customize your portal either before or after you
authorize it for use. Also see the following topics:
• Add Certificates to the Device Portal, on page 829
• Create Endpoint Identity Groups, on page 831
• Create Authorization Profiles, on page 840
• Customize Device Portals, on page 841
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > My
Devices > Create.
Step 2 Provide a unique Portal Name and a Description for the portal.
Ensure that the portal name you use here is not used for any other end-user portals.
Step 3 From the Language File drop-down list, choose the desired action to import or export language files to be used with
the portal.
Step 4 Click the Portal Behavior and Flow Settings tab.
Step 5 Expand Portal Settings to update the default values for ports, certificate group tags, endpoint identity groups, and so
on, and define behavior that applies to the overall portal.
Step 6 Expand Login Page Settings to specify employee credential and login guidelines.
Step 7 Expand Acceptable Use Policy (AUP) Page Settings to add a separate AUP page and define the acceptable use policy
behavior for employees.
Step 8 Expand Post-Login Banner Page Settings to notify employees of additional information after they log into the portal.
Step 9 Expand Employee Change Password Settings to allow employees to change their own passwords. This option is
enabled only if the employee is part of the internal users database.
Step 10 In the Portal Page Customization tab, customize the following information that appears in the My Devices portal
during registration and management:
• Titles, instructions, content, field and button labels
• Error messages and Notification Messages
What to do next
You can customize the portal if you want to change its appearance.
Related Topics
Customize Device Portals, on page 841
My Devices Portal, on page 823
Display Devices Added by an Employee, on page 842
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization >
Authorization Profiles.
Step 2 Create an authorization profile using the name of the portal that you want to authorize for use.
What to do next
You should create a portal authorization policy rule that uses the newly created authorization profile.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets to create a new authorization policy
rule under Standard policies.
Step 2 For Conditions, select an endpoint identity group that you want to use for the portal validation. For example, for the
Hotspot Guest portal, select the default GuestEndpoints endpoint identity group and, for the MDM portal, select the
default RegisteredDevices endpoint identity group.
Note Reauthenticate and Terminate CoA types are supported by Hotspot Guest portals. You can use Network
Access:UseCase EQUALS Guest Flow as one of the validation conditions in the Hotspot Guest authorization
policy only when Reauthentication CoA type is chosen in the Hotspot Guest Portal.
Step 3 For Permissions, select the portal authorization profile that you created.
Note While creating an authorization condition using a dictionary attribute with the MAC option enabled, such as
RADIUS.Calling-Station-ID, you must use a Mac operator (for example, Mac_equals) to support different
MAC formats.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Identities > Endpoints.
Step 2 Click the Settings icon available on the top right corner of the endpoints list, below the dashlets.
Step 3 Check the Portal User check boxEnable the Portal User toggle button to display this information in the endpoints listing.
Step 4 Click Go.
Step 5 Click the Filter drop-down list and choose Quick Filter.
Step 6 Enter the user’s name in the Portal User field to display only the endpoints that are assigned to that particular user.
Note The My Devices portal is not available when the Administrator's portal is down.
You can permanently delete the device from the Endpoints window. To view this window, click the Menu
icon ( ) and choose Work Centers > Network Access > Identities > Endpoints.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Device Portal Management > Settings >
Employee Registered Devices.
Step 2 Enter the maximum number of devices that an employee can register in the Restrict employees to field. By default, this
value is set to 5 devices.
Step 3 Click Save. If you do not want to save any updates you made to the settings, click Reset to revert to the last saved values.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > Reports.
Step 2 Choose Guest or Endpoints and Users to view the various guest, sponsor, and endpoint related reports
Step 3 Choose the data with which you want to search using the Filters drop-down list.
Step 4 Select the Time Range during which you want to view the data.
Step 5 Click Run.
This report is available at: Operations > Reports > Reports > Guest > My Devices Login and Audit.
You can filter on attributes such as Identity, Endpoint ID, Identity Group, Endpoint Profile and you can
generate a report.
You can query the endpoint database for endpoints that are assigned to the Registered Devices endpoint
identity group. You can also generate reports for specific users that have the Portal User attribute set to a
non null value.
The Registered Endpoints report provides information about a list of endpoints that are registered through
device registration portals by a specific user for a selected period of time.
on the device and matches it against the shared secret in the request to authenticate access. If the shared
secrets match, the TACACS+ server processes the request further based on the policy and configuration.
If they do not match, a reject response is sent to the network device. A failed authentication report is
generated, which provides the failure reason.
• You can configure the Simple Network Management Protocol (SNMP) in the network device definition
for the Profiling service to communicate with the network devices and profile endpoints that are connected
to the network devices.
• You must define Cisco TrustSec-enabled devices in Cisco ISE to process requests from TrustSec-enabled
devices that can be part of the Cisco TrustSec solution. Any switch that supports the Cisco TrustSec
solution is a Cisco TrustSec-enabled device.
Cisco TrustSec devices do not use IP addresses. Instead, you must define other settings so that Cisco
TrustSec devices can communicate with Cisco ISE.
Cisco TrustSec-enabled devices use the TrustSec attributes to communicate with Cisco ISE. Cisco
TrustSec-enabled devices, such as the Cisco Nexus 7000 Series Switches, Cisco Catalyst 6000 Series
Switches, Cisco Catalyst 4000 Series Switches, and Cisco Catalyst 3000 Series Switches are authenticated
using the Cisco TrustSec attributes that you define while adding Cisco TrustSec devices.
Note When you configure a network device on Cisco ISE, we recommend that you do not include a backslash (\)
as part of the shared secret. This is because when you upgrade Cisco ISE, the backslash will not appear in the
shared secret. However, if you reimage Cisco ISE instead of upgrading it, the backslash appears in the shared
secret.
Note We recommend that you add the default device definition only for basic RADIUS and TACACS authentications.
For advanced flows, you must add a separate device definition for each network device.
Cisco ISE looks for the corresponding device definition to retrieve the shared secret that is configured in the
network device definition when it receives a RADIUS or TACACS request from a network device.
Cisco ISE performs the following procedure when a RADIUS or TACACS request is received:
1. Looks for a specific IP address that matches the one in the request.
2. Looks up the ranges to see if the IP address in the request falls within the range that is specified.
3. If both step 1 and 2 fail, it uses the default device definition (if defined) to process the request.
Cisco ISE obtains the shared secret that is configured in the device definition for that device and matches it
against the shared secret in the RADIUS or TACACS request to authenticate access. If no device definitions
are found, Cisco ISE obtains the shared secret from the default network device definition and processes the
RADIUS or TACACS request.
Network Devices
The windows described in the following sections enable you to add and manage network devices in Cisco
ISE.
IP Address or IP Choose one of the following from the drop-down list and enter the required values in
Range the fields displayed:
• IP Address: Enter a single IP address (IPv4 or IPv6 address) and a subnet mask.
• IP Range: Enter the required IPv4 address range. To exclude IP addresses during
authentication, enter an IP address or IP address range in the Exclude field.
The following are the guidelines for defining the IP addresses and subnet masks, or
IP address ranges:
• You can define a specific IP address, or an IP range with a subnet mask. If device
A has an IP address range defined, you can configure another device, B, with an
individual address from the range that is defined in device A.
• You can define IP address ranges in all the octets. You can use a hyphen (-) or
an asterisk (*) as wildcard to specify a range of IP addresses. For example, *.*.*.*,
1-10.1-10.1-10.1-10, or 10-11.*.5.10-15.
• You can exclude a subset of IP address range from the configured range in a
scenario where that subset has already been added, for example,
10.197.65.*/10.197.65.1, or 10.197.65.* exclude 10.197.65.1.
• You can configure up to 40 IP addresses or IP ranges for each network device.
• You cannot define two devices with the same specific IP addresses.
• You cannot define two devices with the same IP range. The IP ranges must not
overlap either partially or completely.
Device Profile Choose the vendor of the network device from the drop-down list.
Use the tooltip next to the drop-down list to see the flows and services that the selected
vendor's network devices support. The tooltip also displays the RADIUS Change of
Authorization (CoA) port and type of URL redirect that is used by the device. These
attributes are defined in the device type's network device profile.
Model Name Choose the device model from the drop-down list.
Use the model name as one of the parameters while checking for conditions in
rule-based policies. This attribute is present in the device dictionary.
Software Version Choose the version of the software running on the network device from the drop-down
list.
You can use the software version as one of the parameters while checking for conditions
in rule-based policies. This attribute is present in the device dictionary.
Network Device In the Network Device Group area, choose the required values from the Location,
Group IPsec, and Device Type drop-down lists.
If you do not specifically assign a device to a group, it becomes a part of the default
device groups (root network device groups), which is All Locations by location and
All Device Types by device type.
Note While using a filter to choose and delete a Network Access Device (NAD) from your Cisco ISE deployment,
clear your browser cache to ensure that only chosen NADs are deleted.
Shared Secret Enter the shared secret for the network device.
The shared secret is the key that is configured on the network device using the
radius-host command with the pac option.
Note The length of the shared secret must be equal to or greater than the value
configured in the Minimum RADIUS Shared Secret Length field in the
Device Security Settings window (Administration > Network Resources
> Network Devices > Device Security Settings).
For a RADIUS server, the best practice is to have 22 characters. For new
installations and upgraded deployments, the shared secret length is four
characters by default. You can change this value in the Device Security
Settings window.
Use Second Shared Specify a second shared secret to be used by the network device and Cisco ISE.
Secret
Note Although Cisco TrustSec devices can take advantage of the dual shared secrets
(keys), Cisco TrustSec CoA packets sent by Cisco ISE will always use the
first shared secret (key). To enable the use of the second shared secret, choose
the Cisco ISE node from which the Cisco TrustSec CoA packets must be sent
to the Cisco TrustSec device. Configure the Cisco ISE node to be used for this
task in the Send From drop-down list in the Work Centers > Device
Administration > Network Resources > Network Devices > Add >
Advanced TrustSec Settings window. You can select a primary administration
node (PAN) or a policy service node (PSN). If the chosen PSN node is down,
the PAN sends the Cisco TrustSec CoA packets to the Cisco TrustSec device.
Note The Second Shared Secret feature for RADIUS Access Request works only
for packets containing the Message-Authenticator field.
DTLS Required If you check the DTLS Required check box, Cisco ISE processes only the DTLS
requests from this device. If this option is disabled, Cisco ISE processes both UDP
and DTLS requests from this device.
RADIUS DTLS provides improved security for Secure Sockets Layer (SSL) tunnel
establishment and RADIUS communication.
Shared Secret Displays the shared secret that is used for RADIUS DTLS. This value is fixed and
used to compute the Message Digest 5 (MD5) integrity checks.
CoA Port Specify the port to be used for RADIUS DTLS CoA.
Issuer CA of ISE Choose the Certificate Authority to be used for RADIUS DTLS CoA from the
Certificates for drop-down list.
CoA
DNS Name Enter the DNS name of the network device. If the Enable RADIUS/DTLS Client
Identity Verification option is enabled in the RADIUS Settings window
(Adminstration > System > Settings > Protocols > RADIUS, Cisco ISE compares
this DNS name with the DNS name that is specified in the client certificate to verify
the identity of the network device.
General Settings
Enable KeyWrap Check the Enable KeyWrap check box only if KeyWrap algorithms are supported
by the network device. The network device must be compatible with AES KeyWrap
RFC (RFC 3394).
This option is used to increase the RADIUS security through an AES KeyWrap
algorithm.
Key Encryption Enter the encryption key that is used for session encryption (secrecy).
Key
Message Enter the key that is used for keyed Hashed Message Authentication Code (HMAC)
Authenticator calculation over RADIUS messages.
Code Key
You can specify the key input format that you want to use to enter the Key Encryption
Key and Message Authenticator Code Key so that it matches the configuration on the
network device. The value that you specify must be the correct (full) length for the
key, and shorter values are not permitted.
Shared Secret A string of text that is assigned to a network device when TACACS+ protocol is
enabled. The user must enter the text before the network device authenticates a username
and password. The connection is rejected until the user supplies the shared secret.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a dialog
box is displayed. You can click either Yes or No.
Remaining Retired (Available only if you click Yes in the Retire dialog box) Displays the default value
Period that is specified in Work Centers > Device Administration > Settings > Connection
Settings > Default Shared Secret Retirement Period. You can change the default
value, as necessary.
The old shared secret remains active for the specified number of days.
End (Available only if you click Yes in the Retire dialog box) Ends the retirement period
and terminates the old shared secret.
Enable Single Check the Enable Single Connect Mode check box to use a single TCP connection
Connect Mode for all TACACS communications with the network device. Click one of the following
radio buttons:
• Legacy Cisco Devices
• TACACS Draft Compliance Single Connect Support
Note If you disable Single Connect Mode, Cisco ISE uses a new TCP
connection for every TACACS request.
SNMP Settings
The following table describes the fields in the SNMP Settings section.
SNMP Version Choose one of the following options from the SNMP Version drop-down list:
• 1: SNMPv1 does not support informs.
• 2c
• 3: SNMPv3 is the most secure model because it allows packet encryption when
you choose Priv in the Security Level field.
Note If you have configured your network device with SNMPv3 parameters,
you cannot generate the Network Device Session Status summary report
that is provided by the monitoring service (Operations > Reports >
Diagnostics > Network Device Session Status). You can generate this
report successfully if your network device is configured with SNMPv1
or SNMPv2c parameters.
SNMP RO (Applicable only for SNMP versions 1 and 2c) Enter the Read Only Community string
Community that provides Cisco ISE with a particular type of access to the device.
Note The caret (circumflex ^) symbol is not allowed.
SNMP Username (Only for SNMP Version 3) Enter the SNMP username.
Security Level (Only for SNMP Version 3) Choose one the following options from the Security Level
drop-down list:
• Auth: Enables MD5 or Secure Hash Algorithm (SHA) packet authentication.
• No Auth: No authentication and no privacy security level.
• Priv: Enables Data Encryption Standard (DES) packet encryption.
Auth Protocol (Only for SNMP Version 3 when the security levels Auth or Priv are selected) Choose
the authentication protocol that you want the network device to use from the Auth
Protocol drop-down list.
• MD5
• SHA
Auth Password (Only for SNMP Version 3 when the Auth or Priv security levels are selected) Enter
the authentication key. It must be at least eight characters in length.
Click Show to display the authentication password that is already configured for the
device.
Note The caret (circumflex ^) symbol cannot be used.
Privacy Protocol (Only for SNMP Version 3 when Priv security level is selected) Choose one of the
following options from the Privacy Protocol drop-down list:
• DES
• AES128
• AES192
• AES256
• 3DES
Privacy Password (Only for SNMP Version 3 when Priv security level is selected) Enter the privacy key.
Click Show to display the privacy password that is already configured for the device.
Note The caret (circumflex ^) symbol cannot be used.
Polling Interval Enter the polling interval, in seconds. The default value is 3600.
Link Trap Query Check the Link Trap Query check box to receive and interpret linkup and linkdown
notifications that are received through the SNMP trap.
Mac Trap Query Check the Link Trap Query check box to receive and interpret MAC notifications
received through the SNMP trap.
Originating Policy Choose the Cisco ISE server to be used to poll for SNMP data, from the Originating
Services Node Policy Services Node drop-down list. The default value for this field is Auto. Overwrite
the setting by choosing a specific value from the drop-down list.
Use Device ID for Check the Use Device ID for TrustSec Identification check box if you want the
TrustSec device name to be listed as the device identifier in the Device ID field.
Identification
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec
Identification check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Click Show to display the password.
Enable HTTP Check the Enable HTTP REST API check box to use the HTTP REST API to provide
REST API the required Cisco TrustSec information to the network devices. This enhances the
efficiency and ability to download large configurations in a short time as compared to
the RADIUS protocol. It also improves reliability by using TCP over UDP.
Username Enter the username that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device. The username cannot contain special characters
such as space ! % ^ : ; , [ { | } ] ` " = < > ?
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec
Identification check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Click Show to display the password.
Download Specify the time interval at which the device must download its environment data from
Environment Data Cisco ISE, by choosing the required values from the drop-down lists in this area. You
Every <...> can choose the time interval in seconds, minutes, hours, days, or weeks. The default
value is one day.
Download Peer Specify the time interval at which the device must download the peer authorization
Authorization policy from Cisco ISE by choosing the required values from the drop-down lists in
Policy Every <...> this area. You can specify the time interval in seconds, minutes, hours, days, or weeks.
The default value is one day.
Reauthentication Specify the time interval at which the device reauthenticates itself against Cisco ISE
Every <...> after the initial authentication, by choosing the required values from the drop-down
lists in this area. You can configure the time interval in seconds, minutes, hours, days,
or weeks. For example, if you enter 1000 seconds, the device authenticates itself against
Cisco ISE every 1000 seconds. The default value is one day.
Download SGACL Specify the time interval at which the device downloads SGACL lists from Cisco ISE,
Lists Every <...> by choosing the required values from the drop-down lists in this area. You can configure
the time interval in seconds, minutes, hours, days, or weeks. The default value is one
day.
Other TrustSec Check the Other TrustSec Devices to Trust This Device check box to allow all the
Devices to Trust peer devices to trust this Cisco TrustSec device. If this check box is not checked, the
This Device peer devices do not trust this device, and all the packets that arrive from this device
(TrustSec Trusted) are colored or tagged accordingly.
Send Check the Send Configuration Changes to Device check box if you want Cisco ISE
Configuration to send Cisco TrustSec configuration changes to the Cisco TrustSec device using CoA
Changes to Device or CLI (SSH). Click the CoA or CLI (SSH) radio button, as required.
Click the CoA radio button if you want Cisco ISE to send the configuration changes
to the Cisco TrustSec device using CoA.
Click the CLI (SSH) radio button if you want Cisco ISE to send the configuration
changes to the Cisco TrustSec device using the CLI (using the SSH connection). For
more information, see the "Push Configuration Changes to Non-CoA Supporting
Devices" section in Cisco ISE Admin Guide: Segmentation.
Send From From the drop-down list, choose the Cisco ISE node from which the configuration
changes must be sent to the Cisco TrustSec device. You can select a PAN or a PSN.
If the PSN that you choose is down, the configuration changes are sent to the Cisco
TrustSec device using the PAN.
Test Connection You can use this option to test the connectivity between the Cisco TrustSec device and
the selected Cisco ISE node (PAN or PSN).
SSH Key To use this feature, open an SSHv2 tunnel from Cisco ISE to the network device, and
use the device's CLI to retrieve the SSH key. You must copy this key and paste it in
the SSH Key field for validation. For more information, see the "SSH Key Validation"
section in Cisco ISE Admin Guide: Segmentation.
Include this device Check the Include this device when deploying Security Group Tag Mapping
when deploying Updates check box if you want the Cisco TrustSec device to obtain the IP-SGT
Security Group mappings using the device interface credentials.
Tag Mapping
Updates
EXEC Mode Enter the username that you use to log in to the Cisco TrustSec device.
Username
Enable Mode (Optional) Enter the enable password that is used to edit the configuration of the Cisco
Password TrustSec device in privileged EXEC mode.
Click Show to view the password.
Issue Date Displays the issuing date of the last Cisco TrustSec PAC that was generated by Cisco
ISE for the Cisco TrustSec device.
Expiration Date Displays the expiration date of the last Cisco TrustSec PAC that was generated by
Cisco ISE for the Cisco TrustSec device.
Issued By Displays the name of the issuer (a Cisco TrustSec administrator) of the last Cisco
TrustSec PAC that was generated by Cisco ISE for the Cisco TrustSec device.
Generate PAC Click the Generate PAC button to generate the out-of-band Cisco TrustSec PAC for
the Cisco TrustSec device.
Default Network Choose Enable from the Default Network Device Status drop-down list to enable
Device Status the default network device definition.
Note If the default device is enabled, you must enable either the RADIUS or the
TACACS+ authentication settings by checking the relevant check box in the
window.
Enable RADIUS Check the Enable RADIUS check box to enable RADIUS authentication for the
device.
Shared Secret Enter a shared secret. The shared secret can be up to 127 characters in length.
The shared secret is the key that you have configured on the network device using the
radius-host command with the pac keyword.
Note The length of the shared secret must be equal to or greater than the value
configured in the Minimum RADIUS Shared Secret Length field in the
Device Security Settings window (Administration > Network Resources >
Network Devices > Device Security Settings). By default, this value is four
characters for new installations and upgraded deployments. For the RADIUS
server, the best practice is to have 22 characters.
DTLS Required If you check the DTLS Required check box, Cisco ISE processes only the DTLS
requests from this device. If this option is disabled, Cisco ISE processes both UDP
and DTLS requests from this device.
RADIUS DTLS provides improved security for SSL tunnel establishment and RADIUS
communication.
Shared Secret Displays the shared secret that is used for RADIUS DTLS. This value is fixed and is
used to compute the MD5 integrity checks.
Issuer CA of ISE Choose the certificate authority to be used for RADIUS DTLS CoA from the Issuer
Certificates for CA of ISE Certificates for CoA drop-down list.
CoA
General Settings
Enable KeyWrap (Optional) Check the Enable KeyWrap check box only if KeyWrap algorithms are
supported on the network device, which increases RADIUS security through an AES
KeyWrap algorithm.
Key Encryption Enter an encryption key to be used for session encryption (secrecy) when you enable
Key KeyWrap.
Message Enter the key that is used for keyed Hashed Message Authentication Code (HMAC)
Authenticator calculation over RADIUS messages when you enable KeyWrap.
Code Key
Key Input Format Choose one of the following formats by clicking the corresponding radio button, and
enter values in the Key Encryption Key and Message Authenticator Code Key
fields:
• ASCII: The Key Encryption Key must be 16 characters (bytes) in length, and
the Message Authenticator Code Key must be 20 characters (bytes) in length.
• Hexadecimal: The Key Encryption Key must be 32 bytes in length, and the
Message Authenticator Code Key must be 40 bytes in length.
Shared Secret Enter a string of text to assign to a network device when the TACACS+ protocol is
enabled. Note that a user must enter the text before the network device authenticates
a username and password. The connection is rejected until the user supplies the shared
secret.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a dialog
box is displayed. Click Yes or No.
Remaining Retired (Optional) Available only if you click Yes in the Retire dialog box. Displays the default
Period value that is specified in the Work Centers > Device Administration > Settings >
Connection Settings > Default Shared Secret Retirement Period window. You
can change the default values.
This allows a new shared secret to be entered. The old shared secret remains active
for the specified number of days.
End (Optional) Available only if you select Yes in the Remaining Retired Period dialog
box. Ends the retirement period and terminates the old shared secret.
Enable Single Check the Enable Single Connect Mode check box to use a single TCP connection
Connect Mode for all TACACS+ communication with the network device. Click one of the following
the radio buttons:
• Legacy Cisco Devices
• TACACS Draft Compliance Single Connect Support.
Note If you disable this field, Cisco ISE uses a new TCP connection for every
TACACS+ request.
Generate a Click Generate a Template to create a comma-separated value (CSV) template file.
Template
Update the template with network devices information in the CSV format and save it
locally. Then, use the edited template to import network devices into any Cisco ISE
deployment.
File Click Choose File to choose the CSV file that you have recently created, or previously
exported from a Cisco ISE deployment.
You can import network devices into another Cisco ISE deployment with new and
updated network devices information, by using the Import option.
Overwrite Existing Check the Overwrite Existing Data with New Data check box to replace the existing
Data with New network devices with the devices in your import file.
Data
If you do not check this check box, new network device definitions that are available
in the import file are added to the network device repository. Duplicate entries are
ignored.
Stop Import on Check the Stop Import on First Error check box if you want Cisco ISE to discontinue
First Error import when it encounters an error during import. Cisco ISE imports network devices
until the time of an error.
If this check box is not checked and an error is encountered, the error is reported and
Cisco ISE continues to import the remaining devices.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 2 Click Add.
Step 3 Enter the corresponding values in the Name, Description, and IP Address fields.
Step 4 Choose the required values from the Device Profile, Model Name, Software Version, and Network Device Group
drop-down lists.
Step 5 (Optional) Check the RADIUS Authentication Settings check box to configure the RADIUS protocol for authentication.
Step 6 (Optional) Check the TACACS Authentication Settings check box to configure the TACACS protocol for authentication.
Step 7 (Optional) Check the SNMP Settings check box to configure SNMP for the Cisco ISE profiling service to collect
information from the network device.
Step 8 (Optional) Check the Advanced Trustsec Settings check box to configure a Cisco TrustSec-enabled device.
Step 9 Click Submit.
Import templates may vary in each Cisco ISE. Do not import CSV files of network devices that have exported
from a different Cisco ISE release. Enter the details of the network devices in the CSV template file for your
release, and import this file into Cisco ISE.
Note You can import the network devices with IP ranges in all the octets.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 2 Click Import.
Step 3 In the Import Network Devices window that is displayed, click Generate A Template to download a CSV file that you
can edit and then import it into Cisco ISE with the required details.
Step 4 Click Choose File to choose the CSV file from the system that is running the client browser.
Step 5 (Optional) Check the for Overwrite Existing Data with New Data and Stop Import on First Errorcheck boxes, as
required.
Step 6 Click Import.
After the file import is complete, Cisco ISE displays a summary message. This message includes the import status
(successful or unsuccessful), number of errors encountered, if any, and the total processing time taken for the file import
process.
Note You can export the network devices with IP ranges in all the octets.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 2 Click Export.
Step 3 Export the device definitions for the network devices added to the Cisco ISE node by performing one of the following
actions.
• Check the check boxes next to the devices that you want to export, choose Export Selected from the Export
drop-down list.
• Choose Export All from the Export drop-down list to export all the network devices that are added to the Cisco
ISE node.
Step 4 In both cases, a CSV file of device definitions downloads to your system.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
General Tools > Evaluate Configuration Validator.
Step 2 Enter the IP address of the network device that you want to evaluate in the Network Device IP field.
Step 3 Check the check boxes and click the radio buttons next to the configuration options you want to compare against the
recommended template.
Step 4 Click Run.
Step 5 In the Progress Details... area, click Click Here to Enter Credentials.
Step 6 In the Credentials Window dialog box, enter the connection parameters and credentials that are required to establish
a connection with the network devices.
Step 7 Click Submit.
Step 8 (Optional) To cancel the workflow, click Click Here to Cancel the Running Workflow in the Progress Details...
window.
Step 9 (Optional) Check the check boxes next to the interfaces that you want to analyze, and click Submit.
Step 10 (Optional) Click Show Results Summary for details of the configuration evaluation.
• The protocols that the network device supports, such as RADIUS, TACACS+, and Cisco TrustSec. You
can import into Cisco ISE any vendor-specific RADIUS dictionaries that exist for the network device.
• The attributes and values that the device uses for various authentication flows such as Wired MAB and
802.1X. These attributes and values allow Cisco ISE to detect the right authentication flow for your
device according to the attributes that the network device uses.
• The Change of Authorization (CoA) capabilities of the network device. While the RADIUS protocol
RFC 5176 defines a CoA request, the attributes used in a CoA request vary depending on the network
device. Most non-Cisco devices with RFC 5176 support the Push and Disconnect functions. For devices
that do not support the RADIUS CoA type, Cisco ISE also supports SNMP CoA.
• The attributes and protocols that the network device uses for MAB flows. Network devices from different
vendors perform MAB authentication differently.
• The VLAN and ACL permissions that are used by the device. When you save the profile, Cisco ISE
automatically generates authorization profiles for each configured permission.
• URL redirection technique information. URL redirection is necessary for advanced flows such as Bring
Your Own Device (BYOD), guest access, and posture services. Two types of URL redirections are found
on a network device—static and dynamic. For static URL redirection, you can copy and paste the Cisco
ISE portal URL into the configuration. For dynamic URL redirection, Cisco ISE uses a RADIUS attribute
to tell the network device where to redirect to.
If the network device does not support both dynamic and static URL redirects, Cisco ISE provides an
Auth VLAN configuration by which URL redirect is simulated. The Auth VLAN configuration is based
on DHCP and DNS services running in Cisco ISE.
After you have defined your network devices in Cisco ISE, configure these device profiles or use the
preconfigured device profiles that are offered by Cisco ISE to define the capabilities that Cisco ISE uses to
enable basic authentication flows, and advanced flows such as Profiler, Guest, BYOD, MAB, and Posture.
9. Cisco ISE responds with an HTTP 301 Moved message with a guest portal URL. The endpoint browser
redirects to the guest portal window.
10. The guest endpoint user logs in for authentication.
11. Cisco ISE validates endpoint compliance and then responds to the NAD. Cisco ISE sends the CoA,
authorizes the endpoint, and bypasses the sink hole.
12. The guest user receives the appropriate access based on the CoA, and the endpoint receives an IP address
from an enterprise DHCP. The guest user can now use the network.
You can separate the Auth VLAN from the corporate network to prevent unauthorized network access by a
guest endpoint before the endpoint passes authentication. Configure the Auth VLAN IP helper to point to the
Cisco ISE machine, or connect one of the Cisco ISE network interfaces to the Auth VLAN.
Multiple VLANs may be connected to one network interface card by configuring a VLAN IP helper from the
NAD configuration. For more information about configuring an IP helper, see the administration guide for
the network device for instructions. For guest access flows that include VLANs with IP helpers, define a guest
portal, and select that portal in an authorization profile that is bound to MAB authorization. For more
information about guest portals, see the Cisco ISE Guest Services section in Cisco ISE Admin Guide: Guest
and BYOD .
The following diagram displays a basic network setup when an Auth VLAN is defined (the Auth VLAN is
connected directly to a Cisco ISE node).
Figure 29: Auth VLAN Connected to Cisco ISE Node
The following diagram displays a network with Auth VLAN and an IP helper.
CoA Types
Cisco ISE supports both RADIUS and SNMP CoA types. RADIUS or SNMP CoA type support is required
for the NAD to work in complex flows, while it is not mandatory for basic flows.
Define the RADIUS and SNMP settings that the network device supports when you configure the NAD in
Cisco ISE. Indicate the CoA type to be used for a specific flow when configuring the NAD profile. For more
information about defining protocols for your NADs, see Network Device Definition Settings, on page 847.
Check with your third-party supplier to verify which CoA type your NAD supports before creating the device
profile and NAD profile in Cisco ISE.
Table 122: Vendor Devices Tested with Cisco ISE 2.1 and Later Releases
Device Type Vendor CoA Type URL Supported or Validated Use Cases
Redirect
Type 802.1X and Profiler Profiler with Posture Guest and
MAB Flows without CoA CoA BYOD
Flows
Wireless Aruba 7000, RADIUS Static URL Yes Yes Yes Yes Yes
InstantAP
Wired HP A5500 RADIUS Auth VLAN Yes Yes Yes Yes Yes
provided by
ISE
HP 3800 and RADIUS Auth VLAN Yes Yes Yes Yes Yes
2920 provided by
(ProCurve) ISE
Brocade ICX RADIUS Auth VLAN Yes Yes Yes Yes Yes
6610 provided by
ISE
For other third-party NADs, you must identify the device Yes Yes Requires Requires CoA support.
properties and capabilities, and create custom NAD CoA support
If a wired device does not
profiles in Cisco ISE.
support URL redirect, Cisco
ISE uses Auth VLAN.
Wireless devices have not
been tested with Auth
VLAN.
You must create custom NAD profiles for other third-party network devices that do not have a predefined
profile. For advanced workflows such as Guest, BYOD, and Posture, the network device must support the
RADIUS protocol RFC 5176, which pertains to CoA support for these flows. See the device's administration
guide for information on the attributes that are required to create network device profiles in Cisco ISE.
Step 1 Add the third-party network device to Cisco ISE (See Import Network Devices into Cisco ISE, on page 859. If you are
configuring Guest, BYOD, or Posture workflows, ensure that CoA is defined and the NAD’s URL redirect mechanism
is configured to point to the relevant Cisco ISE portal. To configure the URL redirect, copy the Cisco ISE portal URL
from the portal’s landing page. For more information about configuring CoA types and URL redirects for the NAD in
Cisco ISE, see Network Device Definition Settings, on page 847. In addition, see the third-party device’s administration
guide for instructions.
Step 2 Ensure that an appropriate NAD profile for your device is available in Cisco ISE. To view the existing profiles, choose
Administration > Network Resources > Network Device Profiles. If an appropriate profile does not exist in Cisco
ISE, create a custom profile. See Create a Network Device Profile, on page 866 for information on how to create custom
profiles.
Step 3 Assign a NAD profile to the NAD that you want to configure. In the Cisco ISE GUI, click the Menu icon ( ) and choose
Administration > Network Resources > Network Devices. Open the device to which you want to assign a profile,
and from the Device Profile drop-down list, choose the profile that you want to assign.
Step 4 When you configure your policy rules, set the authorization profile to the NAD profile in step 1, or Any if you are just
using VLAN or ACL, or if you have different devices from different vendors in your network. To set the NAD profile
for the authorization profile, choose Policy > Policy Elements > Results > Authorization > Authorization Profiles.
Open the relevant authorization profile and from the Network Device Profile drop-down list, choose the relevant NAD
profile. When using Auth VLAN for Guest flows, you should also define a guest portal and select that portal in an
Authorization profile that is bound to MAB authorization—similar to regular Guest flows. For more information about
guest portals, see the "Cisco ISE Guest Services" section in Cisco ISE Admin Guide: Guest and BYOD .
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Device
Profiles.
Step 2 Click Add.
Step 3 In the New Network Device Profile window that is displayed, enter the corresponding values in the Name and Description
fields for the network device.
Step 4 From the Vendor drop-down list, choose the vendor of the network device.
Step 5 In the Icon area, click Change Icon... to upload an icon for the network device from your system.
Alternatively, in the Icon area, click Set To Default to use the default icon provided by Cisco ISE.
Step 6 In the Supported Protocols area, check the check boxes for the protocols that the device supports. Check the check boxes
only for the protocols that you want to actually use. If the network device supports the RADIUS protocol, choose the
RADIUS dictionary to be used in the device from RADIUS Dictionaries drop-down list.
Step 7 In the Templates area, enter relevant details:
a) Click Authentication/Authorization to configure the network device's default settings for flow types, attribute
aliasing, and host lookup. In the new Flow Type Conditions area that is displayed, enter the attributes and values
that your device uses for various authentication and authorization flows such as Wired MAB or 802.1X. This enables
Cisco ISE to detect the correct flow type for your device according to the attributes it uses. There is no IETF standard
for MAB, and different vendors use different values for Service Type. See the device's user guide or use a sniffer
trace of a MAB authentication to determine the correct settings. In the Attribute Aliasing area, map device-specific
attribute names to common names to simplify policy rules. Currently, only the Service Set Identifier (SSID) is defined.
If the network device has the concept of wireless SSID, then set this to the attribute it uses. Cisco ISE maps this to
an attribute called SSID in the Normalized RADIUS dictionary. This simplifies policy rule configuration because
you can refer to SSID in one rule, and it works for multiple devices even if the underlying attributes are different. In
the Host Lookup area, check the Process Host Lookup check box and select the relevant MAB protocols and
attributes for your device, based on the instructions provided by the third-party device vendor.
b) Click Permissions to configure the network device's default settings for VLAN and ACL. These are automatically
mapped based on the authorization profiles that you create in Cisco ISE.
c) Click Change of Authorization (CoA) to configure the network device's CoA capabilities.
If you choose RADIUS from the CoA By drop-down list, in the configurations area that is displayed, you must choose
only static attributes. Dynamic attributes are not supported.
d) Click Redirect to configure the network device's URL-redirect capabilities. URL redirection is necessary for guest,
BYOD, and posture services.
Step 8 Click Submit.
Related Topics
How to Create ISE Network Access Device Profiles
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Device
Profiles.
Step 2 Check the check boxes next to the devices that you want to export, and click Export Selected.
Step 3 A file that is named DeviceProfiles.xml downloads to your local hard disk.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Device
Profiles.
Step 2 Click Import.
Step 3 Click Choose File to choose the XML file from the system that is running the client browser.
Step 4 Click Import.
Name Enter a name for the root network device group. For all subsequent child network
device groups added to this root network device group, enter the name of this newly
created network device group.
You can have a maximum of six nodes in a network device group hierarchy, including
the root node. Each network device group name can have a maximum of 32 characters.
Description Enter a description for the root or the child network device group.
No. of Network The number of network devices in the network group is displayed in this column.
Devices
File Click Choose File and navigate to the location of the CSV file that you want to upload.
The file may be new or a file that was exported from another Cisco ISE deployment.
You can import network device groups from one Cisco ISE deployment to another,
with new and updated network device groups information.
Overwrite Existing Check this check box if you want to replace the existing network device groups with
Data with New the device groups in your import file.
Data
If you do not check this check box, only the new network device groups in the import
file are added to the network device group repository. Duplicate entries are ignored.
Stop Import on Check this check box to discontinue import at the first instance of encountering an
First Error error during the import.
If this check box is not checked and an error is encountered, Cisco ISE reports the
error and continues importing the rest of the device groups.
Assign network devices to one or more hierarchical network device groups. When Cisco ISE processes the
ordered list of configured network device groups to determine the appropriate group to assign to a particular
device, it may find that the same device profile applies to multiple device groups. In this case, Cisco ISE
applies the first device group that is matched.
There is no limit on the maximum number of network device groups that you can create. You can create up
to six levels of hierarchy (including the parent group) for the network device groups.
The device group hierarchy is displayed in two views, Tree Table and Flat Table. Click Tree Table or Flat
Table above the list of network device groups to organize the list into the corresponding view.
In the Tree Table view, the root node appears at the top of the tree followed by the child groups in hierarchical
order. Click Expand All to view all the device groups in each root group. Click Collapse All to view a list
of only the root groups.
In the Flat Table view, the hierarchy of each device group is displayed in the Group Hierarchy column.
In both views, the number of network devices that are assigned to each child group is displayed in the
corresponding No. of Network Devices column. Click the number to launch a dialog box that lists all the
network devices that are assigned to that device group. The dialog box that is displayed also contains two
buttons to move network devices from one group to another. Click Move Devices to Another Group to move
network devices from the current group to another. Click Add Devices to Group to move a network device
into the chosen network device group.
To add a network device group in the Network Device Groups window, click Add. In the Parent Group
drop-down list, choose the parent group to which the network device group must be added, or choose the Add
As Root Group option to add the new network device group as the parent group.
Note You cannot delete a device group if any devices are assigned to that device group. Before deleting a device
group, you must move all the existing devices to another device group.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Device
Groups.
Step 2 Click Import.
Step 3 In the dialog box, click Choose File to choose the CSV file from the system that is running the client browser.
To download a CSV template file for adding network device groups, click Generate a Template.
Step 4 To overwrite the existing network device groups, check the Overwrite Existing Data with New Data check box.
Step 5 Check the Stop Import on First Error check box.
Step 6 Click Import.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Device
Groups > All Groups.
Step 2 To export the network device groups, you can do one of the following:
• Check the check boxes next to the device groups that you want to export, and choose Export > Export Selected.
• Choose Export > Export All to export all the network device groups that are defined.
Name Enter a name for the root network device group. For all subsequent child network
device groups added to this root network device group, enter the name of this newly
created network device group.
You can have a maximum of six nodes in a network device group hierarchy, including
the root node. Each network device group name can have a maximum of 32 characters.
Description Enter a description for the root or the child network device group.
No. of Network The number of network devices in the network group is displayed in this column.
Devices
File Click Choose File and navigate to the location of the CSV file that you want to upload.
The file may be new or a file that was exported from another Cisco ISE deployment.
You can import network device groups from one Cisco ISE deployment to another,
with new and updated network device groups information.
Overwrite Existing Check this check box if you want to replace the existing network device groups with
Data with New the device groups in your import file.
Data
If you do not check this check box, only the new network device groups in the import
file are added to the network device group repository. Duplicate entries are ignored.
Stop Import on Check this check box to discontinue import at the first instance of encountering an
First Error error during the import.
If this check box is not checked and an error is encountered, Cisco ISE reports the
error and continues importing the rest of the device groups.
Table 127: CSV Template Fields and Descriptions for Network Devices
Name:String(32) Enter a name for the network device. The name must be an alphanumeric string
with a maximum of 32 characters.
Description:String(256) (Optional) Enter a description for the network device with a maximum of 256
characters.
IP Address:Subnets(a.b.c.d/m|...) Enter the IP address and subnet mask of the network device. You can enter more
than one value separated by a pipe (|) symbol.
IPv4 and IPv6 addresses are supported for network device (TACACS and
RADIUS) configurations and for external RADIUS server configurations.
When you enter an IPv4 address, you can use ranges and subnet masks.
Ranges are not supported for IPv6.
Model Name:String(32) Enter the network device's model name with a maximum of 32 characters.
Software Version:String(32) Enter the network device's software version with a maximum of 32 characters.
Network Device Groups:String(100) Enter the names of existing network device groups. If it is a subgroup, it must
include both the parent and subgroup, separated by a space. The string must be
a maximum of 100 characters, for example, Location>All Location>US.
Authentication:Protocol:String(6) Enter the authentication protocol that you want to use. The only valid value is
RADIUS (not case-sensitive).
EnableKeyWrap:Boolean(true|false) This field is enabled only if KeyWrap is supported in the network device. Enter
true or false.
EncryptionKey:String(ascii:16|hexa:32) (Required if you enable KeyWrap) Enter the encryption key that is used for
session encryption.
ASCII values: 16 characters (bytes) long.
Hexadecimal values: 32 characters (bytes) long.
AuthenticationKey:String(ascii:20|hexa:40) (Required if you enable KeyWrap.) Enter the keyed Hashed Message
Authentication Code (HMAC) calculation over RADIUS messages.
ASCII values: 20 characters (bytes) long.
Hexadecimal values: 40 characters (bytes) long.
InputFormat:String(32) Enter the encryption and authentication keys input format. ASCII and hexadecimal
values are accepted.
SNMP:Version:Enumeration (|2c|3) Enter the version of the SNMP protocol that the profiler service must use—1,
2c, or 3.
SNMP:RO Community:String(32) (Required if you enter a value in the SNMP:Version:Enumeration (|2c|3) field).
Enter a string for Read Only Community with a maximum of 32 characters
SNMP:RW Community:String(32) (Required if you enter a value in the SNMP:Version:Enumeration (|2c|3) field).
Enter a string for Read Write Community with a maximum of 32 characters.
SNMP:Authentication (Required if you have entered Auth or Priv for the SNMP security level.) Enter
Protocol:Enumeration(MD5|SHA) MD5 or SHA.
SNMP:Polling Interval:Integer:600-86400 Enter the SNMP polling interval, in seconds. A valid value is an integer from
seconds 600 to 86400.
SNMP:Is Link Trap Query:Boolean(true|false) Enable or disable the SNMP link trap by entering true or false.
SNMP:Is MAC Trap Query:Boolean(true|false) Enable or disable the SNMP MAC trap by entering true or false.
SNMP:Originating Policy Services Indicate which Cisco ISE server must be used to poll for SNMP data. It is
Node:String(32) automatic by default, but you can overwrite the setting by assigning different
values in this field.
Trustsec:Device Id:String(32) Enter a Cisco Trustsec device ID, which is a string with a maximum of 32
characters.
Trustsec:Device Password:String(256) (Required if you have entered a Cisco TrustSec device ID.) Enter a Cisco TrustSec
device password, which is a string with a maximum of 256 characters.
Trustsec:Environment Data Download Enter the Cisco TrustSec environment data download interval. A valid value is
Interval:Integer:1-2147040000 seconds an integer from 1 to 2147040000.
Trustsec:Peer Authorization Policy Download Enter the Cisco TrustSec peer authorization policy download interval. A valid
Interval:Integer:1-2147040000 seconds value is an integer from 1 to 2147040000.
Trustsec:Reauthentication Enter the Cisco TrustSec reauthentication interval. A valid value is an integer
Interval:Integer:1-2147040000 seconds from 1 to 2147040000.
Trustsec:SGACL List Download Enter the Cisco TrustSec security group ACL list download interval. A valid
Interval:Integer:1-2147040000 seconds value is an integer from 1 to 2147040000.
Trustsec:Is Other Trustsec Devices Indicate whether a Cisco TrustSec device is trusted by entering true or false.
Trusted:Boolean(true|false)
Trustsec:Notify this device about Trustsec Notify Cisco TrustSec configuration changes to the Cisco TrustSec device by
configuration entering ENABLE_ALL or DISABLE_ALL .
changes:String(ENABLE_ALL|DISABLE_ALL)
Trustsec:Include this device when deploying Indicate if the Cisco TrustSec device is included in security group tag by entering
Security Group Tag Mapping true or false.
Updates:Boolean(true|false)
Deployment:Execution Mode Enter the user name that has privileges to edit the network device configuration.
Username:String(32) It is a string with a maximum of 32 characters.
Deployment:Execution Mode Enter the device password, which is a string with a maximum of 32 characters.
Password:String(32)
Deployment:Enable Mode Password:String(32) Enter the password of the device that allows you to edit its configuration. It is a
string with a maximum of 32 characters.
Trustsec:PAC issue date:Date Enter the issuing date of the last Cisco TrustSec PAC that was generated by Cisco
ISE for the Cisco TrustSec device.
Trustsec:PAC expiration date:Date Etner the expiration date of the last Cisco TrustSec PAC that was generated by
Cisco ISE for the Cisco TrustSec device.
Trustsec:PAC issued by:String Enter the name of the issuer (a Cisco TrustSec administrator) of the last Cisco
TrustSec PAC that was generated by Cisco ISE for the Cisco TrustSec device.
It must be a string value.
Table 128: CSV Template Fields and Descriptions for Network Device Groups
Field Description
Name:String(100): (Required) This field is the network device group name. It is a string with a maximum of 100 characters
in length. The full name of an NDG can have a maximum of 100 characters in length. For example, if
you create a subgroup India under the parent groups Global > Asia, then the full name of the NDG that
you create would be Global#Asia#India. The full name cannot exceed 100 characters in length. If the full
name of the NDG exceeds 100 characters in length, the NDG creation fails.
Description:String(1024) This is an optional field. It is a string, with a maximum of 1024 characters in length.
Type:String(64): (Required) This field is the network device group type. It is a string, with a maximum of 64 characters
in length.
Is (Required) This is a field that determines if the specific network device group is a root group. Valid value
Root:Boolean(true|false): is true or false.
Note Gigabit Ethernet 0 and Bond 0 (when Gigabit Ethernet 0 and Gigabit Ethernet 1 interfaces are bonded) are
management interfaces in the Cisco ISE CLI. IPsec is not supported on Gigabit Ethernet 0 and Bond 0.
Cisco ISE Releases 2.2 and later support IPsec.
Note The C5921 ESR software is bundled with Cisco ISE, Releases 2.2 and later. You
need an ESR license to enable it. See Cisco 5921 Embedded Services Router
Integration Guide for ESR licensing information.
For more information on IPsec configuration, restrictions, and support, see the Security Configuration Guide,
Cisco IOS XE Cupertino 17.7.x (Catalyst 9300 Switches).
Step 1 Configure IP address on the interface from the Cisco ISE CLI.
Gigabit Ethernet 1 through Gigabit Ethernet 5 interfaces (Bond 1 and Bond 2) support IPSec. However, IPSec can be
configured only on one interface in a Cisco ISE node.
Step 2 Add a directly connected network device to the IPSec network device group.
Note RADIUS IPSec requires the static route gateway to be directly connected through an interface of the device.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network
Devices.
b) In the Network Devices window, click Add.
c) Enter the name and IP address and subnet of the network device that you want to add in the corresponding fields.
d) From the IPSEC drop-down list, choose Yes.
e) Check the RADIUS Authentication Settings check box.
f) In the Shared Secret field, enter the shared secret key that you have configured on the network device.
g) Click Save.
Step 3 Add a separate management interface to interact with the Cisco Smart Software Manager (CSSM). See Smart Software
Manager satellite for information on Embedded Services Router (ESR). To do this, from the Cisco ISE CLI, run the
following command to select the corresponding management interface (Gigabit Ethernet 1 to 5 (or Bond 1 or 2)):
ise/admin# license esr smart {interface}
This interface must be able to reach Cisco.com to access the Cisco online licensing server.
To disable ise/admin# license esr smart on an existing interface:
• Add a new management interface.
• In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Protocols >
IPSec. Enable and Disable IPSec on the new interface.
Step 4 Add a network device to a directly connected gateway from the Cisco ISE CLI.
ip route [destination network] [network mask] gateway [next-hop address]
e) Click Save.
Note You cannot modify IPSec configurations directly. To modify the IPSec tunnel or authentication when IPSec is
enabled, disable the current IPSec tunnel, modify the IPSec configuration, and then re-enable the IPSec tunnel
with a different configuration.
Note When enabled, IPSec removes the IP address from the Cisco ISE interface and shuts down the interface. When
the user logs in from Cisco ISE CLI, the interface is displayed with no IP address and in shutdown state. This IP
address will be configured on the ESR-5921 interface.
ise-esr5921>
ise-esr5921>
Note For FIPS compliance, you must configure a secret password that is at least eight characters in length. Enter the
Enable secret level 1 command to specify the password:
ise-esr5921(config)#enable secret level 1 ?
0 Specifies an UNENCRYPTED password will follow
5 Specifies a MD5 HASHED secret will follow
8 Specifies a PBKDF2 HASHED secret will follow
9 Specifies a SCRYPT HASHED secret will follow
LINE The UNENCRYPTED (cleartext) 'enable' secret
Note If you configure customized RADIUS ports from the GUI (other than 1645, 1646, 1812, and 1813), you must
enter the following CLI command in the ESR shell to accept the configured RADIUS ports:
ip nat inside source static udp 10.1.1.2 [port_number] interface Ethernet0/0 [port_number]
Step 7 Verify IPSec tunnel and RADIUS authentication over IPSec tunnel.
a) Add a user in Cisco ISE and assign the user to a user group (In the Cisco ISE GUI, click the Menu icon ( ) and
chooseAdministration > Identity Management > Identities > Users).
b) Carry out the following steps to verify if the IPSec tunnel is established between Cisco ISE and the NAD:
1. Use the ping command to test if Cisco ISE is connected to the NAD.
2. Run the following command from the ESR shell or the NAD CLI to verify if the connection is in the active state:
show crypto isakmp sa
ise-esr5921#show crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
192.168.30.1 192.168.30.3 QM_IDLE 1001 ACTIVE
3. Run the following command from the ESR shell or the NAD CLI to verify if the tunnel is established:
show crypto ipsec sa
ise-esr5921#show crypto ipsec sa
interface: Ethernet0/0
inbound ah sas:
outbound ah sas:
ise-esr5921>
ise-esr5921>
Note For FIPS compliance, you must configure a secret password that is at least eight characters in length. Enter the
Enable secret level 1 command to specify the password:
ise-esr5921(config)#enable secret level 1 ?
0 Specifies an UNENCRYPTED password will follow
5 Specifies a MD5 HASHED secret will follow
8 Specifies a PBKDF2 HASHED secret will follow
9 Specifies a SCRYPT HASHED secret will follow
LINE The UNENCRYPTED (cleartext) 'enable' secret
Note If you configure customized RADIUS ports from the GUI (other than 1645, 1646, 1812, and 1813), you must
enter the following CLI command in the ESR shell to accept the RADIUS ports that are configured:
ip nat inside source static udp 10.1.1.2 [port_number] interface Ethernet0/0 [port_number]
enrollment terminal
serial-number none
fqdn none
ip-address none
subject-name cn=networkdevicename.cisco.com
revocation-check none
rsakeypair rsa2048
Step 5 Copy the output of the certificate signing request to a text file, submit it to an external CA for signing, and obtain the
signed certificate and the CA certificate.
Step 6 Import the Certificate Authority (CA) certificate using the following command:
Example:
crypto pki authenticate rsaca-mytrustpoint
Copy and paste the contents of the CA certificate, including the "—BEGIN—" and "—-End—" lines.
Copy and paste the contents of the signed certificate, including the "—BEGIN—" and "—-End—" lines.
The following is an example of the output that is displayed when you configure and install X.509 Certificates on Cisco
5921 ESR:
ise-esr5921#show running-config
!
hostname ise-esr5921
!
boot-start-marker
boot host unix:default-config
boot-end-marker
!
no aaa new-model
bsd-client server url https://cloudsso.cisco.com/as/token.oauth2
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
call-home
! If contact email address in call-home is configured as [email protected]
! the email address configured in Cisco Smart License Portal will be used as contact email address
to send SCH notifications.
contact-email-addr [email protected]
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
!
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint rsaca-mytrustpoint
enrollment terminal
serial-number none
fqdn none
ip-address none
subject-name cn=ise-5921.cisco.com
revocation-check none
rsakeypair rsa2048
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
no ip route-cache
crypto map radius
!
interface Ethernet0/1
description e0/1->tap0 internal connection to ISE
ip address 10.1.1.1 255.255.255.252
ip nat inside
ip virtual-reassembly in
no ip route-cache
!
interface Ethernet0/2
no ip address
shutdown
!
interface Ethernet0/3
no ip address
shutdown
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
ip nat inside source list 1 interface Ethernet0/0 overload
ip nat inside source static udp 10.1.1.2 1645 interface Ethernet0/0 1645
ip nat inside source static udp 10.1.1.2 1646 interface Ethernet0/0 1646
ip nat inside source static udp 10.1.1.2 1812 interface Ethernet0/0 1812
ip nat inside source static udp 10.1.1.2 1813 interface Ethernet0/0 1813
!
access-list 1 permit 10.1.1.0 0.0.0.3
!
control-plane
!
line con 0
logging synchronous
line aux 0
line vty 0 4
login
transport input none
!
end
The following is an example of the output that is displayed when you configure and install X.509 certificates on Cisco
Catalyst 3850 Series Switches:
cat3850#show running-config
encr aes
hash sha256
authentication rsa-sig
group 16
!
crypto ipsec security-association lifetime seconds 86400
!
crypto ipsec transform-set radius esp-aes esp-sha256-hmac
mode tunnel
interface GigabitEthernet1/0/1
no switchport
ip address 192.168.20.2 255.255.255.0
!
access-list 100 permit ip host 192.168.20.2 host 192.168.20.1
!
snmp-server community public RO
snmp-server community private RW
!
radius server rad-ise
address ipv4 192.168.20.1 auth-port 1645 acct-port 1646
key secret
Example: Output of Pre-shared Key Configuration on Cisco Catalyst 3850 Series Switches
The following is an example of the output that is displayed when you configure the pre-shared key on Cisco
Catalyst 3850 Series Switches:
cat3850#show running-config
encr aes
hash sha256
authentication pre-share
group 16
crypto isakmp key 123456789 address 0.0.0.0
!
crypto ipsec security-association lifetime seconds 86400
!
crypto ipsec transform-set radius esp-aes esp-sha256-hmac
mode tunnel
!
crypto ipsec profile radius-profile
!
crypto map radius 10 ipsec-isakmp
set peer 192.168.20.1
set transform-set radius
match address 100
!
interface GigabitEthernet1/0/1
no switchport
ip address 192.168.20.2 255.255.255.0
key secret
Configure Cisco ISE to interoperate with one or more external MDM servers. By setting up this type of
third-party connection, you can use the detailed information available in the MDM database. Cisco ISE uses
REST API calls to retrieve information from the external MDM server. Cisco ISE applies the appropriate
access control policies to switches, access routers, wireless access points, and other network access points.
The policies give you greater control of the remote devices that are accessing the Cisco ISE-enabled network.
For a list of the MDM vendors supported by Cisco ISE, see Supported Unified Endpoint Management and
Mobile Device Management Servers, on page 891.
• MDMModel: iPhone
• MDMOSVersion: iOS 6.0.0
• MDMPhoneNumber: 5550100
• MDMSerialNumber: DNPGQZGUDTFx
• Polls the MDM server every four hours for device compliance data. Configure the polling interval in the
External MDM Servers page. (To view this page, click the Menu icon ( ) and choose Work Centers >
Network Access > Network Resources > External MDM Servers.
• Issues device instructions through the MDM server: Cisco ISE issues remote actions for user devices
through the MDM server. Initiate remote actions from the Cisco ISE administration portal through the
Endpoints page. To view this page, click the Menu icon ( ) and choose Context Visibility > Endpoints.
Check the check box next to the MDM server and click MDM Actions. Choose the required action from
the drop-down list displayed.
If an MDM server does not provide values for the required attributes, Cisco ISE fills the attributes fields with
the default values that are mentioned in the following table.
Attribute Name Attribute Dictionary Default Value Data That is Expected Data That is Expected
From UEM or MDM From Microsoft SCCM
Servers Servers
DaysSinceLastCheckin MDM None The number of days since The number of days since
a user has last checked in a user has last checked in
Supported from MDM
or synchronized a device or synchronized a device
API Version 3
with the UEM or MDM with the SCCM server.
server. The valid range is The valid range is 1–365
1–365 days. days.
Attribute Name Attribute Dictionary Default Value Data That is Expected Data That is Expected
From UEM or MDM From Microsoft SCCM
Servers Servers
MDMFailureReason MDM None The device failure reason. The device failure reason.
MDMServerName MDM None The name of the server. The name of the server.
If a vendor's unique attributes are not supported, you may be able to use ERS APIs to exchange vendor-specific
attributes. Check the vendor's documentation for information on the ERS APIs that are supported.
The new MDM dictionary attributes are available for use in authorization policies.
Note Some versions of MobileIron do not work with Cisco ISE. MobileIron is aware
of this problem, and have a fix. Contact MobileIron for more information.
For the configurations that you must perform in your endpoint management servers to integrate the servers
with Cisco ISE, see Integrate UEM and MDM Servers With Cisco ISE.
MobileIron 443
Note The input parameter is the MAC address of the endpoint device. For off-premise Apple iOS devices (any
device that connects to Cisco ISE through a VPN), the input parameter is the UDID.
4. If the user’s device is not on this list, it means that the device is not registered. Cisco ISE sends an
authorization request to the NAD to redirect to Cisco ISE. The user is presented with the MDM server
page.
5. Cisco ISE uses MDM to provision the device and presents the appropriate window for the user to register
the device.
6. The user registers the device in the MDM server, and the MDM server redirects the request to Cisco
ISE through automatic redirection or manual browser refresh.
7. Cisco ISE queries the MDM server again for the posture status.
8. If the user’s device is not compliant with the posture (compliance) policies that are configured on the
MDM server, the user is notified that the device is out of compliance. The user must take the necessary
action to ensure that the device is compliant.
9. When the user’s device is compliant, the MDM server updates the device's state in its internal tables.
10. If the user refreshes the browser now, the control is transferred back to Cisco ISE.
11. Cisco ISE polls the MDM server every four hours to get compliance information and issues the
appropriate Change of Authorization (CoA). You can configure the polling interval. Cisco ISE also
checks the MDM server every five minutes to make sure that it is available.
Note A device can only be enrolled in a single MDM server at a time. If you want to enroll the same device to an
MDM service from another vendor, the previous vendor's profiles must be removed from the device. The
MDM service usually offers a "corporate wipe", which only deletes the vendor's configuration from the device
(not the whole device). The user can also remove the files. For example, on an iOS device, the user can go to
the Settings > General > Device management window, and click Remove Management. Or the user can
go to the MyDevices portal in Cisco ISE and click Corporate Wipe.
Step 1 Import the MDM server certificate into Cisco ISE, except for Intune, where you import the Policy Administration node's
(PAN) certificate into Azure.
Step 2 Create mobile device manager definitions.
Step 3 Configure ACLs on the Cisco WLCs.
Step 4 Configure an authorization profile that redirects nonregistered devices to the MDM server.
Step 5 If there are multiple MDM servers on the network, configure separate authorization profiles for each vendor.
Step 6 Configure authorization policy rules for the MDM use cases.
Note For Microsoft Azure, import the Cisco ISE certificate into Azure. See Connect Microsoft Intune to Cisco ISE
as a Mobile Device Management Server.
Step 1 Export the MDM server certificate from your MDM server and save it on your local machine.
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificate > Import.
Step 3 In the Import a new Certificate into the Certificate Store window, click Choose File to select the MDM server
certificate that you obtained from the MDM server.
Step 4 Add a name for the certificate in the Friendly Name field.
Step 5 Check the Trust for authentication within ISE check box.
Step 6 Click Submit.
Step 7 Verify that the Trust Certificates window lists the newly added MDM server certificate.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > External MDM.
Step 2 In the MDM Servers window, click Add.
Step 3 Enter the name and description of the MDM server that you want to add in the corresponding fields.
Step 4 From the Server Type drop-down list, choose Mobile Device Manager.
Step 5 From the Authentication Type drop-down list, choose either Basic or OAuth - Client Credentials.
If you choose the Basic authentication type, the following fields are displayed:
• Host Name / IP Address: Enter the hostname or IP address of the MDM server.
• Port: Specify the port to be used when connecting to the MDM server, which is usually 443.
• Instance Name: If this MDM server has several instances, enter the instance that you want to connect to.
• Username: Enter the username that must be used to connect to the MDM server.
• Password: Enter the password that must be used to connect to the MDM server.
If you choose the OAuth - Client Credentials authentication type, the following fields are displayed:
• From the Auto Discovery drop-down list, choose Yes or No.
• Auto Discovery URL: Enter the value of Microsoft Azure AD Graph API Endpoint from the Microsoft Azure
management portal. This URL is the endpoint at which an application can access directory data in your Microsoft
Entra ID using the Graph API. For more information, see Integrate MDM and UEM Servers with Cisco ISE.
• Client ID: The unique identifier for your application. Use this attribute if your application accesses data in another
application, such as the Microsoft Azure AD Graph API, Microsoft Intune API, and so on.
• Token Issuing URL: Enter the value of the Oauth2.0 Authorization Endpoint. This is the endpoint from which
Cisco ISE obtains an access token using OAuth2.0.
• Token Audience: The recipient resource that the token is intended for, which is a public, well-known APP ID URL
to the Microsoft Intune API.
Time Interval For Compliance Device ReAuth Query: When an endpoint is authenticated or reauthenticated, Cisco
ISE uses a cache to get the MDM variables for that endpoint. If the age of the cached value is greater than the value
configured in this field, Cisco ISE sends a new device query to the MDM server to get new values. If the compliance
status has changed, then Cisco ISE triggers the appropriate CoA. The valid range is from 1 to 10080 minutes. The default
value is one minute.
Polling Interval: Enter the polling interval, in minutes, for Cisco ISE to poll the MDM server for noncompliant endpoints.
Set this value to match the polling interval on your MDM server. The valid range is from 15 to 1440 minutes. The default
value is 240 minutes. We recommend that you set the polling interval more than 60 minutes in production environments
to minimize any performance impact that might occur due to large numbers of noncompliant endpoints.
ISE retrieves list of non compliant devices information through MAC Address/GUID based non compliant API calls (
Eg: )
Since this is a bulk retrieval API, ISE uses paging info provided by MDM Server.
ISE updates endpoint records compliance information based on the non compliance API response. If ISE finds active
sessions on these non compliance devices, then it will reauthorize.
ISE limits the non compliance API calls to maximum of 200 requests or 20,000 endpoint records, whichever happens
first.
If you set the polling interval to 0, Cisco ISE disables polling with the MDM server.
Note Cisco ISE limits API calls from noncompliant endpoints to 200. If the external MDM server receives requests
from more than 20000 noncompliant endpoints, the external MDM server polling interval is automatically set to
0. You also receive the following alarm on Cisco ISE:
MDM Compliance Polling Disabled: Reason is Periodic Compliance Polling received huge
non-compliance device information.
Cisco ISE MDM Support for Microsoft Intune and Microsoft SCCM
• Microsoft Intune: Cisco ISE supports Microsoft Intune device management as a partner MDM server
to manage mobile devices.
Configure Cisco ISE as an OAuth 2.0 client application with the Microsoft Intune server managing
mobile devices. Cisco ISE gets a token from Azure to establish a session with the Cisco ISE Intune
application.
For information about how Microsoft Intune communicates with a client application, see
https://msdn.microsoft.com/en-us/library/azure/dn645543.aspx.
• Desktop Device Manager (Microsoft SCCM): Cisco ISE supports the Microsoft System Center
Configuration Manager (SCCM) as a partner MDM server for managing Windows computers.
For performance and scalability information for Microsoft SCCM integrations, see Size and Scale
Numbers for Configuration Manager. Microsoft uses Windows Management Instrumentation (WMI)
interfaces based on the Component Object Model (COM), which results in scalability limitations.
When a device connects to the network and a Microsoft SCCM policy matches, Cisco ISE queries the relevant
SCCM server to retrieve compliance and last login (check-in) time. With this information, Cisco ISE updates
the compliance status and the lastCheckinTimeStamp of the device in the Endpoint list.
If the device is not compliant or not registered with the Microsoft SCCM server, and the authorization policy
uses a redirect profile, a message is displayed to the user that the device is not compliant, or is not registered
with the Microsoft SCCM. After the user acknowledges the message, Cisco ISE can issue a CoA to the
Microsoft SCCM registration site. Users are granted access based on the authorization policy and profile.
Note The user account that you use for Cisco ISE integration must either:
• Be a member of the SMS Admins user group.
• Have the same permissions as the SMS object under the WMI namespace:
root\sms\site_<sitecode>
Set Permissions when Microsoft Active Directory Users are in Domain Admin Group
For Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2, the Domain Admin
group does not have full control of certain registry keys in the Windows operating system by default. The
Microsoft Active Directory administrator must give the Microsoft Active Directory user full control permissions
on the following registry keys:
• HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
• HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
To grant full control, the Microsoft Active Directory admin must first take ownership of the key:
Step 1 Right-click the key icon and choose the Owner tab.
Step 2 Click Permissions.
Step 3 Click Advanced.
Permissions for Microsoft Active Directory Users Not in Domain Admin Group
For Windows Server 2012 R2, give the Microsoft AD user full control permissions on the following registry
keys:
• HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
• HKLM\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}
Use the following commands in Windows PowerShell to check if full permission is given to the registry keys:
• get-acl -path
"Microsoft.PowerShell.Core\Registry::HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}"
| format-list
• get-acl -path
"hklm:\Software\Classes\Wow6432Node\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}" |
format-list
The following permissions are required when a Microsoft AD user is not in the Domain Admin group, but is
in the Domain Users group:
• Add registry keys to allow Cisco ISE to connect to the domain controller.
• Permissions to Use DCOM on the Domain Controller, on page 636
• Set Permissions for Access to WMI Root and CIMv2 Namespace, on page 904
These permissions are only required for the following Microsoft AD versions:
• Windows 2003
• Windows 2003R2
• Windows 2008
• Windows 2008 R2
• Windows 2012
• Windows 2012 R2
• Windows 2016
Add Registry Keys to Allow Cisco ISE to Connect to the Domain Controller
You must manually add some registry keys to the domain controller to allow Cisco ISE to connect as a domain
user, and retrieve login authentication events. An agent is not required on the domain controllers or on any
machines in the domain.
The following registry script shows the keys to add. You can copy and paste this into a text file, save the file
with a .reg extension, and double click the file to make the registry changes. To add registry keys, the user
must be an owner of the root key.
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"AppID"="{76A64158-CB41-11D1-8B02-00600806D9B6}"
[HKEY_CLASSES_ROOT\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"DllSurrogate"=" "
[HKEY_CLASSES_ROOT\Wow6432Node\AppID\{76A64158-CB41-11D1-8B02-00600806D9B6}]
"DllSurrogate"=" "
Make sure that you include two spaces in the value of the DllSurrogate key. If the registry is manually updated,
you must include only the two spaces and do not include the quotes. While updating the registry manually,
ensure that quotes are not included for AppID, DllSurrogate, and its values.
Retain the empty lines as shown in the preceding script, including the empty line at the end of the file.
Use the following commands in the Windows command prompt to confirm if the registry keys are created
and have the correct values:
Figure 36: Local and Remote Accesses for Launch and Activation Permissions
Higher ports are assigned dynamically, or you can configure them manually. We recommend that you add
%SystemRoot%\System32\dllhost.exe as a target. This program manages ports dynamically.
All firewall rules can be assigned to a specific IP address (Cisco ISE IP).
Note Check your user privileges in your desktop device management server to ensure you have the required security
permissions to allow baseline policies and compliance information to be sent to Cisco ISE. An administrator
must be added in the Security > Administrator Users folder of the desktop device manager.
To view the baseline policies in a Desktop Device Manager server in the Cisco ISE GUI, click the Menu icon
( ) and choose Administration > Network Resources > External MDM > MDM Servers.
Add a New Desktop Device Manager Server to Cisco ISE, and Select Configuration Baseline Policies
1. In the MDM Servers window, click Add.
2. Choose Desktop Device Manager from the Server Type drop-down list.
3. Enter the required details for the following fields:
• Host Name / IP Address: Enter the hostname or IP address of the Microsoft SCCM server.
• Instance Name: If the Microsoft SCCM server has several instances, enter the instance that you
want to connect to.
• Username: Enter the username that must be used to connect to the Microsoft SCCM server.
• Password: Enter the password that must be used to connect to the Microsoft SCCM server.
• Time Interval For Compliance Device ReAuth Query: When an endpoint is authenticated or
reauthenticated, Cisco ISE uses a cache to get the MDM variables for that endpoint. If the age of the
cached value is higher than the value configured in this field, Cisco ISE sends a new device query
to the MDM server to get new values. If the compliance status has changed, then Cisco ISE triggers
the appropriate CoA.
The valid range is from 1 to 10080 minutes. The default value is one minute.
To verify that the server is connected to Cisco ISE, click the Test Connection button. To view the configuration
baseline policies available in this server, click Save & Continue. A new window is displayed with a list of
names and IDs of the baseline policies.
Select Configuration Baseline Policies from an Existing Desktop Device Manager Server
In the MDM Servers window, check the check box for the desired server and click Edit. Click the
Configuration Baselines tab for the list of the baseline policies available in this server.
By default, all the baseline policies are selected. Uncheck the check box next to Name to deselect all the
baseline policies. Select the required baseline policies by checking the check boxes next to their names. Click
Save.
Endpoint compliance is checked based on the selected configuration baseline policies.
If there are any changes in the configuration baseline policies in a Desktop Device Manager server, click the
Update Now button in the Configuration Baselines tab for the changes to be updated in Cisco ISE.
To deselect an identifier, uncheck the check box against the identifier. You can drag the attributes to rearrange
the order in which the server must use them for verification.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization
> Authorization Profiles > Add.
Step 2 Create an authorization profile for redirecting nonregistered devices that are not compliant or registered.
Step 3 Enter a name for the authorization profile that matches the MDM server name, in the Name field.
Step 4 Choose ACCESS_ACCEPT from the Access Type drop-down list.
Step 5 In the Common Tasks section, check the Web Redirection check box and choose MDM Redirect from the drop-down
list.
Step 6 Choose the name of the ACL that you configured on the wireless LAN controller from the ACL drop-down list.
Step 7 Choose the MDM portal from the Value drop-down list.
Step 8 Choose the MDM server that you want to use from the MDM Server drop-down list.
Step 9 Click Submit.
What to do next
Configure Authorization Policy Rules for the MDM Use Cases.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets, and expand the policy set to view the
authorization policy rules.
Step 2 Add the following rules:
• MDM_Un_Registered_Non_Compliant: For devices that are not yet registered with an MDM server or noncompliant
with MDM policies. When a request matches this rule, the Cisco ISE MDM window is displayed to a user, with
information on registering the device with the MDM server.
Note Do not use the MDM.MDMServerName condition in this policy. When this condition is used, an endpoint
matches the policy only if the endpoint is registered with the MDM server.
• PERMIT: If the device is registered with Cisco ISE, registered with MDM, and is compliant with Cisco ISE and
MDM policies, it is granted access to the network based on the access control policies configured in Cisco ISE.
Step 1 Allow all outbound traffic from the server to the client.
Step 2 (Optional) Allow ICMP inbound traffic from the client to the server for troubleshooting.
Step 3 Allow access to the MDM server for unregistered and noncompliant devices to download the MDM agent and proceed
with compliance checks.
Step 4 Allow all inbound traffic from the client to the server to Cisco ISE for the web portal and supplicant, and certificate
provisioning flows.
Step 5 Allow inbound Domain Name System (DNS) traffic from the client to the server for name resolution.
Step 6 Allow inbound DHCP traffic from the client to the server for IP addresses.
Step 7 Deny all inbound traffic from the client to the server to corporate resources for redirection to Cisco ISE (as per your
company policy).
Step 8 (Optional) Permit the rest of the traffic.
Example
The following example shows the ACLs for redirecting a nonregistered device to the BYOD flow.
In this example, the Cisco ISE IP address is 10.35.50.165, the internal corporate network IP addresses
are 192.168.0.0 and 172.16.0.0 (to redirect), and the MDM server subnet is 204.8.168.0.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Identities > Endpoints.
Step 2 Check the check box next to the device that you want to wipe or lock.
Step 3 From the MDM Actions drop-down list, choose one of the following options:
• Full Wipe: Depending on the MDM vendor, this option either removes the corporate apps or resets the device to
the factory settings.
• Corporate Wipe: This option removes applications that you have configured in the MDM server policies.
• PIN Lock: This option locks the device.
Policy Sets
Cisco ISE is a policy-based, network-access-control solution, which offers network access policy sets, allowing
you to manage several different network access use cases such as wireless, wired, guest, and client provisioning.
Policy sets (both network access and device administration sets) enable you to logically group authentication
and authorization policies within the same set. You can have several policy sets based on an area, such as
policy sets based on location, access type, and similar parameters. When you install Cisco ISE, there is always
one policy set defined, which is the default policy set, and the default policy set contains within it, predefined
and default authentication, authorization and exception policy rules.
When creating policy sets, you can configure these rules (configured with conditions and results) in order to
choose the network access services on the policy set level, the identity sources on the authentication policy
level, and network permissions on the authorization policy levels. You can define one or more conditions
using any of the attributes from the Cisco ISE-supported dictionaries for different vendors. Cisco ISE allows
you to create conditions as individual resuable policy elements.
The network access service to be used per policy set to communicate with the network devices is defined at
the top level of that policy set. Network access services include:
• Allowed protocols—the protocols configured to handle the initial request and protocol negotiation.
• A proxy service—sends requests to an external RADIUS server for processing.
Note From the Work Centers > Device Administration , you can also select a relevant TACACS server sequence
for your policy set. Use the TACACS server sequence to configure a sequence of TACACS proxy servers for
processing.
Policy sets are configured hierarchically, where the rule on the top level of the policy set, which can be viewed
from the Policy Set table, applies to the entire set and is matched before the rules for the rest of the policies
and exceptions. Thereafter, rules of the set are applied in this order:
1. Authentication policy rules
2. Local policy exceptions
3. Global policy exceptions
4. Authorization policy rules
Note Policy Sets functionality is identical for network access and for device administration policies. All processes
described in this chapter can be applied when working with both the Network Access and the Device
Administration work centers. This chapter specifically discusses the Network Access work center policy
sets. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Policy
Sets.
Policy Set Name Enter a unique name for this policy set.
Conditions From a new policy row, click the plus (+) icon or from
an existing policy row, click the Edit icon to open the
Conditions Studio.
Description Enter a unique description for the policy.
Allowed Protocols or Server Sequence Choose an allowed protocol that you have already
created, or click the (+) sign to Create a New
Allowed Protocol , to Create a New Radius
Sequence, or to Create a TACACS Sequence.
Conditions From a new exceptions row, click the plus (+) icon
or from an existing exception row, click the Edit icon
to open the Conditions Studio.
Hits Hits are a diagnostic tool indicating the number of
times the conditions have matched. Hover over the
icon to view when this was last updated, reset to zero
and to view the frequency of updates.
View Click the arrow icon to open the Set view of the
specific policy set and view its authentication,
exception, and authorization sub-policies.
Authentication Policies
Each policy set can contain multiple authentication rules that together represent the authentication policy for
that set. Priority of the authentication policies is determined based on the order to those policies as they appear
within the policy set itself (from the Set view page in the Authentication Policy area).
Cisco ISE dynamically chooses the network access service (either an allowed protocol a server sequence)
based on the settings configured on the policy set level, and thereafter checks the identity sources and results
from the authentication and authorization policy levels. You can define one or more conditions using any of
the attributes from the Cisco ISE dictionary. Cisco ISE allows you to create conditions as individual policy
elements that can be stored in the Library and then can be reused for other rule-based policies.
The identity method, which is the result of the authentication policy, can be any one of the following:
• Deny access—Access to the user is denied and no authentication is performed.
• Identity database—A single identity database that can be any one of the following:
• Internal users
• Guest users
• Internal endpoints
• Active Directory
• Lightweight Directory Access Protocol (LDAP) database
• Identity source sequences—A sequence of identity databases that is used for authentication.
The default policy set implemented at initial Cisco ISE installation includes the default ISE authentication
and authorization rules. The default policy set also includes additional flexible built-in rules (that are not
defaults) for authentication and authorization. You can add additional rules to those policies and you can
delete and change the built-in rules but you cannot remove the default rules and you cannot remove the default
policy set.
Cisco ISE allows you to configure any one of the following courses of action for authentication failures:
Even when you choose the Continue option, there might be instances where Cisco ISE cannot continue
processing the request due to restrictions on the protocol that is being used. For authentications using PEAP,
LEAP, EAP-FAST, EAP-TLS, or RADIUS MSCHAP, it is not possible to continue processing the request
when authentication fails or user is not found.
When authentication fails, it is possible to continue to process the authorization policy for PAP/ASCII and
MAC authentication bypass (MAB or host lookup). For all other authentication protocols, when authentication
fails, the following happens:
• Authentication failed—A reject response is sent.
• User or host not found—A reject response is sent.
• Process failure—No response is sent and the request is dropped.
Use Cases for Using Continue as the Course of Action for Authentication Failures
If you select the Continue option, Cisco ISE skips authentication and proceeds to evaluate the authorization
policy in the following cases:
• Lookup (MAB)- Cisco ISE proceeds with authorization policy evaluation even if the ‘User not found’
result is displayed.
• PAP or ASCII
• CHAP
• EAP-MD5
• EAP-TLS - Cisco ISE proceeds with authorization policy evaluation even if the user or certificate
validation has failed in AD or LDAP.
• PEAP (EAP-TLS) - Cisco ISE proceeds with authorization policy evaluation even if the user or certificate
validation has failed in AD or LDAP.
• TEAP (EAP-TLS) - Cisco ISE proceeds with authorization policy evaluation even if the user or certificate
validation has failed in AD or LDAP.
• EAP-FAST (EAP-TLS) - Cisco ISE proceeds with authorization policy evaluation even if the user or
certificate validation has failed in AD or LDAP.
• EAP-chaining TEAP (EAP-TLS, EAP-MS-CHAPv2) - Cisco ISE proceeds with authorization policy
evaluation even if the user or certificate validation has failed in AD or LDAP. Note that the Continue
option is only applicable for the EAP-TLS inner method.
If there is an authentication failure in the following authentication protocols, all the chosen Advanced options
are ignored, and Cisco ISE sends an Access-Reject response.
• MS-CHAPv1
• MS-CHAPv2
• LEAP
• PEAP (EAP-MS-CHAPv2)
• TEAP (EAP-MS-CHAPv2)
• EAP-FAST (EAP-MS-CHAPv2)
• EAP-TTLS (PAP\ASCII)
• EAP-TTLS (MS-CHAPv1)
• EAP-TTLS (MS-CHAPv2)
• EAP-TTLS (EAP-MD5)
• EAP-TTLS (CHAP)
• EAP-TTLS (EAP-MS-CHAPv2)
• EAP-FAST (EAP-GTC)
• PEAP (EAP-GTC)
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Policy Sets for network
access policies. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration >
Device Admin Policy Sets for device administration policies.
Step 2 From the row for the policy set from which you would like to add or update an authentication policy, click from the
View column in the Policy Sets table, in order to access all of the policy set details and to create authentication and
authorization policies as well as policy exceptions.
Step 3 Click the arrow icon next to the Authentication Policy part of the page to expand and view all of the Authentication Policy
rules in the table.
Step 4 From the Actions column on any row, click the cog icon. From the dropdown menu, insert a new authentication policy
rule by selecting any of the insert or duplicate options, as necessary.
A new row appears in the Authentication Policy table.
Step 5 From the Status column, click the current Status icon and from the dropdown list update the status for the policy set as
necessary. For more information about status, seeAuthentication Policy Configuration Settings, on page 921 .
Step 6 For any rule in the table, click in the Rule Name or Description cells to make any free-text changes necessary.
Step 7 To add or change conditions, hover over the cell in the Conditions column and click . The Conditions Studio opens.
For more information, see Special Network Access Conditions , on page 961.
Not all attributes you select will include the “Equals”, “Not Equals", "In", "Not In", “Matches", “Starts With" or “Not
Starts With” operator options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
Note You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for multi-value
attributes. “Matches” operator should be used for regular expression comparison. When “Matches” operator is
used, regular expression will be interpreted for both static and dynamic values. In case of lists, the "in" operator
checks whether a particular value exists in a list. In case of a single string the "in" operator checks whether the
strings are same like the "equals" operator.
Step 8 Organize the policies within the table according to the order by which they are to be checked and matched. To change
the order of the rules, drag and drop the rows in to their correct position.
Step 9 Click Save to save and implement your changes.
What to do next
1. Configure authorization policies
Conditions From a new policy row, click the plus (+) icon or from
an existing policy row, click the Edit icon to open the
Conditions Studio.
Use Choose the identity source that you want to use for
authentication. You can also choose an identity source
sequence if you have configured it.
You can edit the default identity source that you want
Cisco ISE to use in case none of the identity sources
defined in this rule match the request.
Password-Based Authentication
Authentication verifies user information to confirm user identity. Traditional authentication uses a name and
a fixed password. This is the most popular, simplest, and least-expensive method of authentication. The
disadvantage is that this information can be told to someone else, guessed, or captured. An approach that uses
simple, unencrypted usernames and passwords is not considered a strong authentication mechanism, but it
can be sufficient for low-authorization or low-privilege levels such as Internet access.
More-secure methods use cryptographic techniques, such as those used inside the Challenge Authentication
Handshake Protocol (CHAP), one-time password (OTP), and advanced EAP-based protocols. Cisco ISE
supports a variety of these authentication methods.
Authentication Dashlet
The Cisco ISE dashboard provides a summary of all authentications that take place in your network and for
your devices. It provides at-a-glance information about authentications and authentication failures in the
Authentications dashlet.
The RADIUS Authentications dashlet provides the following statistical information about the authentications
that Cisco ISE has handled:
• The total number of RADIUS authentication requests that Cisco ISE has handled, including passed
authentications, failed authentications, and simultaneous logins by the same user.
• The total number of failed RADIUS authentications requests that Cisco ISE has processed.
You can also view a summary of TACACS+ authentications. The TACACS+ Authentications dashlet provides
statistical information for device authentications.
For more information about device administration authentications, see the TACACS Live Logs section in
Cisco ISE Admin Guide: Troubleshooting . For additional information about RADIUS Live Logs settings,
see the RADIUS Live Logs section in Cisco ISE Admin Guide: Troubleshooting .
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > RADIUS > Live Logs for network
authentications (RADIUS). In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > TACACS > Live
Logs to view the real-time authentication summaries.
Step 2 You can view the authentication summary in the following ways:
• Hover your mouse cursor over the Status icon to view the results of the authentication and a brief summary. A pop-up
with status details appears.
• Enter your search criteria in any one or more of the text boxes that appear at the top of the list, and press Enter, to
filter your results.
• Click the magnifier icon in the Details column to view a detailed report.
Note As the Authentication Summary report or dashboard collects and displays the latest data corresponding to
failed or passed authentications, the contents of the report appear after a delay of a few minutes.
Note You must enable IPv6 snooping on Cisco Catalyst 4000 Series switches, otherwise IPv6 address will not be
mapped to the authentication sessions and will not be displayed in the show output. Use the following commands
to enable IPv6 snooping:
vlan config <vlan-number>
ipv6 snooping
end
ipv6 nd raguard policy router
device-role router
interface <access-interface>
ipv6 nd raguard
interface <uplink-interface>
ipv6 nd raguard attach-policy router
end
Authorization Policies
Authorization policies are a component of the Cisco ISE network authorization service. This service allows
you to define authorization policies and configure authorization profiles for specific users and groups that
access your network resources.
Authorization policies can contain conditional requirements that combine one or more identity groups using
a compound condition that includes authorization checks that can return one or more authorization profiles.
In addition, conditional requirements can exist apart from the use of a specific identity group.
Authorization profiles are used when creating authorization policies in Cisco ISE. An authorization policy is
composed of authorization rules. Authorization rules have three elements: name, attributes, and permissions.
The permission element maps to an authorization profile.
Profiles consist of attributes chosen from a set of resources, which are stored in any of the available vendor
dictionaries, and these are returned when the condition for the specific authorization policy matches. Because
authorization policies can include condition mapping to a single network service rule, these can also include
a list of authorization checks.
authorization verifications must comply with the authorization profiles to be returned. Authorization
verifications typically comprise one or more conditions, including a user-defined name that can be added to
a library, which can then be reused by other authorization policies.
In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results to work
with authorization profiles. From the menu on the left, choose Authorization > Authorization Profiles.
Use the Results navigation pane as your starting point in the process for displaying, creating, modifying,
deleting, duplicating, or searching policy element permissions for the different types of authorization profiles
on your network. The Results pane initially displays Authentication, Authorization, Profiling, Posture, Client
Provisioning, and Trustsec options.
Authorization profiles let you choose the attributes to be returned when a RADIUS request is accepted. Cisco
ISE provides a mechanism where you can configure Common Tasks Settings to support commonly used
attributes. You must enter the value for Common Tasks Attributes, which Cisco ISE translates to the
underlying RADIUS values.
Note • When adding an MSE device to Cisco ISE, copy the certificates from the MSE device over to ISE to
facilitate authorization.
• Tracking multiple users will impact the performance due to frequent updates. The Track Movement
option can be used for high security locations.
• The Location Tree is created by using the location data retrieved from the MSE instances. You can select
the location entries that are exposed to the authorization policy by using the Location Tree.
• You will need Cisco ISE Advantage licenses to use the Location Services.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Location Services
> Location Servers
Step 2 Click Add.
Step 3 Enter the MSE server details, such as server name, hostname/IP address, password, and so on.
Step 4 Click Test to test MSE connectivity using the server details that you have provided.
Step 5 (Optional) Enter the MAC address of an endpoint in the Find Location field and click Find to check whether the endpoint
is currently connected to this MSE.
If the endpoint location is found, it is displayed in the following format: Campus:Building:Floor:Zone. Sometimes, more
than one entry can be displayed depending on the location hierarchy and zone settings. For example, if all the floors of
a building (building1) in a campus named Campus1 are defined as non-secure zones, and the Lab Area in the first floor
is defined as a secure zone, the following entries will be displayed when the endpoint is located in the Lab Area:
Found in:
Campus1#building1#floor1#LabArea
Campus1#building1#floor1#NonSecureZone
Location Tree
The Location Tree is created by using the location data retrieved from the MSE instances. In the Cisco ISE
GUI, click the Menu icon ( ) and choose Administration > Network Resources > Location Services >
Location Tree.
If one building has multiple MSEs, Cisco ISE will collate the location details from all the MSEs and present
them as a single tree.
You can select the location entries that are exposed to the authorization policy by using the Location Tree.
You can also hide specific locations based on your requirements. It is recommended to update the Location
Tree before hiding locations. Hidden locations will remain hidden even when the tree is updated.
If the location entries related to an authorization rule are modified or removed, you must disable the affected
rules and set these locations as Unknown or select a replacement location for each affected rule. You must
verify the new tree structure before applying the change or canceling the update.
Click Get Update to get the latest location hierarchy structure from all MSEs. After verifying the new tree
structure, click Save to apply your changes.
Downloadable ACLs
Access control lists (ACLs) are lists of access control entries (ACEs), which may be applied by a Policy
Enforcement Point (for example, a switch) to a resource. Each ACE identifies the permissions allowed per
user for that object, such as read, write, execute and more. For example, an ACL may be configured for 2
users in the Sales area of the network, with an ACE allowing Read and Write permissions for one of the users
and another ACE allowing only Read only permission for the other user.
With Cisco ISE, downloadable ACLs (DACLs) can be configured and implemented in your authorization
policies for control of how the network is accessed by different users and groups of users. DACLs can also
be configured using the custom user attributes and AD attributes.
Note If a DACL used in an Identity Provider (IdP) authorization policy is empty, authorization will fail.
1. Configure a new or existing DACL from Policy > Policy Elements > Results > Downloadable ACLs.
For more information, see Configure Permissions for Downloadable ACLs, on page 929.
2. Configure a new or existing authorization profile from Policy > Policy Elements > Results >
Authorization Profiles, using any of the DACLs you already configured.
3. Implement the authorization profiles you have configured when creating and configuring new and existing
policy sets from Policy > Policy Sets.
With RADIUS protocol, ACLs grant authorization by filtering source and destination IP addresses, transport
protocols, and additional parameters. Static ACLs reside on and are directly configured from the switch and
can be applied in your authorization policies from the ISE GUI.
When working with DACLs, these defaults cannot be changed, but you can duplicate them in order to create
additional, similar, DACLs.
After configuring the DACLs that you need, you can apply those DACLs to relevant authorization policies
on your network. You cannot edit or delete a DACL that is used in an authorization policy. You must first
remove that DACL from the authorization policy to edit or delete that DACL. After updating the DACL, you
can reapply the same DACL to the authorization policy, if needed.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization >
Downloadable ACLs.
Step 2 Click Add from the top of the Downloadable ACLs table or alternatively, choose any of the existing DACLs and click
Duplicate from the top of the table.
Step 3 Enter or edit the desired values for the DACL, keeping in mind the following rules:
• Supported characters for the name field are: alphanumeric, hyphen(-), dot( .) and underscore( _ )
• IP formats are handled based on the selected IP version when you choose the DACL type as follows:
• IPv4 to validate only IPv4 legal ACEs. You must enter a valid IPv4 format.
• IPv6 to validate only IPv6 legal ACEs. You must enter a valid IPv6 format.
• DACLs upgraded from prior releases to release 2.6 shows the Agnostic option as DACL type in the IP Version
field. Enter any format as required. Use Agnostic to create a DACL for devices not supported by Cisco. When
Agnostic is selected, formats are not validated and you cannot check DACL syntax.
• The keyword Any must be the source in all ACEs in the DACL. Once the DACL is pushed, the Any in the source
is replaced with the IP address of the client that is connecting to the switch.
Note The IP Version field is noneditable when DACL is mapped to any authorization profile. In this case, remove the
DACL reference from Authorization Profiles, edit the IP version and remap the DACL in Authorization Profiles.
Step 4 Optionally, when you finish creating the complete list of ACEs, click Check DACL Syntax to validate the list. If there
are validation errors, the check returns specific instructions identifying the invalid syntax in the window that opens
automatically.
Step 5 Click Submit.
• Identity groups default to “Any” (you can use this global default to apply to all users).
• Conditions allow you to set one or more policy values. However, conditions are optional and are not
required to create an authorization policy. These are the two methods for creating conditions:
• Choose an existing condition or attribute from a corresponding dictionary of choices.
• Create a custom condition that allows you to select a suggested value or use a text box to enter a
custom value.
• Condition names you create must use only the following supported characters:
• Symbols: hyphen (-), underscore (_), and period (.).
• Alphabetic characters: A-Z and a-z.
• Numeric characters: 0-9.
• When you create or edit an authorization profile, if you choose to enable Web Redirection (CWA,
MDM, NSP, CPP) with any other option than the Client Provisioning (Policy) , you will not be able
to configure IPv6 address as Static IP/Host name/FQDN for that authorization policy. This is because
IPv6 Static IP/Host name/FQDN are not supported in Central Web Auth (CWA), Mobile Device
Management (MDM) redirect, and Native Supplicant Protocol (NSP).
• Permissions are important when choosing an authorization profile to use for a policy. A permission can
grant access to specific resources or allow you to perform specific tasks. For example, if a user belongs
to a specific identity group (such as Device Admins), and the user meets the defined conditions (such as
a site in Boston), then this user is granted the permissions associated with that group (such as access to
a specific set of network resources or permission to perform a specific operation on a device).
• When you use the radius attribute Tunnel-Private-Group-ID in an authorization condition, you must
mention both the tag and the value in the condition when the EQUALS operator is being used, for
example:
Tunnel-Private-Group-ID EQUALS (tag=0) 77
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Policy Sets for
network access policies. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device
Administration > Device Admin Policy Sets for device administration policies.
Step 2 From the View column, click to access all of the policy set details and to create authentication and authorization
policies as well as policy exceptions.
Step 3 Click the arrow icon next to the Authorization Policy part of the page to expand and view the Authorization Policy
table.
Step 4 From the Actions column on any row, click the cog icon. From the dropdown menu, insert a new authorization policy
rule by selecting any of the insert or duplicate options, as necessary.
A new row appears in the Authorization Policy table.
Step 5 To set the status for a policy, click the current Status icon and from the dropdown list select the necessary status from
the Status column. For more information about statuses, see Authorization Policy Settings, on page 933.
Step 6 For any policy in the table, click in the Rule Name cells to make any free-text changes necessary and to create a unique
rule name.
Step 7 To add or change conditions, hover over the cell in the Conditions column and click . The Conditions Studio
opens. For more information, seePolicy Conditions, on page 942.
Not all attributes you select will include the “Equals”, “Not Equals", "In", "Not In", “Matches", “Starts With" or “Not
Starts With” operator options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
Note You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for
multi-value attributes. “Matches” operator should be used for regular expression comparison. When “Matches”
operator is used, regular expression will be interpreted for both static and dynamic values. In case of lists, the
"in" operator checks whether a particular value exists in a list. In case of a single string the "in" operator checks
whether the strings are same like the "equals" operator.
Step 8 For network access results profiles, select the relevant authorization profile from the Results Profiles dropdown list
or choose or click , choose Create a New Authorization Profile and when the Add New Standard Profile screen
opens, perform the following steps:
a) Enter values as required to configure a new authorization profile. Keep the following in mind:
• Supported characters for the name field are: space, ! # $ % & ‘ ( ) * + , - . / ; = ? @ _ {.
• For Common Tasks, to enter a DACL, choose the relevant DACL Name option as follows and then select
the necessary DACL from the dynamic dropdown list:
• To use an IPv4 DACL, check DACL Name.
• To enter an IPv6 DACL, check IPv6 DACL Name.
• To enter any other DACL syntax, check either option. Agnostic DACLs appear in both the IPv4 and the
IPv6 dropdown lists.
Note If you select DACL Name, then the AVP type is for IPv4, even if the DACL itself is agnostic.
If you select a DACL for the IPv6 DACL Name, then the AVP type is for IPv6, even if the DACL
itself is agnostic.
• Note If you choose to use ACL for your policy, ensure your device is compatible with this feature. For more
information, see the Cisco Identity Services Engine Compatibility Guide.
For Common Tasks, to enter an ACL, choose the relevant ACL (Filter-ID) option as follows and then type
the ACL name in the field:
• To use an IPv4 ACL, check ACL (Filter-ID).
• To enter an IPv6 ACL, check ACL IPv6 (Filter-ID).
• To use an ACL for Airespace devices, check Airespace ACL Name or Airespace IPv6 ACL Name as
necessary, and type the ACL name in the field.
• You can double-check the authorization profile RADIUS syntax from the Attributes Details that dynamically
appear at the bottom of the screen.
b) Click Save to save your changes to the Cisco ISE system database to create an authorization profile.
c) In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization >
Authorization Profiles to create, manage, edit, and delete profiles outside of the Policy Sets area.
Step 9 For network access results security groups, select the relevant security group from the Results Security Groupsdropdown
list or click , choose Create a New Security Group and when the Create New Security Group screen opens, perform
the following steps:
a) Enter a name and description (optional) for the new security group.
b) Check the Propagate to ACI check box if you want to propagate this SGT to Cisco ACI. The SXP mappings that
are related to this SGT will be propagated to Cisco ACI only if they belong to a VPN that is selected in the Cisco
ACI Settings page.
This option is disabled by default.
c) Enter a Tag Value. Tag value can be set to be entered manually or autogenerate. You can also reserve a range for
the SGT. You can configure it from the In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers
> TrustSec > Settings > General TrustSec Settings
d) Click Submit.
For more information, see Security Groups Configuration, on page 1030.
Step 10 For TACACS+ results, select the relevant Command Sets and Shell Profiles from the Results drop-down lists or click
in the Command Sets or Shell Profiles column to open the Add Commands Screen or Add Shell Profile
respectively. Choose Create a New Command Set or Create a New Shell Profile and enter the fields.
Step 11 Organize the order by which the policies are to be checked and matched within the table.
Step 12 Click Save to save your changes to the Cisco ISE system database and create this new authorization policy.
Conditions From a new policy row, click the plus (+) icon or from
an existing policy row, click the Edit icon to open the
Conditions Studio.
Results or Profiles Select the relevant authorization profile, which
determines the different levels of permissions offered
to the configured security group. If you have not yet
configured the relevant authorization profile, you can
do so inline.
Results or Security Groups Select the relevant security group, which determines
the groups of users relevant to the specific rule. If you
have not yet configured the relevant security group,
you can do so inline.
Results or Command Sets Command sets enforce the specified list of commands
that can be executed by a device administrator. When
a device administrator issues operational commands
on a network device, ISE is queried to determine
whether the administrator is authorized to issue these
commands. This is also referred to as command
authorization.
Results or Shell Profiles TACACS+ shell profiles control the initial login
session of the device administrator.
e) Click Save.
Step 2 Log in to your Cisco ISE administration portal:
a) Click the Menu icon ( ) and choose Work Center > Profiler > Profiler Settings.
b) In the Endpoint Analytics Settings area, check one or both of the following check boxes to enable the corresponding
functions:
• Publish Endpoint Attributes to AI Endpoint Analytics: When you enable this setting, the PANs and PSNs
in your deployment can share endpoint attribute data with Cisco AI Endpoint Analytics.
• Consume Endpoint Profiles from AI Endpoint Analytics: When you enable this setting, a new topic subscription
is created in the primary PAN and all the PSNs in your deployment. The primary PAN and PSNs can now receive
endpoint attribute information from Cisco AI Endpoint Analytics.
c) (Optional) To configure a CoA action for an endpoint when there is a change in its Endpoint-Analytics attributes, in
the Profiler Settings area, choose an option from the CoA Type drop-down list.
Step 3 Verify that the pxGrid connection between Cisco AI Endpoint Analytics and Cisco ISE:
a) In the Cisco ISE GUI, choose Administration > pxGrid > Diagnostics.
b) In the WebSocket window that is displayed, in the Clients tab, find the FQDN for the PSN and PAN node. The
following subscriptions should be visible:
• For PAN: /topic/com.cisco.endpointanalytics.data
• For PSNs: /topic/com.cisco.ea.data.{{<FQDN>}}
What to do next
To receive debug logs to troubleshoot pxGrid issues related to Endpoints Analytics:
1. In the Cisco ISE GUI of your PAN, choose Operations > Troubleshoot > Debug Wizard > Debug Log
Configuration.
2. Click the radio button next to the node you want to edit, and click Edit.
3. In the Debug Log Configuration window, click the radio button next to endpoint-analytics.
4. In the Log Level field for endpoint-analytics, choose DEBUG from the drop-down list.
5. Click Save.
Note When upgrading from a Cisco ISE 2.x release to a Cisco ISE 3.x release in a non-Cisco device, if an
Authorization profile contains a Network Device profile with a configured ACL value, an upgrade failure
may occur. This occurs because a Network Device profile is not supposed to have an ACL configured in it.
To work around this issue, you can either remove the value manually or delete the corresponding Authorization
profile itself.
Note This option may impact Cisco ISE performance, it is only intended for
high-security locations.
• Passive Identity Tracking: Enable this option to use the Easy Connect feature of Passive Identity for
policy enforcement and user tracking.
Common Tasks
Common tasks are specific permissions and actions that apply to network access.
• DACL Name : Enable this option to use a downloadable ACL. You can use the default values
(PERMIT_ALL_IPV4_TRAFFIC, PERMIT_ALL_IPV6_TRAFFIC, DENY_ALL_IPV4_TRAFFIC,
DENY_ALL_IPV6_TRAFFIC), or select an attribute from the following dictionaries:
• External identity store (attributes)
• Endpoints
• Internal User
• Internal Endpoint
For more information about adding DACLs or editing and managing existing DACLs, see Downloadable
ACLs, on page 928.
• ACL (Filter-ID): Enable this option to configure a RADIUS filter-ID attribute. The filter-ID specifies
an ACL on the NAD. Your Filter-ID is displayed in the Attributes Details pane. ACL IPv6 (Filter-ID)
works the same way for IPv6 connections to the NAD.
Note From Cisco ISE 3.0 onwards, you can enter the text or select the required attributes
from the Attribute Values drop-down list for ACL Filter-ID. If you are entering
the text for ACL Filter-ID, you must add the ".in" suffix for Cisco devices.
• Security Group: Enable this option to assign a security group (SGT) part of authorization.
• If Cisco ISE is not integrated with Cisco DNA Center, Cisco ISE assigns VLAN ID 1.
• If Cisco ISE is integrated with Cisco DNA Center, then select the Virtual Network (VN) that Cisco
DNA Center shared with Cisco ISE, select the Data Type, and the subnet/address pool.
A Security Group task includes a security group and an optional VN. If you configure a security group,
then you cannot configure a VLAN separately. An endpoint device can only be assigned to one virtual
network.
• VLAN: Enable this option to specify a virtual LAN (VLAN) ID. You can enter integer or string values
for the VLAN ID. The format for this entry is Tunnel-Private-Group-ID:VLANnumber.
• Voice Domain Permission : Enable this option to use a downloadable ACL. The vendor-specific attribute
(VSA) of cisco-av-pair is associated with the value device-traffic-class=voice. In multidomain
authorization mode, if the network switch receives this VSA, the endpoint connects to a voice domain
after authorization.
• Web Redirection (CWA, DRW, MDM, NSP, CPP): Enable this option to enable web redirection after
authentication.
• Select the type of redirection. The type of Web Redirection that you select displays additional
options, which are described below.
• Enter an ACL to support the redirection that Cisco ISE sends to the NAD.
The ACL you enter to send to the NAD displays in the Attributes Details pane as a cisco-av pair.
For example, if you enter acl119, it is displayed in the Attributes Details pane as: cisco-av-pair
= url-redirect-acl = acl119.
• Select the other settings for the selected web redirection type.
After selecting the web redirection type, and entering the required parameters, configure the following
options:
• Display Certificates Renewal Message: Enable this option to display a certificate renewal message.
The URL-redirect attribute value changes and includes the number of days for which the certificate
is valid. This option is only for Centralized Web Auth redirection.
• Static IP/Host Name/FQDN: Enable this option to redirect a user to a different PSN. Enter the
target IP address, hostname, or FQDN. If you do not configure this option, the user is redirected to
the FQDN of the policy service node that received this request.
• Suppress Profiler CoA for endpoints in Logical Profile: Enable this option to cancel the redirect
for a certain type of endpoint device.
• Auto SmartPort: Enable this option to use Auto SmartPort functionality. Enter an event name, which
creates a VSA cisco-av-pair with that value as auto-smart-port=event_name. This value is displayed
in the Attributes Details pane.
• Access Vulnerabilities: Enable this option to run the Threat Centric NAC Vulnerability Assessment on
this endpoint as part of authorization. Select the adapter, and when to run the scan.
• Reauthentication: Enable this option to keep the endpoint connected during reauthentication. You choose
to maintain connectivity during reauthentication by choosing to use RADIUS-Request (1). The default
RADIUS-Request (0) disconnects the existing session. You can also set an inactivity timer.
• MACSec Policy: Enable this option to use the MACSec encryption policy whenever a MACSec enabled
client connects to Cisco ISE. Choose one of the following options: must-secure, should-secure, or
must-not-secure. Your settings are displayed in the Attributes Details pane as: cisco-av-pair =
linksec-policy=must-secure.
• NEAT : Enable this option to use Network Edge Access Topology (NEAT), which extends identity
recognition between networks. Checking this check box displays cisco-av-pair =
device-traffic-class=switch in the Attributes Details pane.
• Web Authentication (Local Web Auth) : Enable this option to use local web authentication for this
authorization profile. This value lets the switch recognize authorization for web authentication by Cisco
ISE sending a VSA along with a DACL. The VSA is cisco-av-pair = priv-lvl=15, which is displayed
in the Attributes Details pane.
• Airespace ACL Name: Enable this option to send an ACL name to Cisco Airespace wireless controller.
The Airespace VSA uses this ACL to authorize a locally defined ACL to a connection on the WLC. For
example, if you entered rsa-1188, it is displayed as Airespace-ACL-Name = rsa-1188 in the Attributes
Details pane.
• ASA VPN: Enable this option to assign an Adaptive Security Appliances (ASA) VPN group policy.
From the drop-down list, choose a VPN group policy.
• AVC Profile Name: Enable this option to run application visibility on this endpoint. Enter the AVC
profile to use.
• UPN Lookup: TBD
Note To modify or delete any of the read-only values that are displayed in the
Attributes Details pane, modify or delete these values in the corresponding
Common Tasks field, or in the attribute that you selected in the Attribute Values
field in the Advanced Attributes Settings pane.
Related Topics
Cisco ISE Authorization Profiles, on page 926
Permissions for Authorization Profiles, on page 926
Configure an Authorization Profile for Redirecting Nonregistered Devices, on page 907
Create Authorization Profiles, on page 471
Note Cisco ISE does not support the use of % character in the authorization policies to avoid security issues.
Policy Conditions
Cisco ISE uses rule-based policies to provide network access. A policy is a set of rules and results, where the
rules are made up of conditions. Cisco ISE allows you to create conditions as individual policy elements that
can be stored in the system library and then reused for other rule-based policies from the Conditions Studio.
Conditions can be as simple or complex as necessary using an operator (equal to, not equal to, greater than,
and so on), and a value, or by including multiple attributes, operators and complex hierarchies. At runtime,
Cisco ISE evaluates a policy condition and then applies the result that you have defined based on whether the
policy evaluation returns a true or a false value.
After you create a condition and assign it a unique name, you can reuse this condition multiple times across
various rules and policies by selecting it from the Conditions Studio Library, for example:
Network Conditions.MyNetworkCondition EQUALS true
You cannot delete conditions from the Condition Studio that are used in a policy or are part of another condition.
Each condition defines a list of objects that can be included in policy conditions, resulting in a set of definitions
that are matched against those presented in the request.
You can use the operator, EQUALS true, to check if the network condition evaluates to true (whether the value
presented in the request matches at least one entry within the network condition) or EQUALS false to test
whether the network condition evaluates to false (does not match any entry in the network condition).
Cisco ISE also offers predefined smart conditions that you can use in your policies separately or as building
blocks in your own customized conditions, and which you can update and change based on your needs.
You can create the following unique network conditions to restrict access to the network:
• Endstation Network Conditions—Based on endstations that initiate and terminate the connection.
Cisco ISE evaluates the remote address TO field (which is obtained based on whether it is a TACACS+
or RADIUS request) to identity whether it is the IP address, MAC address, calling line identification
(CLI), or dialed number identification service (DNIS) of the endpoint.
In a RADIUS request, this identifier is available in Attribute 31 (Calling-Station-Id).
In a TACACS+ request, if the remote address includes a slash (/), the part before the slash is taken as
the FROM value and the part after the slash is taken as the TO value. For example, if a request has
CLI/DNIS, CLI is taken as the FROM value and DNIS is taken as the TO value. If a slash is not included,
the entire remote address is taken as the FROM value (whether IP address, MAC address, or CLI).
• Device Network Conditions—Based on the AAA client that processes the request.
A network device can be identified by its IP address, device name that is defined in the network device
repository, or Network Device Group.
In a RADIUS request, if Attribute 4 (NAS-IP-Address) is present, Cisco ISE obtains the IP address from
this attribute. If Attribute 32 (NAS-Identifier) is present, Cisco ISE obtains the IP address from Attribute
32. If these attributes are not found, it obtains the IP address from the packet that it receives.
The device dictionary (NDG dictionary) contains network device group attributes such as Location,
Device Type, or other dynamically created attributes that represent NDGs. These attributes contain the
groups that the current device is related to.
• Device Port Network Conditions—Based on the device's IP address, name, NDG, and port (physical port
of the device that the endstation is connected to).
In a RADIUS request, if Attribute 5 (NAS-Port) is present in the request, Cisco ISE obtains the value
from this attribute. If Attribute 87 (NAS-Port-Id) is present in the request, Cisco ISE obtains the request
from Attribute 87.
In a TACACS+ request, Cisco ISE obtains this identifier from the port field of the start request (of every
phase).
For more information about these unique conditions, see Special Network Access Conditions , on page 961.
In addition to attributes and allowed values, a dictionary contains information about the attributes such as the
name and description, data type, and the default values. An attribute can have one of the following data types:
BOOLEAN, FLOAT, INTEGER, IPv4, IPv6, OCTET_STRING, STRING, UNIT32, and UNIT64.
Cisco ISE creates system dictionaries during installation and allows you to create user dictionaries.
Attributes are stored in different system dictionaries. Attributes are used to configure conditions. Attributes
can be reused in multiple conditions.
To reuse a valid attribute when creating policy conditions, select it from a dictionary that contains the supported
attributes. For example, Cisco ISE provides an attribute named AuthenticationIdentityStore, which is located
in the NetworkAccess dictionary. This attribute identifies the last identity source that was accessed during
the authentication of a user:
• When a single identity source is used during authentication, this attribute includes the name of the identity
store in which the authentication succeeded.
• When an identity source sequence is used during authentication, this attribute includes the name of the
last identity source accessed.
You can use the AuthenticationStatus attribute in combination with the AuthenticationIdentityStore attribute
to define a condition that identifies the identity source to which a user has successfully been authenticated.
For example, to check for a condition where a user authenticated using an LDAP directory (LDAP13) in the
authorization policy, you can define the following reusable condition:
Note The AuthenticationIdentityStore represents a text field that allows you to enter data for the condition. Ensure
that you enter or copy the name correctly into this field. If the name of the identity source changes, you must
ensure to modify this condition to match the change to the identity source.
To define conditions that are based on an endpoint identity group that has been previously authenticated,
Cisco ISE supports authorization that was defined during endpoint identity group 802.1X authentication status.
When Cisco ISE performs 802.1X authentication, it extracts the MAC address from the “Calling-Station-ID”
field in the RADIUS request and uses this value to look up and populate the session cache for the device's
endpoint identity group (defined as an endpointIDgroup attribute). This process makes the endpointIDgroup
attribute available for use in creating authorization policy conditions, and allows you to define an authorization
policy based on endpoint identity group information using this attribute, in addition to user information.
The condition for the endpoint identity group can be defined in the ID Groups column of the authorization
policy configuration page. Conditions that are based on user-related information need to be defined in the
“Other Conditions” section of the authorization policy. If user information is based on internal user attributes,
then use the ID Group attribute in the internal user dictionary. For example, you can enter the full value path
in the identity group using a value like “User Identity Group:Employee:US”.
For authorization policy types, the verification configured in the condition must comply with the authorization
profiles to be returned.
Verifications typically include one or more conditions that include a user-defined name that can then be added
to a library and reused by other policies.
The following sections describe the supported attributes and dictionaries available for configuring conditions.
You can use the attributes listed in the following table in policy conditions.
Software Version
Model Name
AuthenticationStatus No No
CTSDeviceID No No
UserName No Yes
WasMachineAuthenticated No No
Country
LocationSubject
Organization
Organization Unit
Serial Number
State or Province
Subject
Issuer
Issuer - Organization
Issuer - Location
Issuer - Country
Issuer - Email
Issuer - User ID
Step 1
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Dictionaries > System.
Step 3 Choose a system dictionary in the System Dictionaries page, and click View.
Step 4 Click Dictionary Attributes.
Step 5 Choose a system dictionary attribute from the list, and click View.
Step 6 Click the Dictionaries link to return to the System Dictionaries page.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Dictionaries > User
Step 2 Click Add.
Step 3 Enter the name for the user dictionary, an optional description, and a version for the user dictionary.
Step 4 Choose the attribute type from the Dictionary Attribute Type drop-down list.
Step 5 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Dictionaries > User
Step 2 Choose a user dictionary from the User Dictionaries page, and click Edit.
Step 3 Click Dictionary Attributes.
Step 4 Click Add.
Step 5 Enter the name for an attribute name, an optional description, and an internal name for the dictionary attribute.
Step 6 Choose a data type from the Data Type drop-down list.
Step 7 Click Add to configure the name, allowed value, and set the default status in the Allowed Values table.
Step 8 Click Submit.
RADIUS-Vendor Dictionaries
Cisco ISE allows you to define a set of RADIUS-vendor dictionaries, and define a set of attributes for each
one. Each vendor definition in the list contains the vendor name, the vendor ID, and a brief description.
Cisco ISE provides you the following RADIUS-vendor dictionaries by default:
• Airespace
• Cisco
• Cisco-BBSM
• Cisco-VPN3000
• Microsoft
The RADIUS protocol supports these vendor dictionaries, and the vendor-specific attributes that can be used
in authorization profiles and in policy conditions.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Dictionaries > System >
Radius > Radius Vendors.
Step 2 Click Add.
Step 3 Enter a name for the RADIUS-vendor dictionary, an optional description, and the vendor ID as approved by the Internet
Assigned Numbers Authority (IANA) for the RADIUS vendor.
Step 4 Choose the number of bytes taken from the attribute value to specify the attribute type from the Vendor Attribute Type
Field Length drop- down list. Valid values are 1, 2, and 4. The default value is 1.
Step 5 Choose the number of bytes taken from the attribute value to specify the attribute length from the Vendor Attribute Size
Field Length drop-down list. Valid values are 0 and 1. The default value is 1.
Step 6 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Dictionaries > System
> Radius > Radius Vendors.
Step 2 Choose a RADIUS-vendor dictionary from the RADIUS vendor dictionaries list, and click Edit.
Step 3 Click Dictionary Attributes, and then click Add.
Step 4 Enter the attribute name for the RADIUS vendor attribute and an optional description.
Step 5 Choose the data type from the Data Type drop-down list.
Step 6 Check the Enable MAC option check box.
Step 7 Choose the direction that applies to RADIUS requests only, RADIUS responses only, or both from the Direction
drop-down list.
Step 8 Enter the vendor attribute ID in the ID field.
Step 9 Check the Allow Tagging check box.
Step 10 Check the Allow multiple instances of this attribute in a profile check box.
Step 11 Click Add to add the allowed value for the vendor attribute in the Allowed Values table.
Step 12 Click Submit.
> RADIUS > IETF. You can use these two values in policy conditions. These two values are specifically
designed for HP devices to understand permissions of the user.
HP-Oper 252
HP-User 255
Attribute Name Enter the vendor specific attribute name for the
selected RADIUS vendor.
Internal Name Enter the name for the vendor specific attribute that
refers to it internally in the database.
Data Type Choose one of the following data types for the vendor
specific attribute:
• STRING
• OCTET_STRING
• UNIT32
• UNIT64
• IPV4
• IPV6
Enable MAC option Check this check box to enable the comparison of
RADIUS attribute as MAC address. By default, for
the RADIUS attribute calling-station-id this option is
marked as enabled and you cannot disable it. For other
dictionary attributes (of string types) within the
RADIUS vendor dictionary, you can enable or disable
this option.
Once you enable this option, while setting the
authentication and authorization conditions, you can
define whether the comparison is clear string by
selecting the Text option or whether it is MAC address
by selecting the MAC address option.
Allow Tagging Check this check box to mark the attribute as being
permitted to have a tag, as defined in RFC2868. The
purpose of the tag is to allow grouping of attributes
for tunnelled users. See RFC2868 for more details.
The tagged attributes support ensures that all attributes
pertaining to a given tunnel contain the same value
in their respective tag fields, and that each set includes
an appropriately-valued instance of the
Tunnel-Preference attribute. This conforms to the
tunnel attributes that are to be used in a multi-vendor
network environment, thereby eliminating
interoperability issues among Network Access Servers
(NASs) manufactured by different vendors.
Allow Multiple Instances of this Attribute in a Check this check box when you want multiple
Profile instances of this RADIUS vendor specific attribute
in profiles.
Related Topics
System Defined Dictionaries and Dictionary Attributes, on page 948
User-Defined Dictionaries and Dictionary Attributes, on page 948
RADIUS-Vendor Dictionaries, on page 949
Create RADIUS-Vendor Dictionaries, on page 950
stored in the Library and you can also update and change those stored condition blocks. While creating and
managing conditions later, easily find the blocks and attributes that you need by using quick category filters,
and more.
In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Policy Sets
for network access policies. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers >
Device Administration > Device Admin Policy Sets for device administration policies.
To edit or change conditions that have already been applied to the specific rule in any of your policy sets,
hover over the cell in the Conditions column and click , or click the plus sign from the Conditions
column in the Policy Set table in order to create a new condition, which you can then immediately apply to
the same policy set or alternatively you can also save in the Library for future use.
The following figure shows the main elements of the Conditions Studio.
Figure 41: Conditions Studio
The Condition Studio is divided into two main parts: the Library and the Editor. The Library stores condition
blocks for reuse while the Editor enables you to edit those saved blocks and create new ones.
The following table describes the different parts of the Conditions Studio:
When creating new conditions, you can use the condition blocks that you have already stored in the Library
and you can also update and change those stored condition blocks. While creating and managing conditions,
easily find the blocks and attributes that you need by using quick category filters, and more.
When creating and managing condition rules, use attributes, operators and values.
Cisco ISE also includes predefined condition blocks for some of the most common use cases. You can edit
these predefined conditions to suit your requirements. Conditions saved for re-use, including the out-of-the-box
blocks, are stored in the Library of the Condition Studio, as described in this task.
To perform the following task, you must be a Super Admin or Policy Admin.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets
Step 2 Access the Conditions Studio to create a new condition and to edit existing condition blocks, in order to then use those
conditions as part of the rules you configure for the specific policy set (and its associated policies and rules), or in order
to save to the Library for future use:
a) Click from the Conditions column in the Policy Set table on the main Policy Set page in order to create
conditions that are relevant for the entire policy set (conditions that are checked prior to matching authentication
policy rules).
b) Alternatively, click from a specific policy set row in order to view the Set view, including all rules for
authentication and authorization. From the Set view, hover over the cell in the Conditions column from any of the
c) If you are editing conditions that have already been applied to the policy set, then click to access the Conditions
Studio.
The Conditions Studio opens. If you have opened it in order to create new conditions, then it appears as in the following
image. For a description of the fields and to see an example of the Conditions Studio when you have opened it to edit
conditions that were already applied to the policy set, see Navigate the Conditions Studio, on page 952.
Figure 43: Conditions Studio—Creating a New Condition
Step 3 Use an existing condition block from the Library as a rule in the condition that you are creating or editing.
a) Filter by selecting the relevant category from the category toolbar—in the Library, all blocks that contain an attribute
from the selected category are displayed. Condition blocks that contain more than one rule but that use an attribute
from the selected category for at least one of those rules, are also displayed. If there are additional filters added,
then the results displayed include only condition blocks from the specific filter that also match the other filters that
were included. For example, if you select the Ports category from the toolbar and you also enter "auth" as free text
in the Search by Name field, then all blocks related to ports with "auth" in their names are displayed. Click the
highlighted icon again from the category toolbar in order to deselect it, thereby removing that filter.
b) Search for condition blocks with free text—in the Search by Name free text field, enter any term, or part of a term,
that appears in the name of the block for which you are searching. As you type, the system dynamically searches
for relevant results in real time. If no category is selected (none of the icons are highlighted) then the results include
condition blocks from all categories. If a category icon is already selected (the displayed list is already filtered),
then the results displayed include only blocks in the specific category that use the specific text.
c) Once you find the condition block, drag it to the Editor and drop it in the correct level of the block that you are
building. If you drop it in the incorrect location, you can drag and drop it again from within the Editor, until it is
placed correctly.
d) Hover over the block from the Editor and click Edit to change the rule, in order make changes relevant for the
condition you are working on, to overwrite the rule in the Library with those changes or alternatively to save the
rule as a new block in the Library.
The block, which is read-only when dropped into the Editor can now be edited and has the same fields, structures,
lists and actions as all other customized rules in the Editor. Continue to the next steps for more information in
editing this rule.
Step 4 Add an operator to the current level in order to then add additional rules on the same level—choose AND, OR or Set
to 'Is not'. Set to 'Is not' can also be applied to individual rules.
Step 5 Create and edit rules using the attribute dictionaries—click in the Click to add an attribute field. The Attribute Selector
opens as in the following image:
The parts of the Attribute Selector are as described in the following table:
Attribute Category toolbar Contains a unique icon for each of the different attribute
categories. Choose any attribute category icon to filter the
view by category.
Click a highlighted icon in order to deselect it, thereby
removing the filter.
a) From the Attribute Selector search, filter and search for the attribute you need. When you filter or enter free text
in any part of the Attribute Selector, if there are no other filters activated, then the results include all attributes
relevant for the selected filter only. If more than one filter is used, then the search results that are displayed match
all filters. For example, if you click the Port icon from the toolbar and type "auth" in the Attribute column, then
only attributes from the Port category that have "auth" in their name are displayed. When you choose a category,
the icon in the toolbar is highlighted in blue and the filtered list is displayed. Click the highlighted icon again from
the category toolbar in order to deselect it, thereby removing the filter.
b) Choose the relevant attribute in order to add it to the rule.
The Attribute Selector closes and the attribute you selected is added to the Click to add an attribute field.
c) From the Equals dropdown list, select the relevant operator.
Not all attributes you select will include the “Equals,” “Not Equals,” “Matches,” “Starts With,” or “Not Starts With”
operator options.
The “Matches” operator supports and uses regular expressions (REGEX) not wildcards.
You must use the “equals” operator for straight forward comparison. “Contains” operator can be used for multi-value
attributes. “Matches” operator should be used for regular expression comparison. When “Matches” operator is
used, regular expression will be interpreted for both static and dynamic values.
d) From the Attribute value field do one of the following:
• Type a free text value in the field
• Select a value from the list that dynamically loads ( when relevant—depending on the attribute selected in the
previous step)
• Use another attribute as the value for the condition rule—choose the table icon next to the field in order to
open the Attribute Selector and then search, filter and select the relevant attribute. The Attribute Selector closes
and the attribute you selected is added to the Attribute value field.
to save a group of rules as a block, choose the action button from the bottom of the entire hierarchy in the blocked
area for the entire hierarchy.
b) Click Save. The Save condition screen pops up.
c) Choose:
• Save to Existing Library Condition—choose this option to overwrite an existing condition block in the Library
with the new rule you have created and then select the condition block that you want to overwrite from the
Select from list dropdown list.
• Save as a new Library Condition—type a unique name in the Condition Name field for the block.
d) Optionally, enter a description in the Description field. This description appears when you hover over the info icon
for any condition block from within the Library, enabling you to quickly identify the different condition blocks
and their uses.
e) Click Save to save the condition block in the Library.
Step 7 To create a new rule on a new child level—click AND or OR to apply the correct operator between the existing parent
hierarchy and the child hierarchy that you are creating. A new section is added to the Editor hierarchy with the selected
operator, as a child of the rule or hierarchy from which you chose the operator.
Step 8 To create a new rule on a a current existing level—click New from the relevant level. A new empty row appears for a
new rule in the same level as the level from which you began.
Step 9 Click X to remove any condition from the Editor and all of its children.
Step 10 Click Duplicate to automatically copy and paste the specific condition within the hierarchy, thereby creating additional
identical children at the same level. You can duplicate individual rules with or without their children, depending on the
level from which you click the Duplicate button.
Step 11 Click Use from the bottom of the page to save the condition you created in the Editor and to implement that condition
in your policy set.
Note When an AD attribute is needed in any policy set, the corresponding AD condition must be configured.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Network
Conditions > Device Network Conditions
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—You can add a list of IP addresses or subnets, one per line. The IP address/subnet can be in IPv4 or
IPv6 format.
• Device Name—You can add a list of device names, one per line. You must enter the same device name that is
configured in the Network Device object.
• Device Groups—You can add a list of tuples in the following order: Root NDG, comma, and an NDG (that it under
the root NDG). There must be one tuple per line.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Network
Conditions > Device Port Network Conditions
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—Enter the details in the following order: IP address or subnet, comma, and a port (that is used by the
device). There must be one tuple per line.
• Devices— Enter the details in the following order: device name, comma, and a port. There must be one tuple per
line. You must enter the same device name that is configured in the Network Device object.
• Device Groups— Enter the details in the following order: Root NDG, comma, NDG (that it under the root), and a
port. There must be one tuple per line.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Network
Conditions > Endstation Network Conditions
Step 2 Click Add.
Step 3 Enter a name and description for the network condition.
Step 4 Enter the following details:
• IP Addresses—You can add a list of IP addresses or subnets, one per line. The IP address/subnet can be in IPv4 or
IPv6 format.
• MAC Addresses—You can enter a list of Endstation MAC addresses and Destination MAC addresses, separated
by a comma. Each MAC address must include 12 hexadecimal digits and must be in one of the following formats:
nn:nn:nn:nn:nn:nn, nn-nn-nn-nn-nn-nn, nnnn.nnnn.nnnn, or nnnnnnnnnnnn.
If the Endstation MAC or the Destination MAC is not required, use the token "-ANY-" instead.
• CLI/DNIS—You can add a list of Caller IDs (CLI) and Called IDs (DNIS), separated by a comma. If the Caller ID
(CLI) or the Called ID (DNIS) is not required, use the token "-ANY-" instead.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Common >
Time and Date > Add
Step 2 Enter appropriate values in the fields.
• In the Standard Settings area, specify the time and date to provide access.
• In the Exceptions area, specify the time and date range to limit access.
The following table lists Supported Cisco Attribute-Value pairs and their equivalent IETF attributes:
ipv6:stateful-ipv6-address-pool=<name> Stateful-IPv6-Address-Pool
ipv6:delegated-ipv6-pool=<name> Delegated-IPv6-Prefix-Pool
The RADIUS Live Logs page, RADIUS Authentication report, RADIUS Accounting report, Current Active
Session report, RADIUS Error report, Misconfigured NAS report, Adaptive Network Control Audit, and
Misconfigured Supplicant report support IPv6 addresses. You can view the details about these sessions from
the RADIUS Live Logs page or from any of these reports. You can filter the records by IPv4, IPv6, or MAC
addresses.
Note If you connect an Android device to an IPv6 enabled DHCPv6 network, it receives only the link-local IPv6
address from the DHCP server. Hence, global IPv6 address is not displayed in the Live Logs and in the
Endpoints page (In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network
Access > Identities > Endpoints).
The following procedure describes how to configure IPv6 attributes in authorization policies.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Network Access > Policy Sets for network
access policies. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration >
Device Admin Policy Sets for device administration policies.
Step 2 Create authorization rules.
Step 3 When creating authorization rules, create a condition from the Conditon Studio. In the Condition Studio, from the RADIUS
dictionary, choose the RADIUS IPv6 attribute, the operator, and the value.
Step 4 Click Save to save the authorization rules in the policy set.
• EAP attributes are displayed per identity (so in EAP chaining displayed twice) are shown in authentication
details in monitoring tool in order user then machine even if authentication happens in different order.
• When EAP-FAST authorization PAC is used then EAP authentication method shown in live logs is equal
to the authentication method used for full authentication (as in PEAP) and not as Lookup.
• In EAP chaining mode when tunnel PAC is expired then ISE falls back to provisioning and AC requests
User and Machine authorization PACs - Machine Authorization PAC cannot be provisioned. It will be
provisioned in the subsequent PAC-based authentication conversation when AC requests it.
• When Cisco ISE is configured for chaining and AC for single mode then AC response with IdentityType
TLV to ISE. However, the second identity authentication fails. You can see from this conversation that
client is suitable to perform chaining but currently is configured for single mode.
• Cisco ISE supports retrieval attributes and groups for both machine and user in EAP-FAST chaining
only for AD. For LDAP and Internal DB ISE uses only the last identity attributes.
Note “EAP-FAST cryptobinding verification failed” message might be seen if EAP-FAST authentication protocol
is used for High Sierra, Mojave, or Catalina MAC OSX devices. We recommend that you configure the
Preferred EAP Protocol field in the Allowed Protocols page to use PEAP or EAP-TLS instead of EAP-FAST
for these MAC OSX devices.
Step 1 Choose Administration > System > Settings > Protocols > EAP-FAST > EAP Fast Settings.
Step 2 Enter the details as required to define the EAP-FAST protocol.
Step 3 Click Revoke if you want to revoke all the previously generated primary keys and PACs.
Step 4 Click Save to save the EAP-FAST settings.
EAP-FAST Settings
The following table describes the fields on the Protocol Settings window, which you can use to configure the
EAP-FAST, EAP-TLS, and PEAP protocols. To view this window, click the Menu icon ( ) and choose
Administration > System > Settings > Protocols > EAP-FAST > EAP FAST Settings.
Authority Identity Info Description Enter a user-friendly string that describes the Cisco
ISE node that sends credentials to a client. The client
can discover this string in the Protected Access
Credentials (PAC) information for type, length, and
value (TLV). The default value is Identity Services
Engine.
Master Key Generation Period Specifies the primary key generation period in
seconds, minutes, hours, days, or weeks. The value
must be a positive integer in the range 1 to
2147040000 seconds. The default is 604800 seconds,
which is equivalent to one week.
Revoke all master keys and PACs Click Revoke to revoke all primary keys and PACs.
Enable PAC-less Session Resume Check this check box if you want to use EAP-FAST
without the PAC files.
PAC-less Session Timeout Specifies the time in seconds after which the PAC-less
session resume times out. The default is 7200 seconds.
Related Topics
Policy Set Protocol Settings, on page 965
Guidelines for Using EAP-FAST as Protocol, on page 965
Benefits of EAP-FAST, on page 1009
Configure EAP-FAST Settings, on page 966
PAC Settings
The following table describes the fields on the Generate PAC window, which you can use to configure protected
access credentials for EAP-FAST authentication. To view this window, click the Menu icon ( ) and choose
Administration > System > Settings > Protocols > EAP-FAST > Generate PAC.
PAC Time to Live (For Tunnel and Machine PAC) Enter a value in
seconds that specifies the expiration time for the PAC.
The default is 604800 seconds, which is equivalent
to one week. This value must be a positive integer
between 1 and 157680000 seconds. For the Trustsec
PAC, enter a value in days, weeks, months, or years.
By default, the value is one year. The minimum value
is one day and the maximum is 10 years.
Encryption Key Enter an encryption key. The length of the key must
be between 8 and 256 characters. The key can contain
uppercase or lowercase letters, or numbers, or a
combination of alphanumeric characters.
Related Topics
Policy Set Protocol Settings, on page 965
Guidelines for Using EAP-FAST as Protocol, on page 965
Generate the PAC for EAP-FAST, on page 966
Note If cryptobinding is required, you must use EAP-FAST as the inner method.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Protocols >
EAP-TTLS
Step 2 Enter the required details in the EAP-TTLS Settings page.
Step 3 Click Save.
EAP-TTLS Settings
The following table describes the fields on the EAP-TTLS Settings window. To view this window, click the
Menu icon ( ) and choose Administration > System > Settings > Protocols > EAP-TTLS.
Enable EAP-TTLS Session Resume If you check this check box, Cisco ISE will cache the
TLS session that is created during phase one of
EAP-TTLS authentication, provided the user
successfully authenticates in phase two of EAP-TTLS.
If a user needs to reconnect and the original
EAP-TTLS session has not timed out, Cisco ISE uses
the cached TLS session, resulting in faster EAP-TTLS
performance and a reduced AAA server load.
Note When the EAP-TTLS session is resumed, the
inner method is skipped.
EAP-TTLS Session Timeout Specifies the time in seconds after which the
EAP-TTLS session times out. The default value is
7200 seconds.
Related Topics
Policy Set Protocol Settings, on page 965
Using EAP-TTLS as Authentication Protocol, on page 969
Configure EAP-TTLS Settings, on page 969
Step 1 Choose Administration > System > Settings > Protocols > EAP-TLS.
Step 2 Enter the details as required to define the EAP-TLS protocol.
Step 3 Click Save to save the EAP-TLS settings.
EAP-TLS Settings
The following table describes the fields on the EAP-TLS Settings window, which you can use to configure
the EAP-TLS protocol settings. To view this window, click the Menu icon ( ) and choose Administration >
System > Settings > Protocols > EAP-TLS.
Master Key Generation Period Enter the time after which the primary key is
regenerated. This value determines the duration that
a primary key remains active. You can enter the value
in seconds, minutes, hours, days, or weeks.
Related Topics
Policy Set Protocol Settings, on page 965
Configure EAP-TLS Settings, on page 970
PEAP Settings
The following table describes the fields on the PEAP Settings window, which you can use to configure the
PEAP protocol settings. To view this window, click the Menu icon ( ) and choose Administration >
System > Settings > Protocols > PEAP.
PEAP Session Timeout Specifies the time in seconds after which the PEAP
session times out. The default value is 7200 seconds.
Enable Fast Reconnect Check this check box to allow a PEAP session to
resume in the Cisco ISE without checking user
credentials when the session resume feature is enabled.
Related Topics
Policy Set Protocol Settings, on page 965
Configure PEAP Settings, on page 971
Advantages of Using PEAP, on page 1007
Supported Supplicants for the PEAP Protocol, on page 1007
PEAP Protocol Flow, on page 1008
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings
Step 2 From the Settings navigation pane, click Protocols.
Step 3 Choose RADIUS.
Step 4 Enter the details as required to define the RADIUS settings.
Step 5 Click Save to save the settings.
RADIUS Settings
The following table describes the fields on the RADIUS Settings page. To view this window, click the Menu
icon ( ) and choose Administration > System > Settings > Protocols > RADIUS.
If you enable the Suppress Repeated Failed Clients option, clients with repeated authentication failures will
be suppressed from the audit logs, and requests from these clients will be automatically rejected for the
specified time period. You can also specify the number of authentication failures after which requests from
these clients should be rejected. For example, if this value is configured as 5, when a client authentication
fails five times, all requests received from that client will be rejected for the configured time period.
Note • If the cause of endpoint authentication failure is the entry of a wrong password and user type is internal
user, the endpoint is suppressed and enters rejection mode. However, if a wrong password is detected in
the case of Active Directory users, the endpoint is suppressed but does not enter rejection mode.
• Client suppression in Cisco ISE works only if there is a MAC address associated with the calling station
ID of the client.
Note If you configure suppression of RADIUS failures, you may still receive the error "5440 Endpoint Abandoned
EAP Session and started a new one" after you configure RADIUS log suppression. For more information,
see the following ISE Community post:
https://community.cisco.com/t5/network-access-control/authentication-failed-quot-5440-endpoint-abandoned-eap-session/td-p/3191944
Suppress Repeated Failed Clients Check this check box to suppress the clients for which
the authentications fail repeatedly for the same reason.
These clients are suppressed from the audit logs and
the requests from these clients are rejected for the
specified time period if Reject RADIUS Requests
from Clients with Repeated Failures option is
enabled.
Note CTS related logs are not suppressed even if
this option is enabled and are always included
in the Live Logs.
Detect Two Failures Within Enter the time interval in minutes. If a client fails
authentication twice for the same reason within this
time period, it will be suppressed from the audit logs,
and the requests from this client will be rejected if
Reject RADIUS Requests from Clients with
Repeated Failures option is enabled.
Remember • If the Suppress Repeated Failed Clients check box is checked and two failures occur within
the time specified in the Detect Two Failures Within field, the endpoint is considered
misconfigured. A misconfigured endpoint requires the admin’s intervention to ensure successful
authentication. When an endpoint fails the first authentication, the relevant information is
displayed in the admin’s dashboard. Subsequent authentication failures with the same reasons
do not contain any added information for the admin. Therefore, repeated authentication failures
of an endpoint for a particular reason during the duration specified in the Report Failures
Once Every field are not reported in the audit logs.
After the duration specified in the Report Failures Once Every field,the TotalFailedAttempts
and TotalFailedTime information about the misconfigured endpoint is reported to the
monitoring node.
• If the Suppress Repeated Failed Clients check box is checked and two failures occur after
the time specified in the Detect Two Failures Within field, the failed authentication attempts
of the endpoint will be reported in the audit logs as separate instances even if the reason for
the authentication failure remains the same.
• Cisco ISE allows the endpoint to conduct several consecutive failures with different failure
reasons because endpoints can have various supplicant profiles. Therefore, if the endpoint fails
to authenticate several times because of different failure reasons, Cisco ISE counts each failure
reason separately.
Report Failures Once Every Enter the time interval in minutes for the failed
authentications to be reported. For example, if this
value is set as 15 minutes, clients that repeatedly fail
authentication will be reported in the audit logs only
once every 15 minutes, thereby preventing
over-reporting.
Reject RADIUS Requests from Clients with Check this check box to automatically reject the
Repeated Failures RADIUS requests from the clients for which the
authentications fail repeatedly. You can enable this
option to avoid unnecessary processing by Cisco ISE
and to protect against potential denial of service
attacks.
Remember • If the Reject RADIUS Requests from Clients with Repeated Failures check box is checked
and the endpoint experiences authentication failures equal to the number mentioned in the
Failures Prior to Automatic Rejection field, the endpoint is considered misconfigured and
is rejected. Cisco ISE will immediately reject the first RADIUS message with the authentication
request from this endpoint, thus, not allowing the endpoint to complete the authentication. No
audit logs will be generated for the endpoint. The endpoint stays rejected for the duration given
in the Continue Rejecting Requests for field. The endpoint can send an authentication request
after the duration specified in the Continue Rejecting Requests for, and if the authentication
is successful, the endpoint will be configured.
• You can view and release the rejected endpoints on the Context Visibility (Context Visibility >
Endpoints) page. Select the rejected endpoints and click Release Rejected to release the
rejected endpoints. The audit logs for the released endpoints will be sent to the monitoring
node.
• If there is no activity from the misconfigured endpoint for a period of six hours, it will no longer
be considered as misconfigured.
Failures Prior to Automatic Rejection Enter the number of authentication failures after which
requests from clients with repeated failures are
automatically rejected. All the requests received from
these clients are automatically rejected for the
configured time period (specified in Continue
Rejecting Requests for field). After the interval
expires, the authentication requests from these clients
are processed.
Continue Rejecting Requests for Enter the time interval (in minutes) for which the
requests from clients with repeated failures are to be
rejected.
Ignore Repeated Accounting Updates Within Repeated accounting updates that occur within this
period will be ignored.
Authentications Details
Highlight Steps Longer Than Enter the time interval in milliseconds. If execution
of a single step exceeds the specified threshold, it will
be marked with a clock icon in the authentication
details page.
Detect Steady High Rate of Radius Requests Check this check box to raise an alarm for high
RADIUS request load when the limit specified in the
Duration of RADIUS requests and Total number
of RADIUS requests fields is exceeded.
Duration of RADIUS Requests Enter the period of time (in seconds) that will be used
to calculate the RADIUS rate. The default is 60
seconds. The valid range is from 20 to 86400 seconds.
Total Number of RADIUS Requests Enter the request limit that will be used to calculate
the RADIUS rate. The default is 72000 requests. The
valid range is from 24000 to 103680000 requests.
RADIUS DTLS
Authentication and Accounting Port Specify the port to be used for RADIUS DTLS
authentication and accounting flows. By default, port
2083 is used. The valid range is from 1024 to 65535.
Note Ensure that this port is not used by other
services.
Idle Timeout Enter the time (in seconds) that you want Cisco ISE
to wait before it closes the TLS session if no packets
are received from the network device. Default value
is 120 seconds. The valid range is from 60 to 600
seconds.
Enable RADIUS/DTLS Client Identity Check this check box if you want Cisco ISE to verify
Verification the identity of the RADIUS/DTLS clients during the
DTLS handshake. Cisco ISE fails the handshake if the
client identity is not valid. Identity check is skipped
for the default network device, if configured. Identity
check is performed in the following sequence:
1. If the client certificate contains the subject
alternative name (SAN) attribute:
• If SAN contains the DNS name, the DNS
name specified in the certificate is compared
with the DNS name that is configured for the
network device in Cisco ISE.
• If SAN contains the IP address (and does not
contain the DNS name), the IP address
specified in the certificate is compared with
all the device IP addresses configured in
Cisco ISE.
Related Topics
Policy Set Protocol Settings, on page 965
RADIUS Protocol Support in Cisco ISE, on page 984
Configure RADIUS Settings, on page 972
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Security Settings.
Step 2 In the Security Settings window, choose the required options:
• Allow TLS 1.0: Allows TLS 1.0 for communication with legacy peers for the following workflows:
• Cisco ISE is configured as an EAP server
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure TCP syslog client
• Cisco ISE is configured as a secure LDAP client
• Cisco ISE is configured as an ERS server
Also allows TLS 1.0 for communication with the following Cisco ISE components:
• All portals
• Certificate Authority
• MDM Client
• pxGrid
• PassiveID Agent
Note We recommend that clients and servers negotiate to use a higher version of TLS for enhanced security.
• Allow TLS 1.1: Allows TLS 1.1 for communication with legacy peers for the following workflows:
• Cisco ISE is configured as an EAP server
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure TCP syslog client
• Cisco ISE is configured as a secure LDAP client
• Cisco ISE is configured as an ERS server
Also allows TLS 1.1 for communication with the following Cisco ISE components:
• All portals
• Certificate Authority
• External RESTful Services (ERS)
• MDM Client
• pxGrid
Note We recommend that clients and servers negotiate to use a higher version of TLS for enhanced security.
• Allow SHA-1 Ciphers: Allows SHA-1 ciphers for communication with peers for the following workflows:
• Cisco ISE is configured as an EAP server
• Cisco ISE is configured as a RADIUS DTLS server
• Cisco ISE is configured as a RADIUS DTLS client
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure syslog client
• Cisco ISE is configured as a secure LDAP client
Also allows SHA-1 ciphers for communication with the following Cisco ISE components:
• Admin Access UI
• All portals
• ERS
• pxGrid
You must restart all the nodes in a deployment after enabling or disabling the Allow SHA-1 Ciphers option. If
restart is not successful, the configuration changes are not applied. In such a scenario, you must restart all the nodes
manually using the following commands:
application stop ise and application start ise.
You can select one of the following options while allowing SHA-1 ciphers for communication with legacy peers:
• Allow all SHA-1 Ciphers: Allows all SHA-1 ciphers for communication with legacy peers.
• Allow only TLS_RSA_with_AES_128_CBC_SHA: Allows only TLS_RSA_with_AES_128_CBC_SHA
cipher for communication with legacy peers.
Note We recommend that you use SHA-256 or SHA-384 ciphers for enhanced security.
• Allow ECDHE-RSA Ciphers: Allows ECDHE-RSA ciphers for communication with peers for the following
workflows:
• Cisco ISE is configured as an EAP server
• Cisco ISE is configured as a RADIUS DTLS server
• Cisco ISE is configured as a RADIUS DTLS client
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure syslog client
• Cisco ISE is configured as a secure LDAP client
• Allow 3DES ciphers: Allows 3DES ciphers for communication with peers for the following workflows:
• Cisco ISE is configured as an EAP server
• Cisco ISE is configured as a RADIUS DTLS server
• Cisco ISE is configured as a RADIUS DTLS client
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure syslog client
• Cisco ISE is configured as a secure LDAP client
• Accept Certificates without Validating Purpose: When Cisco ISE acts as an EAP or RADIUS DTLS server, client
certificates are accepted without checking whether:
• The Key Usage extension contains the keyAgreement bit for ECDHE-ECDSA ciphers or the keyEncipherment
bit for other ciphers
• Extended Key Usage attribute value is ClientAuth
When this option is disabled, Cisco ISE will validate the purpose of all the client certificates. A certificate will be
considered valid only if one of the following conditions is met:
• If there is no value for the Extended Key Usage attribute:
• If the cipherGroup is ECDHE-ECDSA, then the Key Usage extension must contain the KeyAgreement
value.
• If the cipherGroup is not ECDHE-ECDSA, then the Key Usage extension must contain the keyEncipherment
and digitalSignature values.
The certificate validation will fail if none of the above conditions are met.
• Allow DSS ciphers for ISE as a client: When Cisco ISE acts as a client, allows DSS ciphers for communication
with a server for the following workflows:
• Cisco ISE is configured as a RADIUS DTLS client
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure syslog client
• Cisco ISE is configured as a secure LDAP client
• Allow Legacy Unsafe TLS Renegotiation for ISE as a Client: Allows communication with legacy TLS servers
that do not support safe TLS renegotiation for the following workflows:
• Cisco ISE downloads CRL from HTTPS or a secure LDAP server
• Cisco ISE is configured as a secure syslog client
• Cisco ISE is configured as a secure LDAP client
• Disclose invalid usernames: By default, Cisco ISE displays the invalid message for authentication failures because
of incorrect usernames. To aid in debugging, this option forces Cisco ISE to display usernames in reports, instead
of the invalid message. Note that usernames are always displayed for failed authentications that are not because
of incorrect usernames.
This feature is supported for Active Directory, Internal Users, LDAP, and ODBC identity sources. It is not supported
for other identity stores, such as RADIUS token, RSA, or SAML.
Cipher Suite When Cisco ISE is configured as an EAP When Cisco ISE
server downloads CRL
from HTTPS or a
When Cisco ISE is configured as a
secure LDAP
RADIUS DTLS server
server
When Cisco ISE is
configured as a
secure syslog client
or a secure LDAP
client
When Cisco ISE is
configured as a
RADIUS DTLS
client for CoA
TLS 1.0 support When TLS 1.0 is allowed When TLS 1.0 is
allowed
(DTLS server supports only DTLS 1.2)
(DTLS client
Allow TLS 1.0 option is disabled by
supports only DTLS
default in Cisco ISE 2.3 and above. TLS
1.2)
1.0 is not supported for TLS based EAP
authentication methods (EAP-TLS,
EAP-FAST/TLS) and 802.1X supplicants
when this option is disabled. If you want
to use the TLS based EAP authentication
methods in TLS 1.0, check the Allow TLS
1.0 check box in the Security Settings
window. To view this window, click the
Menu icon ( ) and choose
Administration > System > Settings >
Protocols > Security Settings.
TLS 1.1 support When TLS 1.1 is allowed When TLS 1.1 is
allowed
DHE-RSA-AES256-SHA256 No Yes
DHE-RSA-AES128-SHA256 No Yes
RSA ciphers
3DES ciphers
DSS ciphers
Allowed Protocols
The following table describes the fields in the Allowed Protocols window, which allows you to configure
the protocols to be used during authentication. Policy > Policy Elements > Results > Authentication >
Allowed Protocols.
Process Host Lookup Check this check box if you want Cisco ISE to process the Host
Lookup request. The Host Lookup request is processed for
PAP/CHAP protocol when the RADIUS Service-Type equals 10
(Call-Check) and the username is equal to Calling-Station-ID.
The Host Lookup request is processed for EAP-MD5 protocol
when the Service-Type equals 1 (Framed) and the username is
equal to Calling-Station-ID. Uncheck this check box if you want
Cisco ISE to ignore the Host Lookup request and use the original
value of the system username attribute for authentication. When
unchecked, message processing is done according to the protocol
(for example, PAP).
Note Disabling this option could result in the failure of existing
MAB authentications.
Allow PAP/ASCII This option enables PAP/ASCII. PAP uses cleartext passwords
(that is, unencrypted passwords) and is the least secure
authentication protocol.
Allow EAP-MD5 Check this check box to enable EAP-based MD5 password hashed
authentication.
Allow EAP-TLS Check this check box to enable EAP-TLS Authentication protocol
and configures EAP-TLS settings. You can specify how Cisco
ISE will verify the user identity as presented in the EAP identity
response from the end-user client. User identity is verified against
information in the certificate that the end-user client presents.
This comparison occurs after an EAP-TLS tunnel is established
between Cisco ISE and the end-user client.
Note EAP-TLS is a certificate-based authentication protocol.
EAP-TLS authentication can occur only after you have
completed the required steps to configure certificates.
Allow PEAP Check this check box to enable PEAP authentication protocol and
PEAP settings. The default inner method is MS-CHAPv2.
When you check the Allow PEAP check box, you can configure
the following PEAP inner methods:
• Allow EAP-MS-CHAPv2: Check this check box to use
EAP-MS-CHAPv2 as the inner method.
• Allow Password Change: Check this check box for
Cisco ISE to support password changes.
• Retry Attempts: Specifies how many times Cisco ISE
requests user credentials before returning login failure.
Valid values are 0 to 3.
Allow EAP-FAST
• Allow EAP-GTC
Allow Password Change: Check this check box for Cisco
ISE to support password changes.
Retry Attempts: Specifies how many times Cisco ISE
requests user credentials before returning login failure. Valid
values are 0-3.
• Use PACs: Choose this option to configure Cisco ISE to
provision authorization Protected Access Credentials (PAC)
for EAP-FAST clients. Additional PAC options appear.
• Don't Use PACs: Choose this option to configure Cisco ISE
to use EAP-FAST without issuing or accepting any tunnel
or machine PACs. All requests for PACs are ignored and
Cisco ISE responds with a Success-TLV without a PAC.
When you choose this option, you can configure Cisco ISE
to perform machine authentication.
• Allow EAP-TLS: Check this check box to use EAP-TLS as
the inner method.
Check the Allow authentication of expired certificates to
allow certificate renewal in Authorization Policy check
box, if you want to allow users to renew certificates. If you
check this check box, ensure that you configure appropriate
authorization policy rules to check if the certificate has been
renewed before processing the request any further.
• Enable EAP Chaining: Check this check box to enable EAP
chaining.
EAP chaining allows Cisco ISE to correlate the results of
user and machine authentication and apply the appropriate
authorization policy using the EAPChainingResult attribute.
EAP chaining requires a supplicant that supports EAP
Allow TEAP
Preferred EAP Protocol Check this check box to choose your preferred EAP protocols
from any of the following options: EAP-FAST, PEAP, LEAP,
EAP-TLS, EAP-TTLS, and EAP-MD5. If you do not specify the
preferred protocol, EAP-TLS is used by default.
EAP-TLS L-bit Check this check box to support legacy EAP supplicants that
expect length-included flag (L-bit flag) by default in TLS Change
Cipher Spec message and Encrypted Handshake message from
ISE.
Note Enable this option only for supplicants that require this
flag. Windows native supplicant does not support this
flag with tunneled EAP protocols; such as PEAP, TEAP
or EAP-FAST. If this option is enabled, and supplicant
does not support it, and tunneled EAP protocol is being
used, ISE will enable this flag in Application Data after
establishing TLS tunnel, then supplicant will discard EAP
session and will not complete EAP authentication for
inner method of the tunnel which will result into a failed
authentication with "Endpoint abandoned EAP session
and started new" failure reason.
Allow Weak Ciphers for EAP If this option is enabled, legacy clients are allowed to negotiate
using weak ciphers (such as RSA_RC4_128_SHA,
RSA_RC4_128_MD5). We recommend that you enable this option
only if your legacy clients support only weak ciphers.
This option is disabled by default.
Note Cisco ISE does not support
EDH_RSA_DES_64_CBC_SHA and
EDH_DSS_DES_64_CBC_SHA.
Require Message Authenticator for all RADIUS Requests If this option is enabled, Cisco ISE verifies whether the RADIUS
Message Authenticator attribute is present in the RADIUS
message. If the message authenticator attribute is not present, the
RADIUS message is discarded.
Enabling this option provides protection from spoofed
Access-Request messages and RADIUS message tampering.
The RADIUS Message Authenticator attribute is a Message Digest
5 (MD5) hash of the entire RADIUS message.
Note EAP uses the Message Authenticator attribute by default
and does not require that you enable it.
Allow 5G Check this check box to enable Cisco Private 5G in Cisco ISE.
Note You must already have Cisco Private 5G deployed in
your network, prior to enabling 5G as a Service (5GaaS)
in Cisco ISE
Related Topics
Allowed Protocols in FIPS and Non-FIPS Modes for TACACS+ Device Administration, on page 429
Define Allowed Protocols for Network Access, on page 1003
PAC Options
The following table describes the fields after you select Use PACs in the Allowed Protocols Services List
window. To view this window, click the Menu icon ( ) and choose Policy > Policy Elements > Results
> Authentication > Allowed Protocols.
Use PAC
Related Topics
OOB TrustSec PAC, on page 1025
Generate the PAC for EAP-FAST, on page 966
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > External
RADIUS Servers.
The RADIUS Servers page appears with a list of external RADIUS servers that are defined in Cisco ISE.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > RADIUS
Server Sequences.
Step 2 Click Add.
Step 3 Enter the values as required.
Step 4 Click Submit to save the RADIUS server sequence to be used in policies.
The TACACS+ External Servers page lists all the external TACACS+ servers that you have defined in Cisco
ISE. You can use the filter option to search for specific TACACS+ servers based on the name or description,
or both.
Cisco ISE can simultaneously act as a proxy client to multiple external TACACS+ servers. In order to configure
multiple external servers, you can use the TACACS+ server sequence page. Refer to the TACACS+ Server
Sequence Settings page for more information.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Network
Resources > TACACS External Servers.
The TACACS External Servers page appears with a list of external TACACS servers that are defined in Cisco ISE.
Step 2 Click Add to add an external TACACS server.
Step 3 Enter the values as required.
Step 4 Click Submit to save the external TACACS server configuration.
Use Single Connect The TACACS protocol supports two modes for
associating sessions to connections: Single Connect
and Non-Single Connect. Single connect mode reuses
a single TCP connection for many TACACS+ sessions
that a client may initiate. Non-Single Connect opens
a new TCP connection for every TACACS+ session
that a client initiates. The TCP connection is closed
after each session.
You can check the Use Single Connect check box for
high-traffic environment and uncheck it for low-traffic
environment.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Network
Resources > TACACS External Server Sequence.
Step 2 Click Add.
Step 3 Enter the required values.
Step 4 Click Submit to save the TACACS+ server sequence to be used in policies.
Server List Select the required TACACS proxy servers from the
Available list. The available list contains the list of
TACACS proxy servers configured in the TACACS
External Services Page.
To perform the following task, you must be a Super Admin or System Admin.
Step 1 Choose Policy > Policy Elements > Results > Authentication > Allowed Protocols.
Step 2 Click Add.
Step 3 Enter the required information.
Step 4 Select the appropriate authentication protocols and options for your network.
Step 5 If you choose to use PACs, make the appropriate selections.
To enable Anonymous PAC Provisioning, you must choose both the inner methods, EAP-MSCHAPv2 and Extensible
Authentication Protocol-Generic Token Card (EAP-GTC). Also, be aware that Cisco ISE only supports Active Directory
as an external identity source for machine authentication.
EAP Methods That Use Cisco ISE Server Certificate for Authentication
• PEAP/EAP-MS-CHAPv2
• PEAP/EAP-GTC
• EAP-FAST/EAP-MS-CHAPv2
• EAP-FAST/EAP-GTC
Apart from the methods listed above, there are EAP methods that use certificates for both server and client
authentication.
In this way, the host and Cisco ISE indirectly exchange EAP messages (transported over RADIUS and passed
through the network device). The initial set of EAP messages that are exchanged in this manner negotiate the
specific EAP method that will subsequently be used to perform the authentication.
The EAP messages that are subsequently exchanged are then used to carry the data that is needed to perform
the actual authentication. If it is required by the specific EAP authentication method that is negotiated, Cisco
ISE uses an identity store to validate user credentials.
After Cisco ISE determines whether the authentication should pass or fail, it sends either an EAP-Success or
EAP-Failure message, encapsulated into a RADIUS Access-Accept or Access-Reject message to the network
device (and ultimately also to the host).
The following figure shows a RADIUS-based authentication with EAP.
Note If users access your network by using a AAA client that is defined in the Network Devices section as a RADIUS
(Cisco Aironet) device, then you must enable LEAP, EAP-TLS, or both; otherwise, Cisco Aironet users cannot
authenticate.
3. There is protected acknowledgment of success and failure if the conversation has reached the inner method.
The client EAP message is always carried in the RADIUS Access-Request message, and the server EAP
message is always carried in the RADIUS Access-Challenge message. The EAP-Success message is
always carried in the RADIUS Access-Accept message. The EAP-Failure message is always carried in
the RADIUS Access-Reject message. Dropping the client PEAP message results in dropping the RADIUS
client message.
Note Cisco ISE requires acknowledgment of the EAP-Success or EAP-Failure message during PEAPv1
communication. The peer must send back a PEAP packet with empty TLS data field to acknowledge the
receipt of success or failure message.
tunnel is used to protect weak authentication methods that are based on passwords. The shared secret, referred
to as a Protected Access Credentials (PAC) key, is used to mutually authenticate the client and server while
securing the tunnel.
Benefits of EAP-FAST
EAP-FAST provides the following benefits over other authentication protocols:
• Mutual authentication—The EAP server must be able to verify the identity and authenticity of the peer,
and the peer must be able to verify the authenticity of the EAP server.
• Immunity to passive dictionary attacks—Many authentication protocols require a password to be explicitly
provided, either as cleartext or hashed, by the peer to the EAP server.
• Immunity to man-in-the-middle attacks—In establishing a mutually authenticated protected tunnel, the
protocol must prevent adversaries from successfully interjecting information into the conversation between
the peer and the EAP server.
• Flexibility to enable support for many different password authentication interfaces such as MS-CHAPv2,
Generic Token Card (GTC), and others—EAP-FAST is an extensible framework that allows support of
multiple internal protocols by the same server.
• Efficiency—When using wireless media, peers are limited in computational and power resources.
EAP-FAST enables the network access communication to be computationally lightweight.
• Minimization of the per-user authentication state requirements of the authentication server—With large
deployments, it is typical to have many servers acting as the authentication servers for many peers. It is
also highly desirable for a peer to use the same shared secret to secure a tunnel much the same way that
it uses the username and password to gain access to the network. EAP-FAST facilitates the use of a
single, strong, shared secret by the peer, while enabling servers to minimize the per-user and device state
that it must cache and manage.
EAP-FAST Flow
The EAP-FAST protocol flow is always a combination of the following phases:
1. Provisioning phase—This is phase zero of EAP-FAST. During this phase, the peer is provisioned with a
unique, strong secret that is referred to as the PAC that is shared between the Cisco ISE and the peer.
2. Tunnel establishment phase—The client and server authenticate each other by using the PAC to establish
a fresh tunnel key. The tunnel key is then used to protect the rest of the conversation and provides message
confidentiality and with authenticity.
3. Authentication phase—The authentication is processed inside the tunnel and includes the generation of
session keys and protected termination.Cisco ISE supports EAP-FAST versions 1 and 1a.
Step 1 Ensure that the MAC address of the endpoints that are to be authenticated are available in the Endpoints database. You
can add these endpoints or have them profiled automatically by the Profiler service.
Step 2 Create a Network Device Profile based on the type of MAC authentication used by the non-Cisco device (PAP, CHAP,
or EAP-MD5).
a) Choose Administration > Network Resources > Network Device Profiles.
b) Click Add.
h) Enter the required details in the Permissions, Change of Authorization (CoA), and Redirect sections, and then click
Submit.
For information on how to create custom NAD profiles, see Network Access Device Profiles with Cisco Identity
Services Engine.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 4 Select the device for which you want to enable MAB, and then click Edit.
Step 5 In the Network Device page, select the network device profile that you created in step 2 from the Device Profile drop-down
list.
Step 6 Click Save.
Note For Cisco NADs, the Service-Type values used for MAB and web/user authentication are different. This
allows ISE to differentiate MAB from web authentication when Cisco NADs are used. Some non-Cisco NADs
use the same value for the Service-Type attribute for both MAB and web/user authentication; this may lead
to security issues in your access policies. If you are using MAB with non-Cisco devices, we recommend that
you configure additional authorization policy rules to ensure that your network security is not compromised.
For example, if a printer is using MAB, you could configure an authorization policy rule to restrict it to printer
protocol ports in the ACL.
Step 1 Ensure that the MAC address of the endpoints that are to be authenticated are available in the Endpoints database. You
can add these endpoints or have them profiled automatically by the Profiler service.
Step 2 Create a Network Device Profile based on the type of MAC authentication used by the Cisco device (PAP, CHAP, or
EAP-MD5).
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network
Device Profiles.
b) Click Add.
c) Enter a name and description for the network device profile.
d) Check the check boxes for the protocols that the device supports. If the device supports RADIUS, select the RADIUS
dictionary to use with the network device.
e) Expand the Authentication/Authorization section to configure the device's default settings for flow types, attribute
aliasing, and host lookup.
f) In the Host Lookup (MAB) section, do the following:
• Process Host Lookup—Check this check box to define the protocols for host lookup used by the network device
profile.
Depending on the device type, check the Check Password check box and/or Check Calling-Station-Id equals
MAC Address check box, for the protocol you are using.
• Via PAP/ASCII—Check this check box to configure Cisco ISE to detect a PAP request from the network device
profile as a Host Lookup request.
• Via CHAP—Check this check box to configure Cisco ISE to detect this type of request from the network devices
as a Host Lookup request.
• Via EAP-MD5—Check this check box to enable EAP-based MD5 hashed authentication for the network device
profile.
g) Enter the required details in the Permissions, Change of Authorization (CoA), and Redirect sections, and then click
Submit.
For information on how to create custom NAD profiles, see Network Access Device Profiles with Cisco Identity
Services Engine.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Network Resources > Network Devices.
Step 4 Select the device for which you want to enable MAB, and then click Edit.
Step 5 In the Network Device page, select the network device profile that you created in step 2 from the Device Profile drop-down
list.
Step 6 Click Save.
TrustSec Architecture
The Cisco TrustSec solution establishes clouds of trusted network devices to build secure networks. Each
device in the Cisco TrustSec cloud is authenticated by its neighbors (peers). Communication between the
devices in the TrustSec cloud is secured with a combination of encryption, message integrity checks, and
data-path replay protection mechanisms. The TrustSec solution uses the device and user identity information
that it obtains during authentication to classify, or color, the packets as they enter the network. This packet
classification is maintained by tagging packets when they enter the TrustSec network so that they can be
properly identified for the purpose of applying security and other policy criteria along the data path. The tag,
also called the security group tag (SGT), allows Cisco ISE to enforce access control policies by enabling the
endpoint device to act upon the SGT to filter traffic.
The following figure shows an example of a TrustSec network cloud.
Figure 46: TrustSec Architecture
TrustSec Components
The key TrustSec components include:
• Network Device Admission Control (NDAC)—In a trusted network, during authentication, each network
device (for example Ethernet switch) in a TrustSec cloud is verified for its credential and trustworthiness
by its peer device. NDAC uses the IEEE 802.1X port-based authentication and uses Extensible
Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) as its Extensible
Authentication Protocol (EAP) method. Successful authentication and authorization in the NDAC process
results in Security Association Protocol negotiation for IEEE 802.1AE encryption. Cisco ISE has CTS
Provisioning (EAP-FAST) TLSv1.2 support for switching platforms starting IOSXE 17.1, and for routing
platforms starting IOSXE 17.6.
• Endpoint Admission Control (EAC)—An authentication process for an endpoint user or a device
connecting to the TrustSec cloud. EAC typically happens at the access level switch. Successful
authentication and authorization in EAC process results in SGT assignment to the user or device. EAC
access methods for authentication and authorization includes:
• 802.1X port-based authentication
• MAC authentication bypass (MAB)
• Web authentication (WebAuth)
• Security Group (SG)—A grouping of users, endpoint devices, and resources that share access control
policies. SGs are defined by the administrator in Cisco ISE. As new users and devices are added to the
TrustSec domain, Cisco ISE assigns these new entities to the appropriate security groups.
• Security Group Tag (SGT)—TrustSec service assigns to each security group a unique 16-bit security
group number whose scope is global within a TrustSec domain. The number of security groups in the
switch is limited to the number of authenticated network entities. You do not have to manually configure
security group numbers. They are automatically generated, but you have the option to reserve a range of
SGTs for IP-to-SGT mapping.
• Security Group Access Control List (SGACL)—SGACLs allow you to control the access and permissions
based on the SGTs that are assigned. The grouping of permissions into a role simplifies the management
of security policy. As you add devices, you simply assign one or more security groups, and they
immediately receive the appropriate permissions. You can modify the security groups to introduce new
privileges or restrict current permissions.
• Security Exchange Protocol (SXP)—SGT Exchange Protocol (SXP) is a protocol developed for TrustSec
service to propagate the IP-SGT bindings across network devices that do not have SGT-capable hardware
support to hardware that supports SGT/SGACL.
• Environment Data Download—The TrustSec device obtains its environment data from Cisco ISE when
it first joins a trusted network. You can also manually configure some of the data on the device. The
device must refresh the environment data before it expires. The TrustSec device obtains the following
environment data from Cisco ISE:
• Server lists—List of servers that the client can use for future RADIUS requests (for both
authentication and authorization)
• Device SG—Security group to which the device itself belongs
• Expiry timeout—Interval that controls how often the TrustSec device should download or refresh
its environment data
• Identity-to-Port Mapping—A method for a switch to define the identity on a port to which an endpoint
is connected, and to use this identity to look up a particular SGT value in the Cisco ISE server.
TrustSec Terminology
The following table lists some of the common terms that are used in the TrustSec solution and their meaning
in an TrustSec environment.
Term Meaning
TrustSec device Any of the Cisco Catalyst 6000 Series or Cisco Nexus
7000 Series switches that support the TrustSec
solution.
TrustSec seed device The TrustSec device that authenticates directly against
the Cisco ISE server. It acts as both the authenticator
and supplicant.
identity-based user access control using the IEEE 802.1X protocol. For a complete up-to-date list of the
Trustsec-supported Cisco switch platforms and the required components, see Cisco TrustSec-Enabled
Infrastructure.
Note Catalyst Center versions earlier than 2.2.1.0 used Cisco ISE CLI to perform the
initial integration steps. Hence, the Cisco ISE CLI and admin usernames and
passwords had to be the same. From Catalyst Center Release 2.2.1.0 onwards,
the use of Cisco ISE CLI has been dropped, and hence the Cisco ISE CLI and
admin usernames and passwords need not be the same.
• APIs: External RESTful Services (ERS) API service must be enabled in Cisco ISE. Ensure that the Use
CSRF Check for Enhanced Security option is disabled in Cisco ISE.
• pxGrid: Cisco ISE is a pxGrid controller, and Catalyst Center is a subscriber. Both Cisco ISE and Catalyst
Center monitor the TrustSec (SD-Access) content, which contains SGT and SGACL information.
Synchronize the system clocks between Cisco ISE and Catalyst Center. For more information about
pxGrid in Cisco ISE, see Cisco pxGrid Node, on page 194.
Note Cisco ISE 2.4 and later supports pxGrid 2.0 and pxGrid 1.0. Although pxGrid
2.0 allows up to 4 pxGrid nodes in the Cisco ISE deployment, Catalyst Center
does not currently support more than 2 pxGrid nodes.
• Cisco ISE IP Address: The connection between the Cisco ISE PAN and Catalyst Center must be direct.
It cannot be through a proxy, a load balancer, or virtual IP address.
Verify that Cisco ISE is not using a proxy. Otherwise, exclude the Catalyst Center IP from the proxy.
• SXP: Catalyst Center does not require SXP. You may want to enable SXP when you connect Cisco ISE
to the Catalyst Center-managed network, so that Cisco ISE can communicate with network devices that
don’t have hardware support for TrustSec (SD-Access).
Note When configuring your Cisco ISE deployment to support TrustSec, or when Cisco
ISE is integrated with Catalyst Center, do not configure a Policy Service node as
SXP-only. SXP is an interface between TrustSec and non-TrustSec devices. It
does not communicate with the TrustSec-enabled network devices.
Note In Catalyst Center releases earlier than 2.2.1.0, there was a requirement to enable SSH. From Catalyst Center
Release 2.2.1.0 onwards, the use of SSH been dropped, and hence, there is no need to enable SSH.
TrustSec Dashboard
The TrustSec dashboard is a centralized monitoring tool for the TrustSec network.
The TrustSec dashboard contains the following dashlets:
• Metrics: The Metrics dashlet displays statistics about the behavior of the TrustSec network.
• Active SGT Sessions: The Active SGT Sessions dashlet displays the SGT sessions that are currently
active in the network. The Alarms dashlet displays alarms that are related to the TrustSec sessions.
• Alarms
• NAD / SGT/ACI Quick View: The Quick View dashlet displays TrustSec-related information for NADs
and SGTs.
• TrustSec Sessions / NAD Activity/ACI endpoint Activity Live Log: In the Live Log dashlet, click the
TrustSec Sessions link to view the active TrustSec sessions. You can also view information about TrustSec
protocol data requests and responses from NADs to Cisco ISE.
Metrics
This section displays statistics about the behavior of the TrustSec network. You can select the time frame (for
example, past 2 hours, past 2 days, and so on) and the chart type (for example, bars, line, spline).
The latest bar values are displayed on the graphs. It also displays the percentage change from the previous
bar. If there is an increase in the bar value, it will be displayed in green with a plus sign. If there is a decrease
in the value, it will be displayed in red with a minus sign.
Place your cursor on a bar of a graph to view the time at which the value was calculated and its exact value
in the following format: <Value:xxxx Date/Time: xxx>
You can view the following metrics:
SGTs in use Displays the total number of unique SGTs that were
used during the chosen time frame. For example, in
one hour, if there were 200 TrustSec sessions, but ISE
responded with only 6 types of SGTs in the
authorization responses, the graph will display a value
6 for this hour.
Alarms
This dashlet displays the alarms related to the TrustSec sessions. You can view the following details:
• Alarm Severity—Displays an icon that represents the severity level of the alarm.
• High—Includes the alarms that indicate failure in the TrustSec network (for example, device failed
to refresh its PAC). Marked with red icon.
• Medium—Includes warnings that indicate wrong configuration of the network device (for example,
device failed to accept CoA message). Marked with yellow.
• Low—Includes general information and update on network behavior (for example, configuration
changes in TrustSec). Marked with blue.
• Alarm description
• Number of times the alarm occurred since this alarm counter was last reset.
• Alarm last occurrence time
Quick View
The Quick View dashlet displays TrustSec-related information for NADs. You can also view the
TrustSec-related information for an SGT.
You can use the Show Latest Logs option to view the NAD activity live logs for the device.
• Updated NADs: Lists the number of NADs which downloaded policies for this SGT.
To know more about Cisco Software-Defined Access (Cisco SD-Access) and Cisco Application Centric
Infrastructure (Cisco ACI), see Connect Cisco Application Centric Infrastructure with Cisco ISE, on page 1065
and Cisco ACI and Cisco SD-Access Integration with Virtual Network Awareness, on page 1068.
Live Log
Click the TrustSec Sessions link to view the active TrustSec sessions (sessions that have SGT as part of their
response).
Click the NAD Activity link to view information regarding TrustSec protocol data requests and responses
from NADs to Cisco ISE.
Click the ACI endpoint Activity link to view the IP-SGT information learnt by Cisco ISE from Cisco ACI.
You may change the Authority Identity Info Description to your Cisco ISE server name. This description
is a user-friendly string that describes the Cisco ISE server that sends credentials to an endpoint client.
The client in a Cisco TrustSec architecture can be either the endpoint running EAP-FAST as its EAP
method for IEEE 802.1X authentication or the supplicant network device performing Network Device
Access Control (NDAC). The client can discover this string in the protected access credentials (PAC)
type-length-value (TLV) information. The default value is Identity Services Engine. You should change
the value so that the Cisco ISE PAC information can be uniquely identified on network devices upon
NDAC authentication.
• To perform the following task, you must be a Super Admin or System Admin.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Settings > General TrustSec
Settings
Step 2 Enter the values in the fields. For information about the fields, see General TrustSec Settings, on page 1020
Step 3 Click Save.
What to do next
• Configure TrustSec Devices, on page 1025
The Verify Deployment option is also available from the below windows. In the Cisco ISE GUI, click the
Menu icon ( ) and choose:
• Work Centers > TrustSec > Components > Security Groups
• Work Centers > TrustSec > Components > Security Group ACLs
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Matrix
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Source Tree
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Destination Tree
Automatic Verification After Every Deploy: Check this check box if you want Cisco ISE to verify the
updates on all the network devices after every deployment. When the deployment process is complete, the
verification process starts after the time you specify in the Time after Deploy Process field.
Time After Deploy Process: Specify the time for which you want Cisco ISE to wait for after the deployment
process is complete, before starting the verification process. The valid range is 10–60 minutes.
The current verification process is cancelled if a new deployment request is received during the waiting period
or if another verification is in progress.
Verify Now: Click this option to start the verification process immediately.
• Proactive PAC Update Will Occur After: Cisco ISE proactively provides a new PAC to a client after
successful authentication when a configured percentage of the Tunnel PAC TTL remains. The server
starts the tunnel PAC update if the first successful authentication occurs before the PAC expires. This
mechanism updates the client with a valid PAC. The default value is 10%.
Note The autocreated SGTs are not deleted if you delete the corresponding authorization policy rule.
Cisco ISE displays a sample SGT name in the Example Name field, based on your selections.
If an SGT exists with the same name, ISE appends _x to the SGT name, where x is the first value, starting
with 1 (if 1 is not used in the current name). If the new name is longer than 32 characters, Cisco ISE
truncate its to the first 32 characters.
• Include entire response payload body in Audit: Enable this option to display the entire TrustSec HTTP
response payload body in the audit logs. This option may dramatically decrease performance. When this
option is disabled, only HTTP headers, status, and authentication information are logged.
Related Topics
TrustSec Architecture, on page 1012
TrustSec Components, on page 1012
Configure TrustSec Global Settings, on page 1019
Step 1 Choose Work Centers > TrustSec > Settings > TrustSec Matrix Settings.
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Settings > TrustSec Matrix
Settings.
Step 3 Enter the required details in the TrustSec Matrix Settings page.
Step 4 Click Save.
Allow Multiple SGACLs Check this check box if you want to allow multiple
SGACLs in a cell. If this option is not selected, Cisco
ISE will allow only one SGACL per cell.
By default, this option is disabled upon fresh install.
After upgrade, Cisco ISE will scan the Egress cells
and if it identifies at least one cell with multiple
SGACLs assigned to it, it allows the admin to add
multiple SGACLs in a cell. Otherwise, it allows only
one SGACL per cell.
Note Before disabling multiple SGACLs, you must
edit the cells containing multiple SGACLs to
include only one SGACL.
Allow Monitoring Check this check box to enable monitoring for all cells
in the matrix. If monitoring is disabled, Monitor All
icon is greyed out and the Monitor option is disabled
in the Edit Cell dialog.
By default, monitoring is disabled upon fresh install.
Note Before disabling monitoring at matrix level,
you must disable monitoring for the cells that
are currently being monitored.
Show SGT Numbers Use this option to display or hide the SGT values (both
decimal and hexadecimal) in the matrix cells.
By default, the SGT values are displayed in the cells.
Related Topics
Egress Policy, on page 1036
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Network
Devices
Step 2 Click Add.
Step 3 Enter the required information in the Network Devices section.
Step 4 Check the Advanced Trustsec Settings check box to configure a Trustsec-enabled device.
Step 5 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings
Step 2 From the Settings navigation pane on the left, click Protocols.
Step 3 Choose EAP-FAST > Generate PAC.
Step 4 Generate TrustSec PAC.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Network
Devices
Step 2 Click Add. You can also click Add new device from the action icon on the Network Devices navigation pane.
Step 3 If you are adding a new device, provide a device name.
Step 4 Check the Advanced TrustSec Settings check box to configure a TrustSec device.
Step 5 Under the Out of Band (OOB) TrustSec PAC sub section, click Generate PAC.
Step 6 Provide the following details:
• PAC Time to Live—Enter a value in days, weeks, months, or years. By default, the value is one year. The minimum
value is one day and the maximum is ten years.
• Encryption Key—Enter an encryption key. The length of the key must be between 8 and 256 characters. The key
can contain uppercase or lowercase letters, or numbers, or a combination of alphanumeric characters.
The Encryption Key is used to encrypt the PAC in the file that is generated. This key is also used to decrypt the PAC
file on the devices. Therefore, it is recommended that the administrator saves the Encryption Key for later use.
The Identity field specifies the Device ID of a TrustSec network device and is given an initiator ID by the EAP-FAST
protocol. If the Identity string entered here does not match that Device ID defined under TrustSec section in the
Network Device creation page, authentication will fail.
The expiration date is calculated based on the PAC Time to Live.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Network
Devices
Step 2 Click Network Devices.
Step 3 Check the check box next to a device for which you want to generate the TrustSec PAC and click Generate PAC.
Step 4 Provide the details in the fields.
Step 5 Click Generate PAC.
Push Button
The Push option in the egress policy initiates a CoA notification that calls the Trustsec devices to immediately
request for updates from Cisco ISE regarding the configuration changes in the egress policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > TrustSec
AAA Servers
Step 2 Click Add.
Step 3 Enter the values as described:
• Name: Name that you want to assign to the Cisco ISE server in this AAA Server list. This name can be different
from the hostname of the Cisco ISE server.
• Description: An optional description.
• IP: IP address of the Cisco ISE server that you are adding to the AAA Server list.
• Port: Port over which communication between the Cisco TrustSec device and server should take place. The default
is 1812.
What to do next
Configure Security Groups.
Note If you configure only one node for HTTPS, then the Trustsec servers that are not configured for HTTPS do
not display in the Trustsec servers list. You must configure all the other Trustsec-enabled nodes in your
deployment for HTTPS. If no PSNs are configured for HTTPS, then RADIUS is used, and all Cisco ISE lists
all the PSN nodes in this Trustsec deployment.
After configuration is complete, Cisco ISE returns a list of configured servers in the TrustSec environment
data under Trustsec > Network Devices.
Debug
Enable ERS in debug. This setting logs all ERS traffic. Don't leave this setting enabled for more than 30 mins
to avoid overloading the log file.
You can enable additional audit information by checking Include request payload body under Trustsec
REST API Service for Network Devices on Trustsec > Settings > General Trustsec Settings.General
TrustSec Settings
on the external server and the certificate trust needs to be established between the network device and
the PSN nodes.
The certificates used by the PSN nodes for this purpose must include the IP address of the external server,
because the network devices establish the SSL session using the IP address of the external server. This
can be achieved by using a wild card certificate or a universal certificate. You can add multiple FQDNs,
IP addresses, or both, as SAN entries in a universal certificate.
Irrespective of the deployment option selected, whenever the external server directs communication from a
network device to a specific PSN node, it must ensure persistence of that connection. This means that all parts
of that communication must take place only between that network device and that specific PSN node.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Trustsec
Servers > HTTPS Servers
Step 2 Click Add External Server.
Step 3 Enter the following details:
• Name: Name of the external server to be added to the Cisco ISE HTTPS servers list.
• Hostname (FQDN): Hostname of the external server.
Note You can choose to provide either the hostname or the IP address of the external server.
You can now see the external server in the Cisco ISE HTTPS servers list.
You can click the Push button to initiate an environment CoA notification after updating multiple SGTs. This
environment CoA notification goes to all TrustSec network devices forcing them to start a policy/data refresh
request.
Note Frequent use of the Push or Deploy button is not advised. When there is a change in a matrix or SGACL,
check the notification bar for any pending deployment requests before performing the next deployment
operation.
6. Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Security
Groups.
Step 2 Click Import.
Step 3 Click Browse to choose the CSV file from the system that is running the client browser.
Step 4 Check the Stop Import on First Error check box.
Step 5 Click Import .
Step 1 Choose Work Centers > TrustSec > Components > Security Groups.
Step 2 Click Export.
Step 3 To export security groups, you can do one of the following:
• Check the check boxes next to the group that you want to export, and choose Export > Export Selected.
• Choose Export > Export All to export all the security groups that are defined.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP SGT Static
Mapping.
Step 2 Click Add.
Step 3 In the New area displayed, choose IP Address or Hostname from the drop-down list, and enter the corresponding value
in the field next to it.
In the Map to SGT individually option in the following step, you can specify a SXP domain to map to. However, the
Send to SXP Domain field is not accessible if you choose Hostname in this step. To add an SXP domain in the next
step, you must choose IP Address here.
Step 4 If you want to use an existing mapping group, click Add to a Mapping Group and select the required group from the
Mapping Group drop-down list.
If you want to map this IP address/hostname to an SGT individually, click Map to SGT Individually and do the following:
• Select an SGT from the SGT drop-down list.
• Select the Virtual Network for the mapping from the drop-down list .
• Select the SXP VPN groups on which the mapping must be deployed.
• Specify the devices on which you want to deploy this mapping. You can deploy the mapping on all TrustSec devices,
on selected network device groups, or on selected network devices.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP SGT Static
Mapping
Step 2 Check the check boxes near the mappings that you want to deploy. Check the check box at the top if you want to deploy
all the mappings.
Step 3 Click Deploy.
All the TrustSec devices are listed in the Deploy IP SGT Static Mapping window.
Step 4 Check the check boxes near the devices or the device groups to which the selected mappings must be deployed.
• Check the check box at the top if you want to select all the devices.
• Use the filter option to search for specific devices.
• If you do not select any device, the selected mappings are deployed on all the TrustSec devices.
• When you select devices to deploy new mapping, ISE selects all the devices that will be affected by the new mapping.
Step 5 Click Deploy. The deploy button updates the mapping on all the devices affected by the new maps.
The Deployment Status window shows the order in which the devices are updated and the devices that are not getting
updated because of an error or because the device is unreachable. After the deployment is complete, the window displays
the total number of devices that are successfully updated and the number of devices that are not updated.
Use the Check Status option in the IP SGT Static Mapping page to check if different SGTs are assigned to
the same IP address for a specific device. You can use this option to locate the devices that have conflicting
mappings, IP addresses that are mapped to multiple SGTs, and the SGTs that are assigned to the same IP
address. The Check Status option can be used even if device groups, FQDN, hostname, or IPv6 addresses
are used in the deployment. You must remove the conflicting mappings or modify the scope of deployment
before deploying these mappings.
IPv6 addresses can be used in IP SGT static mappings. These mappings can be propagated using SSH or SXP
to specific network devices or network device groups.
If FQDN and hostnames are used, Cisco ISE looks for the corresponding IP addresses in the PAN and PSN
nodes while deploying the mappings and checking the deployment status.
Use the IP SGT Static Mapping of Hostnames option in the General TrustSec Settings window to specify
the number of mappings created for the IP addresses returned by the DNS query. Select one of the following
options:
• Create mappings for all the IP addresses returned by a DNS query.
• Create mappings only for the first IPv4 address and the first IPv6 address returned by a DNS
query.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP SGT Static
Mapping
Step 2 Click Import.
Step 3 Click Browse to select the CSV file from the system that is running the client browser.
Step 4 Click Upload.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP SGT Static
Mapping.
Step 2 Do one of the following:
• Check the check boxes next to the mappings that you want to export, and choose Export > Selected.
• Choose Export > All to export all the mappings.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP SGT Static
Mapping > Manage Groups.
Step 2 Click Add.
Step 3 Enter a name and description for the mapping group.
Step 4 Do the following:
• Select an SGT from the SGT drop-down list.
• Select the Virtual Network for the mapping from the drop-down list.
• Select the SXP VPN groups on which the mappings must be deployed.
• Specify the devices on which you want to deploy the mappings. You can deploy the mappings on all TrustSec
devices, on selected network device groups, or on selected network devices.
You can move an IP SGT mapping from one mapping group to another mapping group.
You can also update or delete the mappings and mapping groups. To update a mapping or mapping group,
check the check box next to the mapping or mapping group that you want to update, and then click Edit. To
delete a mapping or mapping group, check the check box next to the mapping or mapping group that you
want to delete, and then click Trash > Selected. When a mapping group is deleted, the IP SGT mappings
within that group are also deleted.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Security
Group ACLs.
Step 2 Click Add to create a new Security Group ACL.
Step 3 Enter the following information:
• Name—Name of the SGACL
• Description—An optional description of the SGACL
• IP Version—IP version that this SGACL supports:
• IPv4—Supports IP version 4 (IPv4)
• IPv6—Supports IP version 6 (IPv6)
• Agnostic—Supports both IPv4 and IPv6
• Security Group ACL Content—Access control list (ACL) commands. For example:
permit icmp
deny ip
The syntax of SGACL input is not checked within ISE. Make sure you are using the correct syntax so that switches,
routers and access points can apply them without errors. The default policy can be configured as permit IP, permit
ip log, deny ip, or deny ip log. A TrustSec network device attaches the default policy to the end of the specific cell
policy.
Here are two examples of SGACLs for guidance. Both include a final catch all rule. The first one denies as the final
catch all rule, and the second one permits.
Permit_Web_SGACL
permit tcp dst eq 80
permit tcp dst eq 443
deny ip
Deny_JumpHost_Protocols
deny tcp dst eq 23
deny tcp dst eq 23
deny tcp dst eq 3389
permit ip
The following table lists syntax for SGACL for IOS, IOS XE and NS-OS operating systems.
SGACL CLI and ACEs Syntax common across IOS, IOS XE, and NX-OS
deny ahp, eigrp, gre, icmp, igmp, ip, nos, ospf, pcp, pim, tcp,
udp
permit
SGACL CLI and ACEs Syntax common across IOS, IOS XE, and NX-OS
Note Hypens are not allowed by some Cisco switches. So permit dst eq 32767-65535 is not valid. Use permit
dst eq range 32767 65535. Some Cisco switches do not require eq in their command syntax. Thus, permit
dst eq 32767-65535 is not valid in these switches. Use permit dst 32767-65535 or permit dst range
32767 65535 instead.
Note Cisco ISE has the following predefined SGACLs: Permit IP, Permit IP Log, Deny IP, and Deny IP Log. You
can use these SGACLs to configure the TrustSec Matrix using the GUI or ERS API. Though these SGACLs
are not listed in the Security Group ACLs listing page in the GUI, these SGACLs will be listed when you use
the ERS API to list the available SGACLs (ERS getAll call).
Egress Policy
The egress table lists the source and destination SGTs, both reserved and unreserved. This page also allows
you to filter the egress table to view specific policies and also to save these preset filters. When the source
SGT tries to reach the destination SGT, the TrustSec-capable device enforces the SGACLs based on the
TrustSec policy as defined in the Egress Policy. Cisco ISE creates and provisions the policy.
After you create the SGTs and SGACLs, which are the basic building blocks required to create a TrustSec
policy, you can establish a relationship between them by assigning SGACLs to source and destination SGTs.
Each combination of a source SGT to a destination SGT is a cell in the Egress Policy.
In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy
> Egress Policy
Matrix View
The Matrix View of the Egress policy looks like a spreadsheet. It contains two axis:
• Source Axis—The vertical axis lists all the source SGTs.
• Destination Axis—The horizontal axis lists all the destination SGTs.
The mapping of a source SGT to a destination SGT is represented as a cell. If a cell contains data, then it
represents that there is a mapping between the corresponding source SGT and the destination SGT. There are
two types of cells in the matrix view:
• Mapped cells—When a source and destination pair of SGTs is related to a set of ordered SGACLs and
has a specified status.
• Unmapped cells—When a source and destination pair of SGTs is not related to any SGACLs and has no
specified status.
The Egress Policy cell displays the source SGT, the destination SGT, and the Final Catch All Rule as a single
list under SGACLs, separated by commas. The Final Catch All Rule is not displayed if it is set to None. An
empty cell in a matrix represents an unmapped cell.
In the Egress Policy matrix view, you can scroll across the matrix to view the required set of cells. The browser
does not load the entire matrix data at once. The browser requests the server for the data that falls in the area
you are scrolling in. This prevents memory overflow and performance issues.
You can use the following options in the View drop-down list to change the matrix view.
• Condensed with SGACL names—If you select this option, the empty cells are hidden and the SGACL
names are displayed in the cells.
• Condensed without SGACL names—The empty cells are hidden and the SGACL names are not displayed
in the cells. This view is useful when you want to see more matrix cells and differentiate between the
content of the cells using colors, patterns, and icons (cell status).
• Full with SGACL names—If you select this option, the left and upper menus are hidden and the SGACL
names are displayed in the cells.
• Full without SGACL names—When this option is selected, the matrix is displayed in full screen mode
and the SGACL names are not displayed in the cells.
ISE allows you to create, name, and save the custom views. To create custom views, choose Show > Create
Custom View. You can also update the view criteria or delete unused views.
The Matrix view has the same GUI elements as the Source and Destination views. However, it has these
additional elements:
Matrix Dimensions
The Dimension drop-down list in the Matrix view enables you to set the dimensions of the matrix.
Step 1 In the Matrix View page, select the Create Custom View option from the Show drop-down list.
Step 2 In the Edit View dialog box, enter the following details:
• View Name—Enter a name for the custom view.
• Source Security Groups—Move the SGTs that you want to include in the custom view to the Show transfer box.
• Show Relevant for Destination—Check this check box if you want to override your selection in the Source Security
Group Show transfer box and copy all the entries in the Destination Security Group Hide transfer box. If there are
more than 200 entries, the data will not be copied and a warning message will be displayed.
• Destination Security Groups—Move the SGTs that you want to include in the custom view to the Show transfer
box.
• Show Relevant for Source—Check this check box if you want to override your selection in the Destination Security
Group Show transfer box and copy all the entries in the Source Security Group Hide transfer box.
Matrix Operations
Step 1 Choose Work Centers > TrustSec > TrustSec Policy > Egress Policy.
Step 2 From the Source or Destination Tree View page, choose Configure > Create New Security Group ACL.
Step 3 Enter the required details and click Submit.
Step 1 Choose Work Centers > TrustSec > Settings > Work Process Settings.
Step 2 Select one of the following options:
• Single Matrix—Select this option if you want to create only one Policy matrix for all the devices in the TrustSec
network.
• Multiple Matrices—Allows you to create multiple policy matrices for different scenarios. You can use these matrices
to deploy different policies to different network devices.
Note The matrices are independent and each network device can be assigned to only one matrix.
• Production and Staging Matrices with Approval Process—Select this option if you want to enable the Workflow
mode. Select the users that are assigned to the editor and approver roles. You can select the users only from the
Policy Admin and Super Admin groups. A user cannot be assigned to both editor and approver roles.
Ensure that email addresses are configured for the users that are assigned to the editor and approver roles, otherwise
email notifications regarding the workflow process will not be sent to these users.
When the Workflow mode is enabled, a user that is assigned to the editor role can create a staging matrix, select the
devices on which he wants to deploy the staging policy, and submit the staging policy to the approver for approval.
The user that is assigned to the approver role can review the staging policy and approve or reject the request. The
staging policy can be deployed on the selected network devices only after the staging policy is reviewed and approved
by the approver.
Step 3 Check the Use DEFCONS check box if you want to create DEFCON matrices.
DEFCON matrices are standby policy matrices that can be easily deployed in the event of network security breaches.
You can create DEFCON matrices for the following severity levels: Critical, Severe, Substantial, and Moderate.
When a DEFCON matrix is activated, the corresponding DEFCON policy is immediately deployed on all the TrustSec
network devices. You can use the Deactivate option to remove the DEFCON policy from the network devices.
Note Matrices Listing page is not displayed when Single Matrix mode is enabled with DEFCON matrix option
disabled.
You can assign NADs to a matrix by using the Assign NADs option. To do this:
1. In the Assign Network Devices window, select the network devices that you want to assign to a matrix.
You can also use the filter option to select the network devices.
2. Select the matrix from the Matrix drop-down list. All the existing matrices and the default matrix are
listed in this drop-down list.
After assigning the devices to a matrix, click Push to notify the TrustSec configuration changes to the relevant
network devices.
Note the following points while working on the Matrices Listing page:
• You cannot edit, delete, or rename the default matrix.
• While creating a new matrix you can start with a blank matrix or copy the policy from an existing matrix.
• If you delete a matrix, the NADs that are assigned to that matrix are automatically moved to the default
matrix.
• When you copy an existing matrix, a copy of the matrix will be created but devices are not automatically
assigned to the copied matrix.
• In the Multiple Matrices mode, all the devices are assigned to the default matrix at the initial stage.
• In the Multiple Matrices mode, some of the SGACLs might be shared among the matrices. In such cases,
changing an SGACL content will affect all matrices that contain this SGACL in one of their cells.
• Multiple matrices cannot be enabled if staging is in progress.
• When you are moving from Multiple Matrices mode to Single Matrix mode, all the NADs are automatically
assigned to the default matrix.
• You cannot delete a DEFCON matrix if it is currently activated.
Super Admin user can select the users that are assigned to the editor and approver roles in the Workflow
Process Settings page. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec
> Settings > Workflow Process.
You cannot edit the SGTs and SGACLs after the staging policy is deployed on the selected devices, however,
you can edit the matrix cells. You can use the Configuration Delta report to track the difference between the
production matrix and the staging matrix. You can also click on the Delta icon on a cell to view the changes
made to that cell during the staging process.
The following table describes the different stages of the workflow:
Stage Description
Stage Description
Staging Awaiting Approval After editing the matrix, the editor submits the staging
matrix to the approver for review and approval.
While submitting the staging matrix for approval, the
editor can add the comments that will be included in
the email sent to the approver.
The approver can review the staging policy and
approve or reject the request. The approver can also
view the selected network devices and the
Configuration Delta report. While approving or
rejecting a request, the approver can add the comments
that will be included in the email sent to the editor.
The editor can cancel the approval request as long as
the staging policy is not deployed on any of the
network devices.
Deploy Approved When the approver approves the request, the staging
matrix is moved to Deploy Approved state. If the
request is rejected, the matrix is moved back to
Staging in Edit state.
The editor can deploy the staging policy on the
selected network devices only after the staging policy
is approved by the approver.
Stage Description
Fully Deployed The above process is repeated till the staging policy
is deployed on all the network devices. When the
staging matrix is deployed on all the network devices,
the approver can set the staging matrix as the
production matrix.
We recommend that you take a copy of the production
matrix before setting the staging matrix as the new
production matrix, because after replacing the
production matrix with the staging matrix, you cannot
rollback to the previous version of the production
matrix.
The options displayed in the Workflow drop-down list vary based on the workflow state and the user role
(editor or approver). The following table lists the menu options displayed for an editor and approver:
Workflow state Menu displayed for Editor Menu displayed for Approver
Workflow state Menu displayed for Editor Menu displayed for Approver
• View deltas
• View deltas
Workflow state Menu displayed for Editor Menu displayed for Approver
Workflow state Menu displayed for Editor Menu displayed for Approver
The workflow options are also available in the Source and Destination Tree view.
You can view the list of devices that downloaded the staging/production policy by using the TrustSec Policy
Download report (Work Centers > TrustSec > Reports). The TrustSec Policy Download lists the requests sent
by the network devices for policy (SGT/SGACL) download and the details sent by ISE. If the Workflow mode
is enabled, the requests can be filtered for production or staging matrix.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Egress
Policy.
Step 2 To select the matrix cells, do the following:
• In the matrix view, click a cell to select it.
• In the Source and Destination tree view, check the check box of a row in the internal table to select it.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Egress
Policy > Matrix > Export.
Step 2 Check the Include Empty Cells check box if you want to include the empty cells (which do not have any SGACL
configured) in the exported file.
When this option is enabled, the whole matrix is exported and the empty cells are marked with the "Empty" keyword in
the SGACL column.
Note Ensure that the exported file does not contain more than 500000 lines, otherwise the export may fail.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Egress
Policy > Matrix > Import.
Step 2 Click Generate a Template.
Step 3 Download the template (CSV file) from the Egress Policy page and enter the following information in the CSV file:
• Source SGT
• Destination SGT
• SGACL
• Monitor status (enabled, disabled, or monitored)
Step 4 Check the Overwrite Existing Data with New Data check box if you want to overwrite the existing policy with the one
that you are importing. If empty cells (cells that are marked with the "Empty" keyword in the SGACL column) are
included in the imported file, the existing policy in the corresponding matrix cells will be deleted.
While exporting the egress policy, if you want to include the empty cells, check the Include Empty Cells check box.
For more information, see Export Egress Policy, on page 1048.
Step 5 Click Validate File to validate the imported file. Cisco ISE validates the CSV structure, SGT names, SGACL, and file
size before importing the file.
Step 6 Check the Stop Import on First Error check box for Cisco ISE to cancel the import if it encounters any errors.
Step 7 Click Import.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Egress
Policy.
Step 2 From the Source or Destination Tree View page, choose Configure > Create New Security Group.
Step 3 Enter the required details and click Submit.
Monitor Mode
The Monitor All option in the egress policy allows you to change the entire egress policy configuration status
to monitor mode with a single click. Check the Monitor All check box in the egress policy page to change
the egress policy configuration status of all the cells to monitor mode. When you check the Monitor All check
box, the following changes take place in the configuration status:
• The cells whose status is Enabled will act as monitored but appears as if they are enabled.
• The cells whose status is Disable will not be affected.
• The cells whose status is Monitor will remain Monitored.
Uncheck the Monitor All check box to restore the original configuration status. It does not change the actual
status of the cell in the database. When you deselect Monitor All, each cell in the egress policy regains its
original configuration status.
Default Policy
Default Policy refers to the <ANY,ANY> cell. Any source SGT is mapped to any destination SGT. Here, the
ANY SGT cannot be modified and it is not listed in any source or destination SGTs. The ANY SGT can only
be paired with ANY SGT. It cannot be paired with any other SGTs. A TrustSec network device attaches the
default policy to the end of the specific cell policy.
• If a cell is empty, that means it contains the default policy alone.
• If a cell contains some policy, the resulting policy is a combination of the cell specific policy followed
by the default policy.
According to Cisco ISE, the cell policy and the default policy are two separate sets of SGACLs that the devices
get in response to two separate policy queries.
SGT Assignment
Cisco ISE allows you to assign an SGT to a TrustSec device if you know the device hostname or IP address.
When a device with the specific hostname or IP address joins the network, Cisco ISE will assign the SGT
before authenticating it.
The following SGTs are created by default:
• SGT_TrustSecDevices
• SGT_NetworkServices
• SGT_Employee
• SGT_Contractor
• SGT_Guest
• SGT_ProductionUser
• SGT_Developer
• SGT_Auditor
• SGT_PointofSale
• SGT_ProductionServers
• SGT_DevelopmentServers
• SGT_TestServers
• SGT_PCIServers
• SGT_BYOD
• SGT_Quarantine
Sometimes, devices need to be manually configured to map the security group tags to the endpoint. You can
create this mapping from the Security Group Mappings page. Before you perform this action, ensure that you
have reserved a range of SGTs.
ISE allows you to create up to 10,000 IP-to-SGT mappings. You can create IP-to-SGT mapping groups to
logically group such large scale mappings. Each group of IP-to-SGT mappings contains a list of IP addresses,
a single security group it would map to and a network device or network device group which is the deployment
target for those mappings.
NDAC Authorization
You can configure the TrustSec policy by assigning SGTs to devices. You can assign security groups to
devices based on TrustSec device ID attribute.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Network
Device Authorization.
Step 2 Click the Action icon on the right-hand side of the Default Rule row, and click Insert New Row Above.
Step 3 Enter the name for this rule.
Step 4 Click the plus sign (+) next to Conditions to add a policy condition.
Step 5 You can click Create New Condition (Advance Option) and create a new condition.
Step 6 From the Security Group drop-down list, select the SGT that you want to assign if this condition evaluates to true.
Step 7 Click the Action icon from this row to add additional rules based on device attributes either above or below the current
rule. You can repeat this process to create all the rules that you need for the TrustSec policy. You can drag and drop the
rules to reorder them by clicking the icon. You can also duplicate an existing condition, but ensure that you change
the policy name.
The first rule that evaluates to true determines the result of the evaluation. If none of the rules match, the default rule will
be applied; you can edit the default rule to specify the SGT that must be applied to the device if none of the rules match.
Note By default, the result of default Network Device Authorization policy is set to TrustSec_Devices.
• To perform the following task, you must be a Super Admin or System Admin.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Authorization Policy.
Step 2 Create a new authorization policy.
Step 3 Select a security group, for Permissions.
If the conditions specified in this authorization policy is true for a user or endpoint, then this security group will be
assigned to that user or endpoint and all data packets that are sent by this user or endpoint will be tagged with this particular
SGT.
When Cisco ISE is deployed in a distributed environment where there are several secondaries that interoperate
with different sets of devices, CoA requests are sent from Cisco ISE primary node to all the network devices.
Therefore, TrustSec network devices need to be configured with the Cisco ISE primary node as the CoA
client.
The devices return CoA NAK or ACK back to the Cisco ISE primary node. However, the following TrustSec
session coming from the network device would be sent to the Cisco ISE node to which the network devise
sends all it's other AAA requests and not necessarily to the primary node.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Network
Resources > Network Devices.
Step 2 Check the checkbox next to the required network device and click Edit.
Verify that the network device's name, IP address, RADIUS and TrustSec settings are properly configured.
Step 3 Scroll down to Advanced TrustSec Settings, and in the TrustSec Notifications and Updates section, check the Send
configuration changes to device checkbox, and click the CLI (SSH) radio button.
Step 4 (Optional) Provide an SSH key.
Step 5 Check the Include this device when deploying Security Group Tag Mapping Updates check box, for this SGA device
to obtain the IP-SGT mappings using device interface credentials.
Step 6 Enter the username and password of the user having privileges to edit the device configuration in the Exec mode.
Step 7 (Optional) Enter the password to enable Exec mode password for the device that would allow you to edit its configuration.
You can click Show to display the Exec mode password that is already configured for this device.
Step 8 Click Submit at the bottom of the page.
The network device is now configured to push Trustsec changes. After you change a Cisco ISE policy, click
Push to have the new configuration reflected on the network device.
for the network device with which you want the Cisco ISE to communicate securely.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Network
Resources > Network Devices, and verify the required network device's name, IP address, RADIUS and TrustSec
settings are properly configured.
b) Scroll down to Advanced TrustSec Settings, and in the TrustSec Notifications and Updates section, check the
Send configuration changes to device checkbox, and click the CLI (SSH) radio button.
c) In the SSH Key field, paste the SSH key retrieved previously from the network device.
d) Click Submit at the bottom of the page.
The network device is now communicating with the Cisco ISE using SSH key validation.
1. Cisco ISE sends an environment CoA notification to the TrustSec network device.
2. The device returns an environment data request.
3. In response to the environment data request, Cisco ISE returns:
The environment data of the device that sent the request—This includes the TrustSec device’s SGT (as
inferred from the NDAC policy) and download environment TTL.
The name and generation ID of the TrustSec AAA server list.
The names and generation IDs of (potentially multiple) SGT tables—These tables list SGT name versus
SGT value, and together these tables hold the full list of SGTs.
4. If the device does not hold a TrustSec AAA server list, or the generation ID is different from the generation
ID that is received, the device sends another request to get the AAA server list content.
5. If the device does not hold an SGT table listed in the response, or the generation ID is different from the
generation ID that is received, the device sends another request to get the content of that SGT table.
Step 1 Choose In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Device Administration > Network
Resources > Network Devices.
Step 2 Add or edit a network device.
Step 3 Update TrustSec Notifications and Updates parameters under the Advanced TrustSec Settings section.
Changing the environment attribute is notified only to the specific TrustSec network device where the change took place.
Because only a single device is impacted, an environmental CoA notification is sent immediately upon submission. The
result is a device update of its environment attribute.
Step 1 Work Centers > TrustSec > Components > Security Groups.
Step 2 In the Security Group page, change the name of an SGT, which will change the name of the mapping value of that SGT.
This triggers an environmental change.
Step 3 Click the Push button to initiate an environment CoA notification after changing the names of multiple SGTs. This
environment CoA notification goes to all TrustSec network devices and provides an update of all SGTs that were changed.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > TrustSec
AAA Servers.
Step 2 In the TrustSec AAA Servers page create, delete or update the configuration of a TrustSec AAA server. This triggers an
environment change.
Step 3 Click the Push button to initiate an environment CoA notification after you configure multiple TrustSec AAA servers.
This environment CoA notification goes to all TrustSec network devices and provides an update of all TrustSec AAA
servers that were changed.
Step 1 Choose Work Centers > TrustSec > Policy > Network Device Authorization.
In the NDAC policy page you can create, delete, or update rules of the NDAC policy. These environment changes are
notified to all network devices.
Step 2 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Network
Device Authorization.
In the NDAC policy page you can create, delete, or update rules of the NDAC policy. These environment changes are
notified to all network devices.
Step 3 You can initiate an environment CoA notification by clicking the Push button in the NDAC policy page. This environment
CoA notification goes to all TrustSec network devices and provides an update of network device own SGT.
1. Cisco ISE sends an update SGACL named list CoA notification to a TrustSec network device. The
notification contains the SGACL name and the generation ID.
2. The device may replay with an SGACL data request if both of the following terms are fulfilled:
If the SGACL is part of an egress cell that the device holds. The device holds a subset of the egress policy
data, which are the cells related to the SGTs of its neighboring devices and endpoints (egress policy
columns of selected destination SGTs).
The generation ID in the CoA notification is different from the generation ID that the device holds for
this SGACL.
3. In response to the SGACL data request, Cisco ISE returns the content of the SGACL (the ACE).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > Security
Group ACLs.
Step 2 Change the content of the SGACL. After you submit a SGACL, it promotes the generation ID of the SGACL.
Step 3 Click the Push button to initiate an Update SGACL Named List CoA notification after you change the content of multiple
SGACLs. This notification goes to all TrustSec network devices, and provides an update of that SGACL content on the
relevant devices.
Changing the name or the IP version of an SGACL does not change its generation ID; hence it does not require sending
an update SGACL named list CoA notification.
However, changing the name or IP version of an SGACL that is in use in the egress policy indicates a change in the cell
that contains that SGACL, and this changes the generation ID of the destination SGT of that cell.
1. Cisco ISE sends an update policies CoA notification to a TrustSec network device. The notification may
contain multiple SGACL names and their generation IDs, and multiple SGT values and their generation
IDs.
2. The device may replay with multiple SGACL data requests and/or multiple SGT data.
3. In response to each SGACL data request or SGT data request, Cisco ISE returns the relevant data.
1. Cisco ISE sends an updated SGT matrix CoA notification to a TrustSec network device. The notification
contains the SGT value and the generation ID.
2. The device may replay with an SGT data request if both the following terms are fulfilled:
If the SGT is the SGT of a neighboring device or endpoint, the device downloads and hold the cells related
to SGTs of neighboring devices and endpoints (a destination SGT).
The generation ID in the CoA notification is different from the generation ID that the device holds for
this SGT.
3. In response to the SGT data request, Cisco ISE returns the data of all egress cells, such as the source and
destination SGTs, the status of the cell, and an ordered list of the SGACL names configured in that cell.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > TrustSec Policy > Egress
Policy.
Step 2 On the Egress Policy page, change the content of a cell (status, SGACLs).
Step 3 After you submit the changes, it promotes the generation ID of the destination SGT of that cell.
Step 4 Click the Push button to initiate the Update SGT matrix CoA notification after you change the content of multiple egress
cells. This notification goes to all TrustSec network devices, and provides an update of cells content on the relevant
devices.
Network Device Changing the Upon successful Environment The specific network
environment TTL in Submit of TrustSec device
the TrustSec section network device
of the page
Egress Policy Any operation that Accumulative Update SGT matrix All TrustSec
changes the changes can be network devices
generation ID of an pushed by clicking
SGT the Push button on
the egress policy
page.
SXP uses TCP as its transport protocol to set up SXP connection between two separate network devices. Each
SXP connection has one peer designated as SXP speaker and the other peer as SXP listener. The peers can
also be configured in a bi-directional mode where each of them act as both speaker and listener. Connections
can be initiated by either peers, but mapping information is always propagated from a speaker to a listener.
Note Session bindings are always propagated on the default SXP domain.
The following table lists some of the common terms used in the SXP environment:
SXP Speaker The peer that sends the IP-SGT mappings over the
SXP connection.
SXP Listener The peer that receives the IP-SGT mappings over the
SXP connection.
To view the SXP peer devices that are added to Cisco ISE, choose Work centers > TrustSec > SXP > SXP
Devices.
Note We recommend that you run the SXP service on a standalone node.
Step 1 Choose Work Centers > TrustSec > SXP > SXP Devices.
Step 2 Click Add.
Step 3 Enter the device details:
• Click Upload from a CSV file to add the SXP devices using a CSV file. Browse and select the CSV file, and then
click Upload.
You can also download the CSV template file, fill in the details of the devices that you want to add, and upload the
CSV file.
• Click Add Single Device to add the device details manually for each SXP device.
Enter the name, IP address, SXP role (listener, speaker, or both), password type, SXP version, and connected PSNs
for the peer device. You must also specify the SXP domain to which the peer device is connected.
Step 4 (Optional) Click Advanced Settings and enter the following details:
• Minimum Acceptable Hold Timer—Specify the time, in seconds, a speaker will send keepalive messages for keeping
the connection alive. The valid range is from 1 to 65534.
• Keep Alive Timer—Used by a speaker to trigger the dispatch of keepalive messages during intervals when no other
information is exported via update messages. The valid range is from 0 to 64000.
You can assign a virtual network to an authorization profile. When an authentication request (Access-Request)
is accepted, Cisco ISE adds the SGT, virtual network, and VLAN details in the response (Access-Accept).
NADs must send the same SGT and virtual network in later requests like accounting-start or accounting-interim
as Cisco AV pairs as shown below:
• cisco-av-pair=cts:security-group-tag
• cisco-av-pair=cts:vn
Note From Cisco ISE 3.0 onwards, a network device can be part of more than one SXP domain.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > SXP > All SXP Mappings.
Step 2 Click Add SXP Domain Filter.
Step 3 Do the following:
• Enter the subnet details. The session mappings of the network devices with IP addresses from this subnet are sent
to the SXP domain (VPN) that is selected in the SXP Domain field.
• Select an SGT from the SGT drop-down list. The session mappings that are related to this SGT are sent to the SXP
domain that is selected in the SXP Domain field.
If you have specified both Subnet and SGT, the session mappings that match this filter are sent to the SXP domain
that you have selected in the SXP Domain field.
• Specify the virtual network in the VN field. The session mappings that are related to this virtual network are sent to
the SXP domain that is selected in the SXP Domain field.
• Select the SXP domain to which the mappings must be sent.
You can also update or delete the SXP domain filters. To update a filter, click Manage SXP Domain Filter,
check the check box next to the filter that you want to update, and then click Edit. To delete a filter, check
the check box next to the filter that you want to delete, and then click Trash > Selected.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Settings > SXP Settings.
Step 2 Check the following check boxes:
• Publish SXP Bindings on pxGrid
• Add Radius and PassiveID Mappings into SXP IP SGT Mapping Table
If you uncheck the Publish SXP Bindings on pxGrid check box, the IP-SGT mappings will not be published through
the pxGrid SXP topics.
Note • When the SXP settings are changed, the SXP service is restarted.
• You must update the SXP device configuration with the connected PSN details in case of upgrade, node
failure, or node configuration updates.
Note You can’t use read-only SGTs in IP-SGT mappings, mapping groups, and SXP local mappings.
When you add a Security Group, you can specify whether the SGT is sent to Cisco ACI by enabling the
Propagate to ACI option. When this option is enabled, the SXP mappings that are related to this SGT are
sent to Cisco ACI. But, only if the Policy Plane option is selected (in the Cisco ACI Settings page) and the
SXP device belongs to an SXP Domain, which you configure on the Cisco ACI Settings page.
Cisco ACI supports the packets that are sent from the TrustSec domain to the Cisco ACI domain by
synchronizing the SGTs, and creating correlating EEPGs. Cisco ACI creates subnets under EEPG based on
the SXP mappings from Cisco ISE. These subnets are not deleted from Cisco ACI, when the corresponding
SXP mappings are deleted in Cisco ISE.
When an IEPG is updated in Cisco ACI, the corresponding SGT configuration is updated in Cisco ISE. A
new EEPG is created in Cisco ACI, when an SGT is added in Cisco ISE. When an SGT is deleted, the
corresponding EEPG is deleted in Cisco ACI. When an endpoint is updated in Cisco ACI, the corresponding
SXP mapping is updated in Cisco ISE.
If the connection with the Cisco ACI server is lost, Cisco ISE re-synchronizes the data again when the
connection is reestablished.
Note You must enable the SXP service to use the Cisco ACI integration feature.
You can view all the bindings sent to Cisco ACI from Cisco ISE and vice versa in the All ACI Mappings
window. To view this window, click the Menu icon ( ) and choose Work Centers > TrustSec > ACI.
When the binding is learned from the Cisco ACI, the Learned By column displays ACI and the PSNs involved
column is empty. Whereas when the binding is sent to Cisco ACI from Cisco ISE, the Learned By column
displays the type of binding such as static, SXP or session and the PSNs involved column displays the FQDN
of the PSNs involved. Tenant information is also displayed for the bindings that are sent to ACI in the VN
column (in tenant:VN format).
To successfully integrate Cisco ISE and Cisco ACI, the signed certificate should have proper SAN fields.
Cisco ISE will use values specified in the SAN extension property of the certificate presented by the APIC
server.
Note Only IPv4-SXP bindings with Cisco ACI are currently supported by Cisco ISE. IPv6-SGT bindings from
Cisco ACI are not supported.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates > Import.
Step 2 Import the Cisco ACI certificate.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > TrustSec > Settings > ACI Settings.
Step 4 Check the Enable ACI Integration check box to learn endpoints from Cisco ACI and propagate them using SXP.
Step 5 Select one of the following options:
• Data Plane / Hardware Integration
• Policy Plane / API Integration
Note If you choose Data Plane / Hardware Integration, Cisco ISE must be integrated with Catalyst Center. If
you choose Policy Plane / API Integration, SXP propagation is not possible without active SXP service.
Activate SXP service in the Deployment window before selecting this option.
Step 6 Enter the following details if you select Data Plane / Hardware Integration:
• IP address: Enter the IP address or hostname of the Cisco ACI server. You can enter three IP addresses or host
names separated by commas.
• Username: Enter the username of the Cisco ACI admin user.
• Password: Enter the password of the Cisco ACI admin user.
• Tenant name: Enter the name of the tenant that is configured on the Cisco ACI.
• Test Connection to ACI: Click this button to check the connectivity with the Cisco ACI server.
• Renew Certificate: Click this button to perform a domain manager refresh.
A certificate is typically valid for 10 years. Successful peering should be available in the system before renewing
the certificate. The Cisco ISE application has to be restarted from the CLI of all the nodes in the deployment after
renewing the certificate. The approximate time to renew the certificate is five minutes.
• New SGT Suffix: This suffix will be added to the SGTs that are newly created based on the EPGs learnt from Cisco
ACI.
Note The EPG name will be truncated if it is greater than 32 characters. However, you can view the full name of
the EPG, application profile name, and SGT suffix details in the Description field in the Security Groups
listing page.
• New EPG Suffix: This suffix will be added to the EPGs that are newly created in Cisco ACI based on the SGTs
learnt from Cisco ISE.
• Enable Data Plane: Check this check box to download the translation table for the border routers. If you enable
the check box, you must select the default SGT name for the packets that cannot be matched to any other existing
SGT.
• Default SGT name: Choose the default name for the SGT from the drop-down list.
• Enable Elements Limit: This option is available only if you enable the data plane.
• Max number of IEPGs: Specify the maximum number of IEPGs that will be converted to SGTs. IEPGs are
converted in alphabetical order. Default value is 1000.
• Max number of SGTs: Specify the maximum number of SGTs that will be converted to IEPGs. SGTs are
converted in alphabetical order. Default value is 500.
Step 7 Enter the following details if you have selected the Policy Plane / API Integration option:
• IP address / Hostname: Enter the IP address or hostname of the Cisco ACI server. You can enter three IP addresses
or host names separated by commas.
• Admin name: Enter the username of the Cisco ACI admin user.
• Admin password: Enter the password of the Cisco ACI admin user.
• Tenant name: Enter the name of the tenant that is configured on the Cisco ACI.
• L3 Route network name: Enter the name of the Layer 3 Route network that is configured on the Cisco ACI for
synchronizing the policy elements.
• Test Settings: Click this button to check the connectivity with the Cisco ACI server.
• New SGT Suffix: This suffix will be added to the SGTs that are newly created based on the EPGs learnt from Cisco
ACI.
• New EPG Suffix: This suffix will be added to the EPGs that are newly created in Cisco ACI based on the SGTs
learnt from Cisco ISE.
• In the SXP Propagation area, you can select all the SXP domains or specify the SXP domains that will share the
mappings with Cisco ACI.
• Enable Data Plane: Check this check box to download the translation table for the border routers. If you enable
the check box, you must select the default SGT name for the packets that cannot be matched to any other existing
SGT.
• EEPG name for untagged packets: Cisco TrustSec packets that are not converted to an EEPG are tagged with
this name in Cisco ACI.
• Default SGT name: Choose the default name for the SGT from the drop-down list.
• Enable Elements Limit: This option is available only if you enable the data plane.
Cisco ISE learns the virtual network information from RADIUS bindings or Cisco ACI bindings, and provides
a local static mapping for a specific virtual network. A virtual network can be used to enhance the SXP filter
logic that is leveraged to coordinate the sharing of IP-SGT bindings with Cisco ACI. Note that the SXP
domains and virtual networks are closely linked, in the sense that the virtual networks that are extended to
Cisco ACI are the only constructs to share IP-SGT bindings with Cisco ACI. Therefore, specific SXP domains
(denoted with the SD-Access- prefix) are mapped to the equivalent virtual network (SXP domain minus the
SD-Access- prefix) in Cisco ISE.
In order to allow the Cisco SD-Access border node to know about the Cisco ACI bindings, the Cisco ACI
bindings are replicated as if they were originated from all the extended virtual networks before they are sent
through the SXP filter logic. For example, a binding from Cisco ACI with the original Cisco ACI virtual
network is sent through the SXP filter four times, if Cisco SD-Access virtual network 1, virtual network 2
and virtual network 3 are extended to Cisco ACI. This exact same binding goes through the filter for all the
four virtual networks. The filters can be modified and customized as per specific deployment requirements.
However, the replication will always happen for all extended virtual networks.
Cisco ISE learns about the IP-SGT, EPG bindings from Cisco ACI whenever possible. However, Cisco ISE
cannot force Cisco ACI to learn about any bindings. Cisco ACI has to explicitly request for the bindings from
Cisco ISE.
The following table lists the source and destination combinations that are possible for IP-SGT or IP-EPG
bindings in Cisco ISE.
Cisco ISE static SXP Cisco SD-Access SXP domain The static bindings
mapping virtual network or can be sent to the
existing SXP SXP domain either
domain directly (specify
SXP domain in
static mapping) or
through the SXP
filter (along with the
virtual network
information). If no
virtual network is
specified, then the
SXP filter uses the
DEFAULT_VN for
the virtual network.
Cisco ISE static pxGrid Cisco SD-Access SXP domain The static bindings
mapping virtual network can be sent to the
SXP domain either
directly (specify
SXP domain in
static mapping) or
through the SXP
filter (along with the
virtual network
information). If no
virtual network is
specified, then the
SXP filter uses the
DEFAULT_VN for
the virtual network.
Cisco ISE static Cisco ACI Cisco SD-Access Cisco SD-Access The Cisco
mapping virtual network virtual network SD-Access virtual
network must be
extended into Cisco
ACI
(mdpExtendvirtual
networkReq) and the
binding uses the
virtual network in
the SXP filter to
send the binding to
Cisco ACI, with the
SXP domain
mapped to a virtual
network.
SXP pxGrid SXP domain SXP domain The SXP domain
shows up as a VPN
in the SXP topic on
pxGrid.
SXP Cisco ACI SXP domain Cisco SD-Access SXP domain sharing
virtual network is selected under
Cisco ACI settings.
Only the SXP
Domain which is
auto-created by the
Cisco SD-Access
virtual network
(virtual network
equivalent SXP
Domain), is shared.
The Cisco
SD-Access virtual
network should be
extended to Cisco
ACI for the virtual
network to have a
chance of sharing
the bindings.
The bindings must
be a part of the
consumer service for
which Cisco ACI
requests endpoint
data.
To promote cross-domain support, you must have the ability to exchange and filter the various network
forwarding domains, for example, IP address, subnet mask, Security Group Tag, EPGs, virtual networks,
Virtual Routing and Forwarding(VRF), from one policy domain, or a forwarding domain within a policy
domain, to another and vice versa. This is especially important when a policy domain, for example Cisco
SD-Access, Cisco ACI, SD-WAN, CPC, and Meraki, has multiple forwarding domains.
You can identify, capture, and store the policy domain’s network-specific forwarding domain and the
domain-specific attributes for all the sessions and bindings learned from other policy domains. These will be
used by the policy administrator to filter the sessions and bindings into specific SXP domains. In addition, it
enables the administrator to create policies that map or filter only certain bindings from one forwarding domain
to another.
From Cisco ISE 3.0 onwards, with every virtual network learnt by the Cisco ISE from Catalyst Center, you
will find an automatically created SXP filter and an SXP domain in the SXP Devices window. To view this
window, click the Menu icon ( ) and choose Work Centers > TrustSec > SXP > SXP Devices. These
SXP domains will, in turn, be used to set the virtual networks in the bindings shared with Cisco ACI.
You can add and edit virtual networks to IP-SGT static mappings in the IP-SGT Static mapping window. To
view this window, click the Menu icon ( ) and choose Work Centers > TrustSec > Components > IP
SGT Static Mapping. Click Add to add a new mapping, or click Edit to modify an existing mapping.
You can also include virtual networks in the SXP domain filter to specify which SXP domain to send the
mapping to when the mapping received by Cisco ISE is mapped to a particular virtual network. To view this
window, click the Menu icon ( ) and choose Work Centers > TrustSec > SXP > SXP Devices > SXP
mappings and click Add SXP Domain Filter. The bindings learned by Cisco ACI have the original Cisco
ACI virtual network, and these are sent to the SXP domain configured in the filter. This filter also influences
how a binding is sent to the Cisco ACI.
Configure Cisco ISE for Cisco ACI and Cisco SD-Access Integration
This task helps you to configure Cisco ISE to support Cisco ACI and Cisco SD-Access Integration.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 From the nodes list, check the check box next to the node for which you want to enable the SXP and pxGrid services.
Step 3 Scroll down to the Policy Service section and enable the pxGrid and SXP services as shown in the following figure.
If you have more than one interface enabled on Cisco ISE, in the Enable SXP Service area, specify which interface
will hold the SXP connection.
Step 7 Download the APIC certificates from the APIC controller browser. Click the lock icon in the address bar of the browser
to view the certificate and download it as a PEM file.
Step 8 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Certificates > Trusted
Certificates.
Step 9 Import the downloaded APIC certificate file in the Trusted Certificates window.
Step 10 In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centres > TrustSec > Settings > ACI Settings.
Step 11 Configure the ACI settings as required. For more information, see Configure ACI Settings, on page 1066.
The logs can be downloaded from the Dowload Logs window. (To view this window, click the Menu icon
( ) and choose Operations > Troubleshoot > Dowload Logs.) You can choose to download either a support
bundle from the Support Bundle tab or download specific debug logs from the Debug Logs tab.
In addtion, the TrustSec Dashboard, on page 1016 is enhanced with the information learnt from the Cisco ACI
integration, which is useful for troubleshooting Cisco ACI-related issues.
After the Catalyst Center sends out the domain advertisement, confirm whether the APIC certificates are
obtained from the APIC domain manager or not, in the both the Trusted Certificates window and the System
Certificates window of Cisco ISE.
Figure 57: Verify the Certificate in System Certificates window
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > TrustSec.
Step 2 Click Top N RBACL Drops by User.
Step 3 From the Filters drop-down menu, add the required monitor modes.
Step 4 Enter the values for the selected parameters accordingly. You can specify the mode from the Enforcement mode drop-down
list as Enforce, Monitor, or Both.
Step 5 From the Time Range drop-down menu, choose a time period over which the report data will be collected.
Step 6 Click Run to run the report for a specific period, along with the selected parameters.
Posture Types
The following posture agents monitor and enforce Cisco ISE posture policies:
• AnyConnect: Deploys the AnyConnect agent to monitor and enforce Cisco ISE posture policies that
require interaction with the client. The AnyConnect agent stays on the client. For more information about
using AnyConnect in Cisco ISE, see Cisco AnyConnect Secure Mobility, on page 1172.
• AnyConnect Stealth: Runs posture as a service, with no user interface. The agent stays on the client.
When you choose the AnyConnect Stealth posture type in the posture requirement, some of the conditions,
remediations, or attributes in a condition are disabled (grayed out). For example, when you enable
AnyConnect Stealth requirement, the Manual Remediation Type is disabled (grayed out) because this
action requires client-side interaction.
When you map the posture profile to the AnyConnect configuration, and then map the AnyConnect
configuration to the Client Provisioning window for AnyConnect Stealth mode deployment:
• AnyConnect can read the posture profile and set it to the intended mode.
• AnyConnect can send information related to the selected mode to Cisco ISE during the initial posture
request.
• Cisco ISE can match the right policy, based on the mode and other factors, such as identity group,
OS, and compliance module.
Note AnyConnect Stealth mode requires AnyConnect version 4.4 and later.
For more information about configuring AnyConnect Stealth in Cisco ISE, see Configure AnyConnect
Stealth Mode Workflow, on page 1143.
• Temporal Agent: When a client attempts to access the trusted network, Cisco ISE opens the Client
Provisioning portal. The portal instructs the user to download and install the agent, and run the agent.
The temporal agent checks the compliance status, and sends the status to Cisco ISE. Cisco ISE acts based
on the results. The temporal agent removes itself from the client after compliance processing completes.
The temporal agent does not support custom remediation. The default remediation supports only message
text.
The Temporal Agent does not support the following conditions:
• Service Condition MAC—System Daemon check
• Service Condition-MAC—Daemon or User Agent check
• PM—Up To Date check
• PM—Enabled check
• DE—Encryption check
• Configure posture policies using the Posture Types Temporal Agent and Compliance Module
4.x or later. Do not configure the compliance module as 3.x or earlier or Any Version.
• For the Temporal Agent, you can only view Patch Management conditions containing the Installation
check type in the Requirements window.
• Cisco ISE does not support VLAN-controlled posture with the Temporal Agent for macOS. When
you change the network access from an existing VLAN to a new VLAN, the user’s IP address is
released before the VLAN change. The client gets a new IP address by DHCP when the user connects
to the new VLAN. Recognizing the new IP address requires root privileges, but the Temporal Agent
runs as a user process.
• Cisco ISE supports ACL-controlled posture environment, which does not require the refreshing of
endpoint IP addresses.
• For more information about configuring the Temporal agent in Cisco ISE, see Configure Cisco
Temporal Agent Workflow, on page 1147.
• AMP Enabler—The AMP Enabler pushes the AMP for Endpoints software to a subset of endpoints
from a server hosted locally within the enterprise, and installs AMP services to its existing user base.
• Agentless Posture—Agentless posture provides posture information from clients, and completely removes
itself when finished. No action is required from the end user. Unlike the Temporal agent, Agentless
Posture connects to the client as an administrative user. For more information about using Agentless
Posture in Cisco ISE, see Agentless Posture, on page 1082.
You can select the posture type in the Client Provisioning window (Policy > Policy Elements > Results >
Client Provisioning > Resources) and the Posture Requirements window (Policy > Policy Elements >
Results > Posture > Requirements). The best practice is to provision the posture profile in the Client
Provisioning window.
Related Topics
Configure AnyConnect Stealth Mode Workflow, on page 1143
Configure Cisco Temporal Agent Workflow, on page 1147
Agentless Posture
Agentless posture provides posture information from clients, and completely removes itself when finished,
until invoked by Cisco ISE again. No action is required from the end user.
The agentless posture package is available as part of the default Cisco ISE client provisioning resources. You
can select this package while creating an agent configuration to be used for the client provisioning policy.
Prerequisites:
• The client must be reachable through its IPv4 address, and that IP address must be available in RADIUS
accounting. IPv6 is not supported.
• Windows and Mac clients are currently supported:
• For Windows clients, port 5985 to access powershell on the client must be open. Powershell must
be v5.1 or later. The client must have cURL v7.34 or later.
• For MacOS clients, port 22 to access SSH must be open to access the client. The client must have
cURL v7.34 or later.
• Client credentials for shell login must have local admin privileges.
• Run the posture feed update to get the latest clients, as described in the configuration steps.
• Ensure that the following entry is updated in the sudoers file to avoid certificate installation failure on
the endpoints:
<macadminusername> ALL = (ALL) NOPASSWD: /usr/bin/security, /usr/bin/osascript
• For MacOS, the user account that is configured must be an administrator's account. Agentless posture
for MacOS does not work with any other account type, even if you grant more privileges. To view this
window, click the Menu icon ( ) and choose Administration > System > Settings > Endpoint
Scripts > Login Configuration > MAC Local User.
• In case of changes in port-related activities in Windows clients due to updates from Microsoft, you might
have to reconfigure the agentless posture configuration workflow for Windows clients.
Note If dual stack protocol is used for authentication in the agentless posture flow, the NADs must also use the
same protocol.
2. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Posture > Posture Policy,
and create one or more supported Posture Policy rules that use Agentless posture for that Posture
Requirement. You can duplicate the rules you plan to use, and change the Posture type to Agentless.
3. In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results >
Authoriation > Authorization Profiles and create an Authorization Profile that evaluates the results
from Agentless Posture.
4. In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Client Provisioning and add a
Client Provisioning policy. For the Cisco Agent Configuration, choose the Agentless plug-in for the
Operating System that you configured. For Windows, the plug-in is CiscoAgentlessWindows 4.9.01095.
For MacOS, the plug-in is CiscoAgentlessOSX 4.9.01095. Select the posture condition this rule checks
for. Note, if you’re using Active Directory, you can use Active Directory groups in your policy.
Note Agentless posture configuration for MACOSX 10.14 and 10.15 versions aren’t available until you update the
posture feed. Before you can run the posture feed, update the posture feed URL. In the Cisco ISE GUI, click
the Menu icon ( ) and choose Work Centers > Posture > Settings > Software Updates > Posture Updates.
In the Posture Updates window, enter the url (https://www.cisco.com/web/secure/spa/posture-update.xml)
in the Update Feed URL field and click Update Now.
5. In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets and expand Authorization
Policy. Enable and configure the following three Authorization policies:
• Unknown_Compliance_Redirect: Configure conditions Network_Access_Authentication_Passed
AND Compliance_Unknown_Devices with result Agentless Posture.
• NonCompliant_Devices_Redirect: Configure conditions Network_Access_Authentication_Passed
and Non_Compliant_Devices with result DenyAccess.
• Compliant_Devices_Access: Configure conditions Network_Access_Authentication_Passed and
Compliant_Devices with result PermitAccess.
6. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Settings > Endpoint
Scripts > Endpoint Login Configuration , and configure the client credentials to log onto clients. These
same credentials are used by the Endpoint Scripts.
7. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Settings > Endpoint
Scripts > Settings, and configure Max retry attempts for OS identification and Delay between retries
for OS identification. These settings determine how quickly connectivity issues can be confirmed. For
example, an error that the PowerShell port is not open displays in logs only after all retries are not exhausted.
8. In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings >
Posture > General Settings, and configure the Agentless Posture settings.
9. As clients connect with Agentless posture, you can see them in the Live Logs.
• Posture
• In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostics
> General Tools
Note The agentless posture script cannot verify itself, but the script verifies the data received from Cisco ISE after
it is executed.
• In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostics
> General Tools > Agentless Posture Troubleshooting.
The Agentless Posture Troubleshooting tool collects Agentless Posture activity for a specified client. Agentless
Posture Flow initiates posture and displays all the interactions between a currently active client and Cisco
ISE. Only Download Client Logs creates logs with up to 24 hours of posture flows from the client. The client
can delete the logs at any time. After collection is completed, you can export a ZIP file of the logs.
Reports
In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > Reports > Endpoints
and Users > Agentless Posture to view all the endpoints that ran Agentless posture.
use this link to define network usage information for your enterprise network that end users accept before
they can gain access to your network.
The following table describes the fields in the Client Posture Requirements window.
Compliance From the Compliance Module drop-down list, choose the required compliance module:
Module
• 4.x or Later: Supports antimalware, disk encryption, patch management, and USB
conditions.
• 3.x or Earlier: Supports antivirus, antispyware, disk encryption, and patch
management conditions.
• Any Version: Supports file, service, registry, application, and compound
conditions.
For more information about compliance module, see Compliance Module, on page
1101.
Posture Type From the Posture Type drop-down list, choose the required posture type.
• AnyConnect: Deploys the AnyConnect agent to monitor and enforce Cisco ISE
policies that require client interaction.
• AnyConnect Stealth: Deploys the AnyConnect agent to monitor and enforce Cisco
ISE posture policies without any client interaction.
• Temporal Agent: A temporary executable file that is run on the client to check
the compliance status.
Related Topics
Configure Acceptable Use Policies for Posture Assessment, on page 1096
Create Client Posture Requirements, on page 1139
agent sends a report to the posture run-time services after which the clients are moved to the noncompliance
state.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
General Settings.
Step 2 In the Remediation Timer field, enter a time value in minutes.
The default value is 4 minutes. The valid range is 1–300 minutes.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
General Settings.
Step 2 Enter a time value in seconds, in the Network Transition Delay field.
The default value is 3 seconds. The valid range is 2 to 30 seconds.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
General Settings.
Step 2 Check the Automatically Close Login Success Screen After check box.
Step 3 Enter a time value in seconds, in the field next to Automatically Close Login Success Screen After check box.
The valid range is 0 to 300 seconds. If the time is set to zero, then AnyConnect does not display the login success screen.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
General Settings.
Step 2 From the Default Posture Status drop-down list, choose the option as Compliant or Noncompliant.
Step 3 Click Save.
Posture Lease
You can configure Cisco ISE to perform posture assessment every time a user logs into your network or
perform posture assessment in specified intervals. The valid range is from 1 to 365 days.
This configuration applies only for those who use AnyConnect agent for posture assessment.
When the posture lease is active, Cisco ISE will use the last known posture state and will not reach out to the
endpoint to check for compliance. But when the posture lease expires, Cisco ISE does not automatically trigger
a re-authentication or a posture reassessment for the endpoint. The endpoint will stay in the same compliance
state since the same session is being used. When the endpoint re-authenticates, posture will be run and the
posture lease time will be reset.
Example Use Case Scenario:
• The user logs on to the endpoint and gets it posture compliant with the posture lease set to one day.
• Four hours later the user logs off from the endpoint (the posture lease now has 20 hours left).
• One hour later the user logs on again. Now the posture lease has 19 hours left. The last know posture
state was compliant. Hence the user is provided access without posture being run on the endpoint.
• Four hours later the user logs off (the posture lease now has 15 hours left).
• 14 hours later, the user logs on. The posture lease has one hour left. The last known posture state was
compliant. The user is provided access without posture being run on the endpoint.
• One hour later, the posture lease expires. The user is still connected to the network as the same user
session is being used.
• One hour later, user logs off (the session is tied to the user but not to the machine, so the machine can
stay on the network).
• One hour later the user logs on. Since the posture lease has expired and a new user session is launched,
the machine performs a posture assessment, the results are sent to the Cisco ISE and the posture lease
timer is reset to one day in case of this use case.
Periodic Reassessments
Periodic reassessment (PRA) can be done only for clients that are already successfully postured for compliance.
PRA cannot occur if clients are not compliant on your network.
A PRA is valid and applicable only if the endpoints are in a compliant state. The policy service node checks
the relevant policies, and compiles the requirements depending on the client role that is defined in the
configuration to enforce a PRA. If a PRA configuration match is found, the policy service node responds to
the client agent with the PRA attributes that are defined in the PRA configuration for the client before issuing
a CoA request. The client agent periodically sends the PRA requests based on the interval specified in the
configuration. The client remains in the compliant state if the PRA succeeds, or the action configured in the
PRA configuration is to continue. If the client fails to meet PRA, then the client is moved from the compliant
state to the noncompliant state.
The PostureStatus attribute shows the current posture status as compliant in a PRA request instead of unknown
even though it is a posture reassessment request. The PostureStatus is updated in the Monitoring reports as
well.
When the posture lease has not expired, an endpoint becomes compliant based on the Access Control List
(ACL), and PRA is initiated. If PRA fails, the endpoint is deemed noncompliant and the posture lease is reset.
Note PRA is not supported during PSN failover. After PSN failover, you must either enable rescan on the client or
enable posture lease.
• Delete the existing PRA configuration with a user identity group “Any”.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
Reassessments.
Step 2 Click Add.
Step 3 Modify the values in the New Reassessment Configuration window to create a new PRA.
Step 4 Click Submit to create a PRA configuration.
MAC Address Enter the MAC address to filter on, using format: xx-xx-xx-xx-xx-xx
Failure Reason Enter the failure reason or click Select to choose a failure reason from a list. Click
Clear to clear the failure reason.
Time Range Select a time range. The RADIUS authentication records that are created during this
time range are used.
Start Date-Time: (Available only when you choose Custom Time Range) Enter the start date and time,
or click the calendar icon to select the start date and time. The date should be in the
mm/dd/yyyy format and time in the hh:mm format.
End Date-Time: (Available only when you choose Custom Time Range) Enter the end date and time,
or click the calendar icon to select the start date and time. The date should be in the
mm/dd/yyyy format and time in the hh:mm format.
Fetch Number of Select the number of records to display: 10, 20, 50, 100, 200, 500
Records
Search Result
Related Topics
Posture Troubleshooting Tool, on page 1149
Posture Lease
• Perform posture assessment every time a user connects to the network: Select this option to initiate
posture assessment every time the user connects to network
• Perform posture assessment every n days: Select this option to initiate posture assessment after the
specified number of days, even if the client is already postured Compliant.
• Cache Last Known Posture Compliant Status: Check this check box for Cisco ISE to cache the result
of posture assessment. By default, this field is disabled.
• Last Known Posture Compliant Status: This setting only applies if you have checked Cache Last
Known Posture Compliant Status. Cisco ISE caches the result of posture assessment for the amount
of time specified in this field. Valid values are from 1 to 30 days, or from 1 to 720 hours, or from 1 to
43200 minutes.
Related Topics
Posture Administration Settings, on page 1085
Posture Lease, on page 1089
Set Remediation Timer for Clients to Remediate Within Specified Time, on page 1087
Set Network Transition Delay Timer for Clients to Transition, on page 1088
Set Login Success Window to Close Automatically, on page 1088
Set Posture Status for Nonagent Devices, on page 1089
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
Updates.
Step 2 Choose the Web option to download updates dynamically.
Step 3 Click Set to Default to set the Cisco default value for the Update Feed URL field.
If your network restricts URL-redirection functions (via a proxy server, for example) and you are experiencing difficulty
accessing the above URL, try also pointing your Cisco ISE to the alternative URL in the related topics.
For more information on adding the downloaded installation packages to Cisco ISE, see the "Add Client
Provisioning Resources from a Local Machine" section in the Cisco Identity Services Engine Administrator
Guide.
You can update the checks, operating system information, and antivirus and antispyware support charts for
Windows and Mac operating systems offline from an archive in your local system, using posture updates.
For offline updates, ensure that the versions of the archive files match the versions in the configuration file.
Use offline posture updates after you configure Cisco ISE and want to enable dynamic updates for the posture
policy service.
To download offline posture updates:
Step 1 Go to https://www.cisco.com/web/secure/spa/posture-offline.html.
Step 2 Save the posture-offline.zip file to your local system. This file is used to update the operating system information, checks,
rules, and antivirus and antispyware support charts for Windows and Mac operating systems.
Step 3 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture.
Step 4 Click the arrow to view the settings for posture.
Step 5 Click Updates.
The Posture Updates window is displayed.
Step 6 Click the Offline option.
Step 7 Click Browse to locate the archive file (posture-offline.zip) from the local folder in your system.
Note The File to Update field is a mandatory field. You can select only one archive file (.zip) containing the appropriate
files. Archive files other than .zip, such as .tar, and .gz are not supported.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
Updates.
Step 2 In the Posture Updates window, check the Automatically check for updates starting from initial delay check box.
Step 3 Enter the initial delay time in hh:mm:ss format.
Cisco ISE starts checking for updates after the initial delay time is over.
Configuration Name Enter the name of the AUP configuration that you want to create.
Configuration Enter the description of the AUP configuration that you want to create.
Description
Show AUP to Agent When selected, the link to network usage terms and conditions for your network is displayed to users
users (for Windows upon successful authentication and posture assessment.
only)
Use URL for AUP When selected, you must enter the URL to the AUP message in the AUP URL field.
message
Use file for AUP When selected, you must browse to the location and upload a file in a zipped format. The file must contain
message the index.html at the top level.
The .zip file can include other files and subdirectories in addition to the index.html file. These files can
reference each other using HTML tags.
AUP URL Enter the URL to the AUP, which users must access upon successful authentication and posture assessment.
AUP File Browse to the file and upload it to the Cisco ISE server. It should be a zipped file and should contain the
index.html file at the top level.
Select User Identity Choose a unique user identity group or a unique combination of user identity groups for your AUP
Groups configuration.
Note the following while creating an AUP configuration:
• Posture AUP is not applicable for a guest flow
• No two configurations have any user identity group in common
• If you want to create a AUP configuration with a user identity group “Any”, then delete all other
AUP configurations first
• If you create a AUP configuration with a user identity group “Any”, then you cannot create other
AUP configurations with a unique user identity group or user identity groups. To create an AUP
configuration with a user identity group other than Any, either delete an existing AUP configuration
with a user identity group “Any” first, or update an existing AUP configuration with a user identity
group “Any” with a unique user identity group or user identity groups.
Acceptable use policy Lists existing AUP configurations and end user identity groups associated with AUP configurations.
configurations—Configurations
list
Related Topics
Configure Acceptable Use Policies for Posture Assessment, on page 1096
Each Acceptable Use Policy configuration must have a unique user identity group, or a unique combination
of user identity groups. Cisco ISE finds the AUP for the first matched user identity group, and then it
communicates to the client agent that displays the AUP.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Posture >
Acceptable Use Policy.
Step 2 Click Add.
Step 3 Modify the values in the New Acceptable Use Policy Configuration window.
Step 4 Click Submit.
Posture Conditions
A posture condition can be any one of the following simple conditions: a file, a registry, an application, a
service, or a dictionary condition. One or more conditions from these simple conditions form a compound
condition, which can be associated to a posture requirement.
When you deploy Cisco ISE on your network for the first time, you can download posture updates from the
web. This process is called the initial posture update.
After an initial posture update, Cisco ISE also creates Cisco defined simple and compound conditions. Cisco
defined simple conditions have pc_ as their prefixes and compound conditions have pr_ as their prefixes.
You can also configure Cisco ISE to download the Cisco-defined conditions periodically as a result of dynamic
posture updates through the web. You cannot delete or edit Cisco defined posture conditions.
A user defined condition or a Cisco defined condition includes both simple conditions and compound conditions.
Note If a process is installed and running, user is compliant. However, the Application
condition works in reverse logic; If an application is not installed and not running,
the end user is complaint. If an application is installed and running, the end user
is non-complaint.
• Service Conditions: A condition that checks if a service is running or not running on the client.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture.
Step 2 Choose any one of the following: File, Registry, Application, Service, or Dictionary Simple Condition.
Step 3 Click Add.
Step 4 Enter the appropriate values in the fields.
Step 5 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture >
Compound Conditions > Add.
Step 2 Enter appropriate values for the fields.
Name Enter the name of the dictionary compound condition that you want to create.
Description Enter the description of the dictionary compound condition that you want to create.
Select Existing Define an expression by selecting pre-defined conditions from the policy elements
Condition from library or add ad-hoc attribute/value pairs to your expression in the subsequent steps.
Library
Condition Name Choose dictionary simple conditions that you have already created from the policy
elements library.
Expression The Expression is updated based on your selection from the Condition Name drop-down
list.
Cisco ISE will process each OR condition in a compound condition sequentially. For
example, if a compound condition checks for A OR B, Cisco ISE first checks A and
then B. If either condition A or B is passed, the overall result is marked as passed.
If condition A fails and condition B succeeds, then the overall result is marked as
passed. In this case, condition A is marked as failed and condition B as passed in the
posture reports.
If condition A succeeds, Cisco ISE skips condition B and marks the overall result as
passed. In the posture reports, condition A is marked as passed, condition B as skipped,
and the overall result as passed.
Condition Name Choose a dictionary simple condition that you have already created.
Expression From the Expression drop-down list, you can create a dictionary simple condition.
Value Enter a value that you want to associate to the dictionary attribute, or choose a value
from the drop-down list.
Related Topics
Compound Posture Conditions, on page 1098
Create Compound Posture Conditions, on page 1098
Note Some of the Anti-Malware endpoint security solutions (such as FireEye, Cisco AMP, Sophos, and so on)
require network access to their respective centralized service for functioning. For such products, AnyConnect
ISE posture module (or OESIS library) expects the endpoints to have internet connectivity. It is recommended
that internet access is allowed for such endpoints during pre-posture for these online agents (if offline detection
is not enabled). Signature Definition condition might not be applicable in such cases.
Compliance Module
The compliance module contains a list of fields, such as vendor name, product version, product name, and
attributes provided by OPSWAT that supports Cisco ISE posture conditions.
Vendors frequently update the product version and date in the definition files, therefore, you must look for
the latest version and date in the definition files for each vendor product by frequently polling the compliance
module for updates. Each time the compliance module is updated to reflect the support for new vendors,
products, and their releases, the AnyConnect agent receives a new library. It helps the AnyConnect agent to
support newer additions. The AnyConnect agent retrieves this support information and checks the latest
definition information from the periodically updated se-checks.xml file (which is published along with the
se-rules.xml file in the se-templates.tar.gz archive), and determine whether clients are compliant with the
posture policies. Depending upon what is supported by the library for a particular antivirus, antispyware,
antimalware, disk encryption, or patch management product, the appropriate requirements will be sent to the
AnyConnect agent for validating their existence, and the status of the particular products on the clients during
posture validation.
The compliance module is available on Cisco.com.
Table given below lists the OPSWAT API versions that support and do not support the ISE posture policy.
There are different policy rules for agents that support versions 3 and 4.
OPSWAT
Non-OPSWAT
Note • Be sure to create separate posture policies for version 3.x or earlier and version 4.x or later, in anticipation
of clients that may have installed any one of the above versions.
• OESIS version 4 support is provided for compliance module 4.x and Cisco AnyConnect 4.3 and higher.
However, AnyConnect 4.3 supports both OESIS version 3 and version 4 policies.
• Version 4 compliance module is supported by ISE 2.1 and higher.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture >
Patch Management Condition.
Step 2 Click Add.
Step 3 Enter the condition name and description in the Name and Description fields.
Step 4 Choose the appropriate operating system from the Operating System drop-down field.
Step 5 Choose the Compliance Module from the drop-down list.
Step 6 Choose the Vendor Name from the drop-down list.
Step 7 Choose the Check Type.
Step 8 Choose the appropriate patch from the Check patches installed drop-down list.
Step 9 Click Submit.
Related Topics
Patch Management Condition Settings, on page 1120
Add a Patch Management Remediation, on page 1136
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture >
Disk Encryption Condition.
Step 2 Click Add.
Step 3 In the Disk Encryption Condition window, enter the appropriate values in the fields.
Field Name Usage Guidelines for Windows Usage Guidelines for macOS
OS
Name Enter the name of the file Enter the name of the file condition.
condition.
Description Enter a description for the file Enter a description for the file condition.
condition.
Operating System Select any Windows operating Select any macOS to which the file
system to which the file condition should be applied.
condition should be applied.
File Type Choose one of the predefined Choose one of the predefined settings:
settings:
• FileDate: Checks whether a file with
• FileDate: Checks whether a particular file-created or
a file with a particular file-modified date exists in the
file-created or system.
file-modified date exists in
the system. • FileExistence: Checks whether a file
exists in the system.
• FileExistence: Checks
whether a file exists in the • CRC32: Checks the data integrity of
system. a file using the checksum function.
Field Name Usage Guidelines for Windows Usage Guidelines for macOS
OS
Field Name Usage Guidelines for Windows Usage Guidelines for macOS
OS
File Path Choose one of the predefined Choose one of the predefined settings:
settings:
• Root: Checks the file in the root (/)
• ABSOLUTE_PATH: directory. Enter the file path.
Checks the file in the fully
qualified path of the file. • Home: Checks the file in the home
For example, (~) directory. Enter the file path.
C:\<directory>\file name.
For other settings, enter
only the file name.
• SYSTEM_32: Checks the
file in the
C:\WINDOWS\system32
directory. Enter the file
name.
• SYSTEM_DRIVE:
Checks the file in the C:\
drive. Enter the file name.
• SYSTEM_PROGRAMS:
Checks the file in the
C:\Program Files. Enter
the file name.
• SYSTEM_ROOT:
Checks the file in the root
path for Windows system.
Enter the file name.
• USER_DESKTOP:
Checks if the specified file
is present on the Windows
user's desktop. Enter the
file name.
• USER_PROFILE:
Checks if the file is
present in the Windows
user's local profile
directory. Enter the file
path.
File Date Type (Available only if you select (Available only if you select FileDate as
FileDate as the File Type) the File Type) Choose Creation Date or
Choose Creation Date or Modification Date.
Modification Date.
Field Name Usage Guidelines for Windows Usage Guidelines for macOS
OS
File Operator The File Operator options The File Operator options change
change according to the settings according to the settings you select in the
you select in the File Type. File Type. Choose the settings
Choose the settings appropriately:
appropriately:
FileDate
FileDate
• EarlierThan
• EarlierThan
• LaterThan
• LaterThan
• EqualTo
• EqualTo
• Within: The last n number of days.
• Within: The last n number Valid values are between 1 and 300
of days. Valid values are days.
between 1 and 300 days.
FileExistence
FileExistence
• Exists
• Exists
• DoesNotExist
• DoesNotExist
FileVersion
• EarlierThan
• LaterThan
• EqualTo
File CRC Data (Available only if you select (Available only if you select CRC32 as
CRC32 as the File Type) You the File Type) You can enter a checksum
can enter a checksum value, for value, for example, 0x3c37fec3 to check
example, 0x3c37fec3 to check file integrity. The checksum value should
file integrity. The checksum start with 0x, a hexadecimal integer.
value should start with 0x, a
hexadecimal integer.
File SHA-256 Data (Available only if you select (Available only if you select SHA-256 as
SHA-256 as the File Type) You the File Type) You can enter a 64-byte
can enter a 64-byte hexadecimal hexadecimal hash value to check file
hash value to check file integrity.
integrity.
Date and Time (Available only if you select (Available only if you select FileDate as
FileDate as the File Type) the File Type) Enter the date and time of
Enter the date and time of the the client system in mm/dd/yyyy and
client system in mm/dd/yyyy hh:mm:ss format.
and hh:mm:ss format.
Related Topics
Simple Posture Conditions, on page 1097
Compound Posture Conditions, on page 1098
Create a Posture Condition, on page 1145
Operating System Checks If the required Firewall product is installed on an endpoint. You can select the
Windows OS or macOS.
Vendor Choose a vendor name from the drop-down list. The Firewall products of a vendor
and their check type are retrieved and displayed in the Products for Selected Vendor
table. The list in the table changes according to the selected operating system.
Check Type Enabled: To check if a specific Firewall is running on an endpoint. Verify if the vendor's
product supports the chosen check type by referring to the Products for Selected
Vendor list.
Registry Type Choose one of the predefined settings as the registry type.
Registry Root Key Choose one of the predefined settings as the registry root key.
Sub Key Enter the sub key without the backslash (“\”) to check the registry key in the path
specified in the Registry Root Key.
For example, SOFTWARE\Symantec\Norton AntiVirus\version will check the key in
the following path:
HKLM\SOFTWARE\Symantec\NortonAntiVirus\version
Value Name (Available only if you select RegistryValue or RegistryValueDefault as the Registry
Type) Enter the name of the registry key value to be checked for RegistryValue.
This is the default field for RegistryValueDefault.
Value Data Type (Available only if you select RegistryValue or RegistryValueDefault as the Registry
Type) Choose one of the following settings:
• Unspecified: Checks whether the registry key value exists or not. This option is
available only for RegistryValue.
• Number: Checks the specified number in the registry key value
• String: Checks the string in the registry key value
• Version: Checks the version in the registry key value
Value Data (Available only if you select RegistryValue or RegistryValueDefault as the Registry
Type) Enter the value of the registry key according to the data type you have selected
in Value Data Type.
Operating System Select the operating system to which the registry condition should be applied.
Related Topics
Simple Posture Conditions, on page 1097
Compound Posture Conditions, on page 1098
Operating System Select the Windows OS or MAC OSX to which the application condition should be
Process Name (Available only when you select Process as the Check By option) Enter the required
name.
Application Operator (Available only when you select Process as the Check By option) Choose one of the
options:
• Running: Choose this option to check if an application is running on an endpoi
• Not Running: Choose this option to check whether an application is not runnin
endpoint.
Application State (Available only when you select Application as the Check By option) Choose one o
following options:
• Installed: Choose this option to check whether the clients have malicious appli
installed. If a malicious application is found, the remediation action is triggered
• Running: Choose this option to check if an application is running on an endpoi
Provision By (Available only when you select Application as the Check By option) Choose o
following options:
• Everything: You can select all listed categories such as Browser, Patch Man
so on.
• Name: You should select at least one category. For example, if you choose t
category, it displays the corresponding vendors in the Vendor drop-down li
• Category: You can check one or more categories such as Anti-Malware, Bac
or Data Storage.
You can view the number of installed and running applications for each endpoint in the Context Visibility
> Endpoints > Compliance window.
The Home > Summary > Compliance window displays the percentage of endpoints that are subject to
posture assessment and are compliant.
Operating Systems Select the operating system to which the service condition should be applied. You can
select different versions of the Windows OS or macOS.
Service Name Enter the name of the Daemon or User Agent service, for example, com.apple.geod,
running as root. The AnyConnect agent uses the command sudo launchctl list to
validate the service condition.
Service Type Choose the type of service that AnyConnect should check for to ensure client
compliance:
• Daemon: Checks if a specified service, such as scanning a client device for
malware, is present in the specified list of Daemon services in the client.
• User Agent: Checks if a specified service, such as a service that runs when
malware is detected, is present in the specified list of User services in the client.
• Daemon or User Agent: Checks if the specified services are present either in the
Daemon or User Agent services list.
Service Operator Choose the service status that you want to check in the client:
• Windows OS: To check if a service is Running or Not Running.
• Mac OSX: To check if a service is Loaded, Not Loaded, Loaded and Running,
Loaded with Exit Code, and Loaded and running or with Exit code.
Related Topics
Simple Posture Conditions, on page 1097
Compound Posture Conditions, on page 1098
Name Enter the name of the compound condition that you want to create.
Description Enter the description of the compound condition that you want to create.
Operating System Select one or more Windows operating systems. This allows you to associate Windows
operating systems to which the condition is applied.
Parentheses ( ) Click the parentheses to combine two simple conditions from the following simple
condition types: file, registry, application, and service conditions.
( & ): AND operator You can use the AND operator (ampersand [ & ]) in a compound condition. For
(use “&” for an example, enter Condition1 & Condition2.
AND operator,
without the quotes)
( | ): OR operator You can use the OR operator (horizontal bar [ | ]) in a compound condition. For
(use “|” for an OR example, enter Condition1 & Condition2.
operator, without the
quotes)
( ! ): NOT operator You can use the NOT operator (exclamation point [ ! ]) in a compound conditions. For
(use “!” for a NOT example, enter Condition1 & Condition2.
operator, without the
quotes)
Simple Conditions Choose from a list of simple conditions of the following types: file, registry, application,
and service conditions.
You can also create simple conditions of file, registry, application, and service
conditions from the object selector.
Click the quick picker (down arrow) on the Action button to create simple conditions
of file, registry, application, and service conditions.
Related Topics
Posture Conditions, on page 1097
Create Compound Posture Conditions, on page 1098
Name Enter the name of the antivirus condition that you want to create.
Description Enter the description of the antivirus condition that you want to create.
Operating System Select an operating system to check the installation of an antivirus program on your
client, or check the latest antivirus definition file updates to which the condition is
applied.
Vendor Choose a vendor from the drop-down list. The selection of Vendor retrieves their
antivirus products and versions, which are displayed in the Products for Selected
Vendor table.
Check Type Choose whether to check an installation or check the latest definition file update on
the client.
Installation Choose to check only the installation of an antivirus program on the client.
Definition Choose to check only the latest definition file update of an antivirus product on the
client.
Note Only one condition can be configured for each antivirus product from either Baseline Condition or Advance
Condition.
Baseline Condition
Minimum Compliance Module Version The minimum compliance module version is updated
from the AnyConnect.
Advance Condition
Check against latest AV definition file version, if (Available only when you choose Definition check
available type) Choose to check the antivirus definition file
version on the client against the latest antivirus
definition file version, if available as a result of
posture updates in Cisco ISE. Otherwise, this option
allows you to check the definition file date on the
client against the latest definition file date in Cisco
ISE.
Allow virus definition file to be (Enabled) (Available only when you choose Definition check
type) Choose to check the antivirus definition file
version and the latest antivirus definition file date on
the client. The latest definition file date cannot be
older than that you define in the next field (days older
than field) from the latest antivirus definition file date
of the product or the current system date.
If unchecked, Cisco ISE allows you to check only the
version of the antivirus definition file using the Check
against latest AV definition file version, if available
option.
Days Older than Define the number of days that the latest antivirus
definition file date on the client can be older from the
latest antivirus definition file date of the product or
the current system date. The default value is zero (0).
Latest File Date Choose to check the antivirus definition file date on
the client, which can be older by the number of days
that you define in the days older than field.
If you set the number of days to the default value (0),
then the antivirus definition file date on the client
should not be older than the latest antivirus definition
file date of the product.
Current System Date Choose to check the antivirus definition file date on
the client, which can be older by the number of days
that you define in the days older than field.
If you set the number of days to the default value (0),
then the antivirus definition file date on the client
should not be older than the current system date.
Related Topics
Compound Posture Conditions, on page 1098
Preconfigured Antivirus and Antispyware Conditions, on page 1100
Antivirus and Antispyware Support Chart, on page 1100
Name Enter the name of the antispyware compound condition that you want to create.
Description Enter the description of the antispyware compound condition that you want to create.
Operating System Selecting an operating system allows you to check the installation of an antispyware
program on your client, or check the latest antispyware definition file updates to which
the condition is applied.
Vendor Choose a vendor from the drop-down list. The selection of Vendor retrieves their
antispyware products and versions, which are displayed in the Products for Selected
Vendor table.
Check Type Choose if you want to choose a type whether to check an installation, or check the
latest definition file update on the client.
Installation Choose if you want to check only the installation of an antispyware program on the
client.
Definition Choose if you want to check only the latest definition file update of an antispyware
product on the client.
Allow Virus Check this check box when you are creating antispyware definition check types, and
Definition File to disabled when creating antispyware installation check types.
be (Enabled)
If checked, the selection allows you to check antispyware definition file version and
the latest antispyware definition file date on the client. The latest definition file date
cannot be older than that you define in the days older than field from the current system
date.
If unchecked, the selection allows you to check only the version of the antispyware
definition file as the Allow virus definition file to be check box is not checked.
Days Older than Define the number of days that the latest antispyware definition file date on the client
can be older from the current system date. The default value is zero (0).
Current System Choose to check the antispyware definition file date on the client, which can be older
Date by the number of days that you define in the days older than field.
If you set the number of days to the default value (0), then the antispyware definition
file date on the client should not be older than the current system date.
Products for Choose an antispyware product from the table. Based on the vendor that you select in
Selected Vendor the New Anti-spyware Compound Condition page, the table retrieves information on
their antispyware products and their version, remediation support that they provide,
latest definition file date and its version.
The selection of a product from the table allows you to check for the installation of an
antispyware program, or check for the latest antispyware definition file date, and its
latest version.
Related Topics
Compound Posture Conditions, on page 1098
Preconfigured Antivirus and Antispyware Conditions, on page 1100
Antivirus and Antispyware Support Chart, on page 1100
Note It is recommended that you manually update the installed Antimalware products to have the latest definitions
at least once. Otherwise, the posture checks using AnyConnect for Antimalware definitions might fail.
Operating System Choose an operating system to check the installation of antimalware programs on your
client, or check the latest antimalware definition file updates to which the condition is
applied. It supports both macOS and Windows OS .
Vendor Choose a vendor from the drop-down list. The selected vendor's antimalware products,
versions, latest definition dates, latest definition versions, and minimum compliance
module versions are displayed in the Products for Selected Vendor table.
Check Against (Available only when you choose Definition check type) Choose this option to check
Latest AV the antimalware definition file version on the client against the latest antimalware
Definition File definition file version, if available as a result of posture updates in Cisco ISE. Otherwise,
Version, if this option allows you to check the definition file date on the client against the latest
Available definition file date in Cisco ISE.
This check will only work if there is a value listed in Cisco ISE for the Latest
Definition Date or Latest Definition Version field for the selected product. Otherwise,
the Current System Date field must be used.
Allow Virus (Available only when you choose Definition check type) Choose this option to check
Definition File to the antimalware definition file version and the latest antimalware definition file date
be on the client. The latest definition file date cannot be older than that you define in the
Days Older Than field.
If unchecked, Cisco ISE allows you to check only the version of the antimalware
definition file using the Check against latest AV definition file version option.
Days Older Than Define the number of days that the latest antimalware definition file date on the client
can be older than the latest antimalware definition file date of the product or the current
system date. The default value is zero.
Latest File Date Choose this option to define the number of days that the latest antimalware definition
file date on the client can be older than the latest antimalware definition file date of
the product.
If you set the number of days to the default value, then the antimalware definition file
date on the client should not be older than the latest antimalware definition file date
of the product.
This check works only if there is a value listed in Cisco ISE for the Latest Definition
Date field for the selected product. Otherwise, the Current System Date field must
be used.
Current System Choose this option to define the number of days that the latest antimalware definition
Date file date on the client can be older than the current system date.
If you set the number of days to the default value, then the antimalware definition file
date on the client should not be older than the current system date.
For an antimalware condition for Carbon Black Cloud 3.x on Mac OS to be successful, the condition must
meet the following requirements:
• The compliance module must be greater than 4.3.2741.
• The condition must be associated with the vendor VMware, Inc.
When you upgrade from one Cisco ISE release to another with a preconfigured Carbon Black Cloud 3.x
condition, after a posture feed update, two Carbon Black Cloud 3.x conditions are listed in the Advanced
Conditions area of the Anti-Malware Condition windows.
You must delete the Carbon Black Cloud 3.x condition associated with the vendor Carbon Black, Inc. You
must reconfigure any existing antimalware conditions that use the Carbon Black Cloud 3.x from Carbon Black,
Inc. to use the condition from the vendor VMware, Inc.
Products for Selected Vendor
Choose an antimalware product from the table. Based on the vendor that you select in the New Antimalware
Condition window, the antimalware products and their versions, remediation support provided, latest definition
file dates and versions are displayed in this table.
Note Only one condition can be configured for each antimalware product from either Baseline Condition or
Advance Condition.
Baseline Condition
Minimum Version (Available only when you update the Operating System and Vendor fields) The
minimum version of the antimalware that must be installed on the endpoints.
Maximum Version The maximum version for antimalware is revised automatically when you update the
posture feed.
Related Topics
Compound Posture Conditions, on page 1098
Name Enter the name of the dictionary simple condition that you want to create.
Description Enter the description of the dictionary simple condition that you want to create.
Operator Choose an operator to associate a value to the attribute that you have selected.
Value Enter a value that you want to associate to the dictionary attribute, or choose a
predefined value from the drop-down list.
Related Topics
Simple Posture Conditions, on page 1097
Create Simple Posture Conditions, on page 1098
Name Enter the name of the dictionary compound condition that you want to create.
Description Enter the description of the dictionary compound condition that you want to create.
Select Existing Define an expression by selecting pre-defined conditions from the policy elements
Condition from library or add ad-hoc attribute/value pairs to your expression in the subsequent steps.
Library
Condition Name Choose dictionary simple conditions that you have already created from the policy
elements library.
Expression The Expression is updated based on your selection from the Condition Name drop-down
list.
Cisco ISE will process each OR condition in a compound condition sequentially. For
example, if a compound condition checks for A OR B, Cisco ISE first checks A and
then B. If either condition A or B is passed, the overall result is marked as passed.
If condition A fails and condition B succeeds, then the overall result is marked as
passed. In this case, condition A is marked as failed and condition B as passed in the
posture reports.
If condition A succeeds, Cisco ISE skips condition B and marks the overall result as
passed. In the posture reports, condition A is marked as passed, condition B as skipped,
and the overall result as passed.
Condition Name Choose a dictionary simple condition that you have already created.
Expression From the Expression drop-down list, you can create a dictionary simple condition.
Value Enter a value that you want to associate to the dictionary attribute, or choose a value
from the drop-down list.
Related Topics
Compound Posture Conditions, on page 1098
Create Compound Posture Conditions, on page 1098
Operating System Choose an operating system to check the installation of a patch management software
on the endpoint, or check the latest patch management definition file updates to which
the condition is applied. You can select the Windows OS or macOS. You can also
select more than one version of an operating system to create the patch management
condition.
Vendor Name Choose a vendor from the Vendor Name drop-down list. Based on your selection, the
patch management products and their supported versions, check type, and minimum
compliant module support details are displayed in the Products for Selected Vendor
table. The list in the table changes according to the selected operating system.
Click the Products for Selected Vendor drop-down list to view the list of products
that the vendor you have specified in the Vendor Name field supports. For example,
if you have selected Vendor A that has two products, namely Product 1 and Product
2. Product 1 may support the Enabled option, whereas Product 2 might not. Or, if
Product 1 does not support any of the check types, it is grayed out.
Note (Applicable for Cisco ISE 2.3 and above, and AnyConnect 4.5 and above) If
you select the Up to Date Check Type in the Patch Management condition
with SCCM, then Cisco ISE:
1. Uses the Microsoft API to check the current security patch for the specified
severity level.
2. Triggers the Patch Management remediation for that missing security
patch.
Check Patches (Available only when you select the Up To Date check type) You can configure
Installed severity levels for missing patches, which are then deployed based on the severity.
Choose one of the following options:
• Critical Only: To check if critical software patches are installed on the endpoints
in your deployment.
• Important and Critical: To check if important and critical software patches are
installed on the endpoints in your deployment.
• Moderate, Important, and Critical: To check if moderate, important, and critical
software patches are installed on the endpoints in your deployment.
• Low To Critical: To check if low, moderate, important, and critical software
patches are installed on the endpoints in your deployment.
• All: To install the missing patches for all severity levels.
Related Topics
Create Patch Management Conditions, on page 1102
Name Enter the name of the disk encryption condition that you want to create.
Operating System Select an operating system of the end point, whose disk is to be checked for encryption.
You can select the Windows OS or macOS. You can also select more than one version
of an operating system to create the disk encryption condition.
Vendor Name Choose a vendor name from the drop-down list. The data encryption products of a
vendor, and their supported version, the encryption state check, and the minimum
compliant module support are retrieved and displayed in the Products for Selected
Vendor table. The list in the table changes according to the selected operating system.
Location Enabled only when an option is checked in the Products for Selected Vendor section.
Select any one of the following options:
• Specific Location: To check if the specified disk drive is encrypted in the end
point, (for example, C: for Windows OS) or a specified volume label is encrypted,
(for example, Mackintosh HD for macOS).
• System Location: To check if the default Windows OS system drive or macOS
hard drive is encrypted in the end point.
• All Internal Drives: To check the internal drives. Includes all hard disks that are
mounted and encrypted, and all internal partitions. Excludes read only drives,
system recovery disk/partition, boot partition, network partitions, and the different
physical disk drives that are external to the endpoint (including but not limited
to disk drives connected via USB and Thunderbolt). Encryption software products
that are validated include:
• Bit-locker-6.x/10.x
• Checkpoint 80.x on Windows 7
Encryption State The Encryption State checkbox is disabled when the selected product does not support
encryption state check. The repeater is displayed only when the checkbox is checked.
You can select the Fully Encrypted option to check if the client's disk drive is wholly
encrypted.
If you create a condition, for example for TrendMicro, and select two vendors—one
with the Encryption State "Yes" and another with the Encryption State "No", then the
Encryption State will be disabled because one of the Vendor Encryption States is "No".
Note You can click the repeater to add more Locations and the relationship between
each location is the logical AND operator.
Related Topics
Create Disk Encryption Conditions, on page 1103
Name USB_Check
Compliance A display-only field for ISE posture compliance module support for version 4.x (and
Module later).
Related Topics
Simple Posture Conditions, on page 1097
Description Cisco predefined check that collects hardware attributes from clients.
Note Profiler policy evaluation will not work if both 'Endpoint policies' and 'Logical Profiles' are configured under
Other Conditions in Policy > Posture.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Posture or Work Centers > Posture > Posture
Policy.
Step 2 Use the drop-down arrow to add a new policy.
Step 3 To edit the profile, either double-click a policy or click Edit at the end of the row.
Step 4 From the Rule Status drop-down list, choose Enabled or Disabled.
Step 5 Choose the drop-down under Policy Options, and specify the Grace Period Settings in minutes, hours, or days.
The valid values are:
• 1 to 30 days
• 1 to 720 hours
• 1 to 43,200 minutes
Step 6 (Optional) Drag the slider named Delayed Notification to delay the grace period prompt from being displayed to the
user until a specific percentage of grace period has elapsed. For example, if the notification delay period is set to 50%
and the configured grace period is 10 minutes, Cisco ISE checks the posture status after 5 minutes and displays the
grace period notification if the endpoint is found to be noncompliant. Grace period notification is not displayed if the
endpoint status is compliant. If the notification delay period is set to 0%, the user is prompted immediately at the
beginning of the grace period to remediate the problem. However, the endpoint is granted access until the grace period
expires. The default value for this field is 0%. The valid range is from 0 to 95%.
Step 7 In the Rule Name field, enter the name of the policy.
Note It is a best practice to configure a posture policy with each requirement as a separate rule in order to avoid
unexpected results.
Step 8 From the Identity Groups column, select the desired identity group.
You can create posture policies based on user or end-point identity groups.
Step 9 From the Operating Systems column, select the operating system.
Step 10 From the Compliance Module column, select the required compliance module:
• 4.x or Later: Supports antimalware, disk encryption, patch management, and USB conditions.
• 3.x or Earlier: Supports antivirus, antispyware, disk encryption, and patch management conditions
• Any Version—: upports file, service, registry, application, and compound conditions.
Step 11 From the Posture Type column, select the Posture Type.
• AnyConnect—Deploys the AnyConnect agent to monitor and enforce Cisco ISE policies that require client
interaction.
• AnyConnect Stealth—Deploys the AnyConnect agent to monitor and enforce Cisco ISE posture policies without
any client interaction.
• Temporal Agent—A temporary executable file that is run on the client to check the compliance status.
Step 12 In Other Conditions, you can add one or more dictionary attributes and save them as simple or compound conditions
to a dictionary.
Note The dictionary simple conditions and compound conditions that you create in the Posture Policy window are
not displayed while configuring an authorization policy.
Note Cisco ISE does not support ARM64 version of AnyConnect for AnyConnect posture flow. Ensure that you
do not use the ARM64 version of AnyConnect in the client provisioning policy, otherwise it might cause
failure on the client side. Restart the client if AnyConnect is not working properly because of this issue.
Note ISE server certificate must be trusted in the System Certificate store for AnyConnect 4.6 MR2 and above.
Any posture check or remediation that requires elevated privileges will not work if the server is untrusted.
• Windows OS: The server certificate must be added to the System Certificate store.
• MAC OS: The server certificate must be added to the System Keychain. It is recommended that you use
the command-line utility to trust the certificate. Adding the certificate to the System Keychain using the
Keychain Access app might not work if it is already present in the Login Keychain.
ISE Posture Agent for Cisco Temporal Agent for ISE Posture Agent for Cisco Temporal Agent for
Windows Windows MacOS MacOS
Operating System/Service — — —
Packs/Hotfixes
Service Check Service Check (Temporal Service Check Daemon checks are not
agent 4.5) supported
File Check File Check (Temporal File Check File Check (Temporal
agent 4.5) agent 4.5)
Windows Update — — —
Configuration
WSUS Compliance — — —
Settings
File Distribution —
Launch Program —
Patch Management —
Remediation
Windows Update —
WSUS —
For example, if you have created an AV compound condition named "MyCondition_AV_Check" to check
any Vendor and any Product, the posture reports will display the internal check, that is “av_def_ANY”, as
the condition name, instead of "MyCondition_AV_Check".
c) Ensure that the custom attribute that you created is displayed in the Custom Attributes area in the Edit Endpoint
dialog box.
d) Click Edit and enter the required attribute value (for example, deviceType = Apple-iPhone).
e) Click Save.
Step 3 Create a posture policy using the custom attributes and values.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Posture > Posture Policy.
b) Create the required policy. Choose the custom attributes by clicking Other Conditions and select the required
dictionary (for example, choose Endpoints > deviceType, the custom attribute that you created in Step 1). For more
information, see the Configure Cisco Temporal Agent Workflow, on page 1147.
c) Click Save.
1. In the Cisco ISE GUI, click the Menu icon ( ) and choose Work Centers > Posture > Client
Provisioning > Client Provisioning Policy.
2. Create the required policy.
• Create the required rule (for example, Rule Name=WindowsAll, if Identity Groups=Any and Operating
Systems=Windows All and Other Conditions=Conditions, then Results=AC_Win_44117).
• Choose the custom attributes by clicking Other Conditions and selecting the required dictionary.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click AS Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New AS Remediations window.
Step 6 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click AV Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New AV Remediation window.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click File Remediation.
Step 4 Click Add.
Step 5 Enter the name and description of the file remediation in the Name and Description fields.
Step 6 Modify the values in the New File Remediation window.
Step 7 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click Launch Program Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New Launch Program Remediation page.
Step 6 Click Submit.
Problem
When an application is launched as a remediation using Launch Program Remediation, the application is
successfully launched (observed in the Windows Task Manager), however, the application UI is not visible.
Solution
The Launch program UI application runs with system privileges, and is visible in the Interactive Service
Detection (ISD) window. To view the Launch program UI application, ISD should be enabled for the following
OS:
• Windows Vista: ISD is in stop state by default. Enable ISD by starting ISD service in services.msc.
• Windows 7: ISD service is enabled by default.
• Windows 8/8.1: Enable ISD by changing "NoInteractiveServices" from 1 to 0 in the registry:
\HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Windows.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click Link Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New Link Remediation window.
Step 6 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click Patch Mangement Remediation.
Step 4 Click Add.
Step 5 Modify the values in the Patch Management Remediation window.
Step 6 Click Submit to add the remediation action to the Patch Management Remediations window.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture.
Step 2 Click Remediation Actions.
Step 3 Click Windows Server Update Services Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New Windows Server Update Services Remediation window.
Step 6 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > > Posture..
Step 2 Click Remediation Actions.
Step 3 Click Windows Update Remediation.
Step 4 Click Add.
Step 5 Modify the values in the New Windows Update Remediation window.
Step 6 Click Submit.
Mandatory Requirements
During policy evaluation, the agent provides remediation options to clients who fail to meet the mandatory
requirements defined in the posture policy. End users must remediate to meet the requirements within the
time specified in the remediation timer settings.
For example, you have specified a mandatory requirement with a user-defined condition to check the existence
of C:\temp\text.file in the absolute path. If the file does not exist, the mandatory requirement fails and the user
will be moved to Non-Compliant state.
Optional Requirements
During policy evaluation, the agent provides an option to clients to continue, when they fail to meet the
optional requirements specified in the posture policy. End users are allowed to skip the specified optional
requirements.
For example, you have specified an optional requirement with a user-defined condition to check for an
application running on the client machine, such as Calc.exe. Although, the client fails to meet the condition,
the agent prompts an option to continue further so that the optional requirement is skipped and the end user
is moved to Compliant state.
Audit Requirements
Audit requirements are specified for internal purposes and the agent does not prompt any message or input
from end users, regardless of the pass or fail status during policy evaluation.
For example, you are in the process of creating a mandatory policy condition to check if end users have the
latest version of the antivirus program. If you want to find out the non-compliant end users before actually
enforcing it as a policy condition, you can specify it as an audit requirement.
Visibility Requirements
During policy evaluation, the agent reports compliance data for visibility requirements, every five to ten
minutes.
Note To create a Posture Requirement to validate all Windows 10 hotfixes in the environment, you must configure
the Conditions area of your Requirement to include both pr_Win10_32_Hotfixes and pr_Win10_64_Hotfixes.
At the top of the conditions, ensure All selected conditions succeed is selected. If the configuration is
successful, pr_Win10_32_Hotfixes & pr_Win10_64_Hotfixes will be displayed. To view the details of the
validated conditions for an endpoint, from the main menu, choose Operations > Reports > Reports >
Endpoints and Users > Posture Assessment by Endpoints. Click the endpoint to view the corresponding
posture details.
Figure 62: Validating Posture Requirements in Windows 10
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture >
Requirements.
Step 2 Enter the values in the Requirements window.
Step 3 Click Done to save the posture requirement in read-only mode.
Step 4 Click Save.
Use Reassessment Check the check box to apply the PRA configurations for the user identity groups.
Enforcement?
Interval Enter a time interval in minutes to initiate PRA on the clients after the first successful
login.
The default value is 240 minutes. Minimum value is 60 minutes and maximum is 1440
minutes.
Grace time Enter a time interval in minutes to allow the client to complete remediation. The grace
time cannot be zero, and should be greater than the PRA interval. It can range between
the default minimum interval (5 minutes) and the minimum PRA interval.
The minimum value is 5 minutes and the maximum value is 60 minutes.
Note The grace time is enabled only when the enforcement type is set to remediate
action after the client fails the posture reassessment.
Select User Identity Choose a unique group or a unique combination of groups for your PRA configuration.
Groups
PRA Displays existing PRA configurations and user identity groups associated to PRA
configurations configurations.
Related Topics
Posture Lease, on page 1089
Periodic Reassessments, on page 1090
Posture Assessment Options, on page 1130
Posture Remediation Options, on page 1132
Custom Conditions for Posture, on page 1132
Custom Posture Remediation Actions, on page 1134
Configure Periodic Reassessments, on page 1090
Unknown Profile
If no matching posture policy is defined for an endpoint, then the posture compliance status of the endpoint
may be set to unknown. A posture compliance status of unknown can also apply to an endpoint where a
matching posture policy is enabled but posture assessment has not yet occurred for that endpoint and, therefore
no compliance report has been provided by the client agent.
Note We recommend you to use posture with redirection for all Cisco network access devices.
Compliant Profile
If a matching posture policy is defined for an endpoint, then the posture compliance status of the endpoint is
set to compliant. When the posture assessment occurs, the endpoint meets all the mandatory requirements
that are defined in the matching posture policy. For an endpoint that is postured compliant, it can be granted
privileged network access on your network.
Noncompliant Profile
The posture compliance status of an endpoint is set to noncompliant when a matching posture policy is defined
for that endpoint but it fails to meet all the mandatory requirements during posture assessment. An endpoint
that is postured noncompliant matches a posture requirement with a remediation action, and it should be
granted limited network access to remediation resources in order to remediate itself.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets.
Step 2 In the View column, click the arrow icon adjacent the corresponding Default Policy.
Step 3 In the Actions column, click the cog icon, and then from the dropdown list, choose a new authorization policy.
A new row appears in the Policy Sets table.
Step 4 Enter a rule name.
Step 5 From the Conditions column, click the (+) symbol.
Step 6 Create the required conditions on the Conditions Studio Page. In the Editor section, click the Click To Add an Attribute
text box, and select the required Dictionary and Attribute.
You can drag and drop a Library condition to the Click To Add An Attribute text box.
Step 7 Click Use to create a new standard authorization policy in read-only mode.
Step 8 Click Save.
• Endpoints should be able to reach the Active Directory server because the file server drive letter cannot
be mapped without reaching the AD. When posture (with AnyConnect ISE posture agent) triggers, it
blocks access to AD, causing delay in login. Use Posture Remediation ACLs to provide access to AD
servers before posture is completed.
• You should set a delay for the login script until posture completes and then you have to set the Persistence
attribute to NO. Windows tries to reconnect all the network drives during login and this cannot be done
until AnyConnect ISE posture agent gains full network access.
Step 1 Create an AnyConnect agent profile, see Create an AnyConnect Agent Profile.
Step 2 Create an AnyConnect configuration for AnyConnect packages, see Create an AnyConnect Configuration for AnyConnect
Packages.
Step 3 Upload a Open DNS Profile in Cisco ISE, see Upload an Open DNS Profile in Cisco ISE.
Step 4 Create a Client Provisioning Policy, see Create a Client Provisioning Policy.
Step 5 Create a Posture Condition, see Create a Posture Condition.
Step 6 Create Posture Remediation, see Create Posture Remediation
Step 7 Create Posture Requirement in Clientless Mode, see Create Posture Requirement in Stealth Mode.
Step 8 Create Posture Policy, see Create Posture Policy.
Step 9 Configure authorization profile.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Authorization >
Authorization Profiles.
b) Click Add and enter the Name of the profile.
c) In Common Tasks, enable Web Redirection (CWA, MDM, NSP, CPP) and choose Client provisioning (Posture)
from the drop-down list, enter the redirect ACL name and choose the Client Provisioning Portal Value. You can
edit or create a new Client Provisioning Portal in Work Centers > Posture > Client Provisioning > Client
Provisioning Portal.
Step 10 Configure authorization policies.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets
b) Click > and choose Authorization Policy and click on + icon to create a new authorization rule that features
Session:Posture Status EQUALS Unknown condition and the authorization profiled configured previously.
c) Above the previous rule, create a new authorization rule that features Session:Posture Status EQUALS
NonCompliant condition and another one that features Session:Posture Status EQUALS Compliant condition.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 From the Add drop-down list, choose AnyConnect Posture Profile.
Step 3 From the Posture Agent Profile Settings drop-down list, choose AnyConnect.
Step 4 In the Name field, type the required name (for example, AC_Agent_Profile).
Step 5 In the Agent Behavior section, select the Stealth Mode parameter as Enabled.
Step 6 Click Save.
What to do next
You should create the AnyConnect configuration for the AnyConnect packages.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 From the Add drop-down list, choose AnyConnect Configuration.
Step 3 From the Select AnyConnect Package drop-down list, choose the required AnyConnect package.
Step 4 In the Configuration Name text box, type the required Name.
Step 5 In the Compliance Module drop-down list, choose the required compliance module.
Step 6 In the AnyConnect Module Selection section, check the ISE Posture and Network Access Manager check boxes.
Step 7 In the Profile Selection section, from the ISE Posture drop-down list, choose the AnyConnect agent profile.
Step 8 From the Network Access Manager drop-down list, choose the required AnyConnect agent profile.
What to do next
You should upload the Open DNS profile to be pushed to the client.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 From the Add drop-down list, choose Agent Resources From Local Disk.
Step 3 From the Category drop-down list, choose Customer Created Packages.
Step 4 From the Type drop-down list, choose AnyConnect Profile .
Step 5 In the Name text box, type the required name (for example, OpenDNS).
Step 6 Click Browse and locate the JSON file from the local disk.
Step 7 Click Submit.
What to do next
You should create the client provisioning policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Client Provisioning.
Step 2 Create the required rule (for example, Rule Name=WindowsAll, if Identity Groups=Any and Operating Systems=Windows
All and Other Conditions=Conditions, then Results=AC_Win_44117).
What to do next
You should create the posture condition.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture > File
Condition.
Step 2 Enter the required name (for example, filechk).
Step 3 From the Operating Systems drop-down list, choose Windows 7 (All).
Step 4 From the File Type drop-down list, choose FileExistence.
Step 5 From the File Path drop-down list, choose ABSOLUTE_PATH C:\test.txt.
Step 6 From the File Operator drop-down list, choose DoesNotExist.
What to do next
You should create the posture remediation.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Remediation Actions >
USB Remediations.
Step 2 Enter the required name (for example, clientless_mode_block).
Step 3 Click Submit.
What to do next
You should create the posture requirement.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 Create the required posture requirement (for example, Name=win7Req for Operating Systems=Windows7(All) using
Compliance Module=4.x or later using Posture Type=AnyConnect Stealth met if Condition=filechk then Remediation
Actions=clientless_mode_block).
What to do next
You should create the posture policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Posture
Step 2 Create the required rule. For example, if Identity Groups=Any and Operating Systems=Windows 7(All) and Compliance
Module=4.x or later and Posture Type=AnyConnect Stealth then Requirements=win7Req.
Note For Client Provisioning without URL redirection, configuring the conditions with attributes specific to Network
Access or Radius will not work and matching of the client provisioning policy might fail due to the non-availability
of session information for the specific user in the Cisco ISE server. However, Cisco ISE allows configuring
conditions for the externally added identity groups.
Note AnyConnect version 4.5.0.3040 and higher supports stealth mode notifications.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Choose Policy > Policy Elements > Results > Client
Provisioning > Resources.
Step 2 Choose Add > AnyConnect ISE Posture Profile.
Step 3 From the Select a Category drop-down list, choose AnyConnect .
Step 4 From the Agent Behavior section, choose Enabled for the Enable notifications in stealth mode option.
or create a new Client Provisioning Portal in Work Centers > Posture > Client Provisioning > Client Provisioning
Portal.
Step 6 Configure authorization policies.
a) In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Sets.
b) Click > and choose Authorization Policy and click on + icon to create a new authorization rule that features
Session:Posture Status EQUALS Unknown condition and the authorization profiled configured previously.
c) Above the previous rule, create a new authorization rule that features Session:Posture Status EQUALS NonCompliant
condition and another one that features Session:Posture Status EQUALS Compliant condition.
Step 7 Download and Launch Cisco Temporal Agent
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Conditions > Posture > File
Condition.
Step 2 Enter the required name (for example, filecondwin).
Step 3 From the Operating Systems drop-down list, choose Windows 7 (All).
Step 4 From the File Type drop-down list, choose FileExistence.
Step 5 From the File Path drop-down list, choose ABSOLUTE_PATH C:\test.txt.
Step 6 From the File Operator drop-down list, choose DoesNotExist.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Posture >
Requirements.
Step 2 From the Edit drop-down list, choose Insert New Requirement.
Step 3 Enter the Name, Operating Systems, and Compliance Module (for example, Name filereqwin, Operating Systems
Windows All, Compliance Module 4.x or later).
Step 4 In the Posture Type drop-down, choose Temporal Agent.
Step 5 Select the required condition (for example, filecondwin).
Note For the Cisco Termporal Agent, you can only view Patch Management conditions containing the Installation
check type in the Requirements page.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Posture.
Step 2 Create the required rule (for example, Name=filepolicywin, Identity Groups=Any, Operating Systems=Windows All,
Compliance Module=4.x or later, Posture Type=Temporal Agent, and Requirements=filereqwin).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Client Provisioning.
Step 2 Create the required rule (for example, Rule Name=Win, Identity Groups=Any, Operating Systems=Windows All, Other
Conditions=Conditions, Results=CiscoTemporalAgentWindows4.5).
You determine this information by filtering requests based on parameters, such as username, MAC address,
and posture status.
• Port Number for SSH Connection: Change this to use a nonstandard port number.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Client Provisioning
or Work Centers > Posture > Settings > Software Updates > Client Provisioning.
Step 2 From the Enable Provisioning drop-down list, choose Enable or Disable.
Step 3 From the Enable Automatic Download drop-down list, choose Enable.
Feed downloads include all the available client provisioning resources. Some of these resources may not be pertinent to
your deployment. Cisco recommends manually downloading resources whenever possible instead of setting this option.
Step 4 Specify the URL where Cisco ISE searches for system updates in the Update Feed URL text box. For example, the
default URL for downloading client-provisioning resources is
https://www.cisco.com/web/secure/spa/provisioning-update.xml.
Step 5 When there is no client provisioning resource for a device, choose one of the following options:
• Allow Network Access: Users are allowed to register their device on the network without having to install and
launch the native supplicant wizard.
• Apply Defined Authorization Policy: Users must try to access the Cisco ISE network via standard authentication
and authorization policy application (outside of the native supplicant provisioning process). If you enable this option,
the user device goes through standard registration according to any client-provisioning policy applied to the user’s
ID. If the user’s device requires a certificate to access the Cisco ISE network, you must also provide detailed
instructions to the user describing how to obtain and apply a valid certificate using the customizable user-facing text
fields.
Note If the ISE certificates are cached in the HTTP Strict Transport Security (HSTS) store of the endpoint, client
provisioning portal redirection might fail and you might see the following error message:
You cannot visit hostname.domain.com right now because the website uses HSTS. Network errors
and attacks are temporary, so this page will probably work later.
To resolve this issue, delete the browser cache on the endpoint or navigate to chrome://net-internals/#hsts and
delete the self-signed ISE certificates.
What to do next
Configure client provisioning resource policies.
After creating client provisioning resources, create client provisioning policies that apply the client provisioning
resources to the endpoints. See Configure Client Provisioning Resource Policies, on page 1176.
Related Topics
Configure Client Provisioning in Cisco ISE, on page 1151
Add Client Provisioning Resources from Cisco, on page 1152
Add Cisco Provided Client Provisioning Resources from a Local Machine, on page 1153
Add Customer Created Resources for AnyConnect from a Local Machine, on page 1154
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 Choose Add > Agent resources from Cisco site.
Step 3 Select one or more required client provisioning resources from the list available in the Download Remote Resources
dialog box.
Step 4 Click Save.
What to do next
After you have successfully added client provisioning resources to Cisco ISE, you can begin to configure
client provisioning resource policies.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources
Step 2 Choose Add > Agent resources from local disk.
Step 3 Choose Cisco Provided Packages from the Category drop-down list.
Step 4 Click Browse to the directory on your local machine where the resource file that you want to download to Cisco ISE
resides.
You can add AnyConnect or Cisco Web Agent resources that you previously downloaded from Cisco to your local
machine.
Step 5 Click Submit.
What to do next
After you have successfully added client provisioning resources to Cisco ISE, you can configure client
provisioning resource policies.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client provisioning >
Resources.
Step 2 Choose Add > Agent Resources from local disk.
Step 3 Choose Customer Created Packages from the Category drop-down list.
Step 4 Enter the name and description for AnyConnect resources.
Step 5 Click Browse to the directory on your local machine where the resource file that you want to download to Cisco ISE
resides.
Step 6 Choose the following AnyConnect resources to upload to Cisco ISE:
• AnyConnect customization bundle
• AnyConnect localization bundle
• AnyConnect profile
• Advanced Malware Protection (AMP) Enabler Profile
What to do next
Create AnyConnect agent configuration.
Note The provisioning wizard only configures interfaces which are active. Because of this, users with Wired and
Wireless connections will not be provisioned for both interfaces, unless they are both active.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 Choose Add > Native Supplicant Profile.
Step 3 Create a profile, using the procedure described in Native Supplicant Profile Settings, on page 1155.
What to do next
Enable self-provisioning capabilities that allow employees to directly connect their personal devices to the
network, as described in the Support for multiple Guest Portals section.
Each profile defines the settings for a network connection that Cisco ISE will apply to the client's native
supplicant.
Wireless Profile
Configure a wireless profile, one for each SSID that you want to make available to the client:
• SSID Name: Enter the name of the SSID that the client will connect to.
• Proxy Auto-Config File URL: If the client will connect to a proxy to get the network configuration for
its supplicant, enter the URL of that proxy server.
• Proxy Host/IP: If the client will connect to a proxy to get the network configuration for its supplicant,
enter the Host/IP of that proxy server.
• Proxy Port: If the client will connect to a proxy to get the network configuration for its supplicant, enter
the port of that proxy server.
• Security: Choose either WPA or WPA2.
• Allowed Procotol: Choose either PEAP or EAP-TLS.
• Certificate Template: For TLS, choose one of the certificate templates. The certificate templates are
defined in Administration > System Certificates > Certificate Authority > Certificate Templates.
Optional Settings
If you expand Optional, the following fields are displayed.
Windows Setings
• Authentication Mode: Choose User, Machine or both as credentials for authorization.
• Do not prompt user to authorize new servers or trusted certification authorities: If this option is
enabled, the user is not prompted to authorize. User certificates are automatically accepted.
• Use a different user name for the connection: This is applicable only for wireless profiles. Use a
different user name for the connection.
• Connect even if the network is not broadcasting its name (SSID): This is applicable only for wireless
profiles. Connect to a network even when its SSID is not being broadcasted.
iOS Settings
• Enable if target network is hidden: Check this check box if the target network is hidden.
Wired Profile
• Allowed Protocol: Choose either PEAP or EAP-TLS.
• Certificate Template: For TLS, choose one of the certificate templates. The certificate templates are
defined in Administration > System Certificates > Certificate Authority > Certificate Templates.
Optional Settings
If you expand Optional, the following fields are also available for Windows clients.
• Authentication Mode: Choose User, Machine or both as credentials for authorization.
• Automatically use logon name and password (and domain if any): If you selected User for
Authentication Mode, use the logon and password to without prompting the user, if that information is
available.
• Enable Fast Reconnect: Allow a PEAP session to resume without checking user credentials when the
session resume feature is enabled in the PEAP protocol options, which is configured on Administration >
System > Settings > Protocols > PEAP.
• Enable Quarantine Checks: Check if the client has been quarantined.
• Disconnect if server does not present cryptobinding TLV: Disconnect if cryptobinding TLV is not
supported for the network connection.
• Do not prompt user to authorize new servers or trusted certification authorities: Automatically
accept user certificates; do not prompt the user.
Note For client provisioning with URL redirection, if the client machine has proxy settings configured, ensure that
you add Cisco ISE to the list of exceptions in the browser settings. This setting is applicable for all flows,
BYOD, MDM, Guest, and Posture that use URL redirection. For example, on Windows machines, do the
following:
1. From Control Panel, click Internet Properties.
2. Select the Connections tab.
3. Click LAN settings.
4. Click Advanced from the Proxy server area.
5. Enter the IP addresses of the Cisco ISE nodes in the Exceptions box.
6. Click OK.
Given below are the steps you perform to provision an endpoint without redirection for different networks.
Dot1X EAP-TLS
1. Connect the Cisco ISE network with provisioned certification.
2. Open a browser window and type in the provisioning URL: provisioning.cisco.com.
3. Log into the CP portal via internal user, AD, LDAP, or SAML.
AnyConnect performs posture. The endpoint moves to the right network based on posture compliance.
Dot1X PEAP
1. Connect the Cisco ISE network with User Name and Password through NSP
2. Open a browser window and type in the provisioning URL: provisioning.cisco.com.
3. Log into the CP portal via internal user, AD, LDAP, or SAML
AnyConnect performs posture. The endpoint moves to the right network based on posture compliance.
Name Enter the name of the AMP enabler profile that you want to create.
Install AMP • Windows Installer: Specify the URL of the local server that hosts the AMP for
Enabler Windows OS software. The AnyConnect module uses this URL to download the
.exe file to the endpoint. The file size is approximately 25 MB.
• Mac Installer: Specify the URL of the local server that hosts the AMP for macOS
software. The AnyConnect module uses this URL to download the .pkg file to
the endpoint. The file size is approximately 6 MB.
The Check button communicates with the server to verify if the URL is valid. If the
URL is valid, a "File found" message is displayed or else an error message is displayed.
Uninstall AMP Uninstalls the AMP for endpoint software from the endpoint.
Enabler
Add to Start Menu Adds a shortcut for the AMP for endpoint software in the Start menu of the endpoint,
after the AMP for endpoint software is installed on the endpoint.
Add to Desktop Adds an icon for the AMP for endpoint software on the desktop of the endpoint, after
the AMP for endpoint software is installed on the endpoint.
Add to Context Adds the Scan Now option in the right-click context menu of the endpoint, after the
Menu AMP for endpoint software is installed on the endpoint.
To create the AMP enable profile using the Cisco ISE embedded profile editor:
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provision >
Resources.
Step 2 Click the Add drop-down.
Step 3 Choose AMP Enabler Profile to create a new AMP enabler profile.
Step 4 Enter the appropriate values in the fields.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client provisioning >
Resources
Step 2 Click Add.
• Error Message: The Windows/Mac installer text box does not contain a valid URL.
This error message appears when you enter a syntactically incorrect URL format.
• Facilitates provisioning and enrolling of Chromebook devices with a Google device license.
• Manages Chromebook devices through the Google Admin Console.
• Sets up and manages the Wi-Fi network configuration for each Chromebook user.
• Manages the Chromebook devices by configuring applications and forced extensions to be installed on
the Chromebook device. Onboarding the Chromebook device requires the Cisco Network Setup Assistant
extensions to be installed in the Chromebook device. This allows the Chromebook device to connect to
Cisco ISE and install the ISE certificate. The extension is forcibly installed because the action of certificate
installation is allowed only for managed devices.
• Ensures that the Cisco ISE certificates are installed in the Google Admin Console to provide server
validation and secure connection. The Google administrator decides whether a certificate should be
generated for a device or a user. Cisco ISE provides options to:
• Generate the certificate for a single user who does not share the Chromebook device.
• Generate a certificate for a Chromebook device that is shared by multiple users. Refer to Step 5 in
the Configure the Network and Force Extensions in the Google Admin Console section for the
required additional configuration.
The Google Administrator installs the ISE server certificate so that ISE is trusted to perform the certificate
provisioning on the Chromebook device and also to allow EAP-TLS certificate-based authentication.
Google Chrome version 37 and higher supports certificate-based authentication for Chromebook devices.
The google administrator needs to load the ISE provisioning application in the Google Admin Console
and make it available to the Chromebook devices to get the certificate from ISE.
• Ensures that the recommended Google host names are allowed in the ACL definition list configured in
the WLC for SSL secure connections. Refer to the recommended and allowed host names in the Google
Support page.
The ISE Administrator:
• Defines the native supplicant profile for the Chromebook OS that includes the certificate template
structure.
• Creates the necessary authorization rules and client provisioning policies in Cisco ISE for Chromebook
users.
• The Cisco ISE administrator can create a custom certificate template for shared Chromebook devices
and use it in the policy. For example, instead of using the standard certificate template that matches the
Subject-Common Name (CN) value, you can specify a Name (for example, chrome-shared-grp1) in the
certificate and the same name can be assigned to the Chromebook device. A policy can be designed to
match the name to allow or deny access to a Chromebook device.
• The Cisco ISE administrator can create an endpoint group with all the Chromebook devices’ MAC
addresses that needs to go through Chromebook onboarding (devices for which access need to be
restricted). The authorization rule should call this out along with device type Chromebook—this would
allow access to be redirected to the NSP.
Step 1 Configure the Network and Force Extensions in the Google Admin Console .
Step 2 Configure Cisco ISE for Chromebook Onboarding.
Step 3 Wipe a Chromebook Device.
Step 4 Enroll Chromebook to the Google Admin Console.
Step 5 Connect Chromebook to the Cisco ISE Network for BYOD On Boarding.
Configure the Network and Force Extensions in the Google Admin Console
The Google administrator performs the following steps.
f) Click Save.
Step 6 (Optional) Install a certificate for a single user who does not share the Chromebook.
a) Choose Device Management > Network > Certificates.
b) In the Certificates window, click Add Certificate and upload the Cisco ISE certificate file.
What to do next
Configure Cisco ISE for Chromebook on board.
Step 1 Press Esc-Refresh-Power key combination. The screen displays a yellow exclamation point (!).
Step 2 Press Ctrl -D key combination to begin dev mode, then press Enter key. The screen displays a red exclamation point.
Step 3 Press Ctrl -D key combination. The Chromebook deletes its local data, returning to its initial state. The deletion takes
approximately 15 minutes.
Step 4 When the transition completes, press the Spacebar key, then press the Enter key to return to verified mode.
Step 5 Enroll the Chromebook before signing in.
What to do next
Enroll Chromebook to the Google Admin Console.
Step 1 Turn on the Chromebook device and follow the onscreen instructions until you see the sign on screen. Do not sign in yet.
Step 2 Before signing in to the Chromebook device, press Ctrl-Alt-E key combination. The Enterprise Enrolment screen
appears.
Step 3 Enter your email address and click Next.
You will receive the following message: Your device has successfully been enrolled for enterprise management.
Step 4 Click Done.
Step 5 Enter the username and password from your Google admin welcome letter, or the username and password for an existing
Google Apps user on your account that has eligibility to enroll.
Step 6 Click Enroll Device. You will receive a confirmation message that the device has been successfully enrolled.
Note that the Chromebook enrollment is a one-time process.
Note If you are using Dual SSID—When connecting from 802.x PEAP to an EAP-TLS network, connect to the
network by entering your credentials in the network supplicant, not the web browser.
Step 5 In the Device Information field, enter a name and a description for your device. For example, "Personal Devices: Jane's
Chromebook Used for School or Shared Devices: Library Chromebook #1 or Classroom 1 Chromebook #1".
Step 6 Click Continue.
Step 7 Click Yes in the Cisco Network Setup Assistant dialog box to install the certificate to access the secure network.
If the Google Administrator configured secure Wi-Fi, the network connection should happen automatically. If it does
not, choose the secure SSID from the list of available networks.
Chromebook users who have already enrolled in the domain, and have the Cisco Network Setup Assistant extension, can
update the extension without waiting for the auto update. Manually update the extension by performing the following
steps.
a. In your Chromebook, open the browser and enter the following URL: chrome://Extensions.
b. Check the Developer Mode check box.
c. Click Update Extensions Now.
d. Verify that the Cisco Network Setup Assistant extension version is 2.1.0.35 and higher.
Name Enter the name of the Enter the name of the Enter the name of the
network connection. network connection. network connection.
Service Set Identifier Enter the SSID (for Enter the SSID (for Enter the SSID (for
(SSID) example, tls_ssid). example, tls_ssid). example, tls_ssid).
This SSID Is Not Select the option. Select the option. Select the option.
Broadcast
Automatically Connect Select the option. Select the option. Select the option.
Outer Identity — — —
Server Certificate Select the ISE certificate Select the ISE certificate —
Authority (imported from Device (imported from Device
Management > Network Management > Network
> Certificates). > Certificates).
• If multiple EAP-TLS certificates are installed on the Chromebook device and all of them match the
certificate pattern configured on the Admin Console, the newest certificate will be used for the
connection.
Note AnyConnect does not support CWA flow. You can't provision AnyConnect from the Guest portal using the
Require guest device compliance field in the Work CentersGuest Access > Portals & Components >
Guest Portals > Create, Edit, or Duplicate > Portal Behavior and Flow Settings > Guest Device
Compliance Settings window. Instead, provision AnyConnect on the Client Provisioning portal. This method
results in redirection as configured in authorization permissions.
When you integrate Cisco ISE with the Cisco AnyConnect agent, Cisco ISE:
• Serves as a staging server to deploy Cisco AnyConnect Version 4.0 and future releases
• Interacts with the AnyConnect posture component for Cisco ISE posture requirements
• Supports deployment of Cisco AnyConnect profiles, customization and language packages, and OPSWAT
library updates for Windows and Mac OS X operating systems
• Supports Cisco AnyConnect and legacy agents at the same time
Note When switching network mediums, you must change the default gateway so the posture module can detect
the changed network and reassess the client.
Note When Cisco ISE is integrated with ASA, ensure that the Accounting mode is set to Single in ASA. Accounting
data is sent to only one accounting server in Single mode.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provision >
Resources.
Step 2 Click Add to create an AnyConnect configuration.
Step 3 Choose AnyConnect Configuration.
Step 4 Choose an AnyConnect Package, which you previously uploaded. For example, AnyConnect DesktopWindows
xxx.x.xxxxx.x .
Step 5 Enter the name for the current AnyConnect Configuration. For example, AC Config xxx.x.xxxxx.x.
Step 6 Choose the compliance module, which you previously uploaded. For example, AnyConnect ComplianceModulewindows
x.x.xxxx.x.
Step 7 Check one or more AnyConnect module check boxes. For example, choose one or more modules from the following:
ISE Posture, VPN, Network Access Manager, Web Security, AMP Enabler, ASA Posture, Start Before Log on (only
for Windows OS), and Diagnostic and Reporting Tool.
Note Un-checking the VPN module under AnyConnect Module Selection does not disable the VPN tile in the
provisioned client. You must configure VPNDisable_ServiceProfile.xml to disable the VPN tile on AnyConnect
GUI. In a system where AnyConnect is installed at the default location, you can find this file under C:\Program
Files\Cisco. If AnyConnect is installed at a different location, then the file will be available under <AnyConnect
Installed path>\Cisco.
Step 8 Choose AnyConnect profiles for selected AnyConnect modules. For example, ISE Posture, VPN, NAM, and Web
Security.
Step 9 Choose AnyConnect customization and localization bundles.
Step 10 Click Submit.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Results > Client Provisioning >
Resources.
Step 2 Click Add.
Step 3 Choose AnyConnect Posture Profile.
Step 4 Enter Name of the profile.
Step 5 Configure parameters for the following:
• Cisco ISE posture agent behavior
• Client IP Address Changes
• Cisco ISE posture protocol
Enable agent IP refresh Yes (Default) This setting specifies whether or not the
client machine to renew or refresh its IP
address after the switch (or WLC) changes
the VLAN for the login session of the
client on the respective switch port.
Note Merge parameter values with existing agent profile settings or overwrite them to appropriately configure
clients on Windows and Mac OS X clients for refreshing IP addresses.
Note ActiveX is supported only on the 32-bit versions of Internet Explorer. You cannot install ActiveX on a Firefox
web browser or on a 64-bit version of Internet Explorer.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Client Provisioning.
Step 2 From the Behavior drop-down list, choose one of the following options:
• Enable: Ensures Cisco ISE uses this policy to help fulfill client-provisioning functions when users log in to the
network and conform to the client-provisioning policy guidelines.
• Disable: Cisco ISE does not use the specified resource policy to fulfill client-provisioning functions.
• Monitor: Disables the policy and “watches” the client-provisioning session requests to see how many times Cisco
ISE tries to invoke based on the “Monitored” policy.
Step 3 Enter a name for the new resource policy in the Rule Name text box.
Step 4 Specify one or more Identity Groups to which a user who logs into Cisco ISE might belong.
You can choose to specify the Any identity group type, or choose one or more groups from a list of existing Identity
Groups that you have configured.
Step 5 Use the Operating Systems field to specify one or more operating systems that might be running on the client machine
or device through which the user is logging into Cisco ISE.
You can choose to specify a single operating system like Android, Mac iOS, macOS or an umbrella operating system
designation that addresses a number of client machine operating systems like Windows XP (All) or Windows 7 (All).
Note Though the option to select macOS 10.6, 10.7, and 10.8 is available in the Client Provisioning window in Cisco
ISE GUI, these versions are not supported by AnyConnect.
Step 6 In the Other Conditions field, specify a new expression that you want to create for this particular resource policy.
Step 7 For client machines, use the Agent Configuration option to specify which agent type, compliance module, agent
customization package, and profile to make available and provision on the client machine.
It is mandatory to include the client provisioning URL in authorization policy to enable the agent to popup in the client
machines. This prevents request from any random clients and ensures that only clients with proper redirect URL can
request for posture assessment.
Step 8 Click Save.
What to do next
After you have successfully configured one or more client provisioning resource policies, you can start to
configure Cisco ISE to perform posture assessment on client machines during login.
Step 1 Choose an available agent from the Agent drop-down list and specify whether the agent upgrade (download) defined
here is mandatory for the client machine by enabling or disabling the Is Upgrade Mandatory option, as appropriate.
The Is Upgrade Mandatory setting only applies to agent downloads. Agent profile, compliance module, and agent
customization package updates are always mandatory.
Step 2 Choose an existing agent profile from the Profile drop-down list.
Step 3 Choose an available compliance module to download to the client machine using the Compliance Module drop-down
list.
Step 4 Choose an available agent customization package for the client machine from the Agent Customization Package
drop-down list.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Choose Policy > Client Provisioning.
Step 2 Choose Enable, Disable, or Monitor from the behavior drop-down list.
Step 3 Enter a name for the new resource policy in the Rule Name text box.
Step 4 Specify the following:
• Use the Identity Groups field to specify one or more Identity Groups to which a user who logs into Cisco ISE might
belong.
• Use the Operating System field to specify one or more operating systems that might be running on the personal
device through which the user is logging into Cisco ISE.
• Use the Other Conditions field to specify a new expression that you want to create for this particular resource
policy.
Step 5 For personal devices, use Native Supplicant Configuration to choose the specific Configuration Wizard to distribute
to these personal devices.
Step 6 Specify the applicable Wizard Profile for the given personal device type.
Step 7 Click Save.
Portal Settings
• HTTPS Port: Enter a port value between 8000 to 8999; the default value is 8443 for all the default
portals, except the Blocked List Portal, which is 8444. If you upgraded with port values outside this
range, they are honored until you make any change to this page. If you make any change to this page,
you must update the port setting to comply with this restriction.
• Allowed Interfaces: Select the PSN interfaces which can run a portal. Only a PSN with an available
allowed interface on a PSN can create a portal. You can configure any combination of physical and
bonded interfaces. This is a PSN-wide configuration; all portals can only run on these interfaces, this
interface configuration is pushed to all the PSNs.
• You must configure the Ethernet interfaces using IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name/Alternate Subject Name must resolve to the interface IP.
• Configure ip host x.x.x.x yyy.domain.com in ISE CLI to map secondary interface IP to FQDN,
which will be used to match Certificate Subject Name/Alternate Subject Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond set
upon that PSN, then the PSN logs an error and exits. It will NOT attempt to start the portal on the
physical interface.
• NIC Teaming or bonding is an O/S configuration option that allows you to configure two individual
NICs for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the
bonded connection continues the connection. A NIC is selected for a portal based on the portal
settings configuration:
• If both physical NICs and the corresponding bonded NIC are configured - When the PSN
attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to
start the portal on the physical interface.
• Certificate Group Tag: Select the group tag of the certificate group to use for the portal’s HTTPS traffic.
• Authentication Method: Choose which identity source sequence (ISS) or Identity Provider (IdP) to use
for user authentication. The ISS is a list of Identity Stores that are searched in sequence to verify user
credentials. Some examples include: Internal Guest Users, Internal Users, Active Directory, and LDAP.
Cisco ISE includes a default client provisioning Identity Source Sequence for Client Provisioning Portals,
Certificate_Request_Sequence.
• Fully Qualified Domain Name (FQDN): Enter at least one unique FQDN and/or hostname for your
Client Provisioning portal. For example, you can enter provisionportal.yourcompany.com, so that when
the user enters either of those into a browser, they will reach the Client Provisioning Portal.
• Update DNS to ensure that the FQDN of the new URL resolves to a valid Policy Services Node
(PSN) IP address. Optionally, this address could point to a load balancer virtual IP address that
serves a pool of PSNs.
• To avoid certificate warning messages due to name mismatches, include the FQDN of the customized
URL, or a wildcard, in the subject alternative name (SAN) attribute of the local server certificate
of the Cisco ISE PSN.
Note For Client Provisioning without URL redirection, the portal name that is entered
in the Fully Qualified Domain Name (FQDN) field must be configured in the
DNS configuration. This URL must be communicated to the users to enable Client
Provisioning without URL redirection.
• Idle Timeout: Enter the time in minutes that you want Cisco ISE to wait before it logs out the user if
there is no activity in the portal. The valid range is from 1 to 30 minutes..
Note In the Client Provisioning Portal, you can define the port number and the certificate so that the host allows
you to download the same certificate for Client Provisioning and Posture. If the portal certificate is signed by
the officials certificate authority, you will not receive any security warning. If the certificate is self-signed,
you will receive one security warning for both the portals and Cisco AnyConnect Posture component.
• Every ______ days (starting at first login): Display an AUP periodically after the user first logs into the
network or portal.
Note This is not a complete list of the dictionary keys in the files.
• key.guest.ui_client_provision_agent_installed_instructions_without_java_message
• key.guest.ui_contact_instruction_message
• key.guest.ui_success_message
• key.guest.ui_client_provision_unable_to_detect_message
• key.guest.ui_client_provision_instruction_message
• key.guest.ui_client_provision_agent_installation_message
• key.guest.ui_client_provision_posture_agent_check_message
• key.guest.ui_vlan_instruction_message
• key.guest.ui_client_provision_agent_installation_instructions_with_no_java_message
• key.guest.ui_success_instruction_message
• key.guest.ui_vlan_optional_content_1
• key.guest.ui_vlan_optional_content_2
• key.guest.ui_contact_optional_content_2
• key.guest.ui_contact_optional_content_1
• key.guest.ui_contact_optional_content_1
• key.guest.ui_client_provision_posture_check_compliant_message
• key.guest.ui_client_provision_optional_content_2
• key.guest.ui_client_provision_optional_content_1
• key.guest.ui_error_optional_content_2
• key.guest.ui_error_optional_content_1
• key.guest.ui_client_provision_posture_check_non_compliant_message
• key.guest.ui_vlan_install_message
• key.guest.ui_success_optional_content_1
• key.guest.ui_success_optional_content_2
• key.guest.ui_client_provision_posture_agent_scan_message
Note Only the Qualys Enterprise Edition is currently supported for TC-NAC flows.
• Rapid7 Nexpose
• Tenable Security Center
When a threat event is detected for an endpoint, you can select the MAC address of the endpoint on the
Compromised Endpoints window and apply an ANC policy, such as Quarantine. Cisco ISE triggers CoA
for that endpoint and applies the corresponding ANC policy. If ANC policy is not available, Cisco ISE triggers
CoA for that endpoint and applies the original authorization policy. You can use the Clear Threat and
Vulnerabilities option on the Compromised Endpoints window to clear the threat and vulnerabilities
associated with an endpoint (from Cisco ISE system database).
The following attributes are listed under the Threat dictionary:
• CTA-Course_Of_Action (values can be Internal Blocking, Eradication, or Monitoring)
• Qualys-CVSS_Base_Score
• Qualys-CVSS_Temporal_Score
• Rapid7 Nexpose-CVSS_Base_Score
• Tenable Security Center-CVSS_Base_Score
• Tenable Security Center-CVSS_Temporal_Score
The valid range is from 0 to 10 for both Base Score and Temporal Score attributes.
When a vulnerability event is received for an endpoint, Cisco ISE triggers CoA for that endpoint. However,
CoA is not triggered when a threat event is received.
You can create an authorization policy by using the vulnerability attributes to automatically quarantine the
vulnerable endpoints based on the attribute values. For example:
Any Identity Group & Threat:Qualys-CVSS_Base_Score > 7.0 -> Quarantine
To view the logs of an endpoint that is automatically quarantined during CoA events, choose Operations >
Threat-Centric NAC Live Logs. To view the logs of an endpoint that is quarantined manually, choose
Operations > Reports > Audit > Change Configuration Audit.
Note the following points while enabling the Threat Centric NAC service:
• The Threat Centric NAC service requires a Cisco ISE Premier license.
• Threat Centric NAC service can be enabled on only one node in a deployment.
• You can add only one instance of an adapter per vendor for Vulnerability Assessment service. However,
you can add multiple instances of FireAMP adapter.
• You can stop and restart an adapter without losing its configuration. After configuring an adapter, you
can stop the adapter at any point of time. The adapter would remain in this state even when the ISE
services are restarted. Select the adapter and click Restart to start the adapter again.
Note When an adapter is in Stopped state, you can edit only the name of the adapter
instance; you cannot edit the adapter configuration or the advanced settings.
You can view the threat information for the endpoints on the following pages:
• Home page > Threat dashboard
• Context Visibility > Endpoints > Compromised Endpoints
The following alarms are triggered by the Threat Centric NAC service:
• Adapter not reachable (syslog ID: 91002): Indicates that the adapter cannot be reached.
• Adapter Connection Failed (syslog ID: 91018): Indicates that the adapter is reachable but the connection
between the adapter and source server is down.
• Adapter Stopped Due to Error (syslog ID: 91006): This alarm is triggered if the adapter is not in the
desired state. If this alarm is displayed, check the adapter configuration and server connectivity. Refer
to the adapter logs for more details.
• Adapter Error (syslog ID: 91009): Indicates that the Qualys adapter is unable to establish a connection
with or download information from the Qualys site.
The following reports are available for the Threat Centric NAC service:
• Adapter Status: The Adapter Status report displays the status of the threat and vulnerability adapters.
• COA Events: When a vulnerability event is received for an endpoint, Cisco ISE triggers CoA for that
endpoint. The CoA Events report displays the status of these CoA events. It also displays the old and
new authorization rules and the profile details for these endpoints.
• Threat Events: The Threat Events report provides a list of all the threat events that Cisco ISE receives
from the various adapters that you have configured. Vulnerability Assessment events are not included
in this report.
• Vulnerability Assessment: The Vulnerability Assessment report provides information about the
assessments that are happening for your endpoints. You can view this report to check if the assessment
is happening based on the configured policy.
You can view the following information from Operations > Reports > Diagnostics > ISE Counters >
Threshold Counter Trends:
• Total number of events received
• Total number of threat events
• Total number of vulnerability events
• Total number of CoAs issued (to PSN)
The values for these attributes are collected every 5 minutes, so these values represent the count for the last
5 minutes.
The Threat dashboard contains the following dashlets:
• Total Compromised Endpoints dashlet displays the total number of endpoints (both connected and
disconnected endpoints) that are currently impacted on the network.
• Compromised Endpoints Over Time dashlet displays a historical view of the impact on endpoints for
the specified time period.
• Top Threats dashlet displays the top threats based on the number of endpoints impacted and the severity
of the threat.
• You can use the Threats Watchlist dashlet to analyze the trend of selected events.
The size of the bubbles in the Top Threats dashlet indicates the number of endpoints impacted and the light
shaded area indicates the number of disconnected endpoints. The color as well as the vertical scale indicate
the severity of the threat. There are two categories of threat—Indicators and Incidents. The severity attribute
for Indicator is "Likely_Impact" and the severity attribute for Incident is "Impact_Qualification".
The Compromised Endpoint window displays the matrix view of the endpoints that are impacted and the
severity of the impact for each threat category. You can click on the device link to view the detailed threat
information for an endpoint.
The Course Of Action chart displays the action taken (Internal Blocking, Eradication, or Monitoring) for the
threat incidents based on the CTA-Course_Of_Action attribute received from the CTA adapter.
The Vulnerability dashboard on the Home page contains the following dashlets:
• Total Vulnerable Endpoints dashlet displays the total number of endpoints that have a CVSS score
greater than the specified value. Also displays the total number of connected and disconnected endpoints
that have a CVSS score greater than the specified value.
• Top Vulnerability dashlet displays the top vulnerabilities based on the number of endpoints impacted
or the severity of the vulnerability. The size of the bubbles in the Top Vulnerability dashlet indicates the
number of endpoints impacted and the light shaded area indicates the number of disconnected endpoints.
The color as well as the vertical scale indicates the severity of the vulnerability.
• You can use the Vulnerability Watchlist dashlet to analyze the trend of selected vulnerabilities over a
period of time. Click the search icon in the dashlet and enter the vendor-specific id ("qid" for Qualys ID
number) to select and view the trend for that particular ID number.
• The Vulnerable Endpoints Over Time dashlet displays a historical view of the impact on endpoints
over time.
The Endpoint Count By CVSS graph on the Vulnerable Endpoints window shows the number of endpoints
that are affected and their CVSS scores. You can also view the list of affected endpoints on the Vulnerable
Endpoints window. You can click the device link to view the detailed vulnerability information for each
endpoint.
Threat Centric NAC service logs are included in the support bundle. Threat Centric NAC service logs are
located at support/logs/TC-NAC/
Note Cisco ISE does not support on-demand scanning with credentials on endpoints.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Check the check box next to the PSN on which you want to enable the Threat Centric NAC service and click Edit.
Step 3 Check the Enable Threat Centric NAC Service check box.
Step 4 Click Save.
Related Topics
Add SourceFire FireAMP Adapter, on page 1189
Configure Cognitive Threat Analytics Adapter, on page 1190
Configure Authorization Profiles for CTA Adapter, on page 1191
Configure Authorization Policy using the Course of Action Attribute, on page 1192
Threat Centric NAC Service, on page 1185
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Threat Centric NAC > Third Party
Vendors.
Step 2 Click Add.
Step 3 Select AMP : Threat from the Vendor drop-down list.
Step 4 Enter a name for the adapter instance.
Step 5 Click Save.
Step 6 Refresh the Vendor Instances listing window. You can configure the adapter only after the adapter status changes to
Ready to Configure on the Vendor Instances listing window.
Step 7 Click the Ready to configure link.
Step 8 (Optional) If you have configured a SOCKS proxy server to route all the traffic, enter the hostname and the port number
of the proxy server.
Step 9 Select the cloud to which you want to connect. You can select US cloud or EU cloud.
Step 10 Select the event source to which you want to subscribe. The following options are available:
• AMP events only
• CTA events only
• CTA and AMP events
Step 11 Click the FireAMP link and login as admin in FireAMP. Click Allow in the Applications pane to authorize the Streaming
Event Export request.
You will be redirected back to Cisco ISE.
Step 12 Select the events (for example, suspicious download, connection to suspicious domain, executed malware, java
compromise) that you want to monitor.
When you change the advanced settings or reconfigure an adapter, if there are any new events added to the AMP cloud,
those events are also listed in the Events Listing window.
You can choose a log level for the adapter. The available options are: Error, Info, and Debug.
The summary of the adapter instance configuration will be displayed in the Configuration Summary window.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Threat Centric NAC > Third Party
Vendors.
Step 2 Click Add.
Step 3 Select CTA : Threat from the Vendor drop-down list.
Step 4 Enter a name for the adapter instance.
Step 5 Click Save.
Step 6 Refresh the Vendor Instances listing page. You can configure the adapter only after the adapter status changes to Ready
to Configure on the Vendor Instances listing page.
Step 7 Click the Ready to configure link.
Step 8 Enter the following details:
• CTA STIX/TAXII service URL: URL of the CTA cloud service. By default, the following URL is used:
https://taxii.cloudsec.sco.cisco.com/skym-taxii-ws/PollService/
• CTA feed name: Enter the feed name of the CTA cloud service.
• CTA username and password: Enter the username and password for the CTA cloud service.
• Proxy host and port (optional): If you have configured a proxy server to route all the traffic, enter the hostname
and the port number of the proxy server.
• Polling interval: Time interval between each poll. Default value is 30 minutes.
• First Poll Duration in hours: Age of the data to be pulled at the first poll. Default value is 2 hours. Maximum
value is 12 hours.
• Incident Type: The following options are available:
• CTA events only
• AMP events only
For example, if you have selected "3-Painful", incidents with this severity level (3-Painful) and above (in this case,
4-Damaging and 5-Catastrophic) are polled.
• Logging level: Choose a log level for the adapter. The available options are: Error, Info, and Debug.
Note CTA works with user identities listed in the web proxy logs as IP addresses or usernames. Specifically, in the
case of IP addresses, the IP address of a device that is available through the proxy logs may collide with the
IP address of another device on the internal network. For example, roaming users connected via AnyConnect
and a split-tunnel directly to the internet could acquire a local IP range address (for example, 10.0.0.X address),
which may collide with an address in an overlapping private IP range used in an internal network. We
recommend that you take into account the logical network architecture while defining the policies to avoid
quarantine actions being applied on mismatched devices.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Authorization > Authorization
Profiles.
Step 2 Click Add.
Step 3 Enter a name and description for the authorization profile.
Step 4 Select the Access Type.
Step 5 Enter the required details and click Submit.
When a threat event is received for an endpoint, Cisco ISE checks if there is any matching authorization policy
for the endpoint and triggers CoA only if the endpoint is active. If the endpoint is offline, threat event details
are added to the Threat Events report (Operations > Reports > Threat Centric NAC > Threat Events).
Note Sometimes CTA sends multiple risks and their associated Course of Action attributes in one incident. For
example, it can send "Internal Blocking" and "Monitoring" (course of action attributes) in one incident. In
this case, if you have configured an authorization policy to quarantine endpoints using "equals" operator, the
endpoints will not be quarantined. For example:
CTA-Course_Of_Action EQUALS Internal Blocking then Quarantine_Systems (authorization profile)
In such cases, you must use "contains" operator in the authorization policy to quarantine the endpoints. For
example:
CTA-Course_Of_Action CONTAINS Internal Blocking then Quarantine_Systems
Qualys enforces limits on the number of API calls that subscribed users can make. The default rate limit
count is 300 per 24 hours. Cisco ISE uses Qualys API version 2.0 to connect to Qualys. Refer to the
Qualys API V2 User Guide for more information on these API functions.
• Rapid7 Nexpose: Cisco ISE integrates with Rapid 7 Nexpose, a vulnerability management solution, to
help detect vulnerabilities and enables you to respond to such threats quickly. Cisco ISE receives the
vulnerability data from Nexpose and based on the policies that you configure in ISE, it quarantines the
affected endpoints. From the Cisco ISE dashboard, you can view the affected endpoint and take appropriate
action.
Cisco ISE has been tested with Nexpose Release 6.4.1.
• Tenable SecurityCenter (Nessus scanner): Cisco ISE integrates with Tenable SecurityCenter and receives
the vulnerability data from Tenable Nessus scanner (managed by Tenable SecurityCenter) and based on
the policies that you configure in ISE, it quarantines the affected endpoints. From the Cisco ISE dashboard,
you can view the affected endpoints and take appropriate action.
Cisco ISE has been tested with Tenable SecurityCenter 5.3.2.
The results from the ecosystem partner are converted in to a Structured Threat Information Expression (STIX)
representation and based on this value, a Change of Authorization (CoA) is triggered, if needed, and the
appropriate level of access is granted to the endpoint.
The time taken to assess endpoints for vulnerabilities depends on various factors and hence VA cannot be
performed in real time. The factors that affect the time taken to assess an endpoint for vulnerabilities include:
• Vulnerability assessment ecosystem
• Type of vulnerabilities scanned for
• Type of scans enabled
• Network and system resources allocated by the ecosystem for the scanner appliances
In this release of Cisco ISE, only endpoints with IPv4 addresses can be assessed for vulnerabilities.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Deployment.
Step 2 Check the check box next to the PSN on which you want to enable the Threat Centric NAC service and click Edit.
Step 3 Check the Enable Threat Centric NAC Service check box.
Step 4 Click Save.
Related Topics
Add SourceFire FireAMP Adapter, on page 1189
Configure Cognitive Threat Analytics Adapter, on page 1190
Configure Authorization Profiles for CTA Adapter, on page 1191
Configure Authorization Policy using the Course of Action Attribute, on page 1192
Threat Centric NAC Service, on page 1185
• Ensure that you have appropriate Qualys license subscriptions. You need access to the Qualys Report
Center, Knowledge Base (KBX), and API. Contact your Qualys Account Manager for details.
• Import the Qualys server certificate in to the Trusted Certificates store in Cisco ISE (Administration >
Certificates > Certificate Management > Trusted Certificates > Import). Ensure that the appropriate
root and intermediate certificates are imported (or present) in the Cisco ISE Trusted Certificates store.
• Refer to the Qualys API Guide for the following configurations:
• Ensure that you have enabled CVSS Scoring in Qualys (Reports > Setup > CVSS Scoring > Enable
CVSS Scoring).
• Ensure that you add the IP address and subnet mask of your endpoints in Qualys (Assets > Host
Assets).
• Ensure that you have the name of the Qualys option profile. The option profile is the scanner template
that Qualys uses for scanning. We recommend that you use an option profile that includes
authenticated scans (this option checks the MAC Address of the endpoint as well).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Threat Centric NAC > Third Party
Vendors.
Step 2 Click Add.
Step 3 From the Vendor drop-down list, choose Qualys:VA.
Step 4 Enter a name for the adapter instance. For example, Qualys_Instance.
The listing window appears with a list of configured adapter instances.
Step 5 Refresh the Vendor Instances listing window. The status for the newly added Qualys_Instance adapter should change
to Ready to Configure.
Step 6 Click the Ready to Configure link.
Step 7 Enter the following values in the Qualys configuration screen and click Next.
REST API Host The hostname of the server that hosts the Qualys cloud.
Contact your Qualys representative for this information.
HTTP Proxy Host If you have a proxy server configured to route all Internet
traffic, enter the hostname of the proxy server.
HTTP Proxy Port Enter the port number used by the proxy server.
If the connection to the Qualys server is established, the Scanner Mappings window appears with a list of Qualys
scanners. The Qualys scanners from your network appear in this window.
Step 8 Choose the default scanner that Cisco ISE will use for on-demand scans.
Step 9 In the PSN to Scanner Mapping area, choose one or more Qualys scanner appliance(s) to the PSN node, and click
Next.
The Advanced Settings window appears.
Step 10 Enter the following values in the Advanced Settings window. The settings in this window determine whether an
on-demand scan will be triggered or the last scan results will be used for VA.
Option Profile Choose the option profile that you want Qualys to use for
scanning the endpoint. You can choose the default option
profile, Initial Options.
Last scan results check interval in minutes (Impacts the access rate of Host Detection List API) Time
interval in minutes after which the last scan results must
be checked again. Valid range is between 1 and 2880.
Maximum results before last scan results are checked (Impacts the access rate of Host Detection List API) If the
number of queued scan requests exceeds the maximum
number specified here, the last scan results are checked
before the time interval specified in Last scan results
check interval in minutes field. Valid range is between
1 and 1000.
Verify MAC address True or False. When set to true, the last scan results from
Qualys would be used only if it includes the MAC address
of the endpoint.
Scan Settings
Scan trigger interval in minutes (Impacts the access rate of Scan API) Time interval in
minutes after which an on-demand scan is triggered. Valid
range is between 1 and 2880.
Maximum requests before scan is triggered (Impacts the access rate of Scan API) If the number of
queued scan requests exceeds the maximum number
specified here, an on-demand scan would be triggered
before the time interval specified in Scan trigger interval
in minutes field. Valid range is between 1 and 1000.
Scan status check interval in minutes Time interval in minutes after which Cisco ISE
communicates with Qualys to check the status of the scan.
Valid range is between 1 and 60.
Number of scans that can be triggered concurrently (This option depends on the number of scanners you have
mapped to each PSN in the Scanner Mappings screen)
Each scanner can process only one request at a time. If
you have mapped more than one scanner to the PSNs, then
you can increment this value based on the number of
scanners you have chosen. Valid range is between 1 and
200.
Scan timeout in minutes Time in minutes after which the scan request will time out.
If a scan request times out, an alarm is generated. Valid
range is between 20 and 1440.
Maximum number of IP addresses to be submitted per Indicates the number of requests that can be queued into
scanner a single request to be sent to Qualys for processing. Valid
range is between 1 and 1000.
Choose the log level for adapter log files Choose a log level for the adapter. The available options
are ERROR, INFO, DEBUG, and TRACE.
• Import the Nexpose server certificate in to the Trusted Certificates store in Cisco ISE (Administration
> Certificates > Certificate Management > Trusted Certificates > Import). Ensure that the appropriate
root and intermediate certificates are imported (or present) in the Cisco ISE Trusted Certificates store.
• Cisco ISE communicates with Nexpose over HTTPS/SSL (port 3780).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Threat Centric NAC > Third Party
Vendors.
Step 2 Click Add.
Step 3 From the Vendor drop-down list, choose Rapid7 Nexpose:VA.
Step 4 Enter a name for the adapter instance. For example, Nexpose.
The listing window appears with a list of configured adapter instances.
Step 5 Refresh the Vendor Instances listing window. The status for the newly added Nexpose adapter should change to Ready
to Configure.
Step 6 Click the Ready to Configure link.
Step 7 Enter the following values in the Nexpose configuration screen and click Next.
HTTP Proxy Host If you have a proxy server configured to route all Internet
traffic, enter the hostname of the proxy server.
HTTP Proxy Port Enter the port number used by the proxy server.
Interval between checking the latest scan results in Time interval in minutes after which the last scan results
minutes must be checked again. Valid range is between 1 and 2880.
Number of pending requests that can trigger checking If the number of queued scan requests exceeds the
the latest scan results maximum number specified here, the last scan results are
checked before the time interval specified in Interval
between checking the latest scan results in minutes field.
Valid range is between 1 and 1000.
Verify MAC address True or False. When set to true, the last scan results from
Nexpose would be used only if it includes the MAC
address of the endpoint.
Scan settings
Scan trigger interval for each site in minutes Time interval in minutes after which a scan is triggered.
Valid range is between 1 and 2880.
Number of pending requests before a scan is triggered If the number of queued scan requests exceeds the
for each site maximum number specified here, a scan would be triggered
before the time interval specified in Scan timeout in
minutes field. Valid range is between 1 and 1000.
Scan timeout in minutes Time in minutes after which the scan request will time out.
If a scan request times out, an alarm is generated. Valid
range is between 20 and 1440.
Number of sites for which scans could be triggered The number of sites for which scans can be run
concurrently concurrently. Valid range is between 1 and 200.
Timezone Choose the time zone based on the time zone that is
configured in the Nexpose server.
Http timeout in seconds Time interval in seconds for Cisco ISE to wait for a
response from Nexpose. Valid range is between 5 and
1200.
Choose the log level for adapter log files Choose a log level for the adapter. The available options
are ERROR, INFO, DEBUG, and TRACE.
Note You must configure the following in Tenable SecurityCenter before you can configure the Tenable Adapter
in Cisco ISE. Refer to Tenable SecurityCenter Documentation for these configurations.
• You must have Tenable Security Center and Tenable Nessus Vulnerability Scanner installed. While
registering the Tenable Nessus scanner, ensure that you choose Managed by SecurityCenter in the
Registration field.
• Create a user account with Security Manager privilege in Tenable SecurityCenter.
• Create a repository in SecurityCenter (Log in to Tenable SecurityCenter with Admin credentials and
choose Repository > Add).
• Add the endpoint IP range to be scanned in the repository.
• Add Nessus scanner.
• Create scan zones and assign IP addresses to the scan zones and scanners that are mapped to these scan
zones.
• Create a scan policy for ISE.
• Add an active scan and associate it with the ISE scan policy. Configure settings and targets (IP/DNS
names).
• Export System and Root certificates from Tenable SecurityCenter and import it in to the Trusted
Certificates store in Cisco ISE (Administration > Certificates > Certificate Management > Trusted
Certificates > Import). Ensure that the appropriate root and intermediate certificates are imported (or
present) in the Cisco ISE Trusted Certificates store.
• Cisco ISE communicates with Tenable SecurityCenter over HTTPS/SSL (port 443).
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > Threat Centric NAC > Third Party
Vendors.
Step 2 Click Add.
Step 3 From the Vendor drop-down list, choose Tenable Security Center:VA.
Step 4 Enter a name for the adapter instance. For example, Tenable.
The listing window appears with a list of configured adapter instances.
Step 5 Refresh the Vendor Instances listing window. The status for the newly added Tenable adapter should change to Ready
to Configure.
Step 6 Click the Ready to Configure link.
Step 7 Enter the following values in the Tenable SecurityCenter configuration window and click Next.
HTTP Proxy Host If you have a proxy server configured to route all Internet
traffic, enter the hostname of the proxy server.
HTTP Proxy Port Enter the port number used by the proxy server.
Scan Policy Choose the scan policy that you have created for ISE in
Tenable SecurityCenter.
Interval between checking the latest scan results in Time interval in minutes after which the last scan results
minutes must be checked again. Valid range is between 1 and 2880.
Number of pending requests that can trigger checking If the number of queued scan requests exceeds the
the latest scan results maximum number specified here, the last scan results are
checked before the time interval specified in the Interval
between checking the latest scan results in minutes field.
Valid range is between 1 and 1000. The default is 10.
Verify MAC address True or False. When set to true, the last scan results from
Tenable SecurityCenter would be used only if it includes
the MAC address of the endpoint.
Scan Settings
Scan trigger interval for each site in minutes Time interval in minutes after which an on-demand scan
is triggered. Valid range is between 1 and 2880.
Number of pending requests before a scan is triggered If the number of queued scan requests exceeds the
maximum number specified here, an on-demand scan
would be triggered before the time interval specified in
Scan trigger interval for each site in minutes field. Valid
range is between 1 and 1000.
Scan timeout in minutes Time in minutes after which the scan request times out. If
a scan request times out, an alarm is generated. Valid range
is between 20 and 1440.
Number of scans that could run in parallel The number of scans that can be run concurrently. Valid
range is between 1 and 200.
Http timeout in seconds Time interval in seconds for Cisco ISE to wait for a
response from Tenable SecurityCenter. Valid range is
between 5 and 1200.
Choose the log level for adapter log files Choose a log level for the adapter. The available options
are ERROR, INFO, DEBUG, and TRACE.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements > Authorization > Authorization
Profiles.
Step 2 Create a new authorization profile or edit an existing profile.
Step 3 From the Common Tasks area, check the Assess Vulnerabilities check box.
Step 4 From the Adapter Instance drop-down list, choose the vendor adapter that you have configured. For example,
Qualys_Instance.
Step 5 Enter the scan interval in hours in the Trigger scan if the time since last scan is greater than text box. Valid range is
between 1 and 9999.
Step 6 Check the Assess periodically using above interval check box.
Step 7 Click Submit.
These attributes are available in the Threat directory. Valid value ranges from 0 to 10.
You can choose to quarantine the endpoint, provide limited access (redirect to a different portal), or reject the
request.
Certificate Issuer
Friendly Name Enter a friendly name for the certificate. This is an optional field. If you do not enter
a friendly name, a default name is generated in the following format:
common-name#issuer#nnnnn
Status Choose Enabled or Disabled from the drop-down list. If the certificate is disabled,
Cisco ISE will not use the certificate for establishing trust.
Usage
Trust for Check this check box if you want this certificate to verify server certificates (from
authentication other Cisco ISE nodes or LDAP servers).
within ISE
Trust for client (Applicable only if you check the Trust for authentication within ISE check box)
authentication and Check the check box if you want this certificate to be used to:
Syslog
• Authenticate endpoints that connect to Cisco ISE using the EAP protocol.
• Trust a Syslog server.
Trust for You can check this check box only when Trust for client authentication and Syslog
certificate based is selected.
admin
Check this check box to enable usage for certificate-based authentications for admin
authentication
access. Import the required certificate chains into the Trusted Certificate store.
Trust for Check this check box if you want this certificate to be used to trust external Cisco
authentication of services such as the Feed Service.
Cisco Services
Certificate Status Cisco ISE supports two ways of checking the revocation status of a client or server
Validation certificate that is issued by a particular CA. The first way is to validate the certificate
using the Online Certificate Status Protocol (OCSP), which makes a request to an
OCSP service maintained by the CA. The second way is to validate the certificate
against a CRL which is downloaded from the CA into Cisco ISE. Both of these methods
can be enabled, in which case OCSP is used first and only if a status determination
cannot be made then the CRL is used.
Validate Against Check the check box to validate the certificate against OCSP services. You must first
OCSP Service create an OCSP Service to be able to check this box.
Reject the request Check the check box to reject the request if certificate status is not determined by the
if OCSP returns OCSP service. If you check this check box, an unknown status value that is returned
UNKNOWN status by the OCSP service causes Cisco ISE to reject the client or server certificate currently
being evaluated.
Reject the request Check the check box for Cisco ISE to reject the request if the OCSP Responder is not
if OCSP Responder reachable.
is unreachable
Download CRL Check the check box for the Cisco ISE to download a CRL.
CRL Distribution Enter the URL to download the CRL from a CA. This field is automatically populated
URL if it is specified in the certificate authority certificate. The URL must begin with “http”,
“https”, or “ldap.”
Retrieve CRL The CRL can be downloaded automatically or periodically. Configure the time interval
between downloads.
If download failed, Configure the time interval that Cisco ISE must wait Cisco ISE tries to download the
wait CRL again.
Bypass CRL Check this check box, for the client requests to be accepted before the CRL is received.
Verification if CRL If you uncheck this check box, all client requests that use certificates signed by the
is not Received selected CA will be rejected until Cisco ISE receives the CRL file.
Ignore that CRL is Check this check box if you want Cisco ISE to ignore the start date and expiration date
not yet valid or and continue to use the not yet active or expired CRL and permit or reject the EAP-TLS
expired authentications based on the contents of the CRL.
Uncheck this check box if you want Cisco ISE to check the CRL file for the start date
in the Effective Date field and the expiration date in the Next Update field. If the CRL
is not yet active or has expired, all authentications that use certificates signed by this
CA are rejected.
Related Topics
Trusted Certificates Store, on page 275
Edit a Trusted Certificate, on page 280
Maintenance Settings
These windows help you to manage data using the backup, restore, and data purge features.
Repository Settings
The following table describes the fields on the Repository List window, which you can use to create repositories
to store your backup files. To view this window, click the Menu icon ( ) and choose Administration >
System > Maintenance > Repository.
Repository Enter the name of the repository. Alphanumeric characters are allowed and the
maximum length is 80 characters.
Protocol Choose one of the available protocols that you want to use.
Server Name (Required for TFTP, HTTP, HTTPS, FTP, SFTP, and NFS) Enter the hostname or IP
address (IPv4 or IPv6) of the server where you want to create the repository.
Note Ensure that the ISE eth0 interface is configured with an IPv6 address if you
are adding a repository with an IPv6 address.
Path Enter the path to your repository. The path must be valid and must exist at the time
you create the repository.
This value can start with two forward slashes (//) or a single forward slash (/) denoting
the root directory of the server. However, for the FTP protocol, a single forward slash
(/) denotes the FTP of the local device home directory and not the root directory.
Enable PKI (Optional; applicable only for SFTP repository) Check this check box if you want to
authentication enable RSA Public Key Authentication in SFTP repository.
User Name (Required for FTP, SFTP) Enter the username that has write permission to the specified
server. A username can contain alphanumeric and _-. /@\$ characters.
Password (Required for FTP, SFTP) Enter the password that will be used to access the specified
server. Passwords can consist of the following characters: 0 to 9, a to z, A to Z, -, ., |,
@, #,$, ^, &, *, (, ), +, and =.
Related Topics
Backup and Restore Repositories, on page 356
Create Repositories, on page 357
Repository Name Repository where your backup file should be saved. You cannot enter a repository
name here. You can only choose an available repository from the drop-down list.
Ensure that you create the repository before you run a backup.
Encryption Key This key is used to encrypt and decrypt the backup file.
Related Topics
Backup Data Type, on page 355
On-Demand and Scheduled Backups, on page 360
Backup History, on page 365
Name Enter a name for your backup file. You can enter a descriptive name of your choice.
Cisco ISE appends the timestamp to the backup filename and stores it in the repository.
You will have unique backup filenames even if you configure a series of backups. On
the Scheduled Backup list window, the backup filename will be prepended with
“backup_occur” to indicate that the file is an occurrence kron job.
Repository Name Select the repository where your backup file should be saved. You cannot enter a
repository name here. You can only choose an available repository from the drop-down
list. Ensure that you create the repository before you run a backup.
Encryption Key Enter a key to encrypt and decrypt the backup file.
Schedule Options Choose the frequency of your scheduled backup and fill in the other options accordingly.
Related Topics
Backup Data Type, on page 355
On-Demand and Scheduled Backups, on page 360
Backup History, on page 365
Backup Failures, on page 365
Cisco ISE Restore Operation, on page 366
Export Authentication and Authorization Policy Configuration, on page 371
Synchronize Primary and Secondary Nodes in a Distributed Environment, on page 373
Backup Using the CLI, on page 365
Schedule a Backup, on page 363
Encryption Key Enter a key to encrypt and decrypt the export data. This field is enabled only if you
select the Export with Encryption Key option.
Destination
Download file to Allows you to download the policy export file to your local system.
local computer
Email file to You can enter multiple email addresses separated by a comma.
Repository Select the repository to export policy data to. You can’t enter a repository name here.
You can only choose an available repository from the drop-down list. Ensure that you
create the repository before scheduling a policy export.
Export Now Click this option to export the data to the local computer or send as an email attachment.
You can’t export to a repository; you can only schedule a repository export.
Schedule
Schedule Options Choose the frequency of the export schedule and enter the other details accordingly.
The Verify Deployment option is also available from the below windows. In the Cisco ISE GUI, click the
Menu icon ( ) and choose:
• Work Centers > TrustSec > Components > Security Groups
• Work Centers > TrustSec > Components > Security Group ACLs
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Matrix
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Source Tree
• Work Centers > TrustSec > TrustSec Policy > Egress Policy > Destination Tree
Automatic Verification After Every Deploy: Check this check box if you want Cisco ISE to verify the
updates on all the network devices after every deployment. When the deployment process is complete, the
verification process starts after the time you specify in the Time after Deploy Process field.
Time After Deploy Process: Specify the time for which you want Cisco ISE to wait for after the deployment
process is complete, before starting the verification process. The valid range is 10–60 minutes.
The current verification process is cancelled if a new deployment request is received during the waiting period
or if another verification is in progress.
Verify Now: Click this option to start the verification process immediately.
• Proactive PAC Update Will Occur After: Cisco ISE proactively provides a new PAC to a client after
successful authentication when a configured percentage of the Tunnel PAC TTL remains. The server
starts the tunnel PAC update if the first successful authentication occurs before the PAC expires. This
mechanism updates the client with a valid PAC. The default value is 10%.
Note The autocreated SGTs are not deleted if you delete the corresponding authorization policy rule.
Cisco ISE displays a sample SGT name in the Example Name field, based on your selections.
If an SGT exists with the same name, ISE appends _x to the SGT name, where x is the first value, starting
with 1 (if 1 is not used in the current name). If the new name is longer than 32 characters, Cisco ISE
truncate its to the first 32 characters.
Related Topics
TrustSec Architecture, on page 1012
TrustSec Components, on page 1012
Configure TrustSec Global Settings, on page 1019
Network Resources
Support for Session Aware Networking (SAnet)
Cisco ISE provides limited support for Session Aware Networking (SAnet). SAnet is a session management
framework that runs on many Cisco switches. SAnet manages access sessions, including visibility,
authentication, and authorization. SAnet uses a service template, which contains RADIUS authorization
attributes. Cisco ISE includes a service template inside an authorization profile. Cisco ISE identifies service
templates in an authorization profile using a flag that identifies the profile as “Service Template” compatible.
Cisco ISE authorization profiles contain RADIUS authorization attributes that are transformed into a list of
attributes. SAnet service templates also contain of RADIUS authorization attributes, but those attributes are
not transformed into a list.
For SAnet devices, Cisco ISE sends the name of the service template. The device downloads the content of
the service template, unless it already has that content in a cache or statically defined configuration. Cisco
ISE sends a CoA notification to the device when a service template changes RADIUS attributes.
Network Devices
The windows described in the following sections enable you to add and manage network devices in Cisco
ISE.
IP Address or IP Choose one of the following from the drop-down list and enter the required values in
Range the fields displayed:
• IP Address: Enter a single IP address (IPv4 or IPv6 address) and a subnet mask.
• IP Range: Enter the required IPv4 address range. To exclude IP addresses during
authentication, enter an IP address or IP address range in the Exclude field.
The following are the guidelines for defining the IP addresses and subnet masks, or
IP address ranges:
• You can define a specific IP address, or an IP range with a subnet mask. If device
A has an IP address range defined, you can configure another device, B, with an
individual address from the range that is defined in device A.
• You can define IP address ranges in all the octets. You can use a hyphen (-) or
an asterisk (*) as wildcard to specify a range of IP addresses. For example, *.*.*.*,
1-10.1-10.1-10.1-10, or 10-11.*.5.10-15.
• You can exclude a subset of IP address range from the configured range in a
scenario where that subset has already been added, for example,
10.197.65.*/10.197.65.1, or 10.197.65.* exclude 10.197.65.1.
• You can configure up to 40 IP addresses or IP ranges for each network device.
• You cannot define two devices with the same specific IP addresses.
• You cannot define two devices with the same IP range. The IP ranges must not
overlap either partially or completely.
Device Profile Choose the vendor of the network device from the drop-down list.
Use the tooltip next to the drop-down list to see the flows and services that the selected
vendor's network devices support. The tooltip also displays the RADIUS Change of
Authorization (CoA) port and type of URL redirect that is used by the device. These
attributes are defined in the device type's network device profile.
Model Name Choose the device model from the drop-down list.
Use the model name as one of the parameters while checking for conditions in
rule-based policies. This attribute is present in the device dictionary.
Software Version Choose the version of the software running on the network device from the drop-down
list.
You can use the software version as one of the parameters while checking for conditions
in rule-based policies. This attribute is present in the device dictionary.
Network Device In the Network Device Group area, choose the required values from the Location,
Group IPsec, and Device Type drop-down lists.
If you do not specifically assign a device to a group, it becomes a part of the default
device groups (root network device groups), which is All Locations by location and
All Device Types by device type.
Note While using a filter to choose and delete a Network Access Device (NAD) from your Cisco ISE deployment,
clear your browser cache to ensure that only chosen NADs are deleted.
Shared Secret Enter the shared secret for the network device.
The shared secret is the key that is configured on the network device using the
radius-host command with the pac option.
Note The length of the shared secret must be equal to or greater than the value
configured in the Minimum RADIUS Shared Secret Length field in the
Device Security Settings window (Administration > Network Resources
> Network Devices > Device Security Settings).
For a RADIUS server, the best practice is to have 22 characters. For new
installations and upgraded deployments, the shared secret length is four
characters by default. You can change this value in the Device Security
Settings window.
Use Second Shared Specify a second shared secret to be used by the network device and Cisco ISE.
Secret
Note Although Cisco TrustSec devices can take advantage of the dual shared secrets
(keys), Cisco TrustSec CoA packets sent by Cisco ISE will always use the
first shared secret (key). To enable the use of the second shared secret, choose
the Cisco ISE node from which the Cisco TrustSec CoA packets must be sent
to the Cisco TrustSec device. Configure the Cisco ISE node to be used for this
task in the Send From drop-down list in the Work Centers > Device
Administration > Network Resources > Network Devices > Add >
Advanced TrustSec Settings window. You can select a primary administration
node (PAN) or a policy service node (PSN). If the chosen PSN node is down,
the PAN sends the Cisco TrustSec CoA packets to the Cisco TrustSec device.
Note The Second Shared Secret feature for RADIUS Access Request works only
for packets containing the Message-Authenticator field.
DTLS Required If you check the DTLS Required check box, Cisco ISE processes only the DTLS
requests from this device. If this option is disabled, Cisco ISE processes both UDP
and DTLS requests from this device.
RADIUS DTLS provides improved security for Secure Sockets Layer (SSL) tunnel
establishment and RADIUS communication.
Shared Secret Displays the shared secret that is used for RADIUS DTLS. This value is fixed and
used to compute the Message Digest 5 (MD5) integrity checks.
CoA Port Specify the port to be used for RADIUS DTLS CoA.
Issuer CA of ISE Choose the Certificate Authority to be used for RADIUS DTLS CoA from the
Certificates for drop-down list.
CoA
DNS Name Enter the DNS name of the network device. If the Enable RADIUS/DTLS Client
Identity Verification option is enabled in the RADIUS Settings window
(Adminstration > System > Settings > Protocols > RADIUS, Cisco ISE compares
this DNS name with the DNS name that is specified in the client certificate to verify
the identity of the network device.
General Settings
Enable KeyWrap Check the Enable KeyWrap check box only if KeyWrap algorithms are supported
by the network device. The network device must be compatible with AES KeyWrap
RFC (RFC 3394).
This option is used to increase the RADIUS security through an AES KeyWrap
algorithm.
Key Encryption Enter the encryption key that is used for session encryption (secrecy).
Key
Message Enter the key that is used for keyed Hashed Message Authentication Code (HMAC)
Authenticator calculation over RADIUS messages.
Code Key
You can specify the key input format that you want to use to enter the Key Encryption
Key and Message Authenticator Code Key so that it matches the configuration on the
network device. The value that you specify must be the correct (full) length for the
key, and shorter values are not permitted.
Shared Secret A string of text that is assigned to a network device when TACACS+ protocol is
enabled. The user must enter the text before the network device authenticates a username
and password. The connection is rejected until the user supplies the shared secret.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a dialog
box is displayed. You can click either Yes or No.
Remaining Retired (Available only if you click Yes in the Retire dialog box) Displays the default value
Period that is specified in Work Centers > Device Administration > Settings > Connection
Settings > Default Shared Secret Retirement Period. You can change the default
value, as necessary.
The old shared secret remains active for the specified number of days.
End (Available only if you click Yes in the Retire dialog box) Ends the retirement period
and terminates the old shared secret.
Enable Single Check the Enable Single Connect Mode check box to use a single TCP connection
Connect Mode for all TACACS communications with the network device. Click one of the following
radio buttons:
• Legacy Cisco Devices
• TACACS Draft Compliance Single Connect Support
Note If you disable Single Connect Mode, Cisco ISE uses a new TCP
connection for every TACACS request.
SNMP Settings
The following table describes the fields in the SNMP Settings section.
SNMP Version Choose one of the following options from the SNMP Version drop-down list:
• 1: SNMPv1 does not support informs.
• 2c
• 3: SNMPv3 is the most secure model because it allows packet encryption when
you choose Priv in the Security Level field.
Note If you have configured your network device with SNMPv3 parameters,
you cannot generate the Network Device Session Status summary report
that is provided by the monitoring service (Operations > Reports >
Diagnostics > Network Device Session Status). You can generate this
report successfully if your network device is configured with SNMPv1
or SNMPv2c parameters.
SNMP RO (Applicable only for SNMP versions 1 and 2c) Enter the Read Only Community string
Community that provides Cisco ISE with a particular type of access to the device.
Note The caret (circumflex ^) symbol is not allowed.
SNMP Username (Only for SNMP Version 3) Enter the SNMP username.
Security Level (Only for SNMP Version 3) Choose one the following options from the Security Level
drop-down list:
• Auth: Enables MD5 or Secure Hash Algorithm (SHA) packet authentication.
• No Auth: No authentication and no privacy security level.
• Priv: Enables Data Encryption Standard (DES) packet encryption.
Auth Protocol (Only for SNMP Version 3 when the security levels Auth or Priv are selected) Choose
the authentication protocol that you want the network device to use from the Auth
Protocol drop-down list.
• MD5
• SHA
Auth Password (Only for SNMP Version 3 when the Auth or Priv security levels are selected) Enter
the authentication key. It must be at least eight characters in length.
Click Show to display the authentication password that is already configured for the
device.
Note The caret (circumflex ^) symbol cannot be used.
Privacy Protocol (Only for SNMP Version 3 when Priv security level is selected) Choose one of the
following options from the Privacy Protocol drop-down list:
• DES
• AES128
• AES192
• AES256
• 3DES
Privacy Password (Only for SNMP Version 3 when Priv security level is selected) Enter the privacy key.
Click Show to display the privacy password that is already configured for the device.
Note The caret (circumflex ^) symbol cannot be used.
Polling Interval Enter the polling interval, in seconds. The default value is 3600.
Link Trap Query Check the Link Trap Query check box to receive and interpret linkup and linkdown
notifications that are received through the SNMP trap.
Mac Trap Query Check the Link Trap Query check box to receive and interpret MAC notifications
received through the SNMP trap.
Originating Policy Choose the Cisco ISE server to be used to poll for SNMP data, from the Originating
Services Node Policy Services Node drop-down list. The default value for this field is Auto. Overwrite
the setting by choosing a specific value from the drop-down list.
Use Device ID for Check the Use Device ID for TrustSec Identification check box if you want the
TrustSec device name to be listed as the device identifier in the Device ID field.
Identification
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec
Identification check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Click Show to display the password.
Enable HTTP Check the Enable HTTP REST API check box to use the HTTP REST API to provide
REST API the required Cisco TrustSec information to the network devices. This enhances the
efficiency and ability to download large configurations in a short time as compared to
the RADIUS protocol. It also improves reliability by using TCP over UDP.
Username Enter the username that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device. The username cannot contain special characters
such as space ! % ^ : ; , [ { | } ] ` " = < > ?
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Device ID You can use this field only if you have not checked the Use Device ID for TrustSec
Identification check box.
Password Enter the password that you have configured in the Cisco TrustSec device's CLI to
authenticate the Cisco TrustSec device.
Click Show to display the password.
Download Specify the time interval at which the device must download its environment data from
Environment Data Cisco ISE, by choosing the required values from the drop-down lists in this area. You
Every <...> can choose the time interval in seconds, minutes, hours, days, or weeks. The default
value is one day.
Download Peer Specify the time interval at which the device must download the peer authorization
Authorization policy from Cisco ISE by choosing the required values from the drop-down lists in
Policy Every <...> this area. You can specify the time interval in seconds, minutes, hours, days, or weeks.
The default value is one day.
Reauthentication Specify the time interval at which the device reauthenticates itself against Cisco ISE
Every <...> after the initial authentication, by choosing the required values from the drop-down
lists in this area. You can configure the time interval in seconds, minutes, hours, days,
or weeks. For example, if you enter 1000 seconds, the device authenticates itself against
Cisco ISE every 1000 seconds. The default value is one day.
Download SGACL Specify the time interval at which the device downloads SGACL lists from Cisco ISE,
Lists Every <...> by choosing the required values from the drop-down lists in this area. You can configure
the time interval in seconds, minutes, hours, days, or weeks. The default value is one
day.
Other TrustSec Check the Other TrustSec Devices to Trust This Device check box to allow all the
Devices to Trust peer devices to trust this Cisco TrustSec device. If this check box is not checked, the
This Device peer devices do not trust this device, and all the packets that arrive from this device
(TrustSec Trusted) are colored or tagged accordingly.
Send Check the Send Configuration Changes to Device check box if you want Cisco ISE
Configuration to send Cisco TrustSec configuration changes to the Cisco TrustSec device using CoA
Changes to Device or CLI (SSH). Click the CoA or CLI (SSH) radio button, as required.
Click the CoA radio button if you want Cisco ISE to send the configuration changes
to the Cisco TrustSec device using CoA.
Click the CLI (SSH) radio button if you want Cisco ISE to send the configuration
changes to the Cisco TrustSec device using the CLI (using the SSH connection). For
more information, see the "Push Configuration Changes to Non-CoA Supporting
Devices" section in Cisco ISE Admin Guide: Segmentation.
Send From From the drop-down list, choose the Cisco ISE node from which the configuration
changes must be sent to the Cisco TrustSec device. You can select a PAN or a PSN.
If the PSN that you choose is down, the configuration changes are sent to the Cisco
TrustSec device using the PAN.
Test Connection You can use this option to test the connectivity between the Cisco TrustSec device and
the selected Cisco ISE node (PAN or PSN).
SSH Key To use this feature, open an SSHv2 tunnel from Cisco ISE to the network device, and
use the device's CLI to retrieve the SSH key. You must copy this key and paste it in
the SSH Key field for validation. For more information, see the "SSH Key Validation"
section in Cisco ISE Admin Guide: Segmentation.
Include this device Check the Include this device when deploying Security Group Tag Mapping
when deploying Updates check box if you want the Cisco TrustSec device to obtain the IP-SGT
Security Group mappings using the device interface credentials.
Tag Mapping
Updates
EXEC Mode Enter the username that you use to log in to the Cisco TrustSec device.
Username
Enable Mode (Optional) Enter the enable password that is used to edit the configuration of the Cisco
Password TrustSec device in privileged EXEC mode.
Click Show to view the password.
Issue Date Displays the issuing date of the last Cisco TrustSec PAC that was generated by Cisco
ISE for the Cisco TrustSec device.
Expiration Date Displays the expiration date of the last Cisco TrustSec PAC that was generated by
Cisco ISE for the Cisco TrustSec device.
Issued By Displays the name of the issuer (a Cisco TrustSec administrator) of the last Cisco
TrustSec PAC that was generated by Cisco ISE for the Cisco TrustSec device.
Generate PAC Click the Generate PAC button to generate the out-of-band Cisco TrustSec PAC for
the Cisco TrustSec device.
Default Network Choose Enable from the Default Network Device Status drop-down list to enable
Device Status the default network device definition.
Note If the default device is enabled, you must enable either the RADIUS or the
TACACS+ authentication settings by checking the relevant check box in the
window.
Enable RADIUS Check the Enable RADIUS check box to enable RADIUS authentication for the
device.
Shared Secret Enter a shared secret. The shared secret can be up to 127 characters in length.
The shared secret is the key that you have configured on the network device using the
radius-host command with the pac keyword.
Note The length of the shared secret must be equal to or greater than the value
configured in the Minimum RADIUS Shared Secret Length field in the
Device Security Settings window (Administration > Network Resources >
Network Devices > Device Security Settings). By default, this value is four
characters for new installations and upgraded deployments. For the RADIUS
server, the best practice is to have 22 characters.
DTLS Required If you check the DTLS Required check box, Cisco ISE processes only the DTLS
requests from this device. If this option is disabled, Cisco ISE processes both UDP
and DTLS requests from this device.
RADIUS DTLS provides improved security for SSL tunnel establishment and RADIUS
communication.
Shared Secret Displays the shared secret that is used for RADIUS DTLS. This value is fixed and is
used to compute the MD5 integrity checks.
Issuer CA of ISE Choose the certificate authority to be used for RADIUS DTLS CoA from the Issuer
Certificates for CA of ISE Certificates for CoA drop-down list.
CoA
General Settings
Enable KeyWrap (Optional) Check the Enable KeyWrap check box only if KeyWrap algorithms are
supported on the network device, which increases RADIUS security through an AES
KeyWrap algorithm.
Key Encryption Enter an encryption key to be used for session encryption (secrecy) when you enable
Key KeyWrap.
Message Enter the key that is used for keyed Hashed Message Authentication Code (HMAC)
Authenticator calculation over RADIUS messages when you enable KeyWrap.
Code Key
Key Input Format Choose one of the following formats by clicking the corresponding radio button, and
enter values in the Key Encryption Key and Message Authenticator Code Key
fields:
• ASCII: The Key Encryption Key must be 16 characters (bytes) in length, and
the Message Authenticator Code Key must be 20 characters (bytes) in length.
• Hexadecimal: The Key Encryption Key must be 32 bytes in length, and the
Message Authenticator Code Key must be 40 bytes in length.
Shared Secret Enter a string of text to assign to a network device when the TACACS+ protocol is
enabled. Note that a user must enter the text before the network device authenticates
a username and password. The connection is rejected until the user supplies the shared
secret.
Retire Retires an existing shared secret instead of ending it. When you click Retire, a dialog
box is displayed. Click Yes or No.
Remaining Retired (Optional) Available only if you click Yes in the Retire dialog box. Displays the default
Period value that is specified in the Work Centers > Device Administration > Settings >
Connection Settings > Default Shared Secret Retirement Period window. You
can change the default values.
This allows a new shared secret to be entered. The old shared secret remains active
for the specified number of days.
End (Optional) Available only if you select Yes in the Remaining Retired Period dialog
box. Ends the retirement period and terminates the old shared secret.
Enable Single Check the Enable Single Connect Mode check box to use a single TCP connection
Connect Mode for all TACACS+ communication with the network device. Click one of the following
the radio buttons:
• Legacy Cisco Devices
• TACACS Draft Compliance Single Connect Support.
Note If you disable this field, Cisco ISE uses a new TCP connection for every
TACACS+ request.
Note The length of the shared secret entered in the Network Devices page must be equal to or greater than the value
configured in the Minimum RADIUS Shared Secret Length field in the Device Security Settings page.
Related Topics
Network Device Definition Settings, on page 847
Generate a Click Generate a Template to create a comma-separated value (CSV) template file.
Template
Update the template with network devices information in the CSV format and save it
locally. Then, use the edited template to import network devices into any Cisco ISE
deployment.
File Click Choose File to choose the CSV file that you have recently created, or previously
exported from a Cisco ISE deployment.
You can import network devices into another Cisco ISE deployment with new and
updated network devices information, by using the Import option.
Overwrite Existing Check the Overwrite Existing Data with New Data check box to replace the existing
Data with New network devices with the devices in your import file.
Data
If you do not check this check box, new network device definitions that are available
in the import file are added to the network device repository. Duplicate entries are
ignored.
Stop Import on Check the Stop Import on First Error check box if you want Cisco ISE to discontinue
First Error import when it encounters an error during import. Cisco ISE imports network devices
until the time of an error.
If this check box is not checked and an error is encountered, the error is reported and
Cisco ISE continues to import the remaining devices.
Name Enter a name for the root network device group. For all subsequent child network
device groups added to this root network device group, enter the name of this newly
created network device group.
You can have a maximum of six nodes in a network device group hierarchy, including
the root node. Each network device group name can have a maximum of 32 characters.
Description Enter a description for the root or the child network device group.
No. of Network The number of network devices in the network group is displayed in this column.
Devices
File Click Choose File and navigate to the location of the CSV file that you want to upload.
The file may be new or a file that was exported from another Cisco ISE deployment.
You can import network device groups from one Cisco ISE deployment to another,
with new and updated network device groups information.
Overwrite Existing Check this check box if you want to replace the existing network device groups with
Data with New the device groups in your import file.
Data
If you do not check this check box, only the new network device groups in the import
file are added to the network device group repository. Duplicate entries are ignored.
Stop Import on Check this check box to discontinue import at the first instance of encountering an
First Error error during the import.
If this check box is not checked and an error is encountered, Cisco ISE reports the
error and continues importing the rest of the device groups.
Icon Select the icon to use for the network device profile. This icon will default to the icon
for the vendor that you select.
The icon you select must be a 16 x 16 PNG file.
Supported Protocols
RADIUS Check this check box if this network device profile supports RADIUS.
TACACS+ Check this check box if this network device profile supports TACACS+.
TrustSec Check this check box if this network device profile supports TrustSec.
RADIUS Select one or more RADIUS dictionaries supported by this profile. Import any
Dictionaries vendor-specific RADIUS dictionaries before you create the profile.
Flow Type Cisco ISE supports 802.1X, MAC authentication bypass (MAB), and browser-based
Conditions Web authentication login for basic user authentication and access via both wired and
wireless networks.
Check the check boxes for the authentication logins that this type of network device
supports. It could be one or more of the following:
• Wired MAC authentication bypass (MAB)
• Wireless MAB
• Wired 802.1X
• Wireless 802.1X
• Wired Web Authentication
• Wireless Web Authentication
After you check the authentication logins that the network device profile supports,
specify the conditions for the login.
Attribute Aliasing Check the SSID check box to use the device's Service Set Identifier (SSID) as the
friendly name in policy rules. This allows you to create a consistent name to use in
policy rules.
Process Host Check this check box to define the protocols for host lookup used by the network
Lookup device profile.
Network devices from different vendors perform MAB authentication differently.
Depending on the device type, check the Check Password or Checking
Calling-Station-Id equals MAC Address check box, or both, for the protocol you
are using.
Via PAP/ASCII Check this check box to configure Cisco ISE to detect a PAP request from the network
device profile as a Host Lookup request.
Via CHAP Check this check box to configure Cisco ISE to detect this type of request from the
network devices as a Host Lookup request.
This option enables CHAP authentication. CHAP uses a challenge-response mechanism
with password encryption. CHAP does not work with Microsoft Active Directory.
Via EAP-MD5 Check this check box to enable EAP-based MD5 hashed authentication for the network
device profile.
Permissions
You can define the VLAN and ACL permissions that will be used for this network device profile. After the
profile is saved, Cisco ISE automatically generates authorization profiles for each configured permission.
Set VLAN Check this check box to set the VLAN permissions for this network device profile.
Choose of the following options:
• IETF 802.1X Attributes. This is a set of default RADIUS attributes defined by
the Internet Engineering Task Force.
• Unique Attributes. You can specify multiple RADIUS attribute-value pairs.
Set ACL Check this check box to select the RADIUS attribute to set for the ACL on the network
device profile.
CoA by RADIUS
Default CoA Port The port to send the RADIUS CoA. By default, this is port 1700 for Cisco devices and
port 3799 for devices from a non-Cisco vendor.
You can override this on the Network Device window.
Timeout Interval The number of seconds that Cisco ISE waits for a response after sending the CoA.
Retry Count The number of times Cisco ISE attempts to send the CoA after the first timeout.
Re-authenticate Select how to send a reauthentication request to the network devices. This is currently
supported only by Cisco devices.
• Basic: Check this check box for a standard session reauthentication.
• Rerun: Check this check box to run through the authentication method from the
beginning.
• Last: Use the last successful authentication method for the session.
CoA Push If the network devices do not support Cisco's TrustSec CoA feature, select this option
to allow Cisco ISE to push a configuration change to the device.
CoA by SNMP
Timeout Interval The number of seconds that Cisco ISE waits for a response after sending the CoA.
Retry Count The number of times that Cisco ISE attempts to send a CoA.
Type Select whether the network device profile supports a static or dynamic URL redirect.
If your device supports neither, select Not Supported and set up a VLAN from
Settings > DHCP & DNS Services .
Client IP Address Enter the parameter name that the network devices use for a client's IP address.
Client MAC Enter the parameter name that the network devices use for a client's MAC address.
Address
Originating URL Enter the parameter name that the network devices use for the originating URL.
Session ID Enter the parameter name that the network devices use for the session ID.
SSID Enter the parameter name that the network devices use for the Service Set Identifier
(SSID).
Parameter When you select to use a Dynamic URL for redirection, you will need to specify how
these network devices create the redirect URL. You can also specify whether the
redirect URL uses the session ID or client MAC address.
Advanced Settings
You can use the Network Device Profile to generate a number of policy elements to make it easy to use a
network device in policy rules. These elements include compound conditions, authorization profiles, and
allowed protocols.
Click Generate Policy Elements to create these elements.
Host IP Enter the IP address of the external RADIUS server. When entering an IPv4 address,
you can use ranges and subnet masks. Ranges are not supported for IPv6.
Shared Secret Enter the shared secret between Cisco ISE and the external RADIUS server that is
used for authenticating the external RADIUS server. A shared secret is an expected
string of text that a user must provide to enable the network device to authenticate a
username and password. The connection is rejected until the user supplies the shared
secret. The shared secret can be up to 128 characters in length.
Enable KeyWrap Enable this option to increase the RADIUS protocol security via an AES KeyWrap
algorithm.
Key Encryption (Only if you check the Enable Key Wrap check box) Enter a key to be used for session
Key encryption (secrecy).
Message (Only if you check the Enable Key Wrap check box) Enter a key to be used for keyed
Authenticator HMAC calculation over RADIUS messages.
Code Key
Key Input Format Specify the format you want to use to enter the Cisco ISE encryption key, so that it
matches the configuration that is available on the WLAN controller. The value you
specify must be the correct (full) length for the key as defined below (shorter values
are not permitted).
• ASCII: The Key Encryption Key must be 16 characters (bytes) long, and the
Message Authenticator Code Key must be 20 characters (bytes) long.
• Hexadecimal: The Key Encryption Key must be 32 bytes long, and the Message
Authenticator Code Key must be 40 bytes long.
Authentication Enter the RADIUS authentication port number. The valid range is from 1 to 65535.
Port The default is 1812.
Accounting Port Enter the RADIUS accounting port number. The valid range is from 1 to 65535. The
default is 1813.
Server Timeout Enter the number of seconds that the Cisco ISE waits for a response from the external
RADIUS server. The default is 5 seconds. Valid values are from 5 to 120.
Connection Enter the number of times that the Cisco ISE attempts to connect to the external
Attempts RADIUS server. The default is 3 attempts. Valid values are from 1 to 9.
RADIUS Proxy Enter the amount of time to elapse after the connection has failed and until a connection
Failover to this server is attempted again. Valid range is from 1 to 600.
Expiration
Configure this parameter to skip the server timeout and go straight to failover.
User Selected Choose the external RADIUS servers that you want to use as policy servers from the
Service Type Available list box and move them to the Selected list box.
Remote Accounting Check this check box to enable accounting in the remote policy server.
Local Accounting Check this check box to enable accounting in Cisco ISE.
Strip End of Check this check box to strip the username from the suffix. For example, if the subject
Subject Name from name is [email protected] and the separator is @, the username becomes userA.
the Last
• You must enable the strip options to extract the username from NetBIOS or User
Occurrence of the
Principle Name (UPN) format usernames ([email protected] or /domain/user),
Separator
because only usernames are passed to the RADIUS server for authenticating the
user.
• If you activate both the \ and @ stripping functions, and you are using AnyConnect,
Cisco ISE does not accurately trim the first \ from the string. However, each
stripping function that is used individually, works as it is designed with
AnyConnect.
Modify Attributes Check this check box to allow Cisco ISE to manipulate attributes that come from or
in the Request to go to the authenticated RADIUS server.
the External
The attribute manipulation operations include these:
RADIUS Server
• Add: Add additional attributes to the overall RADIUS request/response.
• Update: Change the attribute value (fixed or static) or substitute an attribute by
another attribute value (dynamic).
• Remove: Remove an attribute or an attribute-value pair.
• RemoveAny: Remove any occurrences of the attribute.
Continue to Check this check box to divert the proxy flow to run the authorization policy for further
Authorization decision making, based on identity store group and attribute retrieval. If you enable
Policy this option, attributes from the response of the external RADIUS server will be
applicable for the authentication policy selection. Attributes that are already in the
context will be updated with the appropriate value from the AAA server accept response
attribute.
Modify Attributes Check this check box to modify the attribute just before sending a response back to
before send an the device.
Access-Accept
Status Click the Status check box to enable REST API communication from the Cisco ISE
profiler that authenticates connectivity to the CAM.
IP Address Enter the IP address of the CAM. Once you have created and saved a CAM in Cisco
ISE, the IP address of the CAM cannot be edited.
You cannot use 0.0.0.0 and 255.255.255.255, as they are excluded when validating
the IP addresses of the CAMs in Cisco ISE, and so, they are not valid IP addresses
that you can use in the IP Address field for the CAM.
Note You can use the virtual service IP address that a pair of CAMs share in a
high-availability configuration. This allows a failover support of CAMs in a
high-availability configuration.
Username Enter the username of the CAM administrator that allows you to log on to the user
interface of the CAM.
Password Enter the password of the CAM administrator that allows you to log on to the user
interface of the CAM.
To view this window, click the Menu icon ( ) and choose Administration > Device Portal Managment >
Blocked List Portal, Client Provisioning Portals, BYOD Portals, MDM Portals, or My Device Portals >
Create, Edit or Duplicate > Portals Settings and Customization.
• Portal Name: Enter a unique portal name to access this portal. Do not use this portal name for any other
Sponsor, Guest, or nonguest portals, such as Blocked List, Bring Your Own Device (BYOD), Client
Provisioning, Mobile Device Management (MDM), or My Devices portals.
This name appears in the authorization profile portal selection for redirection choices. It is applied to the
list of portals for easy identification among other portals.
• Description: Optional.
• Portal Test URL: A system-generated URL displays as a link after you click Save. Use it to test the
portal.
Click the link to open a new browser tab that displays the URL for this portal. Policy Services Node
(PSN) with Policy Services must be turned on. If Policy Services are disabled, the PSN only displays
the Admin portal.
Note The test portal does not support RADIUS sessions, so you won't see the entire
portal flow for all portals. BYOD and Client Provisioning are examples of portals
that depend on RADIUS sessions. For example, a redirect to an external URL
will not work. If you have more than one PSN, Cisco ISE chooses the first active
PSN.
• Language File: Each portal type supports 15 languages by default, which are available as individual
properties files bundled together in a single zipped language file. Export or import the zipped language
file to use with the portal. The zipped language file contains all the individual language files that you
can use to display text for the portal.
The language file contains the mapping to the particular browser locale setting along with all of the string
settings for the entire portal in that language. A single language file contains all the supported languages,
so that it can easily be used for translation and localization purposes.
If you change the browser locale setting for one language, the change is applied to all the other end-user
web portals. For example, if you change the French.properties browser locale from fr,fr-fr,fr-ca to fr,fr-fr
in the Hotspot Guest portal, the changes also apply to the My Devices portal.
An alert icon displays when you customize any of the text on the Portal Page Customizations tab. The
alert message reminds you that any changes made to one language while customizing the portal must
also be added to all the supported languages properties files. You can manually dismiss the alert icon
using the drop-down list option; or it is automatically dismissed after you import the updated zipped
language file.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s
HTTPS traffic.
• Endpoint Identity Group: Choose an endpoint identity group to track guest devices. Cisco ISE provides
the GuestEndpoints endpoint identity group to use as a default. You can also create more endpoint
identity groups if you choose to not use the default.
Choose an endpoint identity group to track employee devices. Cisco ISE provides the RegisteredDevices
endpoint identity group to use as a default. You can also create more endpoint identity groups if you
choose to not use the default.
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display
language of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback
Language is used as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the
browser locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User
Browser Locale option.
Require Require users to accept an AUP before their account is fully enabled. The Login button
Acceptance is not enabled unless the user accepts the AUP. If users do not accept the AUP, they
will not obtain network access.
Require scrolling This option displays only if Include an AUP on page is enabled.
to end of AUP
Ensure that the user has read the AUP completely. The Accept button is enabled only
after the user has scrolled to the end of the AUP.
Display Device ID Display the device ID to the user during the registration process, even though the
Field During device ID is pre-configured and cannot be changed while using the BYOD portal.
Registration
Originating URL After successfully authenticating to the network, redirect the user’s browser to the
original website that the user is trying to access, if available. If not available, the
Authentication Success window appears. Make sure that the redirect URL is allowed
to work on port 8443 of the PSN by the access-control list on the NAD and by
authorization profiles configured in Cisco ISE for that NAD.
For Windows, MAC, and Android devices, control is given to the Self-Provisioning
Wizard app, which does provisioning. Therefore, these devices are not redirected to
the originating URL. However, iOS (dot1X) and unsupported devices (that are allowed
network access) are redirected to this URL.
Success page Display a page indicating that the device registration was successful.
URL After successfully authenticating to the network, redirect the user's browser to the
specified URL, such as your company’s website.
Note If you redirect a Guest to an external URL after authentication, there may be a delay while the URL address
is resolved and the session is redirected.
• HTTPS Port: Enter a port value between 8000 to 8999; the default value is 8443 for all the default
portals, except the Blocked List Portal, which is 8444. If you upgraded with port values outside this
range, they are honored until you modify this window. If you modify this window, update the port setting
to comply with this restriction.
If you assign ports used by a non-guest (such as My Devices) portal to a guest portal, an error message
appears.
For posture assessments and remediation only, the Client Provisioning portal also uses ports 8905 and
8909. Otherwise, it uses the same ports assigned to the Guest portal.
Portals assigned to the same HTTPS port can use the same Gigabit Ethernet interface or another interface.
If they use the same port and interface combination, they must use the same certificate group tag. For
example:
• Valid combinations include, using the Sponsor portal as an example:
• Sponsor portal: Port 8443, Interface 0, Certificate tag A and My Devices portal: Port 8443,
Interface 0, Certificate group A.
• Sponsor portal: Port 8443, Interface 0, Certificate group A and My Devices portal: Port 8445,
Interface 0, Certificate group B.
• Sponsor portal: Port 8444, Interface 1, Certificate group A and Blocked List portal: Port 8444,
Interface 0, Certificate group B.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s
HTTPS traffic.
• Authentication Method: Choose which identity source sequence or Identity Provider (IdP) to use for
user authentication. The identity source sequence is a list of identity stores that are searched in sequence
to verify user credentials.
Cisco ISE includes a default identity source sequence for sponsor portals, Sponsor_Portal_Sequence.
To configure IdP, choose Administration > Identity Management > External Identity Sources >
SAML Id Providers.
To configure an identity source sequence, choose Administration > Identity Management > Identity
Source Sequences.
• Configure authorized groups: Choose the user identity groups to which you want to grant permission
to generate certificates and move them to the Chosen box.
• Fully Qualified Domain Name (FQDN): Enter at least one unique FQDN or hostname for the Sponsor
or MyDevices portal. For example, you can enter sponsorportal.yourcompany.com,sponsor,
so that when the user enters either of those into a browser, the sponsor portal displays. Separate names
with commas, but do not include spaces between entries.
If you change the default FQDN, then also do the following:
• Update your DNS so that the FQDN of the new URL resolves to a valid Policy Services Node (PSN)
IP address. Optionally, this address could point to a load balancer virtual IP address that serves a
pool of PSNs.
• To avoid certificate warning messages due to name mismatches, include the FQDN of the customized
URL, or a wildcard, in the subject alternative name (SAN) attribute of the local server certificate
of the Cisco ISE PSN. If the Allow Kerberos SSO option is enabled for the sponsor portal, you
must include the FQDN of the Cisco ISE PSN, or a wildcard, in the SAN attribute of the local server
certificate used by the portal.
• Idle Timeout: Enter the time in minutes that you want Cisco ISE to wait before it logs out the user if
there is no activity in the portal. The valid range is from 1 to 30 minutes.
Portal Settings
• HTTPS Port: Enter a port value between 8000 to 8999; the default value is 8443 for all the default
portals, except the Blocked List Portal, which is 8444. If you upgraded with port values outside this
range, they are honored until you make any change to this page. If you make any change to this page,
you must update the port setting to comply with this restriction.
• Allowed Interfaces: Select the PSN interfaces which can run a portal. Only a PSN with an available
allowed interface on a PSN can create a portal. You can configure any combination of physical and
bonded interfaces. This is a PSN-wide configuration; all portals can only run on these interfaces, this
interface configuration is pushed to all the PSNs.
• You must configure the Ethernet interfaces using IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name/Alternate Subject Name must resolve to the interface IP.
• Configure ip host x.x.x.x yyy.domain.com in ISE CLI to map secondary interface IP to FQDN,
which will be used to match Certificate Subject Name/Alternate Subject Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond set
upon that PSN, then the PSN logs an error and exits. It will NOT attempt to start the portal on the
physical interface.
• NIC Teaming or bonding is an O/S configuration option that allows you to configure two individual
NICs for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the
bonded connection continues the connection. A NIC is selected for a portal based on the portal
settings configuration:
• If both physical NICs and the corresponding bonded NIC are configured - When the PSN
attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to
start the portal on the physical interface.
• Certificate Group Tag: Select the group tag of the certificate group to use for the portal’s HTTPS traffic.
• Authentication Method: Choose which identity source sequence (ISS) or Identity Provider (IdP) to use
for user authentication. The ISS is a list of Identity Stores that are searched in sequence to verify user
credentials. Some examples include: Internal Guest Users, Internal Users, Active Directory, and LDAP.
Cisco ISE includes a default client provisioning Identity Source Sequence for Client Provisioning Portals,
Certificate_Request_Sequence.
• Fully Qualified Domain Name (FQDN): Enter at least one unique FQDN and/or hostname for your
Client Provisioning portal. For example, you can enter provisionportal.yourcompany.com, so that when
the user enters either of those into a browser, they will reach the Client Provisioning Portal.
• Update DNS to ensure that the FQDN of the new URL resolves to a valid Policy Services Node
(PSN) IP address. Optionally, this address could point to a load balancer virtual IP address that
serves a pool of PSNs.
• To avoid certificate warning messages due to name mismatches, include the FQDN of the customized
URL, or a wildcard, in the subject alternative name (SAN) attribute of the local server certificate
of the Cisco ISE PSN.
Note For Client Provisioning without URL redirection, the portal name that is entered
in the Fully Qualified Domain Name (FQDN) field must be configured in the
DNS configuration. This URL must be communicated to the users to enable Client
Provisioning without URL redirection.
• Idle Timeout: Enter the time in minutes that you want Cisco ISE to wait before it logs out the user if
there is no activity in the portal. The valid range is from 1 to 30 minutes..
Note In the Client Provisioning Portal, you can define the port number and the certificate so that the host allows
you to download the same certificate for Client Provisioning and Posture. If the portal certificate is signed by
the officials certificate authority, you will not receive any security warning. If the certificate is self-signed,
you will receive one security warning for both the portals and Cisco AnyConnect Posture component.
• Every ______ days (starting at first login): Display an AUP periodically after the user first logs into the
network or portal.
Require Require users to accept an AUP before their account is fully enabled. The Login button
Acceptance is not enabled unless the user accepts the AUP. If users do not accept the AUP, they
will not obtain network access.
Require scrolling This option displays only if Include an AUP on page is enabled.
to end of AUP
Ensure that the user has read the AUP completely. The Accept button is enabled only
after the user has scrolled to the end of the AUP.
Portals assigned to the same HTTPS port can use the same Gigabit Ethernet interface or another interface.
If they use the same port and interface combination, they must use the same certificate group tag. For
example:
• Valid combinations include, using the Sponsor portal as an example:
• Sponsor portal: Port 8443, Interface 0, Certificate tag A and My Devices portal: Port 8443,
Interface 0, Certificate group A.
• Sponsor portal: Port 8443, Interface 0, Certificate group A and My Devices portal: Port 8445,
Interface 0, Certificate group B.
• Sponsor portal: Port 8444, Interface 1, Certificate group A and Blocked List portal: Port 8444,
Interface 0, Certificate group B.
Note We recommend that you use interface 0 for Guest services for best performance.
You can either configure only interface 0 in the Portal Settings, or you can use
the CLI command ip host to map a hostname or FQDN to the IP address of
interface 0.
• Allowed Interfaces: Select the PSN interfaces which a PAN can use to run a portal. When a request to
open a portal is made on the PAN, the PAN looks for an available allowed port on the PSN. You must
configure the Ethernet interfaces using IP addresses on different subnets.
These interfaces must be available on all the PSNs, including VM-based ones, that have Policy Services
turned on. This is a requirement because any of these PSNs can be used for the redirect at the start of the
guest session.
• The Ethernet interfaces must use IP addresses on different subnets.
• The interfaces you enable here must be available on all your PSNs, including VM-based ones when
Policy Services turned on. This is required because any of these PSNs can be used for a redirect at
the start of the guest session.
• The portal certificate Subject Name or Alternate Subject Name must resolve to the interface IP
address.
• Configure ip host x.x.x.x yyy.domain.com in Cisco ISE CLI to map the secondary interface IP
address to the FQDN, which is used to match the certificate Subject Name or Alternate Subject
Name.
• If only the bonded NIC is selected, when the PSN attempts to configure the portal it first attempts
to configure the Bond interface. If that is not successful, perhaps because there was no bond setup
on that PSN, then the PSN logs an error and exits. The PSN will not try to start the portal on the
physical interface.
• NIC Teaming or bonding is a configuration option that allows you to configure two individual NICs
for high availability (fault tolerance). If one of the NICs fails, the other NIC that is part of the bonded
connection continues the connection. A NIC is selected for a portal based in the Portal Settings
configuration. If both physical NICs and the corresponding bonded NIC are configured, when the
PSN attempts to configure the portal, it first attempts to connect to the Bond interface. If that is not
successful, perhaps because there was no bond setup on that PSN, then the PSN attempts to start
the portal on the physical interface.
• Certificate Group tag: Pick a certificate group tag that specifies the certificate to be used for the portal’s
HTTPS traffic.
• Fully Qualified Domain Name (FQDN): Enter at least one unique FQDN or hostname for the Sponsor
or MyDevices portal. For example, you can enter sponsorportal.yourcompany.com,sponsor,
so that when the user enters either of those into a browser, the sponsor portal displays. Separate names
with commas, but do not include spaces between entries.
If you change the default FQDN, then also do the following:
• Update your DNS so that the FQDN of the new URL resolves to a valid Policy Services Node (PSN)
IP address. Optionally, this address could point to a load balancer virtual IP address that serves a
pool of PSNs.
• To avoid certificate warning messages due to name mismatches, include the FQDN of the customized
URL, or a wildcard, in the subject alternative name (SAN) attribute of the local server certificate
of the Cisco ISE PSN. If the Allow Kerberos SSO option is enabled for the sponsor portal, you
must include the FQDN of the Cisco ISE PSN, or a wildcard, in the SAN attribute of the local server
certificate used by the portal.
• Authentication Method: Choose which identity source sequence or Identity Provider (IdP) to use for
user authentication. The identity source sequence is a list of identity stores that are searched in sequence
to verify user credentials.
Cisco ISE includes a default identity source sequence for sponsor portals, Sponsor_Portal_Sequence.
To configure IdP, choose Administration > Identity Management > External Identity Sources >
SAML Id Providers.
To configure an identity source sequence, choose Administration > Identity Management > Identity
Source Sequences.
• Endpoint Identity Group: Choose an endpoint identity group to track guest devices. Cisco ISE provides
the GuestEndpoints endpoint identity group to use as a default. You can also create more endpoint
identity groups if you choose to not use the default.
Choose an endpoint identity group to track employee devices. Cisco ISE provides the RegisteredDevices
endpoint identity group to use as a default. You can also create more endpoint identity groups if you
choose to not use the default.
• Purge Endpoints in this Identity Group when they Reach __ Days: Specify the number of days after
which the device is purged from the Cisco ISE database. Purging is done on a daily basis and the purge
activity is synchronized with the overall purge timing. The change is applied globally for this endpoint
identity group.
If changes are made to the Endpoint Purge Policy based on other policy conditions, this setting is no
longer available for use.
• Idle Timeout: Enter the time in minutes that you want Cisco ISE to wait before it logs out the user if
there is no activity in the portal. The valid range is from 1 to 30 minutes.
• Display Language
• Use Browser Locale: Use the language specified in the client browser's locale setting as the display
language of the portal. If browser locale's language is not supported by Cisco ISE, then the Fallback
Language is used as the language portal.
• Fallback Language: Choose the language to use when the language cannot be obtained from the
browser locale, or if the browser locale language is not supported by Cisco ISE.
• Always Use: Choose the display language to use for the portal. This setting overrides the User
Browser Locale option.
Require scrolling Ensure that the user has read the AUP completely. The Accept button is enabled only
to end of AUP after the user has scrolled to the end of the AUP.
On First Login Display an AUP when the user logs into the network or portal for the first time only.
only
On Every Login Display an AUP each time the user logs into the network or portal.
Every __ Days Display an AUP periodically after the user first logs into the network or portal.
(starting at first
login)
Delete Enable employees to delete a registered device from the My Devices portal or to delete
unused and add new devices, when the maximum number of registered devices is
reached. This action removes the device from the list of devices displayed in the My
Devices portal, but the device remains in the Cisco ISE database and continues to be
listed in the Endpoints list.
To define the maximum number of personal devices that employees can register using
either the BYOD or My Devices portals, choose Administration > Device Portal
Management > Settings > Employee Registered Devices.
To permanently delete the device from the Cisco ISE database, choose Work Centers >
Network Access > Identities > Endpoints.
Stolen Enable employees to indicate that their device is stolen. This action updates the device
status in the My Devices portal to Stolen, adds the device to the Blocked List endpoint
identity group, and removes its certificate.
MAC Address Include the MAC address of the device on the Support Information window.
IP Address Include the IP address of the device on the Support Information window.
Browser User Include the browser details such as the product name and version, layout engine, and
Agent version of the user agent originating the request on the Support Information window.
Policy Server Include the IP address of the ISE Policy Service Node (PSN) that is serving this portal
on the Support Information window.
Failure Code If available, include the corresponding number from the log message catalog. To view
the message catalog, choose Administration > System > Logging > Message Catalog.
Hide Field Do not display any field labels on the Support Information window if the information
that they would contain is non-existent. For example, if the failure code is unknown,
and therefore blank, do not display Failure Code, even if it is selected.
Display Label with Display all selected field labels on the Support Information window, even if the
no Value information that they would contain is non-existent. For example, if the failure code
is unknown, display Failure Code, even if it is blank.
Display Label with Display this text in any selected field on the Support Information window, if the
Default Value information that they would contain is non-existent. For example, if you enter Not
Available in this field, and the failure code is unknown, the Failure Code field displays
Not Available.
Note From Cisco ISE Release 3.1, all pxGrid connections must be based on pxGrid 2.0. pxGrid 1.0-based
(XMPP-based) integrations will cease to work on Cisco ISE from Release 3.1 onwards.
pxGrid Version 2.0, which is based on WebSockets, was introduced in Cisco ISE Release 2.4. We recommend
that you plan and upgrade your other systems to pxGrid 2.0-compliant versions in order to prevent potential
disruptions, if any, to integrations.
Cisco Platform Exchange Grid (pxGrid) is an open and scalable Security Product Integration Framework that
allows for bi-directional any-to-any partner platform integrations.
pxGrid 1.0 uses legacy Extensible Messaging and Presence Protocol(XMPP) implementation. pxGrid 1.0 is
in maintenance mode, and will soon be removed. Cisco pxGrid 1.0 requires client SDK libraries (Java or C)
to work with pxGrid.
pxGrid 2.0 uses REST and WebSocket interfaces. A client uses REST for control messages, queries and
application data, and WebSockets for pushing events. For more information about pxGrid 2.0, see Welcome
to Learning Cisco Platform Exchange Grid (pxGrid).
pxGrid can:
• Share context-sensitive information from the Cisco ISE session directory with other network systems,
such as Cisco ISE ecosystem partner systems and other Cisco platforms.
• Enable third-party systems to invoke adaptive network control actions to quarantine users and devices
in response to a network or security event. TrustSec information, such as tag definition, value, and
description, pass from Cisco ISE via a TrustSec topic to other networks.
• Send endpoint profiles with Fully Qualified Names (FQNs) from Cisco ISE to other networks through
an endpoint profile meta topic.
• Bulk download of tags and endpoint profiles.
• Publish and subscribe to SXP bindings (IP-SGT mappings) through pxGrid. For more information about
SXP bindings, see the Security Group Tag Exchange Protocol section in the Segmentation chapter of
the Cisco ISE Administrators Guide.
• Cisco pxGrid Context-in enables ecosystem partners to publish topic information into Cisco ISE. This
enables Cisco ISE to take action based on the identified asset in the ecosystem. For more information
about Cisco pxGrid Context-in, see pxGrid Context-In.
Note pxGrid 1.0 is in maintenance mode and will soon be deprecated. We introduced pxGrid 2.0 in ISE 2.4. We
highly encourage partners to switch their pxGrid client implementations to pxGrid 2.0.
pxGrid Overview
pxGrid has the following components:
• Controller: Handles Discovery, Authentication, and Authorization.
• Provider: Returns query results or publishes.
• Pubsub: Provides pxGrid services to providers and consumers.
• Subscriber: Once authorized, subscribers get the contextual information and alerts from topics that they
subscribe to.
On the Active pxGrid 1.0 node, these processes show as 'Running'. On the Standby pxGrid 1.0 node, they
show as Disabled. If the Active pxGrid 1.0 noshow logging application pxgrid.statede goes down, the
standby pxGrid node detects that loss, and starts the four pxGrid processes. Within a few minutes, these
processes show as 'Running', and the Standby node becomes the Active node. You can verify that pxGrid is
in standby on that node by running the CLI command show logging application pxgrid.
Cisco ISE does automatic failover to the secondary pxGrid node. If you bring the original primary pxGrid
node back into the network, the original primary pxGrid node continues as the secondary role, and isn’t
promoted back to the primary role, unless you shut down the current primary.
Loss Detection
In Cisco ISE 3.0, we added sequence IDs to pxGrid topics. If there is a break in transmission, the subscriber
can recognize that by checking the gap in sequence of IDs. The subscriber notices the change in topic sequence
ID, and asks for data based on the date of last sequence number. If the Publisher goes down, when it comes
back up, topic sequence starts at 0. When the Subscriber sees sequence 0, they must clear the cache and start
bulk download. If subscriber goes down, the publisher keeps assigning sequential IDs. When the subscriber
reconnects, and sees a gap in sequence IDs, the subscriber asks for data from time of the last sequence number.
Loss detection works with Session Directory, and TrustSec Configuration. With Session Directory, when the
client detects a loss, they must clear the cache and start bulk download.
If you have an existing application that doesn’t use sequence IDs, you don’t have to use them. But using them
provides benefits of loss detection and recovery from loss.
Session Directory sessions are batched and published by MnT asynchronously for every notify interval to
/topic/com.cisco.ise.session.
Changes to TrustSec Security Groups are published to
/topic/com.cisco.ise.config.trustsec.security.group.
Loss Detection is only supported for pxGrid 2.0, and is on by default.
To see code examples of using Loss Detection, see https://github.com/cisco-pxgrid/pxgrid-rest-ws/tree/master/
java/src/main/java/com/cisco/pxgrid/samples/ise.
The Log page displays all the pxGrid 2.0 management events. Event info includes the client and capability
names along with the event type and timestamp. Choose Administration > pxGrid Services > Diagnostics
> Log to view the list of events. You can also clear the logs and resynchronize or refresh the list.
not be functional until the database sync operation completes. The time taken for database sync depends
on the size of configuration database.
The secondary pxGrid node goes back to being the sessions data publisher.
A refresh deployment notification is sent to all modules and when pxgrid module receives this, it
re-establishes all the fanouts that are used for internal distribution of data. Until this is completed, pxGrid
will not be completely functional.
If the FMC has to reconnect, after the reconnection succeeds, FMC will do a bulk download.
Step 1 Choose Administration > pxGrid Services > Client Management > Policy, and then click Add.
Step 2 From the Service drop-down list, choose one of the following options:
• com.cisco.ise.radius
• come.cisco.ise.sxp
• com.cisco.ise.trustsec
• com.cisco.ise.session
• com.cisco.ise.system
• com.cisco.ise.mdm
• com.cisco.ise.config.trustsec
• com.cisco.ise.config.profiler
• com.cisco.ise.pxgrid.admin
• com.cisco.ise.config.deployment.node
• com.cisco.ise.endpoint
• com.cisco.ise.config.anc
• com.cisco.ise.dnac
• com.cisco.ise.config.upn
• com.cisco.ise.pubsub
Step 3 From the Operation drop-down list, choose one of the following options:
• <ANY>
• publish
• publish /topic/com.cisco.ise.session
• publish /topic/com.cisco.ise.session.group
• publish /topic/com.cisco.ise.anc
• <CUSTOM>—You can specify a custom operation if you select this option.
Step 4 From the Groups drop-down list, choose the groups that you want to map to this service.
Predefined groups (such as EPS and ANC) and groups that you manually added are listed in this drop-down list.
Note Only the clients that are part of the groups included in the policy can subscribe to the service specified in that
policy.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > pxGrid Services.
Step 2 Check the checkbox next to the client and click Approve.
Step 3 Click Refresh to view the latest status.
Step 4 Select the capability you want to enable and click Enable.
Step 5 Click Refresh to view the latest status.
pxGrid Diagnostics
• XMPP: The Administration > pxGrid Services > Diagnostics > XMPP page lists pxGrid 1.0 clients,
external and internal. Also lists capabilities.
• Websocket: The Administration > pxGrid Services > Diagnostics > Websocket window lists pxGrid
2.0 clients (external and internal). It also lists the available pxGrid 2.0 topics, and the clients that publish
or subscribe to each one.
• Logs: The Administration > pxGrid Services > Diagnostics > Live Logs window lists management
events.
• Tests: Choose Administration > pxGrid Services > Diagnostics > Tests > Health Monitoring test
and click Start Test to verify whether a client can access the Session Directory service. When the test
is complete, you can view the log of the test activities.
pxGrid Settings
Choose one of the following options in the Administration > pxGrid Services > Settings window:
• Automatically approve new certificate-based accounts: This option is disabled by default. It gives
you control over connections to the pxGrid server. Enable this option only when you trust all clients in
your environment.
• Allow password based account creation: Check this check box to enable username/password based
authentication for pxGrid clients. If you enable this option, the pxGrid clients are not automatically
approved.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > pxGrid Services > Client Management >
Certificates.
Step 2 From the I want to drop-down list, choose one of the following options:
• Generate a single certificate (without a certificate signing request): You must enter the Common Name (CN) if
you select this option.
• Generate a single certificate (with a certificate signing request): You must enter the Certificate Signing Request
details if you select this option.
• Generate bulk certificates: You can upload a CSV file that contains the required details.
• Download Root Certificate Chain: You can download the root certificates and add them to the trusted certificate
store. You must specify the host name and the certificate download format.
Note This field is not displayed if you select the Generate Bulk Certificate option.
Step 6 From the Certificate Download Format drop-down list, choose one of the following options:
• Certificate in Private Enhanced Electronic Mail (PEM) format, key in PKCS8 PEM format (including
certificate chain): The root certificate, the intermediate CA certificates, and the end entity certificate are represented
in the PEM format. PEM-formatted certificates are BASE64-encoded ASCII files. Each certificate starts with the
"--------BEGIN CERTIFICATE-----" tag and ends with the "-------END CERTIFICATE----"
tag. The end entity’s private key is stored using PKCS* PEM. It starts with the "-----BEGIN ENCRYPTED
PRIVATE KEY----" tag and ends with the "-----END ENCRYPTED PRIVATE KEY----" tag.
• PKCS12 format (including certificate chain; one file for both the certificate chain and key): A binary format
to store the root CA certificate, the intermediate CA certificate, and the end entity's certificate and private key in
one encrypted file.
Any client with a noncompliant certificate fails to integrate with Cisco ISE. Use a certificate issued by the internal CA,
or generate a new certificate with proper usage extensions:
• The Key Usage extension in the certificate must contain the Digital Signature and Key Encipherment fields.
• The Extended Key Usage extension in the certificate must contain the Client Authentication and Server
Authentication fields.
• The Netscape Certificate Type extension is not required. If you want to include that extension, add both SSL Client
and SSL Server in the extension.
• If you are using a self-signed certificate, the Basic Constraints CA field must be set to True, and the Key Usage
extension must contain the Key Cert Sign field.
ip http server
! Must enable HTTP/HTTPS for URL-redirection on port 80/443
ip http secure-server
key <passwd>
! passwd is the secret password confiugured in Cisco ISE
exit
Note We recommend that you configure a dead-criteria time of 30 seconds with 3 retries to provide longer response
times for RADIUS requests that use Active Directory for authentication.
Note • Cisco ISE uses port 1700 (Cisco IOS software default) versus RFC default port 3799 for CoA. Existing
Cisco Secure ACS 5.x customers may already have this set to port 3799 if they use CoA as part of an
existing ACS implementation.
• secret key should be the same as the one configured on Cisco ISE while adding a network device and
the IP address should be a PSN IP address.
vlan <VLAN_number>
name ACCESS!
vlan <VLAN_number>
name VOICE
!
interface <VLAN_number>
description ACCESS
ip address 10.1.2.3 255.255.255.0
ip helper-address <DHCP_Server_IP_address>
ip helper-address <Cisco_ISE_IP_address>
!
interface <VLAN_number>
description VOICE
ip address 10.2.3.4 255.255.255.0
ip helper-address <DHCP_Server_IP_address>
remark DHCP
remark DNS
remark Ping
remark Ping
Note This configuration on the Wireless Controller may increase CPU utilization and raises the risk of system
instability. This is an IOS issue and does not adversely affect Cisco ISE.
Step 1 Enter the interface configuration mode for all of the access switch ports:
interface range FastEthernet0/1-8
Step 2 Enable the switch ports for access mode (instead of trunk mode):
switchport mode access
Step 3 Statically configure the access VLAN. This provides local provisioning for the access VLANs and is required for
open-mode authentication:
switchport access vlan <VLAN_number>
Step 4 Statically configure the voice VLAN:
switchport voice vlan <VLAN_number>
Step 5 Enable open-mode authentication. Open mode allows traffic to be bridged onto the data and voice VLANs before
authentication is completed. We strongly recommend using a port-based ACL in a production environment to prevent
unauthorized access.
Enabling open-mode authentication also allows pre-authentication access before the AAA server response, subject to
the port ACL.
authentication open
Step 6 Apply a port-based ACL to determine which traffic should be bridged by default from unauthenticated endpoints onto
the access VLAN. Because you should allow all access first and enforce policy later, you should apply ACL-ALLOW
to permit all traffic through the switch port. You have already created a default Cisco ISE authorization to allow all
traffic for now because we want complete visibility and do not want to impact the existing end-user experience yet.
An ACL must be configured to prepend dynamic ACLs from the AAA server.
ip access-group ACL-ALLOW in
Note Before Cisco IOS software Release 12.2(55)SE on DSBU switches, a port ACL is required for dynamic ACLs
from a RADIUS AAA server to be applied. Failure to have a default ACL will result in assigned dynamic ACLs
being ignored by the switch. With Cisco IOS software Release 12.2(55)SE, a default ACL will be automatically
generated and applied.
Note We are using ACL-ALLOW at this point in the lab because we want to enable 802.1X port-based authentication,
but without any impact on the existing network. In a later exercise, we will apply a different ACL-DEFAULT,
which blocks undesired traffic for a production environment.
Step 7 Enable Multi-Auth host mode. Multi-Auth is essentially a superset of Multi-Domain Authentication (MDA). MDA
only allows a single endpoint in the data domain. When multi-auth is configured, a single authenticated phone is allowed
in the voice domain (as with MDA) but an unlimited number of data devices can be authenticated in the data domain.
Allow voice and multiple endpoints on the same physical access port
authentication host-mode multi-auth
Note Multiple data devices (whether virtualized devices or physical devices connected to a hub) behind an IP phone
can exacerbate the access ports’ physical link-state awareness.
Step 8 Enable various authentication method options with the following commands:
Enable re-authentication:
authentication periodic
Enable re-authentication via RADIUS Session-Timeout:
The following example shows a control policy that is configured to allow sequential authentication methods
using MAB, 802.1X, and web authentication.
policy-map type control subscriber MABDOT1X
event session-started match-all
10 class always do-until-failure
10 authenticate using mab priority 20
20 authenticate using dot1x priority 10
event authentication-failure match-first
10 class ALL_FAILED do-until-failure
10 authentication-restart 60
event authentication-success match-all
10 class DOT1X do-until-failure
10 terminate mab
event agent-found match-all
10 class always do-until-failure
10 authenticate using dot1x priority 10
interface GigabitEthernet1/0/4
switchport mode access
device-tracking attach-policy pol1
ip access-group sample in
authentication timer reauthenticate server
access-session port-control auto
mab
dot1x pae authenticator
dot1x timeout tx-period 10
dot1x timeout auth-period 10
spanning-tree portfast
service-policy type control subscriber DOT1XMAB
Note The snmp-server group <group> v3 priv context vlan-1 command must be configured for each context.
The snmp show context command lists all the context information.
If the SNMP request times out and there is no connectivity issue, then you can increase the timeout value.
where inactivity is the interval of inactivity in seconds, after which the client activity is considered unauthorized.
In Cisco ISE, you can enable this option for any authorization policies to which such a session inactivity timer
should apply. In the Cisco ISE GUI, click the Menu icon ( ) and choose Policy > Policy Elements >
Results > Authorization > Authorization Profiles.
You can ignore this error message because this does not affect the authentication of the device.
Step 1 Allow all outbound traffic from the server to the client.
Step 2 (Optional) Allow ICMP inbound traffic from the client to the server for troubleshooting.
Step 3 Allow access to the MDM server for unregistered and noncompliant devices to download the MDM agent and proceed
with compliance checks.
Step 4 Allow all inbound traffic from the client to the server to Cisco ISE for the web portal and supplicant, and certificate
provisioning flows.
Step 5 Allow inbound Domain Name System (DNS) traffic from the client to the server for name resolution.
Step 6 Allow inbound DHCP traffic from the client to the server for IP addresses.
Step 7 Deny all inbound traffic from the client to the server to corporate resources for redirection to Cisco ISE (as per your
company policy).
Step 8 (Optional) Permit the rest of the traffic.
Example
The following example shows the ACLs for redirecting a nonregistered device to the BYOD flow.
In this example, the Cisco ISE IP address is 10.35.50.165, the internal corporate network IP addresses
are 192.168.0.0 and 172.16.0.0 (to redirect), and the MDM server subnet is 204.8.168.0.
Figure 63: ACLs for Redirecting Nonregistered Device
Note This feature is available in Cisco ISE Release 3.0 Patch 1 and later.
Step 1 In the home page of your Cisco ISE portal click the question mark icon at the top-right corner.
Step 2 In the Interactive Help menu displayed, from the Resources drop-down list, choose TAC Support Cases.
Step 3 In the TAC Support Cases window displayed, log in using your cisco.com credentials. (If you see an error message
indicating failure in accessing the feature, consult Cisco customer support to review the terms of your Cisco ISE contract.)
After you log in, the Cases window is displayed.
Step 4 Click Open A Case.
Step 5 In the Open Case form:
a. From the drop-down list, choose up to four nodes for which to open a case. Primary PAN and MnT nodes are chosen
by default.
b. Enter the details of your issue in the Title and Description fields.
c. Enter the required information in the Contract ID and Product Name fields.
d. (Optional) Choose values for:
1. Tech: From the drop-down list containing Cisco ISE Releases, choose a value. (Here, Cisco Identity Services
Engine - 2.6 refers to Releases 2.6 and later).
2. Sub Tech: From the drop-down list of Cisco ISE features, choose the problem area.
3. Problem Code: From the drop-down list, choose the applicable value.
With this, Cisco TAC receives the details of your issue and contacts you to further investigate the problem and troubleshoot.
The cases generated here are of severity level 3 by default. For higher severity cases (1 and 2), contact Cisco TAC to
open a case.
You can view the details of your case in the TAC Support Cases window. From the list of cases displayed, check the
check box adjacent to the case you want to examine. Click View Case to see the details of your case and a list of notes
that includes updates from TAC on this case. Click Add Notes to add a note of your own to the case.
To close the case, click the Close Case button. You must provide a closure reason when closing the case.
Health Check
Cisco ISE has an on-demand health check option to diagnose all the nodes in your Cisco ISE deployment.
Running a health check on all the nodes before any operation helps to reduce the downtime and improve the
overall functionality of Cisco ISE system by identifying critical issues, if any. Health Check provides the
working status of a component and displays troubleshooting recommendations regarding issues, if any, in
your deployment.
Platform Support Checks the supported platforms in the deployment. A platform that does not meet the
Check recommended requirement specification may cause performance issues.
Checks the 34xx and other unsupported platform details and checks if the system has
a minimum of 12 core CPU, 300-GB hard disk, 16-GB memory.
DNS Resolvability Checks for the forward and reverse lookup of host name and IP address.
Both forward and reverse DNS resolutions are recommended for deployment Health
Check to function properly.
Trust Store Checks if your Trust Store certificate is valid or has expired.
Certificate
Delete or renew unused or expired certificates to ensure optimum Cisco ISE
Validation
functionality.
System Certificate Checks the system certificate validation for each node.
Validation
Delete or renew unused or expired certificates to ensure optimum Cisco ISE
functionality.
Disk Space Check Checks the hard disk located in the Platform Support Check, and the free space available
in the disk for further upgrade procedures.
We recommend that you run a Disk Space Check before you begin the upgrade
operation to avoid performance issues.
NTP Reachability Checks the NTP configured in the system and whether the time source is the NTP
and Time Source server.
Check
NTP synchronization is essential for Cisco ISE services such as AD operations, upgrade
workflows, and so on.
Load Average Checks system load at specified intervals. The valid interval configurations are 1, 5,
Check and 15 minutes.
Load Average Check failures could lead to performance issues in Cisco ISE.
MDM Validation Checks for connectivity between the configured MDM servers and Cisco ISE PSN
servers.
To use the MDM-supported features in Cisco ISE, the MDM Validation Check must
be successful.
License Validation Checks if Smart Licensing is configured and valid. If your smart licences are not
configured or are valid, a warning is displayed in the Cisco ISE GUI asking you to
configure and validate your licenses.
Cisco ISE Release 3.0 and later releases support only Smart Licensing. Convert your
traditional licenses to smart licenses before you upgrade to Cisco ISE Release 3.0 and
later releases.
Services or Process Checks if the status of a service or application is in Running or Failed state.
Failures
Note The numbers adjacent to the deployment indicates the number of nodes and their health check details. For
example, if a deployment has 0/2, 0 indicates the number of nodes that are in Failed, In progress, and Completed
and 2 indicates the number of nodes in the deployment. During the health check, if any node does not send
back response for 15 minutes, health check for that specific node gets timed out.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Health Checks.
Step 2 Click Start health checks.
An information pop-up window displays the following message:
Health Checks triggered.
See section "Cisco ISE Administrator Groups" in Chapter "Cisco ISE Admin Guide: Overview" in Cisco ISE
Administrator Guide for information on the permissions and restrictions set for each user role.
Note Accessing Cisco ISE using the root shell without Cisco TAC supervision is not supported, and Cisco is not
responsible for any service disruption that might be caused as a result.
• Cisco Account: Enter your Cisco account credentials so that you can get emails from Telemetry. We
may also use this ID to contact you if Telemetry finds any serious issues that may affect your Cisco ISE
deployment..
• Transport Gateway: You can use a proxy between your Cisco ISE and the Cisco external telemetry
servers for extra security. To do this, check this check box and enter the FQDN of your proxy server.
Telemetry does not require a proxy.
Cisco provides software for Transport Gateway. You can download from cisco.com. This software runs
on a Linux server. See the Smart Call Home Deployment Guide for information on how to deploy the
Transport Gateway software on an RHEL server. If you are using this Cisco software, the URL value is
<FQDN of proxyserver>/Transportgateway/services/DeviceRequestHandler.
You can use this gateway to connect to the Smart Licensing server, too. From Version 3.5 of the Transport
Gateway, you cannot change the port, but you can enter IP address instead of the FQDN.
Posture
• Number of inactive policies
• Last posture feed update
• Number of active policies
• Posture feed updates
Guest Users
• Maximum number of authenticated guests for the day
• Maximum number of active guests for the day
• Maximum number of BYOD users for the day
• External ID information for authenticated guests
NAD Profile
Profiler
• Date of last feed update
• Are automatic updates enabled?
• Endpoints profiled, endpoint type, unknown endpoints, percentage unknown, and total endpoint count
• Number of custom profiles
• Serial number, scope, endpoint types, custom profiles
The following table lists the generic SNMP traps that are generated by default in Cisco ISE.
Note When an ISE process is manually stopped by an admin, Monit for the process also stops and no traps are sent
to the SNMP manager. A process-stop SNMP trap is sent to the SNMP manager only when a process
accidentally shuts down and is not automatically revived.
Cisco ISE sends traps for the following statuses to the configured SNMP server:
• Process Start (monitored state)
• Process Stop (not monitored state)
• Execution Failed: When the process state changes from Monitored to Execution Failed, a trap is sent.
• Does Not Exist: When the process state changes from Monitored to Does Not Exist, a trap is sent.
A unique object ID (OID) is generated for every object in the SNMP server and a value is assigned to the
OID. You can find the object with its OID value in the SNMP server. The OID value for a running trap is
running, and the OID value for the Not monitored, Does not exist, and Execution failed traps is stopped.
Cisco ISE sends traps using the OID of hrSWRunName that belongs to the HOST-RESOURCES MIB, and
sets the OID value as < PROCESS NAME > - < PROCESS STATUS >, for example, runtime - running.
To stop Cisco ISE from sending SNMP traps to the SNMP server, remove the SNMP configuration from the
Cisco ISE CLI. This operation stops sending SNMP traps and polling from the SNMP manager.
The Advanced Filter allows you to filter information based on specified conditions, such as, Alarm Name
contains TrustSec. You can specify more than one condition.
You can create and save user-specific custom filters that are accessible only to you.
Click Clear All Filters to remove all the applied filters.
The following table lists all the Cisco ISE alarms, descriptions, and resolutions.
Upgrade Bundle Download failure An upgrade bundle download has Check ADE.log on the failed node for upgrade
failed on an ISE node. failure reason and corrective actions.
SXP Connection Failure SXP connection has failed. Verify that the SXP service is running. Check the
peer for compatibility.
Cisco profile applied to all devices Network device profiles define the Consider editing the configuration of non-Cisco
capabilities of network access devices, network devices to assign the appropriate profile.
such as MAB, Dot1X, CoA, and Web
Redirect.
Secure LDAP connection reconnect CRL check result indicates that the Check the CRL configuration and verify that it is
due to CRL found revoked certificate certificate used for LDAP connection valid. Check that the LDAP server certificate and
is revoked. its issuer certificates are not revoked. If revoked,
issue a new certificate and install it on the LDAP
server.
Secure LDAP connection reconnect OCSP check result indicates that the Check the OCSP configuration and verify that it is
due to OCSP found revoked certificate certificate used for LDAP connection valid. Check that the LDAP server certificate and
is revoked. its issuer certificates are not revoked. If revoked,
issue a new certificate and install it on the LDAP
server.
Secure syslog connection reconnect CRL check result indicates that the Check the CRL configuration and verify that it is
due to CRL found revoked certificate certificate used for syslog connection valid. Check that the syslog server certificate and its
is revoked. issuer certificates are not revoked. If revoked, issue
a new certificate and install it on the syslog server.
Secure syslog connection reconnect OCSP check result indicates that the Check the OCSP configuration and verify that it is
due to OCSP found revoked certificate certificate used for syslog connection valid. Check that the syslog server certificate and its
is revoked. issuer certificates are not revoked. If revoked, issue
a new certificate and install it on the syslog server.
Administrator account Administrator account is locked or Administrator password can be reset by another
Locked/Disabled disabled because of password administrator using the GUI or CLI.
expiration or incorrect login attempts.
For more details, refer to the
administrator password policy.
ERS identified deprecated URL ERS-identified deprecated URL The request URL is deprecated and we recommend
that you avoid using it.
ERS identified out-dated URL ERS-identified outdated URL The requested URL is outdated and we recommend
that you use a newer one. The outdated URL will
not be removed in future releases.
ERS request content-type header is ERS request content-type header is The request resource version stated in the request
outdated outdated. content-type header is outdated. This means that the
resource schema has been modified. One or more
attributes may have been added or removed. To
overcome that with the outdated schema, the ERS
engine will use default values.
ERS XML input is a suspect for XSS ERS XML input is a suspect for XSS Review your XML input.
or Injection attack or injection attack.
Backup Failed The ISE backup operation failed. Check the network connectivity between Cisco ISE
and the repository. Ensure that:
• The credentials used for the repository are
correct.
• There is sufficient disk space in the repository.
• The repository user has write privileges.
CA Server is down CA server is down. Check to make sure that the CA services are up and
running on the CA server.
Certificate Expiration This certificate will expire soon. When Replace the certificate. For a trust certificate, contact
it expires, Cisco ISE may fail to the issuing Certificate Authority (CA). For a
establish secure communication with CA-signed local certificate, generate a CSR and have
clients. the CA create a new certificate. For a self-signed
local certificate, use Cisco ISE to extend the
expiration date. You can delete the certificate if it is
no longer used.
Certificate Revoked Administrator has revoked the Go through the BYOD flow again from the start to
certificate issued to an endpoint by the be provisioned with a new certificate.
internal CA.
Certificate Provisioning Initialization Certificate provisioning initialization More than one certificate found with the same value
Error failed. of CN (CommonName) attribute in the subject.
Cannot build certificate chain. Check all the
certificates in the system, including those from the
SCEP (Simple Certificate Enrollment Protocol)
server.
Certificate Replication Failed Certificate replication to secondary The certificate is not valid on the secondary node,
node failed. or there is some other permanent error condition.
Check the secondary node for a pre-existing,
conflicting certificate. If found, delete the
pre-existing certificate on the secondary node, and
export the new certificate on the primary node, delete
it, and import it in order to reattempt replication.
Certificate Replication Temporarily Certificate replication to secondary The certificate was not replicated to a secondary
Failed node temporarily failed. node because of a temporary condition such as a
network outage. The replication is retried until it
succeeds.
Certificate Expired This certificate has expired. Cisco ISE Replace the certificate. For a trust certificate, contact
may fail to establish secure the issuing Certificate Authority (CA). For a
communication with clients. CA-signed local certificate, generate a CSR and have
Node-to-node communication may also the CA create a new certificate. For a self-signed
be affected. local certificate, use Cisco ISE to extend the
expiration date. You can delete the certificate if it is
no longer used.
Certificate Request Forwarding Failed Certificate request forwarding failed. Make sure that the certificate request that is coming
in matches the attributes from the sender.
Configuration Changed Cisco ISE configuration is updated. Check if the configuration change is expected.
This alarm is not triggered for any
configuration change in users and
endpoints.
CRL Retrieval Failed Unable to retrieve CRL from the Ensure that the download URL is correct and is
server. This occurs if the specified available for the service.
CRL is unavailable.
DNS Resolution Failure DNS resolution failed on the node. Check if the DNS server configured by the ip
name-server command is reachable.
If you get the alarm as DNS Resolution failed for
CNAME <hostname of the node>, ensure that you
create CNAME RR along with the A record for each
Cisco ISE node.
Firmware Update Required A firmware update is required on this Contact Cisco TAC to obtain firmware update.
host.
Insufficient Virtual Machine Resources Virtual Machine (VM) resources such Ensure that the minimum requirements for the VM
as CPU, RAM, disk space, or IOPS host, as specified in the Cisco ISE Hardware
(Input/output operations per second) Installation Guide.
are insufficient on this host.
NTP Service Failure The NTP service is down on this node. This could be because there is a large time difference
between the NTP server and a Cisco ISE node (more
than 1000 seconds). Ensure that your NTP server is
working properly and use the ntp server
<servername> CLI command to restart the NTP
service and fix the time gap.
NTP Sync Failure All the NTP servers configured on this Run the show ntp command from the CLI for
node are unreachable. troubleshooting. Ensure that the NTP servers are
reachable from Cisco ISE. If NTP authentication is
configured, ensure that the key ID and value matches
with that of the server.
No Configuration Backup Scheduled No Cisco ISE configuration backup is Create a schedule for configuration backup.
scheduled.
Operations DB Purge Failed Unable to purge older data from the Check the Data Purging Audit report and ensure that
operations database. This occurs if the the used space is lesser than the threshold space. Log
MnT nodes are busy. in to the MnT nodes using the CLI and perform the
purge operation manually.
Profiler SNMP Request Failure Either the SNMP request timed out, or Ensure that SNMP is running on the NAD and verify
the SNMP community or user that SNMP configuration on Cisco ISE matches with
authentication data is incorrect. NAD.
Restore Failed Cisco ISE restore operation failed. Ensure network connectivity between Cisco ISE and
the repository. Ensure that the credentials used for
the repository is correct. Also ensure that the backup
file is not corrupted. Execute the reset-config
command from the CLI and restore the last-known
good backup.
Patch Failure A patch process has failed on the Reinstall the patch process on the server.
server.
External MDM Server API Version External MDM server API version Ensure that the MDM server API version is the same
Mismatch does not match with what is configured as what is configured in Cisco ISE. Update the Cisco
in Cisco ISE. ISE MDM server configuration, if needed.
External MDM Server Connection Connection to the external MDM Ensure that the MDM server is up and the Cisco
Failure server failed. ISE-MDM API service is running on the MDM
server.
External MDM Server Response Error External MDM server response error. Ensure that the Cisco ISE-MDM API service is
running properly on the MDM server.
MDM Compliance Polling Disabled Periodic compliance polling received Keep the number of non-compliant device requests
huge non-compliance device reaching the MDM server below 20000.
information.
Endpoint certificates expired Endpoint certificates were marked Re-enroll the endpoint device to get a new endpoint
expired by daily the scheduled job. certificate.
Endpoint certificates purged Expired endpoint certificates were No action is needed. This is an
purged by the daily scheduled job. administrator-initiated clean-up operation.
Endpoints Purge Activities Purge the activities on endpoints for Review the purge activities by choosing
the past 24 hours. This alarm is Operations > Reports > Endpoints and Users >
triggered at midnight. Endpoint Purge Activities.
PAN Auto Failover - Failover Failed Promotion request to the Secondary See the alarm details for further action.
Administration Node failed.
PAN Auto Failover - Failover Successfully triggered the failover of Wait for the promotion of secondary PAN to
Triggered the Secondary Administration Node to complete, and bring up the old primary PAN.
Primary role.
PAN Auto Failover - Health Check PAN did not receive the health check Verify if the reported monitoring node is down or
Inactivity monitoring request from the designated out-of-sync, and trigger a manual synchronization,
monitoring node. if needed.
PAN Auto Failover - Invalid Health Invalid health check monitoring Verify if the health check monitoring node is
Check request received for auto failover. out-of-sync, and trigger a manual synchronization
if needed.
PAN Auto Failover - Primary PAN is down or is not reachable from Bring up the PAN, or wait for failover to happen.
Administration Node Down the monitoring node.
PAN Auto Failover - Rejected Failover Secondary administration node rejected See the alarm details for further action.
Attempt the promotion request made by the
health check monitor node.
EST Service is down EST service is down. Make sure that the CA and EST services are up and
running, and that the certificate services endpoint
sub CA certificate chain is complete.
EST Service is up EST service is up. A notification is sent to inform the administrator that
the EST service is up.
Smart Call Home Communication Smart Call Home messages were not Ensure that there is network connectivity between
Failure sent successfully. Cisco ISE and Cisco Systems.
Telemetry Communication Failure Telemetry messages were not sent Ensure that there is network connectivity between
successfully. Cisco ISE and Cisco Systems.
Adapter not reachable Cisco ISE cannot connect to the Check the adapter logs for more details about the
adapter. failure.
Adapter Error Adapter has encountered an error. Check the description of the alarm.
Adapter Connection Failed The adapter cannot connect to the Ensure that the source server is reachable.
source server.
Adapter Stopped Due to Error The adapter has encountered an error Ensure that the adapter configuration is correct and
and is not in the desired state. the source server is reachable. See the adapter logs
for more details about the error.
Service Component Error The service component has Check the description of the alarm.
encountered an error.
ISE Services
Excessive TACACS Authentication The ISE Policy Service nodes are • Check the re-auth timer in the network devices.
Attempts experiencing higher than expected rate
of TACACS authentications. • Check the network connectivity of the ISE
infrastructure.
Excessive TACACS Authentication The ISE Policy Service nodes are • Check the authentication steps to identify the
Failed Attempts experiencing higher than expected rate root cause.
of failed TACACS authentications.
• Check the ISE or NAD configuration for
Identity and Secret mismatch.
MSE Location Server accessible again MSE Location Server is accessible None.
again.
MSE Location Server not accessible. MSE Location Server is not accessible, Check if the MSE Location Server is up and running
or is down. and is accessible from the ISE nodes.
AD Connector had to be restarted AD Connector stopped unexpectedly If this issue persists, contact Cisco TAC for
and had to be restarted. assistance.
Active Directory Forest is unavailable Active Directory forest Global Catalog Check DNS configuration, Kerberos configuration,
is unavailable, and cannot be used for error conditions, and network connectivity.
authentication, authorization, and
group and attribute retrieval.
Authentication domain is unavailable Authentication domain is unavailable, Check DNS configuration, Kerberos configuration,
and cannot be used for authentication, error conditions, and network connectivity.
authorization and group and attribute
retrieval.
ISE Authentication Inactivity Cisco ISE policy service nodes are not • Check the Cisco ISE and NAD configuration.
receiving authentication requests from
the network devices. • Check the network connectivity of the Cisco
ISE and NAD infrastructure.
ID Map. Authentication Inactivity No user authentication events were If user authentications are expected during this time,
collected by the Identity Mapping for example, during work hours, check the
Service in the last 15 minutes. connection to the Active Directory domain
controllers.
CoA Failed Network device has denied the Change Ensure that the network device is configured to
of Authorization (CoA) request issued accept CoA from Cisco ISE. Check if CoA is issued
by the Cisco ISE policy service nodes. on a valid session.
Configured nameserver is down Configured nameserver is down or Check DNS configuration and network connectivity.
unavailable.
Supplicant Stopped Responding Cisco ISE sent last message to the • Verify that the supplicant is configured properly
client 120 seconds ago, but there is no to conduct a full EAP conversation with Cisco
response from the client. ISE.
• Verify that NAS is configured properly to
transfer EAP messages to and from the
supplicant.
• Verify that the supplicant or NAS does not have
a short timeout for EAP conversation.
Excessive Authentication Attempts Cisco ISE policy service nodes are Check the reauthorization timer in the network
experiencing higher than expected rate devices. Check the network connectivity of the Cisco
of authentications. ISE infrastructure.
After the threshold is met, the Excessive
Authentication Attempts and Excessive Failed
Attempts alarms are triggered. The numbers
displayed next to the Description column are the
total number of authentications that have succeeded
or failed against Cisco ISE in the last 15 minutes.
Excessive Failed Attempts Cisco ISE policy service nodes are Check the authentication steps to identify the root
experiencing higher than expected rate cause. Check the Cisco ISE or NAD configuration
of failed authentications. for identity and secret mismatch.
After the threshold is met, the Excessive
Authentication Attempts and Excessive Failed
Attempts alarms are triggered. The numbers
displayed next to the Description column are the
total number of authentications that have succeeded
or failed against Cisco ISE in the last 15 minutes.
AD: Machine TGT refresh failed ISE server Ticket Granting Ticket Check that the ISE machine account exists and is
(TGT) refresh has failed. The TGT is valid. Also check for possible clock skew,
used for Active Directory connectivity replication, Kerberos configuration, or network
and services. errors, or all of them.
AD: ISE account password update ISE server has failed to update it's AD Check that the ISE machine account password is not
failed machine account password. changed and that the machine account is not disabled
or restricted. Check the connectivity to KDC.
Joined domain is unavailable Joined domain is unavailable, and Check DNS configuration, Kerberos configuration,
cannot be used for authentication, error conditions, and network connectivity.
authorization, and group and attribute
retrieval.
Identity Store Unavailable Cisco ISE policy service nodes are Check the network connectivity between Cisco ISE
unable to reach the configured identity and the identity stores.
stores.
Misconfigured Network Device Cisco ISE has detected too many Too much duplicate RADIUS accounting
Detected RADIUS accounting information from information has been sent to ISE from NAS.
NAS. Configure NAS with accurate accounting frequency.
This alarm is disabled by default. To
enable this alarm, see Enable and
Configure Alarms.
Misconfigured Supplicant Detected Cisco ISE has detected misconfigured Ensure that the configuration on the supplicant is
supplicant on the network. correct.
This alarm is disabled by default. To
enable this alarm, see Enable and
Configure Alarms.
No Accounting Start Cisco ISE policy service nodes have Ensure that RADIUS accounting is configured on
authorized a session, but did not the network device. Check the network device
receive accounting start from the configuration for local authorization.
network device.
Unknown NAD Cisco ISE policy service nodes are Check if the network device is a genuine request and
receiving authentication requests from add it to the configuration. Ensure that the secret
a network device that is not configured matches.
in Cisco ISE.
SGACL Drops Secure Group Access (SGACL) drops Run the RBACL drop summary report and review
occurred. This occurs if a the source causing the SGACL drops. Issue a CoA
Trustsec-capable device drops packets to the offending source to reauthorize or disconnect
because of SGACL policy violations. the session.
RADIUS Request Dropped The authentication and accounting Check that the NAD/AAA client has a valid
request from a NAD is silently configuration in Cisco ISE. Check whether the
discarded. This may occur because of shared secrets on the NAD/AAA client and Cisco
unknown NAD, mismatched shared ISE match each other. Ensure that the AAA client
secrets, or invalid packet content per and the network device, have no hardware problems
RFC. or problems with RADIUS compatibility. Also,
ensure that the network that connects the device to
This alarm is disabled by default. To
Cisco ISE has no hardware problems.
enable this alarm, see Enable and
Configure Alarms.
EAP Session Allocation Failed A RADIUS request was dropped Wait for a few seconds before invoking another
because EAP sessions limit is reached. RADIUS request with a new EAP session. If system
This condition can be caused by too overload continues to occur, try restarting the ISE
many parallel EAP authentication server.
requests.
RADIUS Context Allocation Failed A RADIUS request was dropped due Wait for a few seconds before invoking a new
to system overload. This condition can RADIUS request. If system overload continues to
be caused by too many parallel occur, try restarting the ISE server.
authentication requests.
AD: ISE machine account does not Cisco ISE machine account does not Check if the Cisco ISE machine account has rights
have the required privileges to fetch have the required privileges to fetch to fetch user groups in the Active Directory.
groups groups.
Posture Configuration Detection The posture state synchronization port Configure an ACL to block the posture state
is not blocked for compliant synchronization probe from reaching Cisco ISE if
authorization profiles. the client posture status is compliant.
Node Replication
Slow Replication Info Slow or stuck replication is detected Verify that the node is reachable, is a part of the
when the pending message count is deployment, and validate if it is under high load.
greater than 10000 or the time taken to
replicate messages exceeds an hour.
Slow Replication Warning Slow or stuck replication is detected Verify that the node is reachable, is a part of the
when the pending message count is deployment, and validate if it is under high load.
greater than 20000 or the time taken to
replicate messages exceeds three hours.
Slow Replication Error Slow or stuck replication is detected Verify that the node is reachable, is a part of the
when the pending message count is deployment, and validate if it is under high load.
greater than 40000 or the time taken to
replicate messages exceeds five hours.
Replication Failed The secondary node failed to consume Log in to the Cisco ISE GUI and perform a manual
the replicated message. synchronization from the Deployment window or
deregister and register the affected Cisco ISE node.
Replication Stopped The Cisco ISE node could not replicate Log in to the Cisco ISE GUI to perform a manual
configuration data from the PAN. synchronization from the Deployment window or
deregister and register the affected Cisco ISE node
with the required field.
System Health
High Disk I/O Utilization Cisco ISE system is experiencing high Check if the system has sufficient resources. Check
disk I/O utilization. the actual amount of work on the system, for
example, number of authentications, profiler activity,
and so on. Add an additional server to distribute the
load.
High Disk Space Utilization Cisco ISE system is experiencing high Check if the system has sufficient resources. Check
disk space utilization. the actual amount of work on the system, for
example, number of authentications, profiler activity,
and so on. Add an additional server to distribute the
load.
High Load Average Cisco ISE system is experiencing high Check if the system has sufficient resources. Check
load average. the actual amount of work on the system, for
example, number of authentications, profiler activity,
and so on. Add an additional server to distribute the
load.
Do not use third-party tools to check the load
average on a single CPU core because this metric
would not reflect the overall system load. We
recommend that you use the tech top command in
the Cisco ISE CLI for a cumulative view of the
system load.
If the High Load Average alarm is seen against 2:00
a.m. time stamps for Primary and Secondary MnT
nodes, note that CPU usage might be high due to
DBMS statistics being run at that hour. CPU usage
will be back to normal after the DBMS stats is
complete.
A High Load Average alarm is triggered at 1:00 a.m.
every Sunday by a weekly maintenance task. This
maintenance task rebuilds all the indexes that occupy
more than 1 GB space. This alarm can be ignored.
High Memory Utilization Cisco ISE system is experiencing high Check if the system has sufficient resources. Check
memory utilization. the actual amount of work on the system, for
example, number of authentications, profiler activity,
and so on. Add an additional server to distribute the
load.
We recommend that you use the show memory
command in the Cisco ISE CLI to check memory
utilization.
In a Cisco ISE node, its operating system manages
memory utilization. You must check for the available
memory (instead of free memory) metric for a more
reliable measure of memory utilization.
Note that an operating system segments most of the
memory in buffer or cache. If less than 90% of the
total memory is displayed as used, and there is no
substantial increase in swap memory, Cisco ISE
memory utilization can be considered stable.
High Operations DB Usage Cisco ISE monitoring nodes are Check and reduce the purge configuration window
experiencing higher volume of syslog for the operations data.
data than expected.
High Authentication Latency Cisco ISE system is experiencing high Check if the system has sufficient resources. Check
authentication latency. the actual amount of work on the system, for
example, number of authentications, profiler activity,
and so on. Add an additional server to distribute the
load.
Health Status Unavailable The monitoring node has not received Ensure that Cisco ISE nodes are up and running, and
the health status from the Cisco ISE are able to communicate with the monitoring nodes.
node.
Process Down One of the Cisco ISE processes is not Restart the Cisco ISE application.
running.
Profiler Queue Size Limit Reached The ISE Profiler Queue Size Limit has Check if the system has sufficient resources, and
been reached. Events received after ensure that the EndPoint attribute filter is enabled.
reaching the queue size limit will be
dropped.
OCSP Transaction Threshold Reached The OCSP transaction threshold has Check if the system has sufficient resources.
been reached. This alarm is triggered
when the internal OCSP service
transaction has reached its threshold.
Licensing
License About to Expire License installed on the Cisco ISE See the Licencing window in Cisco ISE to view the
nodes are about to expire. license usage.
License Expired License installed on the Cisco ISE Contact the Cisco Accounts team to purchase new
nodes has expired. licenses.
License Violation Cisco ISE nodes have detected that you Contact the Cisco Accounts team to purchase
are exceeding or are about to exceed additional licenses.
the allowed license count.
Smart Licensing Authorization Expired Authorization for Smart Licensing has See the Cisco ISE License Administration window
expired. to manually renew registration for Smart Licensing
or check your network connectivity with Cisco Smart
Software Manager. Contact your Cisco partner if the
issue persists.
Smart Licensing Authorization Renewal of authorization with Cisco See the Cisco ISE License Administration window
Renewal Failure Smart Software Manager has failed. to manually renew authorization with Cisco Smart
Software Manager using the Refresh button in the
Licenses table. Contact your Cisco partner if issue
persists.
Smart Licensing Authorization Renewal of authorization with Cisco Send notification to inform that authorization
Renewal Success Smart Software Manager was renewal of Cisco ISE with Cisco Smart Software
successful. Manager was successful.
Smart Licensing Communication Communication of Cisco ISE with Check your network connectivity with Cisco Smart
Failure Cisco Smart Software Manager has Software Manager. Log in to Cisco Smart Software
failed. Manager or contact your Cisco partner if issue
persists.
Smart Licensing Communication Communication of Cisco ISE with Send notification to inform that your network
Restored Cisco Smart Software Manager was connectivity with Cisco Smart Software Manager
restored. has been restored.
Smart Licensing De-Registration Deregistration of Cisco ISE with Cisco See the Cisco ISE License Administration window
Failure Smart Software Manager has failed. for additional details. Log in to Cisco Smart
Software Manager or contact your Cisco partner if
issue persists.
Smart Licensing De-Registration Deregistration of Cisco ISE with Cisco Send notification to inform that deregistration of
Success Smart Software Manager was Cisco ISE with Cisco Smart Software Manager was
successful. successful.
Smart Licensing Disabled Smart Licensing is disabled on Cisco See the License Administration window to enable
ISE, and traditional licensing is in use. Smart Licensing again. See the Cisco ISE Admin
Guide or contact your Cisco partner to learn about
using Smart Licensing on Cisco ISE.
Smart Licensing Evaluation Period Evaluation period of Smart Licensing See the Cisco ISE License Administration window
Expired has expired. to register Cisco ISE with Cisco Smart Software
Manager.
Smart Licensing HA Role changed High-availability role change has Send notification to inform that the HA role of Cisco
occurred while using Smart Licensing. ISE has changed.
Smart Licensing Id Certificate Expired Smart Licensing certificate has expired. See the Cisco ISE License Administration window
to manually renew registration for Smart Licensing.
Contact your Cisco partner if the issue persists.
Smart Licensing Id Certificate Renewal Registration renewal for Smart See the Cisco ISE License Administration window
Failure Licensing with Cisco Smart Software to manually renew registration for Smart Licensing.
Manager has failed. Contact your Cisco partner if the issue persists.
Smart Licensing Id Certificate Renewal Registration renewal for Smart Send notification to inform that registration renewal
Success Licensing with Cisco Smart Software with Cisco Smart Software Manager was successful.
Manager was successful.
Smart Licensing Invalid Request Invalid request was made to Cisco See the Cisco ISE License Administration window
Smart Software Manager. for additional details. Log in to Cisco Smart
Software Manager or contact your Cisco partner if
issue persists.
Smart Licensing Out of Compliance Cisco ISE licenses are out of See the ISE License Administration window for
compliance. additional details. Contact your partner or Cisco
account team to purchase new licenses.
Smart Licensing Registration Failure Registration of Cisco ISE with Cisco See the ISE License Administration winsow for
Smart Software Manager has failed. additional details. Log in to Cisco Smart Software
Manager or contact your Cisco partner if issue
persists.
Smart Licensing Registration Registration of Cisco ISE with Cisco Send notification to inform that registration of Cisco
Successful Smart Software Manager was ISE with Cisco Smart Software Manager was
successful. successful.
System Error
Log Collection Error The Cisco ISE monitoring collector This will not impact the actual functionality of the
process is unable to continue with the Policy Service nodes. Contact Cisco TAC for further
audit logs generated from the policy resolution.
service nodes.
Scheduled Report Export Failure Unable to copy the exported report Verify the configured repository. If it has been
(CSV file) to the configured repository. deleted, add it back. If it is not available or is not
reachable, reconfigure the repository to a valid one.
TrustSec
Unknown SGT was provisioned Unknown SGT was provisioned. ISE provisioned an Unknown SGT as part of the
authorization flow. Unknown SGT should not be
assigned as part of a known flow.
Some TrustSec network devices do not Some TrustSec network devices do not ISE identified some network devices that have a
have the latest ISE IP-SGT mapping have the latest ISE IP-SGT mapping different IP-SGT mapping sets. Use the IP-SGT
configuration configuration. Mapping Deploy option to update the devices.
TrustSec SSH connection failed TrustSec SSH connection failed. ISE failed to establish SSH connection to a network
device. Verify if the network device's SSH
credentials in the Network Device window are
similar to the credentials configured on the network
device. Check the network device-enabled SSH
connections from ISE (IP address).
TrustSec identified ISE was set to work TrustSec-identified ISE was set to TrustSec supports only TLS Version 1.0.
with TLS versions other than 1.0 work with TLS versions other than 1.0.
Trustsec PAC validation failed Trustsec PAC validation failed. ISE could not validate a PAC that was sent by the
network device. Check the Trustsec device
credentials in the Network Device window and in
the device CLI. Make sure the device uses a valid
PAC that was provisioned by the ISE server.
Trustsec environment data download Trustsec environment data download Cisco ISE has received illegal Environment Data
failed has failed. request.
Verify the following:
• PAC exists in the request, and is valid.
TrustSec CoA message ignored TrustSec CoA message was ignored. Cisco ISE sent a TrustSec CoA message and did not
receive a response. Verify if the network device is
CoA capable. Check the network device
configuration.
TrustSec default egress policy was TrustSec default egress policy was Make sure it is aligned with your security policy.
modified modified.
Note Alarms are not triggered when you add users or endpoints to Cisco ISE.
Alarm Settings
The following table describes the fields in the Alarm Settings window(In the Cisco ISE GUI, click the Menu
icon ( ) and choose Administration > System > Settings > Alarm Settings > Alarm Configuration >
Add)
Severity Select the severity level for your alarm. Valid options are:
• Critical: Indicates a critical error condition.
• Warning: Indicates a normal but significant condition. This is the default condition.
• Info: Indicates an informational message.
Send Syslog Send a syslog message for each system alarm that Cisco ISE generates.
Message
Notes in Email (0 Custom text messages that you want associated with your system alarm.
to 4000 characters)
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Alarm Settings
Step 2 In the Alarm Configuration tab, click Add.
Step 3 Enter the required details. See the Alarm Settings section for more information.
Based on the alarm type (High Memory Utilization, Excessive RADIUS Authentication Attempts, Excessive TACACS
Authentication Attempts, and so on), additional attributes are displayed in the Alarm Configuration window. For
example, Object Name, Object Type, and Admin Name fields are displayed for Configuration Change alarms. You
can add multiple instances of the same alarm with different criteria.
Note The recipient email address specified at the alarm rule level overrides the global recipient email address setting.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Settings > Alarm Settings.
Step 2 Select an alarm from the list of default alarms y clicking on the radio button and click Edit.
Step 3 Select Enable or Disable. from the Status drop-down list.
Step 4 Configure alarm threshold, if applicable.
Step 5 Click Submit.
Step 4 Acknowledge alarms to reduce the alarm counters (number of times an alarm is raised) by marking them as read. Select
alarms for acknowledgement by checking the check boxes next to the timestamps.
Choose Acknowledge Selected from the Acknowledge drop-down list to mark as read all the alarms currently displayed
in the window. By default, 100 rows are displayed in the window. You can choose a different number of rows to be
displayed, by choosing a value from the Rows/Page drop-down list.
Choose Acknowledge All from the Acknowledge drop-down list to mark as read all the alarms in the list, whether or
not they are currently displayed in the window.
Note When you check the check box next to the Time Stamp in the title row, all the alarms displayed in the window
are selected. However, if you then uncheck a check box for one or more of the selected alarms, the select all
function lapses. You will see that the check box next to the Time Stamp is unchecked at this point.
Step 5 Click the Details link corresponding to the alarm that you select. A dialog box opens with the details corresponding to
the selected alarm.
Note The Details link corresponding to the alarms that were generated prior to persona change shows no data.
Log Collection
Monitoring services collect log and configuration data, store the data, and then process it to generate reports
and alarms. You can view the details of the logs that are collected from any of the servers in your deployment.
Note Cisco ISE monitoring requires that the logging-source interface configuration use the network access server
(NAS) IP address. You must configure a switch for Cisco ISE monitoring.
You must also have a system that is configured as a syslog server to be able to receive syslog messages. You
can create, edit, and delete alarm syslog targets.
To configure a remote logging target as an alarm target, perform this procedure.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Administration > System > Logging > Remote Logging
Targets.
Step 2 Click Add.
Step 3 In the New Logging Target window, submit the required details for the logging target, and check the Include Alarms
for this Target check box.
Time Shows the time at which the log was received by the monitoring and troubleshooting
collection agent. This column is required and cannot be deselected.
Status Shows if the authentication succeeded or failed. This column is mandatory and cannot
be deselected. Green is used to represent passed authentications. Red is used to represent
failed authentications.
Details Clicking the icon under the Details column opens the Accounting Detail Report in
a new browser window. This report offers information about authentication and related
attributes, and authentication flow.
Clicking the icon under the Details column opens the Accounting Detail report if an
accounting event is processed for that session. If the session is in authenticated state,
Authentication Detail report is displayed when you click the icon under the Details
column.
The Response Time in the Authentication Detail report is the total time taken by
Cisco ISE to process the authentication flow. For example, if authentication consists
of three roundtrip messages that took 300 ms for the initial message, 150 ms for the
next message, and 100 ms for the last, Response Time is 300 + 150 + 100 = 550 ms.
Note You cannot view the details for endpoints that are active for more than 7 days.
You will see a window with the following message when you click the Details
icon for endpoints that are active for more than 7 days: No Data available
for this record. Either the data is purged or authentication for
this session record happened a week ago. Or if this is an
'PassiveID' or 'PassiveID Visibility' session, it will not have
authentication details on ISE but only the session.
Repeat Count Shows the number of time the authentication requests were repeated in the last 24
hours, without any change in the context of identity, network devices, and authorization.
Identity Shows the logged in username that is associated with the authentication.
If the username is not present in any ID Store, it is displayed as INVALID. If the
authentication fails due to any other reason, it is displayed as USERNAME.
Note This is applicable only for users. This is not applicable for MAC addresses.
To aid debugging, you can force Cisco ISE to display the invalid usernames. To do
this, check the Disclose Invalid Usernames check box under Administration >
System > Settings > Security Settings. You can also configure the Disclose Invalid
Usernames option to time out, so that you do not have to manually turn it off.
Endpoint ID Shows the unique identifier for an endpoint, usually a MAC or IP address.
Endpoint Profile Shows the type of endpoint that is profiled, for example, profiled to be an iPhone,
Android, MacBook, Xbox, and so on.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
Authorization Shows the authorization profile that was used for authentication.
Profiles
Device Port Shows the port number at which the endpoint is connected.
Identity Group Shows the identity group that is assigned to the user or endpoint, for which the log
was generated.
Posture Status Shows the status of posture validation and details on the authentication.
Server Indicates the policy service from which the log was generated.
Failure Reason Shows the detailed reason for failure, if the authentication failed.
Auth Method Shows the authentication method that is used by the RADIUS protocol, such as
Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2),
IEE 802.1x or dot1x, and so on.
Authentication Shows the authentication protocol used, such as Protected Extensible Authentication
Protocol Protocol (PEAP), Extensible Authentication Protocol (EAP), and so on.
Security Group Shows the group that is identified by the authentication log.
Note In the RADIUS Live Logs and TACACS+ Live Logs window, a Queried PIP entry appears for the first
attribute of each policy authorization rule. If all the attributes within the authorization rule are related to a
dictionary that was already queried for previous rules, no additional Queried PIP entry appears.
Generated Time Shows the syslog generation time based on when a particular event was triggered.
Logged Time Shows the time when the syslog was processed and stored by the Monitoring node.
This column is mandatory and cannot be deselected.
Status Shows if the authentication succeeded or failed. This column is required and cannot
be deselected. Green is used to represent passed authentications. Red is used to represent
failed authentications.
Details Brings up a report when you click the magnifying glass icon, allowing you to drill
down and view more detailed information about the selected authentication scenario.
This column is required and cannot be deselected.
Session Key Shows the session keys (found in the EAP success or EAP failure messages) returned
by ISE to the network device.
Username Shows the user name of the device administrator. This column is required and cannot
be deselected.
Type Consists of two Types—Authentication and Authorization. Shows names of users who
have passed or failed authentication, authorization, or both. This column is mandatory
and cannot be deselected.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
ISE Node Shows the name of the ISE node through which the access request is processed.
Network Device IP Shows the IP addresses of network devices whose access requests are processed.
Network Device Shows the name of corresponding network device groups to which a network device
Groups belongs.
Device Type Shows the device type policy that is used to process access requests from different
network devices.
Location Shows the location-based policy that is used to process access requests from network
devices.
Device Port Shows the device port number through which the access request is made.
Failure Reason Shows the reason for rejecting an access request that is made by a network device.
Remote Address Shows the IP address, MAC address, or any other string that uniquely identifies the
end station.
Shell Profile Shows the privileges that were granted to a device administrator for executing
commands on the network device.
Live Authentications
You can monitor recent RADIUS authentications as they occur, from the Live Authentications window. The
window displays the top ten RADIUS authentications in the last 24 hours. This section explains the functions
of the Live Authentications window.
The Live Authentications window shows the live authentication entries corresponding to the authentication
events as they happen. In addition to authentication entries, this window also shows the live session entries
corresponding to the events. You can also drill-down a session to view a detailed report corresponding to that
session.
The Live Authentications window provides a tabular account of recent RADIUS authentications, in the order
in which they occur. The last update shown at the bottom of the Live Authentications window shows the
date of the server, time, and timezone.
Note If the password attribute in an Access-Request packet is empty, an error message is triggered and the access
request fails.
When a single endpoint is authenticated successfully, two entries appear in the Live Authentications
window—one corresponding to the authentication record and another corresponding to the session record
(pulled from the session live view). Subsequently, when the device performs another successful authentication,
the repeat counter corresponding to the session record is incremented. The Repeat Counter that appears in the
Live Authentications window shows the number of duplicate RADIUS authentication success messages that
are suppressed.
See the Live Authentication data categories that are shown by default. These are described in the Recent
RADIUS Authentications section.
You can choose to view all the columns, or only selected data columns. After selecting the columns that you
want to be displayed, you can save your selections.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > RADIUS > Live logs
Step 2 From the Refresh drop-down list, choose a time interval to change the data refresh rate.
Step 3 Click the Refresh icon to manually update the data.
Step 4 From the Show drop-down list, choose an option to change the number of records that appear.
Step 5 From the Within drop-down list, choose an option to specify a time interval.
Step 6 Click Add or Remove Columns and choose the options from the drop-down list to change the columns that are displayed.
Step 7 Click Save at the bottom of the window to save your modifications.
Step 8 Click Show Live Sessions to view the live RADIUS sessions.
You can use the dynamic Change of Authorization (CoA) feature for the live sessions that allows you to dynamically
control active RADIUS sessions. You can send reauthenticate or disconnect requests to a Network Access Device (NAD).
several operators that are available in the Live Authentications window to filter out records based on your
search criteria.:
• 'abc' : Contains 'abc'
• '!abc' : Does not contain 'abc'
• '{}' : Is empty
• '!{}' : Is not empty
• 'abc*' : Starts with 'abc'
• '*abc' : Ends with 'abc'
• '\!', '\*', '\{', '\\' : Escape
The Escape option allows you to filter text with special characters (including the special characters used as
filters). You must prefix the special character with a backward slash (\). For example, if you want to view the
authentication records of users with identity "Employee!," enter "Employee\!" in the Identity Filter field. In
this example, Cisco ISE considers the exclamation mark (!) as a literal character and not as a special character.
In addition, the Status field allows you to filter only passed authentication records, failed authentications,
live sessions, and so on. The green check mark filters all the passed authentications that occurred in the past.
The red cross mark filters all failed authentications. The blue i icon filters all the live sessions. You can also
choose to view a combination of these options.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > RADIUS > Live Logs
Step 2 Filter data based on any of the fields in the Show Live Authentications window.
You can filter the results based on passed or failed authentications, or live sessions.
Updated Shows the timestamp when the session was last updated because of a change.
Account Session Shows the time span (in seconds) of a user's session.
Time
Action Click the Actions icon to reauthenticate an active RADIUS session or disconnect an
active RADIUS session.
Endpoint ID Shows the unique identifier for an endpoint, usually a MAC or IP address.
Posture Status Shows the status of posture validation and details of the authentication.
Security Group Shows the group that is identified by the authentication log.
Server Indicates the Policy Service node from which the log was generated.
Auth Method Shows the authentication method that is used by the RADIUS protocol, such as
Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol
(CHAP), IEE 802.1x or dot1x, and so on.
Authentication Shows the authentication protocol used, such as Protected Extensible Authentication
Protocol Protocol (PEAP), Extensible Authentication Protocol (EAP), and so on.
Authentication Shows the name of the policy selected for specific authentication.
Policy
Authorization Shows the name of the policy selected for specific authorization.
Policy
PRA Action Shows the periodic reassessment action taken on a client after it is successfully postured
for compliance on your network.
WLC Roam Shows the boolean (Y/N) used to track if an endpoint has been handed off during
roaming, from one Wireless Lan Controller (WLC) to another. It has the value of
cisco-av-pair=nas-update =Y or N.
Note Cisco ISE relies on the nas-update=true attribute from WLC to identify whether
the session is in roaming state. When the original WLC sends an accounting
stop attribute with nas-update=true, the session is not deleted in ISE to avoid
reauthentication. If roaming fails, ISE clears the session after five days of
inactivity.
Provider Endpoint events are learned from different syslog sources. These syslog sources are
referred to as providers.
• Windows Management Instrumentation (WMI): WMI is a Windows service that
provides a common interface and object model to access management information
about operating system, devices, applications, and services.
• Agent: A program that runs on a client on behalf of the client or another program.
• Syslog: A logging server to which a client sends event messages.
• REST: A client is authenticated through a terminal server. The TS Agent ID,
Source Port Start, Source Port End, and Source First Port values are displayed
for this syslog source.
• Span: Network information is discovered using span probes.
• DHCP: DHCP event.
• Endpoint
Note When two events from different providers are learned or obtained from an
endpoint session, the providers are displayed as comma-separated values in
the Live Sessions window.
Endpoint Check Shows the time at which an endpoint was last checked by the endpoint probe.
Time
Endpoint Check Shows the result of an endpoint probe. The possible values are:
Result
• Unreachable
• User Logout
• Active User
Source Port Start (Values are displayed only for the REST provider) Shows the first port number in a
port range.
Source Port End (Values are displayed only for the REST provider) Shows the last port number in a
port range.
Source First Port (Values are displayed only for the REST provider) Shows the first port allocated by
the Terminal Server Agent.
A Terminal Server refers to a server or network device that allows multiple endpoints
to connect to it without a modem or network interface and facilities the connection of
the multiple endpoints to a LAN network. The multiple endpoints appear to have the
same IP address, and therefore, it is difficult to identify the IP address of a specific
user. Consequently, to identify a specific user, a Terminal Server Agent is installed in
the server, which allocates a port range to each user. This helps create an IP address-port
user mapping.
TS Agent ID (Values are displayed only for the REST provider) Shows the unique identity of the
Terminal Server Agent that is installed on an endpoint.
AD User Resolved (Values are displayed only for AD user) Shows the potential accounts that matched.
Identities
AD User Resolved (Values are displayed only for AD user) Shows the Distinguished Name of AD user,
DNs for example, CN=chris,CN=Users,DC=R1,DC=com
Export Summary
You can view the details of the reports exported by all the users in the last seven days, along with the status.
The export summary includes both the manual and scheduled reports. The Export Summary window is
automatically refreshed every two minutes. Click the Refresh icon to refresh the Export Summary window
manually.
The super admin can cancel the export that is In-Progess or in Queued state. Other users are allowed only
to cancel the export process that they have initiated.
By default, only three manual export of reports can run at a given point of time; the remaining triggered manual
export of reports are queued. There are no such limits for the scheduled export of reports.
Note All the reports in the queued state are scheduled again and the reports in the In-Progress or
Cancellation-in-progress state are marked as failed when the Cisco ISE server is restarted. If the primary
MnT node is down, the scheduled report export job runs on secondary MnT node.
The following table describes the fields in the Export Summary window. In the Cisco ISE GUI, click the
Menu icon ( ) and choose Operations > Reports > Export Summary.
Exported By Shows the role of the user who initiated the export process.
Triggered On Shows the time at which the export process has been triggered in the system.
Repository Displays the name of the repository where the exported data will be stored.
Filter Parameters Shows the filter parameters selected while exporting the report.
Status Shows the status of the exported reports. It can be one of the following:
• Queued
• In-progress
• Completed
• Cancellation-in-progress
• Cancelled
• Failed
• Skipped
Note Failed status indicates the reason for failure. Skipped status indicates that the
scheduled export of reports is skipped because the primary MnT node is down.
Note You can generate the Authentication Summary report only for the last 30 days.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > Reports > Device Administration >
Authentication Summary Report.
Step 2 Filter the report for the Failure Reasons.
Step 3 Review the data in the Authentication by Failure Reasons section of the report to troubleshoot your network access
problem.
Note Because the Authentication Summary report collects and displays the latest data corresponding to failed or passed
authentications, the contents of the report appear after a delay of a few minutes.
• You can also go to the Operations Audit window (In the Cisco ISE GUI, click the Menu icon ( ) and
choose Operations > Reports > Reports > Audit > Operations Audit) for details of the services
enabled, disabled, registered, unregistered, enrolled, or unenrolled as part of Cisco Support Diagnostics.
Troubleshooting Information
If the Cisco Support Diagnostics bidirectional connection appears as to be broken, check for the following:
• Smart Licensing: Disabling Smart Licensing disables Cisco Support Diagnostics automatically. Re-enable
smart licensing to enable the connector.
• Connectivity to Security Services Exchange cloud: When Cisco Support Diagnostics is enabled, Cisco
ISE continuously checks the persistent connectivity established with the Security Services Exchange
portal. If this connection is found to be broken, the following critical alarm is triggered: Alarms: The
Cisco Support Diagnostics bi-directional connectivity is broken. Re-enable the feature using the
configuration steps provided earlier.
Related Information
An administrator can use ERS APIs to perform these specific tasks:
• Trigger support information on a specific node.
• Get the status of the triggered support bundle.
• Download the support bundle.
• Pull the deployment information.
See the ERS SDK page for usage and other information.
Note When searching for RADIUS authentications based on NAS IP Address and
Endpoint ID Fields, a search is first performed in the operational database, and
then in the configuration database.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
General Tools > RADIUS Authentication Troubleshooting.
Step 2 Specify the search criteria in the fields, as needed.
Step 3 Click Search to display the RADIUS authentications that match your search criteria.
If you are searching for Active Directory-related authentication, and an Active Directory server is not configured in your
deployment, a message stating AD not configured is displayed.
Step 4 Select a RADIUS authentication record from the table, and click Troubleshoot.
To troubleshoot Active Directory-related authentication, access the Diagnostics Tool under Administration > Identity
Management > External Identity Sources > Active Directory > AD node.
Step 5 Click User Input Required, modify the fields, as needed, and then click Submit.
Step 6 Click Done.
Step 7 Click Show Results Summary after the troubleshooting is complete.
Step 8 (Optional) To view the diagnosis, the steps taken to resolve the problem, and the troubleshooting summary, click Done.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
General Tools > Execute Network Device Command.
Step 2 Enter the information in the appropriate fields.
Step 3 Click Run to execute the command on the specified network device.
Step 4 Click User Input Required, and modify the fields, as necessary.
Step 5 Click Submit to run the command on the network device, and view the output.
Note The agentless posture script cannot verify itself, but the script verifies the data received from Cisco ISE after
it is executed.
• In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostics
> General Tools > Agentless Posture Troubleshooting.
The Agentless Posture Troubleshooting tool collects Agentless Posture activity for a specified client. Agentless
Posture Flow initiates posture and displays all the interactions between a currently active client and Cisco
ISE. Only Download Client Logs creates logs with up to 24 hours of posture flows from the client. The client
can delete the logs at any time. After collection is completed, you can export a ZIP file of the logs.
Reports
In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Reports > Reports > Endpoints
and Users > Agentless Posture to view all the endpoints that ran Agentless posture.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
General Tools > Evaluate Configuration Validator.
Step 2 Enter the IP address of the network device that you want to evaluate in the Network Device IP field.
Step 3 Check the check boxes and click the radio buttons next to the configuration options you want to compare against the
recommended template.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > General
Tools > Posture Troubleshooting.
Step 2 Enter the information in the appropriate fields.
Step 3 Click Search.
Step 4 To find an explanation and determine a resolution for an event, select the event in the list and click Troubleshoot.
Note You can configure test cases only for Simple RADIUS authentication.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > General
Tools > Session Trace Test Cases.
After you select a predefined test case, Cisco ISE automatically populates the relevant attributes for the test case. You
can use the default values of these attributes or select a value from the displayed options. You can also add additional
custom attributes to the test case.
The attributes and the values that you add to the test case are listed in the Text field (below the Custom Attributes field).
When you edit the content in the Text field, Cisco ISE checks the validity and syntax of the updated content.
You can view the summary of all the attributes at the bottom of the Test Details window.
Step 6 In the Test Visualizer tab, select the node on which you want to run this Test Case.
Note Only the nodes with Policy Service persona are displayed in the ISE Node drop-down list.
Click User Groups/Attributes to retrieve the groups and attributes for a user from an external identity store.
Step 8 (Optional) Click the Previous Test Executions tab to view the results of previous test executions. You can also select
and compare any two test cases. Cisco ISE displays the comparative view of the attributes for each test case in a tabular
format.
Step 9 You can launch the Session Trace Test Case tool from the RADIUS Live Logs window. You can select an entry on the
Live Logs window and click the Actions icon (in the Details column) to launch the Session Trace Test Case tool. Cisco
ISE extracts the relevant attributes and their values from the corresponding log entry. You can modify these attributes
and values, if required, and execute the test case.
You can configure the TCP dump options and then collect data from the network traffic to help you troubleshoot
a network issue.
Note Human-readable format is no longer an option; the dump file is always in raw format.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > General
Tools > TCP Dump.
Step 2 From the Host Name drop-down list, choose the source for the TCP Dump utility.
Step 3 From the Network Interface drop-down list, choose an interface to monitor.
Step 4 In the Filter field, enter a boolean expression on which to filter.
The following are supported standard TCP dump filter expressions:
• ip host 10.77.122.123
• ip host ISE123
• ip host 10.77.122.123 and not 10.77.122.119
Step 8 The Limit to option can be used to limit the number of files that the dump can expand into.
Step 9 The Time Limit option can be used to configure how long a dump runs before ending.
Step 10 Set Promiscuous Mode by clicking On or Off. The default is On.
Promiscuous mode is the default packet sniffing mode in which the network interface passes all traffic to the system’s
CPU. We recommend that you leave it set to On.
Note Cisco ISE does not support frames greater than 1500 MTU (jumbo frames).
Note You can also access TCP Dump through the Cisco ISE CLI. For more information, see the Cisco Identity
Services Engine CLI Reference Guide.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > General
Tools > TCP Dump.
Step 2 From the Format drop-down list, choose an option. Human Readable is no longer an option; the dump file is always
in raw format.
Step 3 Click Download, corresponding to the desired location, and then click Save.
Step 4 (Optional) To get rid of the previous dump file without saving it, click Delete.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > TrusSsec
Tools > Egress (SGACL) Policy.
Step 2 Enter the network device IP address of the TrustSec device whose SGACL policy you want to compare.
Step 3 Click Run.
Step 4 Click User Input Required and modify the fields, as necessary.
Step 5 Click Submit.
Step 6 Click Show Results Summary to view the diagnosis and suggested resolution steps.
1 Connects a the device with the IP address that you provided, and obtains the access
control lists (ACLs) for each source and destination SGT pair.
2 Checks the egress policy that is configured in Cisco ISE and obtains the ACLs for
each source and destination SGT pair.
3 Compares the SGACL policy that is obtained from the network device with the SGACL
policy that is obtained from Cisco ISE.
4 Displays the source and destination SGT pair if there is a mismatch. Also, displays
the matching entries as additional information.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools > Trustsec
Tools > SXP-IP Mappings .
Step 2 Enter the IP address of the network device.
Step 3 Click Select.
Step 4 Click Run.
The Expert Troubleshooter retrieves TrustSec SXP connections from the network device and again prompts you to select
the peer SXP devices.
Step 5 Click User Input Required, and enter the necessary information, in that field.
Step 6 Check the check box of the peer SXP devices for which you want to compare SXP mappings, and enter the common
connection parameters.
Step 7 Click Submit.
Step 8 Click Show Results Summary to view the diagnosis and resolution steps.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
TrustSec Tools > IP User SGT.
Step 2 Enter the information in the fields, as needed.
Step 3 Click Run.
You are prompted for additional input.
Step 4 Click User Input Required and modify the fields, as necessary.
TroubleshootConnectivityIssuesinaTrustSec-EnabledNetworkbyComparing
Device SGT Mappings
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Diagnostic Tools >
Trustsec Tools > Device SGT.
Step 2 Enter the information in the fields, as needed.
The default port number for Telnet is 23 and SSH is 22.
Note The support bundles and debug logs provide advanced troubleshooting information for TAC and are difficult
to interpret. You can use the various reports and troubleshooting tools that Cisco ISE provides to diagnose
and troubleshoot issues that you are facing in your network.
• Full configuration database: Contains the Cisco ISE configuration database in a human-readable XML
format. When you troubleshoot issues, you can import this database configuration into another Cisco
ISE node to re-create the scenario.
• Debug logs: Captures bootstrap, application configuration, run-time, deployment, public key infrastructure
(PKI) information, and monitoring and reporting.
Debug logs provide troubleshooting information for specific Cisco ISE components. To enable debug
logs, see chapter 11 on Logging. If you do not enable the debug logs, all the informational messages
(INFO) will be included in the support bundle. For more information, see Cisco ISE Debug Logs, on
page 1322.
• Local logs: Contains syslog messages from the various processes that run on Cisco ISE.
• Core files: Contains critical information that helps identify the cause of a crash. These logs are created
when the application crashes, and includes heap dumps.
• Monitoring and reporting logs: Contains information about alerts and reports.
• System logs: Contains Cisco Application Deployment Engine-related (ADE-related) information.
• Policy configuration: Contains policies configured in Cisco ISE in human-readable format.
You can download these logs from the Cisco ISE CLI by using the backup-logs command. For more
information, see the Cisco Identity Services Engine CLI Reference Guide.
Note For Inline Posture node, you cannot download the support bundle from the Admin portal. You must use the
backup-logs command from the Cisco ISE CLI.
If you choose to download these logs from the Admin portal, you can do the following:
• Download only a subset of logs based on the log type, such as debug logs or system logs.
• Download only the latest n number of files for the selected log type. This option allows you to control
the size of the support bundle and the time taken for download.
Monitoring logs provide information about the monitoring, reporting, and troubleshooting features. For more
information about downloading logs, see Download Cisco ISE Log Files, on page 1321.
Support Bundle
You can download the support bundle to your local computer as a simple tar.gpg file. The support bundle will
be named with the date and time stamps in the format
ise-support-bundle_ise-support-bundle-mm-dd-yyyy--hh-mm.tar..gpg. The browser prompts you to save the
support bundle to an appropriate location. You can extract the content of the support bundle and view the
README.TXT file, which describes the contents of the support bundle, as well as how to import the contents
of the ISE database if it is included in the support bundle.
You can also download system logs that include ADE-OS and other log files to troubleshoot installation and
upgrade issues.
While downloading a support bundle, instead of entering an encryption key manually, you can choose to use
a public key for encryption. If you choose this option, Cisco PKI will be used for encryption and decryption
of the support bundle. Cisco TAC maintains the public and private keys. Cisco ISE uses the public keys to
encrypt the support bundle. Cisco TAC can decrypt the support bundle using the private keys. Use this option
if you want to provide the support bundle to Cisco TAC for troubleshooting. Use the shared key encryption
if you are going to troubleshoot the issues on premise.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Download Logs >
Appliance Node List.
Step 2 Click the node from which you want to download the support bundles.
Step 3 In the Support Bundle tab, choose the parameters that you want to be populated in your support bundle.
If you include all the logs, your support bundle will be excessively large and the download will take a long time. To
optimize the download process, choose to download only the most recent n number of files.
Step 4 Enter the From and To dates for which you want to generate the support bundle.
Step 5 Choose one of the following:
• Public Key Encryption: Choose this option if you want to provide the support bundle to Cisco TAC for
troubleshooting purposes.
• Shared Key Encryption: Choose this option if you want to troubleshoot the issues locally on premise. If you choose
this option, you must enter the encryption key for the support bundle.
Step 6 Enter and re-enter the encryption key for the support bundle.
Step 7 Click Create Support Bundle.
Step 8 Click Download to download the newly-created support bundle.
The support bundle is a tar.gpg file that is downloaded to the client system that is running your application browser.
What to do next
Download debug logs for specific components.
Note Enabling debug logs with heavy load (such as monitoring debug logs) will generate alarms about high load.
Step 1 Configure the components for which you want to obtain debug logs. See Cisco ISE Components and Corresponding
Debug Logs, on page 1323.
Step 2 Download Debug Logs.
ers ise-psc.log
guest ise-psc.log
Guest Access Admin guest.log
MyDevices guest.log
Portal guest.log
Portal-Session-Manager guest.log
Portal-web-action guest.log
guestauth ise-psc.log
guestportal ise-psc.log
identitystore-AD ise-psc.log
infrastructure ise-psc.log
ipsec-api api-service.log
ipsec-ui ise-psc.log
mdm ise-psc.log
mdm-pip ise-psc.log
mnt-report reports.log
mydevices ise-psc.log
nsf ise-psc.log
nsf-session ise-psc.log
org-apache ise-psc.log
org-apache-cxf ise-psc.log
org-apache-digester ise-psc.log
posture ise-psc.log
profiler profiler.log
provisioning ise-psc.log
policy-engine ise-psc.log
prrt-JNI prrt-management.log
runtime-AAA prrt-management.log
runtime-config prrt-management.log
Note • The per-node log levels take precedence over Debug wizard profiles.
• When enabling multiple profiles that edit the same component, the higher log level takes precedence,
where trace has the highest priority.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Debug Wizard > Debug
Profile Configuration to configure a debug profile.
Step 2 To create a new profile, click Add.
Step 3 Enter the Name and Description of the new profile.
Step 4 Check the check boxes adjacent to the components that you want to include in the profile, and set the corresponding
Log Level for each of the components.
Step 5 Click Save.
Step 6 To enable the ISE node immediately, click Enable. Otherwise click Do it Later.
Step 7 If you click Enable, check the check boxes adjacent to the ISE nodes for which you want to enable the profile.
Step 8 Click Save.
Step 9 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Debug Wizard > Debug
Log Configuration to configure a debug log.
Step 10 Click a radio button to choose a node.
Step 11 Click a radio button to choose a component.
Step 12 Click Edit to change the Component Name, Log Level, Description and Log File Name of a component.
Step 13 Click Save.
Step 1 In the Cisco ISE GUI, click the Menu icon ( ) and choose Operations > Troubleshoot > Download Logs >
Appliance Node List.
Step 2 From the Appliance node list, click the node for which you want to download the debug logs.
Step 3 Click the Debug Logs tab.
A list of debug log types and debug logs is displayed. This list is based on your debug log configuration.
Step 4 Click the log file that you want to download and save it to the system that is running your client browser.
You can repeat this process to download other log files as needed. The following are the additional debug logs that you
can download from the Debug Logs window:
• isebootstrap.log: Provides bootstrapping log messages
• monit.log: Provides watchdog messages
• pki.log: Provides third-party crypto library logs
• iseLocalStore.log: Provides logs about the local store files
• ad_agent.log: Provides Microsoft Active Directory third-party library logs
• catalina.log: Provides third-party logs