Overview
Instructions to configure AAA server and Cisco ISE for Catalyst Center.
Catalyst Center uses AAA servers for user authentication and Cisco ISE for both user authentication and access control. Use this procedure to configure AAA servers, including Cisco ISE.
Before you begin
-
If you are using Cisco ISE to do both policy and AAA functions, make sure that Catalyst Center and Cisco ISE are integrated.
-
If FIPS mode is enabled for Catalyst Center, ensure that you enable KeyWrap when integrating Catalyst Center and Cisco ISE. See Step 2e in Integrate Cisco ISE with Catalyst Center.
You cannot enable KeyWrap if Catalyst Center and Cisco ISE have already been integrated. To enable this feature, you need to delete Cisco ISE and then reintegrate it with Catalyst Center.
-
If you are using another product (not Cisco ISE) to do AAA functions, make sure to do these tasks:
-
Register Catalyst Center with the AAA server, including defining the shared secret on both the AAA server and Catalyst Center.
-
Define an attribute name for Catalyst Center on the AAA server.
-
For a Catalyst Center multihost cluster configuration, define all individual host IP addresses and the virtual IP address for the multihost cluster on the AAA server.
-
-
Before you configure Cisco ISE, confirm that:
-
You have deployed Cisco ISE on your network. For information on supported Cisco ISE versions, see the Catalyst Center Compatibility Matrix. For information on installing Cisco ISE, see the Cisco Identity Services Engine Install and Upgrade guides.
-
If you have a standalone ISE deployment, you must integrate Catalyst Center with the Cisco ISE node and enable the pxGrid service and External RESTful Services (ERS) on that node.
Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment, Catalyst Center releases earlier than 2.2.1.x do not support more than two pxGrid nodes.
-
If you have a distributed Cisco ISE deployment:
-
You must integrate Catalyst Center with the primary policy administration node (PAN), and enable ERS on the PAN.
We recommend that you use ERS through the PAN. However, for backup, you can enable ERS on the PSNs.
-
You must enable the pxGrid service on one of the Cisco ISE nodes within the distributed deployment. Although you can decide to do so, you do not have to enable pxGrid on the PAN. You can enable pxGrid on any Cisco ISE node in your distributed deployment.
-
The PSNs that you configure in Cisco ISE to handle TrustSec or SD Access content and PACs must also be defined in . For more information, see the Cisco Identity Services Engine Administrator Guide.
-
-
You must enable communication between Catalyst Center and Cisco ISE on these ports: 443, 5222, 8910, and 9060.
-
The Cisco ISE host on which pxGrid is enabled must be reachable from Catalyst Center on the IP address of the Cisco ISE eth0 interface.
-
The Cisco ISE node can reach the fabric underlay network via the appliance's NIC.
-
The Cisco ISE admin node certificate must contain the Cisco ISE IP address or FQDN in either the certificate subject name or the Subject Alternative Name (SAN).
-
The Catalyst Center system certificate must list both the Catalyst Center appliance IP address and FQDN in the SAN field.
For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might reject that certificate after applying those patches. This is because the older versions of that certificate have the Netscape Cert Type extension specified as the SSL server, which now fails (because a client certificate is required).
This issue does not occur in Cisco ISE 3.0 and later. For more information, see the Cisco ISE Release Notes.
-
Procedure
| 1. | From the main menu, choose . |
|
| 2. | From the Add drop-down list, select AAA or ISE. |
|
| 3. | To configure the primary AAA server, enter this information:
|
|
| 4. | To configure a Cisco ISE server, enter these details:
|
|
| 5. | Click Advanced Settings and configure the settings:
|
|
| 6. | Click Add. |
|
| 7. | To add a secondary server, repeat the preceding steps. |