Overview
Explains how to integrate Cisco ISE and Catalyst Center.
Catalyst Center provides a mechanism to create a trusted communications link with Cisco ISE and to share data with Cisco ISE in a secure manner. After Cisco ISE is registered with Catalyst Center, any device that Catalyst Center discovers, along with relevant configuration and other data, is pushed to Cisco ISE. You can use Catalyst Center to discover devices and then apply both Catalyst Center and Cisco ISE functions to them because these devices will be displayed in both the applications. Catalyst Center and Cisco ISE devices are all uniquely identified by their device names.
As soon as the devices are provisioned and assigned to a particular site in the Catalyst Center site hierarchy, Catalyst Center devices are pushed to Cisco ISE. Any updates to a Catalyst Center device (such as changes to IP address, SNMP or CLI credentials, Cisco ISE shared secret, and so on) will be sent to the corresponding device instance on ISE automatically.
Catalyst Center devices are pushed to Cisco ISE only when these devices are associated with a particular site where Cisco ISE is configured as its AAA server.
Before you begin
Before attempting to integrate Cisco ISE with Catalyst Center, ensure that you have met these prerequisites:
-
You have deployed one or more Cisco ISE hosts on your network. For information on supported Cisco ISE versions, see the Catalyst Center Compatibility Matrix. For information on installing Cisco ISE, see the Cisco Identity Services Engine Install and Upgrade guides.
-
If you have a standalone Cisco ISE deployment, you must integrate Catalyst Center with the Cisco ISE node and enable the pxGrid service and External RESTful Services (ERS) on that node.
Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment, Catalyst Center releases earlier than 2.2.1.x do not support more than two pxGrid nodes.
-
If you have a distributed Cisco ISE deployment:
-
You must integrate Catalyst Center with the primary policy administration node (PAN), and enable ERS on the PAN.
We recommend that you use ERS through the PAN. However, for backup, you can enable ERS on the PSNs.
-
You must enable the pxGrid service on one of the Cisco ISE nodes within the distributed deployment. Although you can decide to do so, you do not have to enable pxGrid on the PAN. You can enable pxGrid on any Cisco ISE node in your distributed deployment.
-
The PSNs that you configure in Cisco ISE to handle TrustSec or SD Access content and PACs must also be defined in . For more information, see the Cisco Identity Services Engine Administrator Guide.
-
-
Only a user with Super Admin role permissions can integrate Cisco ISE with Catalyst Center.
-
Catalyst Center does not support ERS API access if the Use CSRF Check for Enhanced Security option is enabled in Cisco ISE.
-
You must enable communication between Catalyst Center and Cisco ISE on these ports: 443, 5222, 8910, and 9060.
-
The Cisco ISE host on which pxGrid is enabled must be reachable from Catalyst Center on the IP address of the Cisco ISE eth0 interface.
-
The Cisco ISE node can reach the fabric underlay network via the appliance's NIC.
-
Catalyst Center will check the certificate revocation status if Online Certificate Status Protocol (OCSP) or certificate revocation list (CRL) validation is defined for the certificates used by the Cisco ISE services.
-
The Cisco ISE admin node certificate must contain the Cisco ISE IP address or FQDN in either the certificate subject name or the Subject Alternative Name (SAN).
-
Your ability to use an FQDN-only system certificate depends on whether LAN automation is enabled in your Catalyst Center deployment. For more information, see the alt_names section bullet in Step 3 of the Catalyst Center Security Best Practices Guide's "Generate a Certificate Request Using Open SSL" topic.
For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might reject that certificate after applying those patches. This is because the older versions of that certificate have the Netscape Cert Type extension specified as the SSL server, which now fails (because a client certificate is required).
This issue does not occur in Cisco ISE 3.0 and later. For more information, see the Cisco ISE Release Notes.
For more information about configuring Cisco ISE for Catalyst Center, see the "Integration with Catalyst Center" topic in the Cisco Identity Services Engine Administrator Guide.
Procedure
| 1. | Enable the pxGrid service and ERS on Cisco ISE: |
|
| 2. | Add the Cisco ISE node to Catalyst Center as a AAA server: When the integration with Cisco ISE is initiated, you will see a notification that the certificate from Cisco ISE is not yet trusted. You can view the certificate to see the details. Click Accept to trust the certificate and continue with the integration process, or select Decline if you do not wish to trust the certificate and terminate the integration process. After the integration completes successfully, a confirmation message is displayed. If there is any issue in the integration process, an error message is displayed. An option to edit or retry is displayed where applicable.
|
|
| 3. | Verify that Catalyst Center is connected to Cisco ISE, and that the Cisco ISE SGT groups and devices are pushed to Catalyst Center:
|
|
| 4. | Verify that Cisco ISE is connected to Catalyst Center and that the connection has subscribers: |