Common Policy: Workload Connectors
Workload connectors
Common Policy is a framework for building and enforcing consistent access and segmentation policies, regardless of the domain. Workload connectors are used in this framework to build secure connections with on-premises and cloud data centers, import application workload context, normalize that context into SGTs, and share the context with other domains for building policies.
You can establish logical clusters of SXP devices, referred to as SGT domains, to regulate traffic according to SGT bindings. It helps you set up authorization policies and workload classification rules. With these rules, you can assign SGTs to IP addresses and receive mappings. Additionally, you can specify the SGT domains that will receive the mappings by managing incoming SGT domain rules.
Workload Classification Rules are used to assign primary and secondary SGTs to workloads. Secondary SGTs could be tagged along with Primary SGTs. Inbound SGT domain rules are used to map incoming SGT bindings to specific SGT domains. Outbound SGT domain rules are used to designate target destinations for specific SGT bindings.
For information on TrustSec, see Cisco TrustSec.
Add a workload connection
Follow these steps to add a workload connection.
Before you begin
-
pxGrid must be enabled on at least one node within your network.
-
SXP must be enabled on at least one node within your network.
-
Identify the relevant attributes (tags) within your vCenter, AWS, GCP, or Azure environment that need to be added to workload connector.
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, click the links below for directions on adding the specific workload connector platform. |
Add a Cisco ACI connection
Before you begin
-
Enable the pxGrid and SXP services in Administration > System > Deployment.
-
Update the DNS configuration in Cisco ACI so that Cisco ACI can resolve the FQDN of the Cisco ISE pxGrid node.
-
You will need an Advantage, Premier, or 90-day evaluation license for this integration.
Step 1 | In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, click ACI. |
Step 5 | In the Create ACI Connection page, enter the following details:
|
Step 6 | In the Naming Convention page, set the naming convention for the SGTs that will be created from the EPGs and ESGs received from the connected Cisco ACI controllers. You can use the following types of naming conventions to create SGT names with up to 64 characters:
|
Step 7 | Click Next. |
Step 8 | In the Select EPG/ESGs page, select the EPGs or ESGs that must be retrieved from Cisco ACI and converted to SGTs. You will be able to use the Select All option during the initial setup. After configuring the SGT numbering range, you cannot choose the Select All option if the number of listed EPG or ESGs is greater than the numbering range configured. If a security group name populated from the connection already exists in the Cisco ISE database, the SGT isn’t assigned a new number. If the security group name does not exist in the Cisco ISE database, then a new security group will be created with the derived name and an SGT will be assigned from the available SGT range. While editing this connection, you cannot deselect an EPG that is used in an inbound or outbound SGT domain rule. |
Step 9 | Click Next. |
Step 10 | (Optional) In the Set SGT Numbering Range page, enable the Set SGT Numbering Range for EPG/ESGs option to manually configure a numbering range for the newly created SGTs. While setting the numbering range, account for existing and expected EPGs and ESGs. When this option is disabled, Cisco ISE automatically assigns numbers to SGTs from the number ranges that are not reserved or used for other SGTs. |
Step 11 | Click Next. |
Step 12 | Verify the entered details in the Summary page. You can click Edit in the corresponding section to update the details, if needed. |
Step 13 | Click Create. |
To verify whether the Cisco ACI connection is successfully created:
-
Verify the connection status in the Work Centers > TrustSec > Integrations > Workload Connectors > Workload Connections page.
-
Check whether the EPGs and ESGs that are selected in Step 7 are converted to security groups in the Work Centers > TrustSec > Components > Security Groups page.
-
Verify whether the bindings for the EPGs and ESGs that are selected in Step 7 are listed in the Work Centers > TrustSec > SXP > SGT Bindings page.
You can connect, suspend, or delete a connection from the Work Centers > TrustSec > Integrations > Workload Connectors > Workload Connections page.
If all the associated SGTs are deleted for a connection, the connection will be moved to Suspended state. When a connection is in Suspended state:
-
All SXP bindings and MnT session data related to that connection are removed.
-
ACI connection subscription is paused.
-
Modifications to the name conversion rule will not be automatically applied to the EPGs or ESGs already learned from this Cisco ACI connection. To apply the modified name conversion rule, you must first deselect the previously learned EPGs or ESGs from the Synced EPG/ESGs tab and save your changes. After that, you must edit the connection again to select the required EPGs or ESGs, and then save your changes again.
-
If the PSNs are restarted, you must suspend and reconnect the ACI connection to repopulate the ACI connection details.
-
If you are using multiple ACI connections, you must configure the SXP nodes identically to listen to same NADs.
Add an AWS workload connector
Before you begin
-
You must have a stable internet connection.
-
You must have a policy that grants these permissions: ec2:DescribeTags, ec2:DescribeVpcs, and ec2:DescribeInstances.
-
You must ensure Cisco ISE server time is synchronized correctly, with a time delta of no more than 5 minutes.
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, choose AWS. |
Step 5 | Enter these details while adding the AWS connection.
You can create multiple AWS workload connectors to support various regions.
|
Step 6 | Click Next. |
Step 7 | In the Manage Attributes page, choose the existing AWS attributes (tags) that you want to add to the Cisco ISE dictionary, and then click Next. You can rename the attribute in the Attribute Name in Dictionary field.
|
Step 8 | In the Summary page, review the Cisco ISE workload connector configurations. Click Edit to change any configuration. |
Step 9 | Click Create. |
Add an Azure workload connector
Before you begin
-
You must have a stable internet connection.
-
You must have a policy with Reader permission.
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, choose Azure. |
Step 5 | Enter these details while adding the Azure connection.
Cisco ISE validates the added information for each of the connection types and returns the error "Test connection failed" if any of the details are incorrect. Click Next. |
Step 6 | In the Manage Attributes page, choose the existing Azure attributes (tags) that you want to add to the Cisco ISE dictionary, and then click Next. You can rename the attribute in the Attribute Name in Dictionary field.
|
Step 7 | In the Summary page, review the Cisco ISE workload connector configurations. Click Edit to change any configuration. |
Step 8 | Click Create. |
Add a vCenter workload connector
Before you begin
-
You must have a stable internet connection.
-
You must have a policy with Read Only permission.
-
If a proxy is needed to access the internet, you must bypass the vCenter IP if the vCenter is on-premises.
As VMware ESXi does not support attributes (tags), only vCenter can be configured as a workload connector.
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, choose vCenter. |
Step 5 | Enter these details while adding the vCenter connection.
Cisco ISE validates the added information for each of the connection types and returns the error "Test connection failed" if any of the details are incorrect. |
Step 6 | Click Next. |
Step 7 | In the Manage Attributes page, choose the existing vCenter attributes (tags) that you want to add to the Cisco ISE dictionary, and then click Next. You can rename the attribute in the Attribute Name in Dictionary field.
|
Step 8 | In the Summary page, review the Cisco ISE workload connector configurations. Click Edit to change any configuration. |
Step 9 | Click Create. |
The newly created vCenter connectors are listed in the Workload Connections listing page.
Add a GCP workload connector
Before you begin
-
You must have a stable internet connection.
-
You must have a policy with Basic > Viewer permission.
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Connection. |
Step 3 | Click Let’s do it. |
Step 4 | In the Select Workload Platform page, choose GCP. |
Step 5 | Enter these details while adding the connection, and then click Next.
Cisco ISE validates the added information for each of the connection types and returns the error "Test connection failed" if any of the details are incorrect. |
Step 6 | In the Manage Attributes page, choose the existing GCP attributes (tags) that you want to add to the Cisco ISE dictionary, and then click Next. You can rename the attribute in the Attribute Name in Dictionary field.
|
Step 7 | In the Summary page, review the Cisco ISE workload connector configurations. |
Step 8 | Click Edit to change any configuration. |
Step 9 | Click Create. |
The newly created GCP connectors are listed in the Workload Connections listing page.
Attributes dictionary
Attributes dictionary lists the attributes for all the workload connections (except ACI) integrated with Cisco ISE. You can select and add the required attributes to the Cisco ISE dictionary.
Note the following points while configuring the attributes.
-
One dictionary will be created for each connection type. For example, attributes of all AWS connectors will be added to a single AWS dictionary.
-
Attributes in use will not be excluded from the dictionary.
-
Attributes will not be automatically removed when you delete a connection.
-
You can manually delete any attribute that is not in use.
-
You can import new attributes from provider.
-
You can add attributes that are not present in the provider.
Add dictionary attributes
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Attributes Dictionary. |
Step 3 | Click Add Attribute. |
Step 4 | Enable the Include in Dictionary toggle button. |
Step 5 | Enter the attribute name in the Workload Attribute field. |
Step 6 | Enter the name to be displayed in the dictionary in the Attribute Name in Dictionary field. |
Step 7 | Click Save. |
Add inbound SGT domain rules
You can create inbound SGT domain rules to map incoming SGT bindings with specific SGT domains. If no rules are defined, bindings received from workload connectors are sent to the default SGT domain.
Step 1 | In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | In the Inbound SGT Domain Rules tab, click Add Inbound Rule. |
Step 3 | In the Rule Settings area, enter the name of the inbound SGT domain rule. |
Step 4 | Click Enabled. |
Step 5 | From the Destination drop-down list, choose the SGT domains to which the bindings must be sent. Use the Create SGT Domain option to create a new SGT domain and add it to the destination list. |
Step 6 | In the Rule Configuration area, configure the conditions for the inbound SGT domain rule using the following attributes:
You can also choose from the additional attributes (tags) that you added to the dictionary while creating AWS, GCP, Azure, and vCenter workload connectors. You can also add AND or OR conditions based on your requirements. |
Step 7 | Click Add. |
Step 8 | Click Save. |
You can create outbound SGT domain rules to designate target destinations for specific SGT bindings. For information on how to create outbound SGT domain rules, see Add outbound SGT domain rules.
Add outbound SGT domain rules
You can create outbound SGT domain rules to designate target destinations for specific SGT bindings.
Step 1 | In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | In the Outbound SGT Domain Rules tab, click Add Outbound Rule. |
Step 3 | In the Rule Settings area, enter the name of the outbound SGT domain rule. |
Step 4 | Click Enabled. |
Step 5 | From the Destination drop-down list, choose the Cisco ACI connections and the Layer 3 Outs (L3Outs) to which the SGTs must be sent. |
Step 6 | In the Rule Configuration area, configure the conditions for the outbound SGT domain rule using the following attributes:
You can also add AND or OR conditions based on your requirements. |
Step 7 | (Optional) In the Contract Configuration area, assign Consumed and Provided contracts for the shared security groups. |
Step 8 | Click Add. |
Step 9 | Click Save. |
After creating the outbound SGT domain rules, you can verify the ACI consumer status in the Administration > pxGrid Services > Diagnostics > WebSocket > Topics page.
You can use the Preview option to preview the matching IP-SGT bindings while adding or editing the inbound and outbound SGT domain rules.
You can view the newly created inbound and outbound SGT domain rules in the Work Centers > TrustSec > SXP > Inbound & Outbound SGT Domain Rules page. To view the SGT bindings table for a specific filter, click its SGT bindings number.
When you configure an outbound SGT domain rule, you must choose an SGT that doesn't originate from the destination ACI. If you choose an SGT that originates from the destination ACI, Cisco ISE pushes the selected SGT binding back to the originating ACI.
Add workload classification rules
Workload classification rules are used to classify the workloads and to assign primary and secondary SGTs to the workloads. The primary SGT is marked as “Security Group” in the pxGrid session topic and is used to publish IP-to-SGT mappings via SXP. Secondary SGTs are included in the pxGrid session topic as an ordered array named “Secondary Security Groups.”
You can specify the order of classification rule execution. You can drag and drop the rules to change the order of priority.
You can insert a new or duplicate rule above or below an existing rule based on the priority that you want to set for that rule.
The default classification rule is always listed at the bottom of the list. The default rule is disabled by default and mapped to Unknown primary SGT.
If multiple classification rules are matched and multiple primary SGTs are assigned, only the first assigned SGT is considered as the primary SGT and the remaining SGTs are marked as secondary SGTs. You can create inbound SGT domain rules to define the SGT domains for these IP bindings.
For a workload from a Cisco ACI connection, the primary SGT is always the one created during connection configuration and derived from its EPG or ESG.
Follow these steps to add a workload classification rule.
Step 1 | In the Cisco ISE GUI, click the Menu icon ( |
Step 2 | Click Add Classification Rule. |
Step 3 | In the Rule Settings area, enter the name of the workload classification rule. |
Step 4 | Click Enabled. |
Step 5 | In the Authorization Configuration area, from the Primary SGT drop-down list, choose the primary SGT for that rule. |
Step 6 | (Optional) From the Secondary SGT drop-down list, choose the secondary SGTs that you want to add to that rule. |
Step 7 | In the Rule Configuration area, configure the conditions for the workload classification rule using the following attributes:
You can also choose from the additional attributes (tags) that you added to the dictionary when creating AWS, GCP, Azure, and vCenter workload connectors. You can also add AND or OR conditions based on your requirements. |
Step 8 | Click Save. |
You can use the Preview option to preview the SGT details and matching rules while adding or editing the workload classification rules.
The SGT Bindings page displays all the configured SGT bindings, giving you an easy view of assigned primary and secondary SGTs, the source of the learned data, and the workload classification rules that are applied. You can also view the IP-SGT bindings with shared destinations. You can review the classification details and the specifics of defined inbound and outbound SGT domain rules by clicking the corresponding column values.
The maximum number of IP-SGT bindings supported for each network device depends on the model of device and its capacity design. For information about the Cisco SD-Access platform scale, see Cisco Catalyst Center Data Sheet.
Refer to the border node scale and the edge node scale while configuring the workload classification rules for different network device types. If the total number of bindings is greater than the maximum number of bindings supported for a device, the IP-SGT bindings exceeding the scale limit are dropped and not sent to the SXP devices. In this case, you must reduce the number of IP-SGT bindings based on the scale limits and reconfigure your settings.
Troubleshoot
Workloads live session
The Workloads Live Session page displays the details about the live workload sessions. To view this page, in the Cisco ISE GUI, click the Menu icon and choose Operations > Workloads > Workloads Live Session.
You can view the live workload sessions only in the primary PAN.
You can do the following in the Workloads Live Session page:
-
Filter the workload sessions based on connector type.
-
Export the data in CSV or PDF format.
-
Show or hide the columns based on your requirements.
-
Filter the data using the quick or custom filter and save your filters for later use.
-
Rearrange the columns and adjust the width of the columns.
-
Sort the column values.
Debug logs for workload connectors
You can configure the debug log severity level for ACI in Operations > Troubleshoot > Debug Wizard > Debug Profile Configuration. You must set the log level as DEBUG for the Workload Connector component on the PAN, SXP, and pxGrid nodes.
The following log files are available for Workload connectors (under /opt/CSCOcpm/logs):
-
workloads.log
-
workload-conn/*.log
-
aciconn/aciconn.log
-
api-service.log
-
ise-psc.log
-
pxgriddirect-service.log
-
sxp_appserver/sxp.log
Alarms generated for workload connectors
The following alarms are generated for the ACI integration.
-
When an EPG, ESG, or L3Out is deleted in Cisco ACI, the corresponding objects are deleted in Cisco ISE. If any of those objects are included in the Inbound or Outbound rules, an alarm is raised.
-
When the mdpConn object is deleted in Cisco ACI, Cisco ISE learns the configuration changes and generates an alarm.
-
When an EEPG is deleted in Cisco ACI, Cisco ISE learns the configuration changes and generates an alarm.
-
While deleting the ACI connection in Cisco ISE, if the process fails to delete the learned SGTs and SGT range, an alarm is generated.
-
When the Cisco ISE listener listening to Cisco ACI events is disconnected from Cisco ACI, an alarm is generated. This may occur due to ACI password change, certificate expiry, or network connectivity issue.
This may also occur if the server certificate is changed in Cisco ACI during an upgrade. In this case, you must update the server certificate for Cisco ACI in the Cisco ISE Trusted Certificate Store.
-
If the creation of a workload connector fails after scenarios like restore, promotion/HA, or upgrade, Workload Connection Create/Connect Unsuccessful alarm is generated.
-
If the deletion of a workload connector fails, Workload Connection Delete Unsuccessful alarm is generated.
-
When other related workload connection service failures occur, Workload Connection Service Error alarm is generated.