New and Changed Information
The following table provides an overview of the significant changes up to this current release. The table does not provide an exhaustive list of all changes or of the new features up to this release.
Cisco APIC Release Version |
Feature |
Description |
---|---|---|
Release 3.2(2) |
Support for identity-based (Active Directory) server groups. |
Active Directory (AD) use groups can be used by a tenant for identity-based uEPGs, which allows control of traffic flow between EPGs based on AD security groups. |
Support for AD attribute for microsegmentation (uSeg) EPGs. |
The AD attribute enables you to match VMs to uSeg EPGs using user groups. |
AD-Based Microsegmentation
![]() Note |
AD-Based Microsegmentation is not supported from Release 6.0(1). |
Microsegmentation (uSeg) with the Cisco Application Centric Infrastructure (ACI) enables you to automatically assign endpoints to logical security zones called endpoint groups (EPGs). These EPGs are based on various network-based or virtual machine (VM)-based attributes.
Beginning with Cisco APIC Release 3.2(2), identity servers, such as Active Directory (AD), can be used by a tenant for identity-based microsegmentation. This allows you to apply forwarding and security policies to entire group of VMs based on the security groups configured on the AD server.
This chapter contains information specific to using AD-based microsegmentation, for a complete overview of microsegmentation with Cisco ACI, see Microsegmentation with Cisco ACI .
Before this feature can be used in APIC, a device called ISE-PIC (Identity Service Engine, Passive Identity Connector) has to be installed and configured in your environment. ISE-PIC monitors all the events, users, and groups belonging to your AD domain and builds an inventory of them for APIC.
Keep in mind, before you configure ISE PIC and APIC, you must have a Microsoft AD server 2008 R2 or above already set up for your domain.
![]() Note |
Configuring identity server groups and uSeg EPGs with the AD attribute are beta features in this release of Cisco APIC. |
Configuring ISE-PIC for Identity-Based Microsegmentation
This section provides an overview of how to configure ISE-PIC for use with APIC's identity-based micro-segmentation.
Before you begin
-
You must have installed ISE-PIC 2.0 or later, as described in ISE-PIC Installation and Administrator Guide
-
You must have installed APIC 3.2(2) or later, as described in Cisco APIC Basic Configuration Guide
-
You must also have an Active Directory (AD) server already configured for your domain.
Procedure
Step 1 |
Log in to your ISE-PIC. |
Step 2 |
Configure the ISE-PIC to connect to your AD server. After you complete these steps, the ISE Node's status will change to Operational. |
Step 3 |
Configure the Active Directory instance for PassiveID.
At this point, the ISE-PIC is configured to monitor the domain controler remotely via WMI. You can check the status of the domain controller on the dashboard using the Providers screen. |
Step 4 |
Configure Active Directory Groups.
|
Step 5 |
Navigate to and configure the NTP server.It is recommended that you use the same NTP server for APIC, ISE-PIC, and AD server to keep the time synchronized between all devices. |
Step 6 |
Create the certificates to be used by APIC. After you have created the certificate, you will need to import it into your APIC, as described in the following steps. |
Step 7 |
Log in to your APIC. |
Step 8 |
Create a certificate authority. You can skip this step if you already have a certificate authority configured in your environment. |
Step 9 |
Navigate to .You can modify the default DNS profile and add DNS provider and DNS Domain associated with the AD domain you plan to use. |
Identity Server Groups
The following sections provide information on how to set up and configure the APIC for identity-based microsegmentation, specifically how to create identity server groups. You can use the APIC GUI, the NX-OS style CLI, or REST API to make all the necessary setup and configuration changes.
Configuring an Identity Server Group Using the GUI
You can use the APIC GUI to configure an AD server group.
Before you begin
You must have a tenant configured. For tenant configuration information, see the Cisco APIC Basic Configuration Guide.
Procedure
Step 1 |
Log in to the Cisco APIC. |
Step 2 |
Click Tenants and then click the tenant where you plan to use the AD attribute for a microsegmentation (uSeg) EPG. |
Step 3 |
In the tenant navigation pane, select Services, then right-click Identity Server Groups (Beta) and choose Create Identity Server Group. |
Step 4 |
In the Create Identity Server Group dialog box, read and accept the user agreement for the beta feature. |
Step 5 |
In the Name field, enter the name for the Identity Server Group. |
Step 6 |
(Optional) In the Security Domain area, click the plus icon, and select (or create) a security domain. |
Step 7 |
In the Servers area, click the plus icon, and then enter the fully-qualified domain name (FQDN) of the ISE-PIC server and key ring you have created in Configuring ISE-PIC for Identity-Based Microsegmentation. Group inventory is synchronized every 8 hours. Synchronization can also be triggered manually from the GUI by clicking the
identity server icon.
|
Step 8 |
Click OK and then click Submit to save the changes . |
What to do next
If you want to define an AD attribute for uSeg EPG, follow the instructions in the section Microsegmentation EPGs with AD Group Attribute in this document.
Configuring an AD Server Group Using the NX-OS Style CLI
Before you begin
You must have a tenant configured. For tenant configuration information, see the Cisco APIC Basic Configuration Guide.
Procedure
Configure the ISE Auth server group under a given Tenant. In the following commands, provide the following parameters for your environment:
Example:
|
What to do next
If you want to define an AD attribute for a uSeg EPG, follow the instructions in the section Microsegmentation EPGs with AD Group Attribute in this document.
Configuring an AD Server Group Using REST API
Before you begin
You must have a tenant configured. For tenant configuration information, see the Cisco APIC Basic Configuration Guide.
Procedure
Step 1 |
Configure a Certificate Authority (CA). POST: <host info>/api/node/mo/uni.xml Example:
|
Step 2 |
Configure a key ring. POST: <host info>/api/node/mo/uni.xml Example:
|
Step 3 |
Configure an AD server group. POST: <host info>/api/node/mo/uni.xml Example:
|
What to do next
If you want to define a DNS attribute for a uSeg EPG, follow the instructions in the section Microsegmentation EPGs with AD Group Attribute in this document.
Microsegmentation EPGs with AD Group Attribute
Defining an AD attribute for a uSeg EPG enables you to put VMs matching AD security groups that you previously identified into the uSeg EPG. You can define an AD attribute for a uSeg EPG in the APIC GUI, NX-OS style CLI, or REST API.
Configuring a uSeg EPG with the AD Attribute Using the GUI
Before you begin
Procedure
Step 1 |
Follow the procedure "Configuring Microsegmentation with Cisco ACI Using the GUI" in the "Microsegmentation with Cisco ACI" chapter of the Cisco ACI Virtualization Guide through Step 11. |
Step 2 |
Instead of Step 12, perform the following steps:
|
Step 3 |
Complete Step 13 and the rest of the procedure. |
After a uSeg EPG has been configured with the AD attribute, you will be able to see the classified end points move to the
folder in the UI.Alternatively, you can also view the classified microsegmentation end points under
.Configuring a uSeg EPG with the AD Attribute Using the NX-OS Style CLI
Before you begin
Read and understand the guidelines and fulfill the prerequisites in the "Microsegmentation with Cisco ACI" chapter of the Cisco ACI Virtualization Guide.
Procedure
Create the AD-based attribute matching a specific Active Directory group under a given Tenant Example:
|
Configuring a uSeg EPG with the AD Attribute Using REST API
Before you begin
Read and understand the guidelines and fulfill the prerequisites in the "Microsegmentation with Cisco ACI" chapter of the Cisco ACI Virtualization Guide.
Procedure
Configure a uSeg EPG with the AD attribute. Example:
|