<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automate removal of Authentication on an ISE Node using REST and SSH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780091#M486722</link>
    <description>&lt;P&gt;The Temp bypass portal using the MyDevices portal is not allowing direct access to the ISE GUI.&amp;nbsp; This is a separate GUI whose only job is to put MAC addresses into a particular endpoint identity group (whitelist).&amp;nbsp; Basically if you spend time coding a REST API method to do this and created a front end GUI around your API you would be simply recreating something ISE already offers.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jan 2019 13:16:26 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2019-01-15T13:16:26Z</dc:date>
    <item>
      <title>Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3769670#M486706</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm fairly new to these forums and looking for some guidance in providing an elegant solution to our problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My organization leverages ISE with all access layer endpoints. Essentially all workstations, laptops etc, with the exception of some statically configured devices like printers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently the Network team is being flooded with tickets from Service Desk when troubleshooting connectivity issues. It has become process like behaviors to first request ISE to be removed from a users port (essentially removed from their access switch). This process was manual in the sense that a wall jack would be labeled with the Network switch used, and a letter, however the letter can represent up to 4 network ports on that jack (not granular enough or consistent). So someone has to manually go to the switch and see which port is active, and then remove authentication on that port and follow up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I looked at the REST services available and am able to see the active sessions by hitting the PSN with the following call:&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;https://$psn/ise/mnt/api/Session/ActiveList&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;and drilling through the attributes in the returned ['activeSession'] these include ['calling_station_id'] and ['nas_ip_address'] which is essentially the endpoints Mac Address and the Network swtich used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;THIS IS PERFECT- if it worked.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I scripted a process to snag the mac address, ssh to the switch, send an arp table through cli, regex for interface used by the mac then send cli commands to remove authentication. However it doesn't work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems if authentication is challenged or if ISE is actually keeping the endpoint off the network, then it in fact is not on the "activeSession" list returned by the PSN api. Are the ones currently challenged returned elsewhere? Is what we're trying to do possible via this method?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Dec 2018 21:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3769670#M486706</guid>
      <dc:creator>eespin</dc:creator>
      <dc:date>2018-12-27T21:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3770814#M486711</link>
      <description>&lt;P&gt;Perhaps you need to actually delete the endpoint? This is what I do in my lab when I need to refresh things to test new policy. To do this I get the endpoint ID from the MAC, and then delete the Endpoint ID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;GET https://$psn:9060/ers/config/endpoint/name/$mac&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;DELETE&amp;nbsp;https://$psn:9060/ers/config/endpoint/$endpointid&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 13:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3770814#M486711</guid>
      <dc:creator>dodgerfan78</dc:creator>
      <dc:date>2018-12-31T13:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3771600#M486716</link>
      <description>&lt;P&gt;You really shouldn't be removing ISE from ports.&amp;nbsp; You should be putting a method in place for the Service Desk to put MAC addresses into a temporary bypass condition so troubleshooting can occur.&amp;nbsp; You can use a MyDevices portal for this or allow the Service Desk to use the context visibility screen in ISE to put MAC addresses into a specific endpoint identity group.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 18:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3771600#M486716</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-01-02T18:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3779595#M486719</link>
      <description>Unfortunately the way our organization is, they don't and won't be allowed access to ISE directly so we'd like to abstract that by front ending some of the functionality through the API. Can a MAC address be placed in bypass condition using ERS?</description>
      <pubDate>Mon, 14 Jan 2019 22:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3779595#M486719</guid>
      <dc:creator>eespin</dc:creator>
      <dc:date>2019-01-14T22:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3779613#M486720</link>
      <description>&lt;P&gt;I believe you would just change the endpoint profile to your whitelist, and then send a CoA. These can be done via the API.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jan 2019 22:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3779613#M486720</guid>
      <dc:creator>dodgerfan78</dc:creator>
      <dc:date>2019-01-14T22:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780091#M486722</link>
      <description>&lt;P&gt;The Temp bypass portal using the MyDevices portal is not allowing direct access to the ISE GUI.&amp;nbsp; This is a separate GUI whose only job is to put MAC addresses into a particular endpoint identity group (whitelist).&amp;nbsp; Basically if you spend time coding a REST API method to do this and created a front end GUI around your API you would be simply recreating something ISE already offers.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 13:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780091#M486722</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-01-15T13:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780096#M486724</link>
      <description>&lt;P&gt;If you block someone from doing something but still want them to do that thing, then yes, I believe it is accurate to say, you will need to copy that original thing into a space where they are allowed to do it. Automation can often involve particular tasks from other GUIs or systems that already exist, because you are putting them into the context of a particular workflow that has some other benefit or value.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jan 2019 13:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780096#M486724</guid>
      <dc:creator>dodgerfan78</dc:creator>
      <dc:date>2019-01-15T13:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780272#M486726</link>
      <description>You can also look at automation using Adaptive Network Control policies&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01101.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01101.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Recommend segmenting using SGTs as well instead of switch ACL or VLANs&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Jan 2019 16:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3780272#M486726</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-15T16:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: Automate removal of Authentication on an ISE Node using REST and SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3799609#M486728</link>
      <description>&lt;P&gt;We are just cautious of the level of access we grant, do you know what permissions are required.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 21:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/automate-removal-of-authentication-on-an-ise-node-using-rest-and/m-p/3799609#M486728</guid>
      <dc:creator>eespin</dc:creator>
      <dc:date>2019-02-11T21:55:02Z</dc:date>
    </item>
  </channel>
</rss>

