<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco API and thrid party access in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4510881#M571320</link>
    <description>&lt;P&gt;Copied from private message so that others with similar questions may learn as well...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question from &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/826303"&gt;@Niklas.D&lt;/a&gt;:&lt;/P&gt;
&lt;P&gt;So as i said before i tried to use the collector also!&lt;/P&gt;
&lt;P&gt;and we did get alot of info, but could not get the IP in to Checkpoint.&lt;/P&gt;
&lt;P&gt;Is there away to see what is in the PxGrid Database? To confirm that it working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Response:&lt;/P&gt;
&lt;P&gt;The session database is quite dynamic, so you would need to confirm if Checkpoint provides a way to list out all of the known (static and dynamic) IP-SGT bindings learned via pxGrid.&lt;/P&gt;
&lt;P&gt;There is no way from the ISE GUI to list the sessions in the pxgrid Session topic, however, you can leverage the pxGrid API to pull this information directly. See the information on &lt;A href="https://developer.cisco.com/docs/pxgrid/#!getting-started/using-cisco-pxgrid-10" target="_blank" rel="noopener"&gt;Cisco DevNet&lt;/A&gt; related to the pxGrid API.&lt;/P&gt;
&lt;P&gt;One of my colleagues also built a python library that leverages the pxGrid API that is useful for this kind of testing. You can find his &lt;A href="https://github.com/vbobrov/pxAPI" target="_blank" rel="noopener"&gt;GitHub page here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Example output from the 'session all' command using this client tool:&lt;/P&gt;
&lt;PRE&gt;{
  "sessions": [
    {
      "timestamp": "2021-12-01T09:29:44.438+11:00",
      "state": "STARTED",
      "userName": "grzwin10pc1.domain.local",
      "callingStationId": "00:50:56:8D:C9:44",
      "calledStationId": "00:56:2B:80:C0:86",
      "auditSessionId": "C0A8642300000044EDAB61E1",
&lt;STRONG&gt;      "ipAddresses": [
        "192.168.140.102"&lt;/STRONG&gt;
      ],
      "macAddress": "00:50:56:8D:C9:44",
      "nasIpAddress": "192.168.120.35",
      "nasPortId": "GigabitEthernet0/6",
      "nasPortType": "Ethernet",
      "endpointProfile": "Windows10-Workstation",
      "endpointOperatingSystem": "Windows 10 Pro",
&lt;STRONG&gt;      "ctsSecurityGroup": "Employees",&lt;BR /&gt;...&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Nov 2021 22:55:14 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-11-30T22:55:14Z</dc:date>
    <item>
      <title>Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508279#M571247</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a third party firewall, (Checkpoint) and i am trying to get my Security Groups to the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Firewall can access the ISE, and i see all my Security Groups, but when accessing a SGT there are no IPS in it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there easy way to make sure that i setup my ISE correct for this to work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe i am missing something? that is my feeling that i missed something in the Creation of the SGT or ISE API.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Nov 2021 11:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508279#M571247</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-11-25T11:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508373#M571251</link>
      <description>&lt;P&gt;I was looking at this, and it cointains "IP" ex. but i cant get it out of the ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://developer.cisco.com/docs/identity-services-engine/v1/#!sgmapping" target="_blank"&gt;https://developer.cisco.com/docs/identity-services-engine/v1/#!sgmapping&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ex. but i cant get it out of the ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also i have around 3000 Devices Connected but only 25 devices in the&amp;nbsp;&lt;/P&gt;&lt;P&gt;Work Centers-&amp;gt; TrustSec -&amp;gt; Dashboard&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Nov 2021 14:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508373#M571251</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-11-25T14:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508602#M571263</link>
      <description>&lt;P&gt;I'm not sure I understand what you are trying to do using the REST API. Checkpoint supports direct integration with ISE via pxGrid to allow ISE to share Scalable Groups and IP-SGT bindings that Checkpoint can then use in firewall policies.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Integration-of-Check-Point-Identity-Collector-and/td-p/53429" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Integration-of-Check-Point-Identity-Collector-and/td-p/53429&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Nov 2021 04:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508602#M571263</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-11-26T04:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508667#M571264</link>
      <description>&lt;P&gt;Yeah i been looking at this also, and tried it also.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And allways i get no hits, its like the ISE SGTs are empty both via PxGrid and or the API.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;even when i curl this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://developer.cisco.com/docs/identity-services-engine/v1/#!sgmapping" target="_blank"&gt;https://developer.cisco.com/docs/identity-services-engine/v1/#!sgmapping&lt;/A&gt;&lt;/P&gt;&lt;P&gt;it even says it should contain IP of the hosts&lt;/P&gt;</description>
      <pubDate>Fri, 26 Nov 2021 06:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508667#M571264</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-11-26T06:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508673#M571265</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_CloudGuard_Controller_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_CloudGuard_Controller_AdminGuide/209643" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_CloudGuard_Controller_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_CloudGuard_Controller_AdminGuide/209643&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So this is the one i am trying to get to work with the API&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Nov 2021 07:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4508673#M571265</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-11-26T07:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4509693#M571280</link>
      <description>&lt;P&gt;As the Checkpoint document states... "It allows the use of TrustSec security groups in the security policy according to the &lt;STRONG&gt;static IP-to-SGT mappings&lt;/STRONG&gt; in ISE"&lt;/P&gt;
&lt;P&gt;These are specifically the admin-created mappings found on the &lt;STRONG&gt;&lt;EM&gt;Work Centers &amp;gt; TrustSec &amp;gt; Components &amp;gt; IP SGT Static Mapping&lt;/EM&gt;&lt;/STRONG&gt; page. This is the same info returned by the '/ers/config/sgmapping' REST API call.&lt;/P&gt;
&lt;P&gt;Dynamic IP-SGT bindings for endpoint sessions are stored in the Session Database and published by the pxGrid Session Directory topic. There is no single ERS API call that allows you to extract all dynamic IP-SGT bindings from ISE. This is the where the pxGrid integration would be used to allow the Checkpoint Identity Collector to learn these mappings as they are created/updated.&lt;/P&gt;
&lt;P&gt;If the Checkpoint ID Collector is integrated correctly via pxGrid, but is not learning the IP-SGT bindings via the pxGrid topic(s), you might need to open a TAC case to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 03:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4509693#M571280</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-11-29T03:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4510350#M571298</link>
      <description>&lt;P&gt;Thank you Greg for clearing this up for me!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for dynamic only the collector will work!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 07:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4510350#M571298</guid>
      <dc:creator>Niklas.D</dc:creator>
      <dc:date>2021-11-30T07:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco API and thrid party access</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4510881#M571320</link>
      <description>&lt;P&gt;Copied from private message so that others with similar questions may learn as well...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question from &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/826303"&gt;@Niklas.D&lt;/a&gt;:&lt;/P&gt;
&lt;P&gt;So as i said before i tried to use the collector also!&lt;/P&gt;
&lt;P&gt;and we did get alot of info, but could not get the IP in to Checkpoint.&lt;/P&gt;
&lt;P&gt;Is there away to see what is in the PxGrid Database? To confirm that it working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Response:&lt;/P&gt;
&lt;P&gt;The session database is quite dynamic, so you would need to confirm if Checkpoint provides a way to list out all of the known (static and dynamic) IP-SGT bindings learned via pxGrid.&lt;/P&gt;
&lt;P&gt;There is no way from the ISE GUI to list the sessions in the pxgrid Session topic, however, you can leverage the pxGrid API to pull this information directly. See the information on &lt;A href="https://developer.cisco.com/docs/pxgrid/#!getting-started/using-cisco-pxgrid-10" target="_blank" rel="noopener"&gt;Cisco DevNet&lt;/A&gt; related to the pxGrid API.&lt;/P&gt;
&lt;P&gt;One of my colleagues also built a python library that leverages the pxGrid API that is useful for this kind of testing. You can find his &lt;A href="https://github.com/vbobrov/pxAPI" target="_blank" rel="noopener"&gt;GitHub page here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Example output from the 'session all' command using this client tool:&lt;/P&gt;
&lt;PRE&gt;{
  "sessions": [
    {
      "timestamp": "2021-12-01T09:29:44.438+11:00",
      "state": "STARTED",
      "userName": "grzwin10pc1.domain.local",
      "callingStationId": "00:50:56:8D:C9:44",
      "calledStationId": "00:56:2B:80:C0:86",
      "auditSessionId": "C0A8642300000044EDAB61E1",
&lt;STRONG&gt;      "ipAddresses": [
        "192.168.140.102"&lt;/STRONG&gt;
      ],
      "macAddress": "00:50:56:8D:C9:44",
      "nasIpAddress": "192.168.120.35",
      "nasPortId": "GigabitEthernet0/6",
      "nasPortType": "Ethernet",
      "endpointProfile": "Windows10-Workstation",
      "endpointOperatingSystem": "Windows 10 Pro",
&lt;STRONG&gt;      "ctsSecurityGroup": "Employees",&lt;BR /&gt;...&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Nov 2021 22:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-api-and-thrid-party-access/m-p/4510881#M571320</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-11-30T22:55:14Z</dc:date>
    </item>
  </channel>
</rss>

