<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNAC to ISE Integration - SSH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002878#M586642</link>
    <description>&lt;P&gt;The use of SSH as part of the integration process was dropped after DNAC (Catalyst Center) version 2.2.1.0. The entire integration process is now done by the APIs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_segmentation.html#concept_wvx_cx3_x2b" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_segmentation.html#concept_wvx_cx3_x2b&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Jan 2024 22:09:32 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2024-01-22T22:09:32Z</dc:date>
    <item>
      <title>DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002600#M586612</link>
      <description>&lt;P&gt;We've having some debate internally around when DNAC needs to log into ISE via SSH.&amp;nbsp; In our environment ISE and DNAC are owned by 2 different teams thus we want to limit who knows what credential.&amp;nbsp; What happened was because we learned that the SSH cred and the web cred are actually 2 different credentials (albeit the same username/password at time of install) they are subject to 2 different password policies.&amp;nbsp; In this case the SSH credential expired and forced us to change the credential.&amp;nbsp; In working with some of our Cisco reps, they stated they needed to be the same username/password and DNAC would use SSH.&amp;nbsp; When we updated the SSH password we saw no impact on DNAC so we're wondering why we keep being told to keep them in sync. Hoping this forum can shed some light cause as best i can tell, and per the below, it only needs it at time of initial setup.&amp;nbsp; What are others doing?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per the below it is documented that DNAC to ISE via SSH is only for the initial config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/hardening_guide/b_dnac_security_best_practices_guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/hardening_guide/b_dnac_security_best_practices_guide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;see the section called "Cisco DNA Center&amp;nbsp;Outbound to Device and Other Systems"&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 14:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002600#M586612</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-01-22T14:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002738#M586630</link>
      <description>&lt;P&gt;When you integrating with ISE and DNAC there are 3 parts (SSH is one of them)&lt;/P&gt;
&lt;P&gt;when DNA Center (Catalyst center) and ISE are integrated intiallu there is an SSH session that established. That SSH session is used to share the certificates each other. So ISE shares the certificates to DNA Center. DNA Center shares its certificate with ISE.&lt;/P&gt;
&lt;P&gt;check below guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/networking-knowledge-base/how-to-cisco-dna-center-ise-integration/ta-p/3896410" target="_blank"&gt;https://community.cisco.com/t5/networking-knowledge-base/how-to-cisco-dna-center-ise-integration/ta-p/3896410&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 17:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002738#M586630</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-22T17:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002878#M586642</link>
      <description>&lt;P&gt;The use of SSH as part of the integration process was dropped after DNAC (Catalyst Center) version 2.2.1.0. The entire integration process is now done by the APIs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_segmentation.html#concept_wvx_cx3_x2b" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_segmentation.html#concept_wvx_cx3_x2b&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jan 2024 22:09:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002878#M586642</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-01-22T22:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002935#M586646</link>
      <description>&lt;P&gt;So there are 2 documents each published by cisco that are saying different things.&amp;nbsp; The one you referenced (Last updated on August 4, 2020) says SSH isn't needed with DNAC 2.2.1.0.&amp;nbsp; The article i referenced (last updated Jan 22, 2024) says it is needed.&amp;nbsp; Which is correct?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 00:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002935#M586646</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-01-23T00:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002958#M586647</link>
      <description>&lt;P&gt;Unfortunately, the newer document is incorrect. I suspect when that was updated, the table was not corrected. I would suggest submitting feedback on that document to suggest it needs correcting.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 01:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002958#M586647</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-01-23T01:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002977#M586648</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; Will open a case with TAC and see what they say.&amp;nbsp; So all DNAC needs is an account that has ERS Admin permissions?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 02:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5002977#M586648</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-01-23T02:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5003004#M586654</link>
      <description>&lt;P&gt;Yes, the ERS Admin account is used for the integration with Catalyst Center.&lt;/P&gt;
&lt;P&gt;TAC may also refer you to the feedback link on the document. You can submit feedback on the document directly on the page.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-01-23 at 2.46.03 pm.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/208237iB34E224928904846/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-01-23 at 2.46.03 pm.png" alt="Screenshot 2024-01-23 at 2.46.03 pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 03:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5003004#M586654</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-01-23T03:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213000#M592573</link>
      <description>&lt;P&gt;Does this mean we can create a local account on ISE that is just a member of the ERS Admin group for the integration, rather than using the local admin account?&lt;/P&gt;
&lt;P&gt;What about external authentication, or is the ERS API just local authentication?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:03:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213000#M592573</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2024-10-22T15:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213116#M592579</link>
      <description>&lt;P&gt;Yes that is the expectation.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 18:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213116#M592579</guid>
      <dc:creator>ryanbess</dc:creator>
      <dc:date>2024-10-22T18:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213779#M592600</link>
      <description>&lt;P&gt;I created an admin user (ers-admin) on ISE that is just a member of the "ERS Admin" group and this doesn't work.&amp;nbsp; I just get a message saying 'The Cisco ISE credentials provided are invalid'.&lt;/P&gt;
&lt;P&gt;I can successfully login to the ERS admin web service from a PC (&lt;A href="https://ise-server:9060/ers/sdk" target="_blank"&gt;https://ise-server:9060/ers/sdk&lt;/A&gt;) using the ers-admin account I created.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 16:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5213779#M592600</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2024-10-23T16:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5216079#M592707</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Just wanted to give you a heads up that in the Catalyst Center release cisco has made changes to how the integrations will work for "ERS-admin" and the API-integrations. The documentation *clear* states that you need to be a "Super-Admin" in ISE for integration work, although lot of documentation (including ciscolive presentations) still wrongly states that you just need ERS-admin for it to work.&lt;/P&gt;
&lt;P&gt;I have done countless integrations between DNAC/ISE and here is how it actuall works:&lt;/P&gt;
&lt;P&gt;... PRE Catalst Center branding release:&lt;BR /&gt;-ISE will need SSH cli admin account &lt;BR /&gt;-ISE will need GUI super admin account (can be externally authenticated and mapped to AD-groups etc that is mapped to Super-Admin role)&lt;/P&gt;
&lt;P&gt;...Catalyst Center release...&lt;BR /&gt;-ISE will still need local SSH admin-account to get a "successfull integration" (but it's not really used)&lt;BR /&gt;-ISE will need GUI Super Admin role access *but it has to be LOCALLY configured in ISE*&lt;/P&gt;
&lt;P&gt;The main difference with GUI account is that cisco changed the way the ERS/API integrations work with ISE in the "catalyst center" relesae so that for some reason you cannot use an externally mapped Super-Admin role in ISE.&lt;/P&gt;
&lt;P&gt;That said, you can also skip the SSH Admin CLI account and it will still work (but will generate some cosmetic errors here and there).&lt;/P&gt;
&lt;P&gt;Yes you need the GUI local account to be Super Admin (everything else will *not* work regardless of what documentation states, and actually the admin guide for catalyst center also clearly states this!).&lt;/P&gt;
&lt;P&gt;Bottom line is, i still see the "catalyst center" release as a form of Beta-release as of now. lot of cosmetic errors, in general vague documentation about how things work .... lot of things changed (example provision jobs, compliance checks etc) for the worse (15 click processes instead of 3 click processes)...&lt;/P&gt;
&lt;P&gt;And everyone that has done proper service-account integrations are having issues with the catalyst center release due to what i mentioned above and it being undocumented! So, sadly... &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/323185"&gt;@andrew.butterworth&lt;/a&gt; you will need that Super Admin account local in ISE.&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;-Daniel&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 10:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5216079#M592707</guid>
      <dc:creator>DanielLarsson63527</dc:creator>
      <dc:date>2024-10-28T10:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5263638#M595126</link>
      <description>&lt;P&gt;Sorry to bump this so many months on, but do you know if the requirement for an ISE superadmin account is still the case with CatC 2.3.7.6?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 19:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5263638#M595126</guid>
      <dc:creator>ConteAlmaviva</dc:creator>
      <dc:date>2025-02-21T19:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: DNAC to ISE Integration - SSH</title>
      <link>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5306932#M597155</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/391190"&gt;@ConteAlmaviva&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Late reply don't got any notification... but yes, it is still the requirements and i still haven't seen any updated documentation regarding this so i would follow above recommendations if you want it to work long-term.&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;-Daniel&lt;/P&gt;
&lt;P&gt;P.s - ERSadmin is what cisco still claims is the requirements, but it will do some things that will require "super admin" access to function properly.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 13:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/dnac-to-ise-integration-ssh/m-p/5306932#M597155</guid>
      <dc:creator>DanielLarsson63527</dc:creator>
      <dc:date>2025-07-08T13:00:12Z</dc:date>
    </item>
  </channel>
</rss>

