cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1055
Views
25
Helpful
5
Replies

Cisco ACS Migration to ISE - Identity policy

Andreas88
Level 1
Level 1

Hello,

 

Im planning on migrating from ACS to  ISE and i cant find the same feature in ISE as i've used in ACS.

 

My devices is using tacacs for authentication, and most of the users is mostly authenticated using external ad groups or local users in ACS. But i have a special case were i need to forward the request to an external radius server.

In ACS i've been able to do this with a identity policy's that checks if a username starts with xxx_, then identity equals my radius server.

 

Im trying to do the same in Cisco ISE, but i cant figure it out. Is this feature missing, or how am i going about implementing it?

 

Traffic flow:

Device -> Tacacs+ -> Cisco ISE -> Radius -> External Radius server

 

 

1 Accepted Solution

Accepted Solutions

Those return attributes are only used as matching conditions in the AuthZ Policies to provide differentiated access (T+ Command Sets, Shell Profiles, etc).

The connection between the NAD and ISE (and vice-versa) is using TACACS+ which is a different protocol than RADIUS and does not support the same attributes. RADIUS attributes returned by the external RADIUS server to ISE cannot be sent to the NAD via TACACS+. This would be no different between ACS and ISE.

View solution in original post

5 Replies 5

Greg Gibbs
Cisco Employee
Cisco Employee

TACACS+ and RADIUS are different protocols that handle Authentication and Authorization in different ways. ISE cannot translate TACACS+ to RADIUS (I doubt ACS can either), so you cannot configure a RADIUS Proxy service in a Device Admin Policy Set. I suspect you are simply using the external server as a RADIUS Token server.
If this is what you are doing in ACS, you should be able to achieve the same in ISE using these steps:

  1. Configure the RADIUS Token server
  2. In your Device Admin Policy Set, create an Authentication Policy that matches on something like 'Network Access·UserName Starts with xxx_' and Uses your RADIUS Token server
  3. Create your Authorization Policies with matching conditions based on the attribute_name that is returned by the RADIUS Token server (e.g. RADIUS_Token·CiscoSecure-Group-Id Equals GroupA)

Hello,

 

Thanks for the reply,

 

Ive tried to set up the Radius Token Server, but it only seems that i can add one attribute the standard ciscosecure-group-idimage.png

 

While in Cisco ACS i have the possibility to add multiple attributes:

 

image.png

 

I then access this server trough an identity policy:

 

image.png

 

I need to return the class, and reply-message also including the cisco-av-pair.

 

If i have set up the a rule to match on the cisco av pair sent from the external radius server, will other attributes also be contained, and reaching the network device?

I'm not sure I understand what you are trying to do here.

Are you saying that the external RADIUS server returns specific attribute-value pairs for RADIUS Class [25] and Reply-Message [18] based on some policy logic and ACS uses these returned RADIUS values as matching conditions in the Device Admin policies (Authentication and/or Authorization) to provide different TACACS+ responses (Shell Profile, Command Sets, etc) for different users?

If that's the case, then there is no way to do this with ISE AFAIK. The RADIUS Token response only provides the configuration of one attribute and the Device Admin policy sets do not provide the ability to match on any RADIUS attributes except the one configured in the RADIUS Token server section.

If you need to match on those RADIUS attributes for differentiated access, you might instead need to use RADIUS between the NAD and ISE and use the External RADIUS Servers and normal Policy Sets (RADIUS-based) instead of Device Admin (TACACS+).

Hello, i think i probably have not understood correctly how the attributes works.

 

Its fine to only match the policy on ciscosecure-group-id, i dont need more granulary controll than this.

 

I just thought i needed the class and reply-message attribute added for the NAD to recieve the attributes from the radius server. But as i understand it now, the attributes we add here, is just to help make policies, correct?

 

So if i make a policy that matches on the correct group-id, the other attributes should be sent to the device also?

 

Those return attributes are only used as matching conditions in the AuthZ Policies to provide differentiated access (T+ Command Sets, Shell Profiles, etc).

The connection between the NAD and ISE (and vice-versa) is using TACACS+ which is a different protocol than RADIUS and does not support the same attributes. RADIUS attributes returned by the external RADIUS server to ISE cannot be sent to the NAD via TACACS+. This would be no different between ACS and ISE.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: