09-25-2015 12:52 AM - edited 03-10-2019 11:05 PM
Hi,
I'm current struggling to get PI and ISE to integrate, these are running:
To integrate ISE with PI, on the PI server I browse to
Design > Management Tools >External Management Servers > ISE Servers
I enter all the correct details but I get an error message:
Error: Identity Service Engine with IP Address XXX.XXX.XXX.XXX is not reachable. Please check the network connectivity of the Identity Services Engine.
Both devices are in the same subnet, there’s no filtering taking place. Both servers can see each other without an issue. From the CLI I can confirm I can see an ARP and can ping each other without issue. Both the CPI primary and ISE Primary server are located on the same ESX host.
Any ideas?????
09-25-2015 05:30 AM
Is your ISE deployment single node? If it's distributed, you should be pointing to the M&T server(s).
We recently discussed over in the Network Management forum where I showed some examples.
09-25-2015 05:49 AM
Hi Marvin,
This was sourced from my primary MnT/PAN (Primary for both roles at present)
Do you think its a version conflict?
Thanks
RG
09-25-2015 05:55 AM
I doubt it's a version conflict. I've integrated ISE 1.2, 1.3 and 1.4 with PI 2.0, 2.1 and 2.2 at various times (though I can't say with certainty I've done your exact mix).
If I were troubleshooting I'd dig into the packets a bit to see what's going on (or open a TAC case). You can initiate a packet capture from either system - PI from the root shell or ISE from the troubleshooting tools in the GUI.
09-25-2015 06:18 AM
Marvin,
great shout on the packet capture.. looks like I have a TLS/SSL issues which I think I known why.. I'll keep you posted.
Thanks
RG
09-28-2015 02:10 AM
I thought the issue was due to a certificate issue.
I have updated the management certificates on all ISE and PI servers, these are allocated via our internal CA. The management certificates have been working not throwing errors since they were installed (my laptop has the CA certs installed via AD CS)
On the ISE servers I had uploaded the CA certs but missed this off the PI servers. I presumed it was due to the PI not trusting the certificate allocated to the ISE server (As it didn't have the CA certs). After updating the CA certs I still get the same issue.
I do see a TLSv1 Handshake error in the packet capture, this hasn't changed post CA cert upload.
Going to raise a TAC case.
09-29-2015 01:06 AM
Hi RG,
I'm having the same problem. A TCPDump on ISE shows that ISE is replying with a TLSv1 "handshake failure" to Prime's SSLv2 "client hello".
If possible, keep this post updated with TACs reply. My environment:
Prime: 2.1.0.0.87
ISE: 1.4.0.253 patch 3
Thanks in advance.
Regards,
09-29-2015 09:53 AM
TAC have informed me this is a bug, you need to upgrade via a patch which is downloadable from CCO.
The bug ID is CSCur43834
I have not completed the patch as yet, I will keep you posted.
Thanks
RG
12-02-2015 04:04 PM
RG,
Were you ever able to get this patch?
12-02-2015 04:34 PM
Yes, installed and working without issue since.
Thanks
RG
12-02-2015 05:42 PM
Thanks for the update. I'll open a TAC case myself to get it now that I've run across the same issue. I had forgotten this thread conversation until Google reminded me. :)
I see the same TLS 1.0 - 1.2 negotiation failure you ran across when I did a tcpdump from ISE 2.0. It even happens with PI 3.02. The BugID still isn't public. :(
12-13-2015 08:05 AM
FYI the BugID you cited is only applicable to the ISE 1.x and PI2.x scenario.
The integration is broken (again) in ISE 2.0 - PI 3.0. There's an unpublished BugID on the issue.
My TAC engineer told me that PI 3.1 (ca. February 2016) will fix it.
09-29-2015 03:58 AM
Interesting. I wonder what would happen if you imported the Prime Infrastructure server certificate into ISE's store as a trusted certificate.
Are both ISE and PI certificates issues from the same trusted root CA. Do you have any intermediate certificates loaded into ISE in addition to the root?
09-29-2015 08:50 AM
09-29-2015 09:13 AM
TJ - that might very well be the case.
I came across a handy utility use for nmap to check supported cipher specs on a host. You might give it a whirl to check your hypothesis:
https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide