02-27-2025 02:55 AM
02-27-2025 03:24 AM
@manvik if you have integrated ISE with FMC via pxGrid dynamic bindings should already be sent, is that integration working correctly?
Can you run the command adi_cli session from CLI of the FMC, which will display the user/IP bindings sent from ISE to the FMC and confirm they have been received.
02-27-2025 03:31 AM
Integration is working correcly. I can see FMC in ISE Administration > PxGrid > Client management a Enabled status.
The setup is still moving to production only, so there's no traffic yet coming to FTD/FMC. How do we ensure the configuration is correct.
I have created an access policy in FTD calling the SGT created in ISE, in FMC source network (in access policy)
02-27-2025 03:39 AM
@manvik you'd need to authenticate devices to the network, ISE will then dynamically send the bindings to the FMC, that command above would show the bindings when they've been sent. If the solution is still in dev and no users have been authenticated by ISE, then there would be no bindings.
From the FMC you could run the command cat /var/sf/run/adi-health will provide information on the state of the configuration (up or down), but still they won't be any bindings.
02-27-2025 04:17 AM
02-27-2025 04:51 AM
@manvik for each endpoint authenticated by ISE, it will send the user/IP/SGT bindings to the FMC. These bindings are stored in a database and forwarded to the FTDs. If you have no active user sessions authenticated by ISE, there will be no mappings in the database. Connect a test device to the network, authenticate it and use the command provided above to confirm and entry is received by the FMC/FTD. More verification commands to use here.
02-27-2025 10:01 PM
02-27-2025 10:46 PM
@manvik the FTD would now have the IP/SGT binding, so in your Access Control Policy you create rules based on the SGT. When you test the rules, from the CLI of the FTD run the command system support firewall-engine-debug this will confirm which rule you are matching and also confirm the SGT.
02-27-2025 11:06 PM
thank you, is there any way to see the FTD access policy action or the IP that are included in the SGT without any client traffic reaching FTD. Currently FTD is in isolated network, not moved to live network.
wanted to make sure the config works before moving to live network.
02-27-2025 11:20 PM
If you can see the SGTs from the FMC GUI and reference them in the Access Control rule, then you know that functionality is work. You can tun the command show access-control-config from the CLI of the FTD, which will show you the deployed Access Control rule configuration including the SGT referenced in the rule.
You can check the Snort user_identity file to confirm the IP/SGT mappings
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide