on 07-21-2025 07:45 AM
Introduction
This document shows you how to Integrate Cisco ISE with Cylera
What is Cylera?
Cylera is SaaS platform which provide provides the easiest, most accurate and extensible, platform for healthcare IoT intelligence and security to optimize care delivery, service availability, and cyber defenses across diverse connected medical device and infrastructure.
The platform accurately discovers, categorizes, assesses, and monitors known and unknown healthcare IoT and connected medical devices with high fidelity. Cybersecurity and biomedical engineering professionals gain unparalleled asset inventory visibility, usage telemetry, threat prioritization, analytics, and guided remediation. The solution, in combination with its rapid implementation and integrations with popular IT and biomedical applications, enables organizations to advance their cybersecurity program maturity, increase operational efficiency, mitigate risk, and enable compliance audit-readiness.
Why Integrate Cisco ISE with Cylera?
Cylera provide variety list of benefits including
Continuous visibility: Identify, classify, and monitor healthcare IoT and connected medical devices in real-time.
Deep healthcare IoT device intelligence: Capture make, model, OS, vendor, network services, SBoM attributes, and more.
Network traffic inspection and assessment: Analyze granular flow and communication attributes.
Known and unknown device identification: Auto-categorize and assess without requiring retooling.
Passive, real-time detection: Identify vulnerabilities and indicators of compromise (IOCs) affecting healthcare IoT devices.
Dynamic risk profiling: Pinpoint actual attack surface risk and potential service impact.
Efficient mitigation: Prioritize threats with risk scores and remediate faster with detailed triage context and prescriptive remediation guidance.
Zero trust support: Segmentation policy generation and zone monitoring through integrations with fireall, network access control (NAC), and microsegmentation tools.
Rich analytics: Obtain insights with interactive dashboards, filters, and reports.
Compliance audit-readiness: Utilize reports and data export of inventory, event logs, exposures, and resolution.
Data sharing: Integrate with popular network, security, asset, vulnerability and risk management, and service management systems.
Healthcare IoT optimization: Collect usage telemetry to enable optimization and cost savings.
Background Information
Cylera Appliance
Each site in your organization should have a dedicated Cylera Appliance that collects device information via SPAN, typically configured on the distribution switch. This data is then sent to the Cylera cloud application, which can be accessed from anywhere. Additionally, the Cylera Appliance will be integrated with Cisco ISE through pxGrid.
https://cylera.com/platform/how-cylera-works/
Prerequisites
Knowledge of Cisco ISE Network Access , Cisco pxGrid , REST API and Cylera architecture.
Components Used
In this document, we assume that your organization has four sites, each equipped with one Cylera Appliance (sensor). You only need to integrate ISE PAN1 (which has pxGrid persona enabled) with one of these four sensors. This sensor will act as a proxy, enabling the connection between ISE and the Cylera cloud application. The integration will be established via pxGrid. Afterwards, the Cylera cloud application will use REST APIs to synchronize and push information to ISE. For this process, Cylera requires an internal ISE user account with membership in both the Identity Admin and ERS Admin groups.
Prerequisites ISE configuration
Step 1 Enable pxGrid persona on your PAN1 node
Select Administration → System → Deployment , Edit the ISE node and go to “General Settings”
Step 2 Enable Profiling Custom Attribute Enforcement
Select Administration → System → Settings → Profiling , Enable custom attribute enforcement
Step 3 Enable pxGrid Profiling for each PSN node
Select Administration → System → Deployment , Edit the ISE node and go to “Profiling Configuration” , Enable pxGrid under Profiling Configuration
Step 4 Enable REST API
Select Administration → System → Settings → API Settings ,Click on “API Service Settings” ,Enable ERS (Read/Write)
Step 5 Create ISE user account for Cylera
Go to Administration → System → Admin Access b. On the left navigation bar select Administrators → Admin Users c. Click “Add”
Add the following Admin Groups to the User : Identity Admin and ERS Admin
Step 6 Create pxgrid certificate and DNS record for Clyera appliance
You will need to generate a pxGrid certificate for your Cylera sensor, ensuring that the certificate's Common Name (CN) is resolvable by your DNS server. The certificate can be issued either by your Enterprise CA or by the ISE CA, which can be accessed under the Certificate section in Client Management. In both cases, you must upload the certificate, the CA certificate (including the full chain of trust), and the private key to the Cylera sensor.
Below example if you will use ISE as CA
Below example for the files you will need to upload to Cylera in the end
Remember from ISE pxGrid settings , you will need to approve the certificate or choose automatically to approve it.
Step 7 Create pxGrid Group for Cylera
Navigate to Administration → pxGrid Services → Client Management , Select Groups on the left hand side and create a new group with the name “Cylera”
Step 8 Create pxGrid Policy for Cylera
The Policy page is where we can see the services/policies available to pxGrid clients. We may also create new policies here as well.
Used to assign service to the group
The default operations are as follows:
Navigate to Policy on the left hand side and create the following Service:
Select the cylera-appliance pxGrid client and then select “Edit”
Add the Cylera client group to the pxGrid client and select “Save
Step 9 Create the cylera custom attributes
Navigate to Administration —> Identity Management —> Settings , On the left hand side, select “Endpoint Custom Attributes” ,Create the following attributes with their respective types
Save the custom attributes
Integrate ISE with Cylera
In Cylera cloud app , Go to “Integration” , click “Create New Integration” then click “Configure Integration”
Syncing Policies from Cylera to Cisco ISE
dACL Policies
If the synced policy is a dACL policy, navigate in the ISE GUI to Policy → Policy Elements → Results. Then, on the left-hand menu, go to Authorization → Downloadable ACLs. You will find the ACL rules for the synced policy listed here, identified by the prefix "cylera" followed by the group name.
Next, navigate to Authorization → Authorization Profiles. You will see a corresponding authorization profile, also prefixed with "cylera" and the group name, which is associated with its respective downloadable ACL.
TrustSec Policies
If the synced policy is a TrustSec policy, go to the ISE GUI and navigate to Work Centers → TrustSec → TrustSec Policy. On the left-hand side, click on Matrix to view the TrustSec matrix, which displays allowed traffic flows from source to destination.
To sync policies from Cylera to Cisco ISE, log in to the Cylera Dashboard and go to Network → Policies. Create a new policy by either generating rules based on traffic data or defining custom rules manually. Make sure the policy is set to Enforcement mode—this enables the Sync NAC button. Once the rules are configured, click Save, then click Sync NAC. This will queue the sync action for the configured NAC integration.
The sync process may take 5 to 15 minutes, depending on the number of devices associated with the group. During this time, a notification will appear on the Cylera Dashboard indicating that the integration is in progress, followed by another notification once the sync is complete.
After the sync is finished, navigate to the Cisco ISE GUI to verify the integration.
Actions
Push Device Attributes Frequency
Runs Daily Can also be invoked from the integration detail page Due to limitation of the pxGrid Context-In probe the limit of devices getting updated is 25 devices per second. For example, a client who has 10,000 devices they would like to sync over would take about 7 minutes. Syncs over the type, vendor, operating system, model, and class a device into the custom attributes for the device Can be configured from the Configure Integration modal to only send specific classes. If none are selected in the modal then NO device attributes will be synced over.
Push Policies Frequency
Ad-Hoc, determined by user Can be invoked from both the integration detail page and the policy detail page Invocation from the integration detail page will push ALL policies that are in ENFORCEMENT mode to the NAC Invocation from the poilcy detail page will only push the policy that is detailed on the page Can push over dACL and Trustsec types of policies and this is configured on the Configure Integration modal
Push Profiles Frequency
Ad-Hoc, determined by user Can only be invoked from integration detail page Invocation from the integration detail page will push device attributes for all device profiles that are in ENFORCEMENT mode to the NAC. This action gives the user more granularity into pushing attributes only for devices they are interested in creating an policy rule for.
Verification
Great write up!
thank you!!!
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: