on
09-01-2021
10:11 AM
- edited on
02-12-2023
12:47 PM
by
hslai
This document goes over all the requirements and needs for integrating with Cisco ISE pxGrid. Anyone integrating with Cisco ISE is required to reach out to us to get onboarded, find out more from the CSTA program.
Both methods complement each other. In ISE 3.x you can use both mechanisms for a robust system. The point in registering with two nodes is to make it less likely that you need to do bulk downloads because of pxGrid node failures. However, if the producer of information fails or the network between a pxGrid node and a client fails, this is detected using the connection loss detection mechanism.
In the pxGrid DevNet information there is a RADIUS simulator, it will help get information into ISE. This doesn't substitute for a real client connect to a network device such as a compatible Cisco switch, VPN concentrator (ASA) or wireless controller (WLC).
Client server communication requires that ISE trusts the services client (your service). This is easily solved by generating a cert from pxGRid services on ISE using its internal CA. This certificate needs to have the following: CN as the FQDN (your-svc-client.domain.com), SAN needs same FQDN and also the client IP address. This zip package would be uploaded to your services client and the RootCA, client cert, and client key would be used. The RootCA allows communication from ISE to be trusted without the need to install each pxGRid node client cert in the clients trusted store.
If customer has an external PKI then the client and server (ISE) must have the PKI cert chain trusted instead. That PKI would generate a cert for ISE nodes and for the client server. See more information in the above links about generating certs
Using this guide Testing and Configuration Guide for Cisco Platform Exchange Grid (pxGrid) 2.0
The API gateway is intended to provide options so that integrations don’t have to be so aware of the topology of ISE and of special port numbers when it comes to interacting with ISE via API. Underneath the covers the API gateway is ALWAYS used in front of port 443, but when it is "enabled" it also routes requests that should go to the PAN to the PAN, so a integration can use, for example, ERS or MNT/Admin APIs against any node with the API gateway "enabled".
Next, a customer may wish to consider having a VIP through a load balancer that maps to any of the API gateway-enabled nodes, or have a virtual hostname that maps in DNS to any one of the API gateway-enabled nodes. This will allow the customer to perhaps have more flexible deployments, especially when nodes are being replaced/upgraded or have failed. If a customer goes this way the hosts with the API gateway enabled should all be "close" to each other in latency terms as there will be internal routing of requests. For example, write requests through the ERS will always terminate on the current PAN.
ERS APIs must be invoked against primary admin node prior to 3.0
MNT APIs against primary MNT
Therefore the short pre-3.0 answer is:
Without API Gateway
HTTP/1.1 401
Unauthorized: The requested operation is allowed on PAP Node only.: 401
Content-Length: 0
Date: Fri, 04 Feb 2022 14:47:43 GMT
Connection: close
Server:
With API Gateway
First, all port 9060 behavior above stays the same. In addition:
HTTP/1.1 302
Content-Length: 0
Connection: close
Strict-Transport-Security: max-age=31536000; includeSubDomains
Location: https://tl-enn-ise-7.cisco.com:443/admin/
Date: Fri, 04 Feb 2022 14:59:10 GMT
Server:
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: