Cisco ISE Part 3: Active directory
This is a Cisco ISE blog post series with some how-to’s for configuring the ISE deployment, This blog post series exists of 10 parts.
The blogpost Agenda:
Part 1: introduction
Part 2: installation
Part 3: Active Directory
Part 4: High Availability
Part 5: Configuring wired network devices
Part 6: Policy enforcement and MAB
Part 7: Configuring wireless network devices
Part 8: Inline posture and VPN
Part 9: Guest and web authentication
Part 10: Profiling and posture
This week, part 3: Active Directory
Microsoft Active directory is the mostly used directory. Cisco ISE can get membership in only 1 AD forest in ISE 1.1.x.
Check the following requirements:
- Correctly configured NTP
- Firewall ports: tcp: 389, 636, 445, 88, 3268, 3289, 464
- Firewall ports: udp: 389, 123
- All firewall ports are needed for the policy nodes
- NAT is not supported!!
A local identity store is desired as a fallback in the event that the external identity store cannot be contacted. This is optional.
Click Administration – Identity management – Groups and click Add to add a new group. (Bulk import is available)
Under Administration – Identity management – identities – users, users can be created and linked to the usergroup.