The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Identity Services Engine Passive Identity Connector Administrator Guide, Release 3.2
The Monitoring and troubleshooting service is a comprehensive identity solution for all Cisco ISE-PIC run-time services and uses the following components:
Learn more in this section about how you can manage ISE-PIC with monitoring, troubleshooting and reporting tools.
The following table describes the fields in the Live Sessions window, which displays live sessions . From the main menu bar, choose Live Sessions .
Initiated
Shows the timestamp when the session was initiated.
Updated
Shows the timestamp when the session was last updated due to any change.
Account Session Time
Shows the time span (in seconds) of a user's session.
Session Status
Shows the current status of the endpoint device.
Action
Click the Actions icon to open the Actions pop-up window. You can do the following:
Endpoint ID
Shows the unique identifier for an endpoint, usually a MAC or IP address.
Identity
Shows the username of the endpoint device.
IP Address
Shows the IP address of the endpoint device.
Server
Indicates the PIC node from which the log was generated.
Auth Method
Shows the authentication method that is used by the RADIUS protocol, such as Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), IEE 802.1x or dot1x, and the like.
Session Source
Indicates whether it is a RADIUS session or PassiveID session.
User Domain Name
Shows the registered DNS name of the user.
User NetBIOS Name
Shows the NetBIOS name of the user.
Provider
Endpoint events are learned from different syslog sources. These syslog sources are referred to as providers.
When two events from different providers are learned from an endpoint session, the providers are displayed as comma-separated values in the live sessions page.
MAC Address
Shows the MAC address of a client.
Endpoint Check Time
Shows the time at which the endpoint was last checked by the endpoint probe.
Endpoint Check Result
Shows the result of an endpoint probe. The possible values are:
Source Port Start
(Values are displayed only for the REST provider) Shows the first port number in a port range.
Source Port End
(Values are displayed only for the REST provider) Shows the last port number in a port range.
Source First Port
(Values are displayed only for the REST provider) Shows the first port allocated by the Terminal Server (TS) Agent.
A Terminal Server (TS) refers to a server or network device that allows multiple endpoints to connect to it without a modem or network interface and facilities the connection of the multiple endpoints to a LAN network. The multiple endpoints appear to have the same IP address and therefore it is difficult to identify the IP address of a specific user. Consequently, to identify a specific user, a TS Agent is installed in the server, which allocates a port range to each user. This helps create an IP address-port-user mapping.
TS Agent ID
(Values are displayed only for the REST provider) Shows the unique identity of the Terminal Server (TS) agent that is installed on an endpoint.
AD User Resolved Identities
(Values are displayed only for AD user) Shows the potential accounts that matched.
AD User Resolved DNs
(Values are displayed only for AD user) Shows the Distinguished Name of AD user, for example, CN=chris,CN=Users,DC=R1,DC=com
The following table lists the preconfigured reports, grouped according to their category. Descriptions of the report functionality and logging category are also provided.
AD Connector Operations
The AD Connector Operations report provides log of operations performed by AD Connector such as ISE-PIC Server password refresh, Kerberos tickets management, DNS queries, DC discovery, LDAP, and RPC Connections management, etc.
If some AD failures are encountered, you can review the details in this report to identify the possible causes.
Choose Administration > System > Logging > Logging Categories and select AD Connector.
The Administrator Logins report provides information about all GUI-based administrator login events as well as successful CLI login events.
Choose Administration > System > Logging > Logging Categories and select Administrative and Operational audit.
Change Configuration Audit
The Change Configuration Audit report provides details about configuration changes within a specified time period. If you need to troubleshoot a feature, this report can help you determine if a recent configuration change contributed to the problem.
Choose Administration > System > Logging > Logging Categories and select Administrative and Operational audit.
Current Active Sessions
The Current Active Sessions report enables you to export a report with details about who was currently on the network within a specified time period.
If a user isn't getting network access, you can see whether the session is authenticated or terminated or if there is another problem with the session.
Choose Administration > System > Logging > Logging Categories and select these logging categories: Accounting and RADIUS Accounting.
The Health Summary report provides details similar to the Dashboard. However, the Dashboard only displays data for the past 24 hours, and you can review more historical data using this report.
You can evaluate this data to see consistent patterns in data. For example, you would expect heavier CPU usage when most employees start their work days. If you see inconsistencies in these trends, you can identify potential problems.
The CPU Usage table lists the percentage of CPU usage for the different ISE-PIC functions. The output of the show cpu usage CLI command is presented in this table and you can correlate these values with the issues in your deployment to identify possible causes.
Choose Administration > System > Logging > Logging Categories and select these logging categories: Administrative and Operational Audit, System Diagnostics, and System Statistics.
The Operations Audit report provides details about any operational changes, such as: running backups, registering a ISE-PIC node, or restarting an application.
Choose Administration > System > Logging > Logging Categories and select Administrative and Operational audit.
The Passive ID report enables you to monitor the state of WMI connection to the domain controller and gather statistics related to it (such as amount of notifications received, amount of user login/logouts per second etc.)
Choose Administration > System > Logging > Logging Categories and select Identity Mapping.
pxGrid Administrator Audit
The pxGrid Administrator Audit report provides the details of the pxGrid administration actions such as client registration, client deregistration, client approval, topic creation, topic deletion, publisher-subscriber addition, and publisher-subscriber deletion.
Every record has the administrator name who has performed the action on the node.
You can filter the pxGrid Administrator Audit report based on the administrator and message criteria.
The System Diagnostic report provides details about the status of the ISE-PIC nodes. If the ISE-PIC node is unable to register, you can review this report to troubleshoot the issue.
This report requires that you first enable several diagnostic logging categories. Collecting these logs can negatively impact ISE-PIC performance. So, these categories are not enabled by default, and you should enable them just long enough to collect the data. Otherwise, they are automatically disabled after 30 minutes.
Choose Administration > Logging > Logging Categories and select these logging categories: Internal Operations Diagnostics, Distributed Management, Administrator Authentication and Authorization.
User Change Password Audit
The User Change Password Audit report displays verification about employee's password changes.
Choose Administration > System > Logging > Logging Categories and select Administrative and Operational audit.
Alarms notify you of conditions on a network and are displayed in the Alarms dashlet. There are three alarm severities: critical, warning and information. They also provide information on system activities, such as data purge events. You can configure how you want to be notified about system activities, or disable them entirely. You can also configure the threshold for certain alarms.
Most alarms do not have an associated schedule and are sent immediately after an event occurs. At any given point in time, only the latest 15,000 alarms are retained.
If the event re-occurs, then the same alarms are suppressed for about an hour. During the time that the event re-occurs, depending up on the trigger, it may take about an hour for the alarms to re-appear.
The following table lists all the Cisco ISE-PIC alarms, descriptions and their resolution.
Deployment Upgrade Failure
An upgrade has failed on an ISE PIC node.
Check the ADE.log on the failed node for upgrade failure reason and corrective actions.
Upgrade Bundle Download failure
An upgrade bundle download has failed on an ISE-PIC node.
Check the ADE.log on the failed node for upgrade failure reason and corrective actions.
Secure LDAP connection reconnect due to CRL found revoked certificate
CRL check result is that the certificate used for LDAP connection is revoked.
Check the CRL configuration and verify that it is valid. Check that the LDAP server certificate and its issuer certificates are not revoked. If revoked issue new certificate and install it on LDAP server.
Secure LDAP connection reconnect due to OCSP found revoked certificate
OCSP check result is that the certificate used for LDAP connection is revoked.
Check the OCSP configuration and verify that it is valid. Check that the LDAP server certificate and its issuer certificates are not revoked. If revoked issue new certificate and install it on LDAP server.
Secure syslog connection reconnect due to CRL found revoked certificate
CRL check result is that the certificate used for syslog connection is revoked.
Check the CRL configuration and verify that it is valid. Check that the syslog server certificate and its issuer certificates are not revoked. If revoked issue new certificate and install it on syslog server.
Secure syslog connection reconnect due to OCSP found revoked certificate
OCSP check result is that the certificate used for syslog connection is revoked.
Check the OCSP configuration and verify that it is valid. Check that the syslog server certificate and its issuer certificates are not revoked. If revoked issue new certificate and install it on syslog server.
Administrator account Locked/Disabled
Administrator account is locked or disabled due to password expiration or incorrect login attempts. For more details, refer to the administrator password policy.
Administrator password can be reset by another administrator using the GUI or CLI.
ERS identified deprecated URL
ERS identified deprecated URL
The request URL is deprecated and it is recommended to avoid using it.
ERS identified out-dated URL
ERS identified out-dated URL
The requested URL is out-dated and it is recommended to use a newer one. This URL will not be removed in future releases.
ERS request content-type header is out-dated
ERS request content-type header is out-dated.
The request resource version stated in the request content-type header is out-dated. That means that the resource schema has been modified. One or more attributes may have been added or removed. To overcome that with the outdated schema, the ERS Engine will use default values.
ERS XML input is a suspect for XSS or Injection attack
ERS XML input is a suspect for XSS or Injection attack.
Please review your xml input.
The Cisco ISE-PIC backup operation failed.
Check the network connectivity between Cisco ISE-PIC and the repository. Ensure that:
CA Server is down
CA server is down.
Check to make sure that the CA services are up and running on the CA server.
CA Server is Up
CA server is up.
A notification to inform the administrator that the CA server is up.
This certificate will expire soon. When it expires, Cisco ISE-PIC may fail to establish secure communication with clients.
Replace the certificate. For a trust certificate, contact the issuing Certificate Authority (CA). For a CA-signed local certificate, generate a CSR and have the CA create a new certificate. For a self-signed local certificate, use Cisco ISE-PIC to extend the expiration date. You can delete the certificate if it is no longer used.
Administrator has revoked the certificate issued to an Endpoint by the Internal CA.
Go through the ISE-PIC flow from the beginning to be provisioned with a new certificate.
Certificate Provisioning Initialization Error
Certificate provisioning initialization failed
More than one certificate found with the same value of CN (CommonName) attribute in the subject, cannot build certificate chain. Check all the certificates in the system.
Certificate Replication Failed
Certificate replication to secondary node failed
The certificate is not valid on the secondary node, or there is some other permanent error condition. Check the secondary node for a pre-existing, conflicting certificate. If found, delete the pre-existing certificate on the secondary node, and export the new certificate on the primary, delete it, and import it in order to re-attempt replication.
Certificate Replication Temporarily Failed
Certificate replication to secondary node temporarily failed
The certificate was not replicated to a secondary node due to a temporary condition such as a network outage. The replication will be retried until it succeeds.
This certificate has expired. Cisco ISE-PIC may fail to establish secure communication with clients. Node-to-node communication may also be affected.
Replace the certificate. For a trust certificate, contact the issuing Certificate Authority (CA). For a CA-signed local certificate, generate a CSR and have the CA create a new certificate. For a self-signed local certificate, use Cisco ISE-PIC to extend the expiration date. You can delete the certificate if it is no longer used.
Certificate Request Forwarding Failed
Certificate request forwarding failed.
Make sure that the certification request coming in matches with attributes from the sender.
Cisco ISE configuration is updated. This alarm is not triggered for any configuration change in users and endpoints.
Check if the configuration change is expected.
CRL Retrieval Failed
Unable to retrieve CRL from the server. This could occur if the specified CRL is unavailable.
Ensure that the download URL is correct and is available for the service.
DNS Resolution Failure
DNS resolution failed on the node.
Check if the DNS server configured by the command ip name-server is reachable.
If you get the alarm as 'DNS Resolution failed for CNAME ', then ensure that you create CNAME RR along with the A record for each Cisco ISE node.
Firmware Update Required
A firmware update is required on this host.
Contact Cisco Technical Assistance Center (TAC) to obtain firmware update
Insufficient Virtual Machine Resources
Virtual Machine (VM) resources such as CPU, RAM, Disk Space, or IOPS are insufficient on this host.
Ensure that a minimum requirements for the VM host, as specified in the Cisco ISE Hardware Installation Guide.
NTP Service Failure
The NTP service is down on this node.
This could be because there is a large time difference between NTP server and Cisco ISE-PIC node (more than 1000s). Ensure that your NTP server is working properly and use the ntp server CLI command to restart the NTP service and fix the time gap.
NTP Sync Failure
All the NTP servers configured on this node are unreachable.
Execute show ntp command from the CLI for troubleshooting. Ensure that the NTP servers are reachable from Cisco ISE-PIC . If NTP authentication is configured, ensure that the key ID and value matches with that of the server.
No Configuration Backup Scheduled
No Cisco ISE-PIC configuration backup is scheduled.
Create a schedule for configuration backup.
Operations DB Purge Failed
Unable to purge older data from the operations database. This could occur if M&T nodes are busy.
Check the Data Purging Audit report and ensure that the used_space is lesser than the threshold_space. Login to M&T nodes using CLI and perform the purge operation manually.
The secondary node failed to consume the replicated message.
Login to the Cisco ISE-PIC GUI and perform a manual syncup from the deployment page. De-register and register back the affected Cisco ISE-PIC node.
Cisco ISE-PIC restore operation failed.
Ensure the network connectivity between Cisco ISE-PIC and the repository. Ensure that the credentials used for the repository is correct. Ensure that the backup file is not corrupted. Execute the reset-config command from the CLI and restore the last known good backup.
A patch process has failed on the server.
Re-install the patch process on the server.
A patch process has succeeded on the server.
ISE-PIC node could not replicate configuration data from the primary node.
Login to the Cisco ISE-PIC GUI to perform a manual syncup from the deployment page or de-register and register back the affected Cisco ISE-PIC node with required field.
Endpoint certificates expired
Endpoint certificates were marked expired by daily scheduled job.
Please re-enroll the endpoint device to get a new endpoint certificate.
Endpoint certificates purged
Expired endpoint certificates were purged by daily scheduled job.
No action needed - this was an administrator-initiated cleanup operation.
Slow Replication Error
Slow or a stuck replication is detected.
Please verify that the node is reachable and part of the deployment.
Slow Replication Info
Slow or a stuck replication is detected.
Please verify that the node is reachable and part of the deployment.
Slow Replication Warning
Slow or a stuck replication is detected .
Please verify that the node is reachable and part of the deployment.
EST Service is down
EST Service is down.
Make sure that the CA and EST services are up and running and Certificate services endpoint Sub CA certificate chain is complete.
EST Service is up
EST Service is up.
A notification to inform the administrator that the EST service is up.
Smart Call Home Communication Failure
Smart Call Home messages were not sent successfully.
Ensure that there is network connectivity between Cisco ISE-PIC and Cisco systems.
Telemetry Communication Failure
Telemetry messages were not sent successfully.
Ensure that there is network connectivity between Cisco ISE and Cisco systems.
AD Connector had to be restarted
AD Connector stopped unexpectedly and had to be restarted.
If this issue persists, contact the Cisco TAC for assistance.
Active Directory forest is unavailable
Active Directory forest GC (Global Catalog) is unavailable, and cannot be used for authentication, authorization and group and attribute retrieval.
Check DNS configuration, Kerberos configuration, error conditions, and network connectivity.
Authentication domain is unavailable
Authentication domain is unavailable, and cannot be used for authentication, authorization and group and attribute retrieval.
Check DNS configuration, Kerberos configuration, error conditions, and network connectivity.
ID Map. Authentication Inactivity
No User Authentication events were collected by the Identity Mapping service in the last 15 minutes.
If this is a time when User Authentications are expected (e.g. work hours), then check the connection to Active Directory domain controllers.
Configured nameserver is down
Configured nameserver is down or unavailable.
Check DNS configuration and network connectivity.
AD: Machine TGT refresh failed
ISE-PIC server TGT (Ticket Granting Ticket) refresh has failed; it is used for AD connectivity and services.
Check that the Cisco ISE-PIC machine account exists and is valid. Also, check for possible clock skew, replication, Kerberos configuration and/or network errors.
AD: ISE account password update failed
ISE-PIC server has failed to update it's AD machine account password.
Check that the Cisco ISE-PIC machine account password is not changed and that the machine account is not disabled or restricted. Check the connectivity to KDC.
Joined domain is unavailable
Joined domain is unavailable, and cannot be used for authentication, authorization and group and attribute retrieval.
Check DNS configuration, Kerberos configuration, error conditions, and network connectivity.
Identity Store Unavailable
Cisco ISE-PIC policy service nodes are unable to reach the configured identity stores.
Check the network connectivity between Cisco ISE-PIC and identity store.
AD: ISE machine account does not have the required privileges to fetch groups
Cisco ISE-PIC machine account does not have the required privileges to fetch groups.
Check if the Cisco ISE-PIC machine account has rights to fetch user groups in Active Directory.
High Disk I/O Utilization
Cisco ISE-PIC system is experiencing high disk I/O utilization.
Check if the system has sufficient resources. Check the actual amount of work on the system for example, number of authentications, profiler activity etc. Add additional server to distribute the load.
High Disk Space Utilization
Cisco ISE-PIC system is experiencing high disk space utilization.
Check if the system has sufficient resources. Check the actual amount of work on the system for example, number of authentications, profiler activity etc. Add additional server to distribute the load.
High Load Average
Cisco ISE-PIC system is experiencing high load average.
Check if the system has sufficient resources. Check the actual amount of work on the system for example, number of authentications, profiler activity etc. Add additional server to distribute the load.
High Memory Utilization
Cisco ISE-PIC system is experiencing high memory utilization.
Check if the system has sufficient resources. Check the actual amount of work on the system for example, number of authentications, profiler activity etc. Add additional server to distribute the load.
High Operations DB Usage
Cisco ISE-PIC monitoring nodes are experiencing higher volume of syslog data than expected.
Check and reduce the purge configuration window for the operations data.
Health Status Unavailable
The monitoring node has not received health status from the Cisco ISE-PIC node.
Ensure that Cisco ISE-PIC nodes are up and running. Ensure that Cisco ISE-PIC nodes are able to communicate with the monitoring nodes.
One of the Cisco ISE-PIC processes is not running.
Restart the Cisco ISE-PIC application.
OCSP Transaction Threshold Reached
The OCSP transaction threshold has been reached. This alarm is triggered when internal OCSP service reach high volume traffic.
Please check if the system has sufficient resources.
PIC License Expired
License installed on the Cisco ISE-PIC nodes has expired.
Contact Cisco Accounts team to purchase new licenses.
PIC Licence expiring within 30 Days
License installed on the Cisco ISE-PIC nodes will be expiring in 30 days.
Contact Cisco Sales team for extension of the ISE-PIC license.
PIC Licence expiring within 60 Days
License installed on the Cisco ISE-PIC nodes will be expiring in 60 days.
Contact Cisco Sales team for extension of the ISE-PIC license.
PIC Licence expiring within 90 Days
License installed on the Cisco ISE-PIC nodes will be expiring in 90 days.
Contact Cisco Sales team for extension of the ISE-PIC license.
Log Collection Error
Cisco ISE-PIC monitoring collector process is unable to persist the audit logs generated from the policy service nodes.
This will not impact the actual functionality of the Policy Service nodes. Contact TAC for further resolution.
Scheduled Report Export Failure
Unable to copy the exported report (CSV file) to configured repository.
Verify the configured repository. If it has been deleted, add it back. If it is not available or not reachable, reconfigure the repository to a valid one.
Alarms are not triggered when you add users or endpoints to Cisco ISE-PIC .
The following table describes the fields in the Alarm Settings window ( Settings > Alarm Settings ).
Alarm Type
Alarm Name
Name of the alarm.
Description
Description for the alarm.
Suggested Actions
Action to be performed when the alarm is triggered.
Status
Enable or disable the alarm rule.
Severity
Select the severity level for your alarm. Valid options are:
Send Syslog Message
Send a syslog message for each system alarm that Cisco ISE-PIC generates.
Enter multiple e-mails separated with comma
List of e-mail addresses or ISE-PIC administrator names or both.
Notes in Email (0 to 4000 characters)
Custom text messages that you want associated with your system alarm.
Cisco ISE-PIC contains 5 default alarm types, such as Configuration Changed, High Disk I/O Utilization, High Disk Space Utilization, High Memory Utilization and ISE Authentication Inactivity. Cisco-defined system alarms are listed in the Alarms Settings page (Settings > Alarms Settings). You can only edit the system alarms.
In addition to the existing system alarms, you can add, edit, or delete custom alarms under the existing alarm types.
For each alarm type, you can create a maximum of 5 alarms and the total number of alarms is limited to 200.
To add an alarm:
Choose Settings > Alarm Settings .
In the Alarm Configuration tab, click Add .
Enter the required details. Refer to the Alarm Settings section for more information.
Based on the alarm type, additional attributes are displayed in the Alarm Configuration page. For example, Object Name, Object Type, and Admin Name fields are displayed for Configuration Changed alarms. You can add multiple instances of same alarm with different criteria.
The TCP Dump Utility sniffs packets that you can use to verify if the expected packet has reached a node. For example, when there is no incoming authentication or log indicated in the report, you may suspect that there is no incoming traffic, or that the incoming traffic cannot reach Cisco ISE. In such cases, you can run this tool to validate.
You can configure the TCP dump options and then collect data from the network traffic to help you troubleshoot a network issue.
The TCP Dump window lists TCP dump process files that you create. You can create different files for different purposes, run them as needed, and delete them when you don't need them.
You can control the data that is collected by specifying size, number of files, and how long the process runs. If the process finishes before the time limit, and the file is less than the maximum size, and you enabled more than one file, then the process continues and creates another dump file.
You can run TCP dump on more interfaces, including bonded interfaces.
Human-readable format is no longer an option; the dump file is always in raw format.
We support IPv6 connections to the repository.
The Network Interface drop-down list in the TCP Dump window displays only the network interface cards (NICs) that have an IPv4 or IPv6 address configured. By default in VMware, all the NICs are connected, which means that all the NICs have an IPv6 address and are displayed in the Network Interface drop-down list.
From the Host Name drop-down list, choose the source for the TCP Dump utility.
From the Network Interface drop-down list, choose an interface to monitor.
In the Filter field, enter a boolean expression on which to filter.
The following are supported standard TCP dump filter expressions:
Enter a File Name for this TCP dump process.
From the Repository drop-down list, choose a repository to store TCP dump log files in.
From the File Size drop-down list—Select a maximum file size.
If the dump exceeds this file size, a new file opens to continue the dump. The number of times the dump can continue to a new file is limited by the Limit to setting.
The Limit to option can be used to limit the number of files that the dump can expand into.
The Time Limit option can be used to configure how long a dump runs before ending.
Set Promiscuous Mode by clicking On or Off. The default is On.
Promiscuous mode is the default packet sniffing mode in which the network interface passes all traffic to the system’s CPU. We recommend that you leave it set to On.
You should have successfully completed the task, as described in Using TCP Dump to Monitor network Traffic section.
You can also access TCP Dump through the Cisco ISE CLI. For more information, see the Cisco Identity Services Engine CLI Reference Guide .
Click Download , corresponding to the desired location, and then click Save .
(Optional) To get rid of the previous dump file without saving it, click Delete .
The following table describes the fields on the tcpdump utility page, which you use to monitor the contents of packets on a network interface and troubleshoot problems on the network as they appear. The navigation path for this page is: Troubleshoot .
Choose the name of the host to monitor from the drop-down list.
Choose the network interface to monitor from the drop-down list.
You must configure all network interface cards (NICs) with an IPv4 or IPv6 address so that they are displayed in the Cisco ISE Admin portal.
Promiscuous mode is the default packet sniffing mode. It is recommended that you leave it set to On. In this mode the network interface is passing all traffic to the system’s CPU.
Enter a boolean expression on which to filter. Supported standard tcpdump filter expressions:
ip host 10.77.122.123
ip host 10.77.122.123 and not 10.177.122.119
Select a format for the tcpdump file.
Displays data on the last dump file, such as the following:
Last created on Wed Apr 27 20:42:38 UTC 2011 by admin
File size: 3,744 bytes Format: Raw Packet Data Host Name: Positron Network Interface: GigabitEthernet 0 Promiscuous Mode: On
Use this process to set local log-storage periods and to delete local logs after a certain period of time.
This section describes the manual steps required to configure Active Directory for integration with Cisco ISE-PIC . However, in most cases, you can enable Cisco ISE-PIC to automatically configure Active Directory. The following are the prerequisites to integrate Active Directory with Cisco ISE-PIC .
The join operation requires the following account permissions:
The leave operation requires the following account permissions:
If you perform a force leave (leave without the password), it will not remove the machine account from the domain.
The ISE-PIC machine account that communicates to the Active Directory connection requires the following permissions:
You can precreate the machine account in Active Directory. If the SAM name matches the Cisco ISE-PIC appliance hostname, it is located during the join operation and re-used.
If there are multiple join operations, multiple machine accounts are maintained inside Cisco ISE-PIC , one for each join.
The credentials that are used for the join or leave operation are not stored in Cisco ISE-PIC . Only the newly created Cisco ISE-PIC machine account credentials are stored.
The Network access: Restrict clients allowed to make remote calls to SAM security policy in Microsoft Active Directory has been revised. Hence, Cisco ISE might not able to update its machine account password every 15 days. If the machine account password is not updated, Cisco ISE will no longer authenticate users through Microsoft Active Directory. You will receive the AD: ISE password update failed alarm on your Cisco ISE dashboard to notify you of this event.
This issue happens in Windows Server 2016 Active Directory or later and Windows 10 version 1607 due to the restriction in them. To overcome this restriction, when you are integrating Windows Server 2016 Active Directory or later or Windows 10 version 1607 with Cisco ISE, you much set the registry value in the following registry from non-zero to blank to give access to all: Registry:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\restrictremotesam This allows Cisco ISE to update its machine account password.
The security policy allows users to enumerate users and groups in the local Security Accounts Manager (SAM) database and in Microsoft Active Directory. To ensure Cisco ISE can update its machine account password, check that your configurations in Microsoft Active Directory are accurate. For more information on the Windows operating systems and Windows Server versions affected, what this means for your network, and what changes may be needed, see:
Random number greater than or equal to 49152
DNS Servers/AD Domain Controllers
Global Catalog Servers
NTP Servers/Domain Controllers
For the secondary ISE-PIC node
ISE-PIC uses Active Directory login audit events generated by the Active Directory domain controller to gather user login information. The Active Directory server must be configured properly so the ISE user can connect and fetch the user login information. The following sections show how to configure the Active Directory domain controller (configurations from the Active Directory side) to support ISE-PIC .
To configure Active Directory domain controllers (configurations from the Active Directory side) to support , follow these steps:
You must configure all the domain controllers in all the domains.
ISE-PIC Active Directory login audit events generated by the Active Directory domain controller to gather user login information. ISE-PIC connects to Active Directory and fetches the user login information.
The following steps should be performed from the Active Directory domain controller:
Make sure relevant Microsoft patches are installed on the Active Directory domain controllers.
Make sure the Active Directory logs the user login events in the Windows Security Log.
Verify that the Audit Policy settings (part of the Group Policy Management settings) allows successful logons to generate the necessary events in the Windows Security Log (this is the default Windows setting, but you must explicitly ensure that this setting is correct).
You must have an Active Directory user with sufficient permissions for ISE-PIC to connect to the Active Directory. The following instructions show how to define permissions either for admin domain group user or none admin domain group user:
The Active Directory user used by ISE-PIC can be authenticated either by NT Lan Manager (NTLM) v1 or v2. You need to verify that the Active Directory NTLM settings are aligned with ISE-PIC NTLM settings to ensure successful authenticated connection between ISE-PIC and the Active Directory Domain Controller. The following table shows all Microsoft NTLM options, and which ISE-PIC NTLM actions are supported. If ISE-PIC is set to NTLMv2, all six options described in are supported. If ISE-PIC is set to support NTLMv1, only the first five options are supported.
ISE-PIC NTLM Setting Options / Active Directory (AD) NTLM Setting Options NTLMv1 NTLMv2
Send LM & NTLM responses connection is allowed connection is allowed
Connection is allowed
Connection is allowed
Send LM & NTLM - use NTLMv2 session security if negotiated connection is allowed connection is allowed
Connection is allowed
Connection is allowed
Send NTLM response only connection is allowed connection is allowed
Connection is allowed
Connection is allowed
Send NTLMv2 response only connection is allowed connection is allowed
Connection is allowed
Connection is allowed
Send NTLMv2 response only. Refuse LM connection is allowed connection is allowed
Connection is allowed
Connection is allowed
Send NTLMv2 response only. Refuse LM & NTLM connection is refused connection is allowed
Connection is refused
Connection is allowed
Make sure that you have created a firewall rule to allow traffic to dllhost.exe on Active Directory domain controllers.
You can either turn the firewall off, or allow access on a specific IP ( ISE-PIC IP address) to the following ports:
Higher ports are assigned dynamically or you can configure them manually. We recommend that you add %SystemRoot%\System32\dllhost.exe as a target. This program manages ports dynamically.
All firewall rules can be assigned to specific IP ( ISE-PIC IP).
Ensure that the Audit Policy (part of the Group Policy Management settings) allows successful logons. This is required to generate the necessary events in the Windows Security Log of the AD domain controller machine. This is the default Windows setting, but you must verify that this setting is correct.
Choose Start > Programs > Administrative Tools > Group Policy Management .
Navigate under Domains to the relevant domain and expand the navigation tree.
Choose Default Domain Controller Policy , right click and choose Edit .
The Group Policy Management Editor appears.
Choose Default Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security Settings .
Note | Cisco ISE uses RC4 cipher in Kerberos protocol while communicating with Active Directory, unless this encryption type is disabled in Active Directory Domain Controller configuration. You can use the Network Security: Configure Encryption Types Allowed for Kerberos option in Active Directory to configure the allowed encrytion types for Kerberos protocol. |
If any Audit Policy item settings have been changed, you should then run gpupdate /force to force the new settings to take effect.
For Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2, the Domain Admin group does not have full control of certain registry keys in the Windows operating system by default. The Microsoft Active Directory administrator must give the Microsoft Active Directory user full control permissions on the following registry keys:
The following Microsoft Active Directory versions require no registry changes:
To grant full control, the Microsoft Active Directory admin must first take ownership of the key:
Right-click the key icon and choose the Owner tab.