Quick Configuration
This task discusses how to configure Cisco ISE (but not ISE-PIC) by entering a user name and password. The Cloud-Delivered Firewall Management Center then logs in to ISE and downloads the necessary certificates to authenticate the two applications.
Firewall Threat Defense Feature History:
7.6—This feature is introduced.
Before you begin
Procedure
1 |
Log in to the Cloud-Delivered Firewall Management Center. |
||
2 |
Click |
||
3 |
Click Identity Services Engine for the Service Type to enable the ISE connection.
|
||
4 |
Click Quick Configuration (New). |
||
5 |
In the Primary PAN FQDN/IP Address field, enter the fully qualified domain name or IP address of the policy administration node (PAN). Do not enter a scheme (such as https:// ). |
||
6 |
In the Username field, enter the user name of a user in at least the ERS Operator group. For more information about groups, see the section on Cisco ISE Administrator Groups in the Cisco Identity Services Engine Administrator Guide. |
||
7 |
In the Password field, enter the user's password. |
||
8 |
(Optional.) Enter an ISE Network Filter using CIDR block notation. |
||
9 |
In the Subscribe To section, check the following:
|
||
10 |
(Optional.) From the Proxy list, click either a managed device or a proxy sequence. If Security Cloud Control cannot communicate with your ISE/ISE-PIC server, you can choose either a managed device or proxy sequence to do it. For example, your Security Cloud Control might be in a public cloud but the ISE/ISE-PIC server might be on an internal intranet.
|
||
11 |
To test the connection, click Test. |
||
12 |
(Optional.) After a successful trest, click Save this Config at the top of the page to save the configuration on the Cloud-Delivered Firewall Management Center. |
What to do next
-
Specify users to control and other options using an identity policy as described in Create an Identity Policy.
-
Associate the identity rule with an access control policy, which filters and optionally inspects traffic, as discussed in Associating Other Policies with Access Control.
-
Use Security Group Tags (SGT) from Cisco ISE as dynamic attributes in access control policies.
For more information, see Configure Dynamic Attributes Conditions.
-
Deploy your identity and access control policies to managed devices as discussed in Deploy Configuration Changes.
-
Monitor user activity .