{"id":477,"date":"2025-01-23T05:38:59","date_gmt":"2025-01-23T05:38:59","guid":{"rendered":"https:\/\/certcent.io\/?p=477"},"modified":"2025-02-06T23:50:44","modified_gmt":"2025-02-06T23:50:44","slug":"ise-trustsec-lab","status":"publish","type":"post","link":"https:\/\/certcent.io\/index.php\/2025\/01\/23\/ise-trustsec-lab\/","title":{"rendered":"ISE TrustSec Lab"},"content":{"rendered":"\n<p>Below is a sample from my Cisco switch configuration in eve-ng that works to connect a Cisco switch to an ISE server.  My config doesn&#8217;t include the ASA router that assigns an IP dynamically based on the OU group e1\/0 and e1\/1 have Windows PCs that log with a student of staff, based on that configures if the IP address is .20 or .30.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1024x377.png\" alt=\"\" class=\"wp-image-482\" width=\"776\" height=\"285\" srcset=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1024x377.png 1024w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-300x110.png 300w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-768x283.png 768w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image.png 1336w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><\/figure>\n\n\n\n<p>Current configuration : 5186 bytes<br>!<br>! Last configuration change at 23:34:51 UTC Thu Feb 6 2025 by admin<br>!<br>version 15.2<br>service timestamps debug datetime msec<br>service timestamps log datetime msec<br>no service password-encryption<br>service compress-config<br>!<br>hostname Switch<br>!<br>boot-start-marker<br>boot-end-marker<br>!<br>!<br>!<br>username cisco password 0 admin<br>username admin password 0 cisco<br>aaa new-model<br>!<br>!<br><\/p>\n\n\n\n<p>!<br>!<br>aaa group server radius ISE-GROUP<br>server name ISE<br>ip radius source-interface Vlan10<br>!<br>aaa authentication dot1x default group ISE-GROUP<br>aaa authorization network default group ISE-GROUP<br>aaa authorization network cts-list group ISE-GROUP<br>aaa accounting update periodic 5<br>aaa accounting dot1x default start-stop group ISE-GROUP<br>!<br>!<br>!<br>!<br>!<br>aaa server radius dynamic-author<br>client 10.1.1.200 server-key eve1<br>!<br>aaa session-id common<br><\/p>\n\n\n\n<p>!<br>!<br>!<br>ip domain-name eve<br>ip cef<br>no ipv6 cef<br>!<br>!<br>cts authorization list cts-list<br>cts role-based sgt-map 10.1.1.100 sgt 2<br>cts role-based sgt-map 10.1.1.200 sgt 2<br>cts role-based sgt-map 10.1.1.201 sgt 2<br>cts role-based sgt-map 10.1.1.253 sgt 2<br>cts role-based sgt-map 10.1.1.254 sgt 2<br>cts sxp enable<br>cts sxp default source-ip 10.1.1.252<br>cts sxp default password eve1<br>cts sxp connection peer 10.1.1.200 source 10.1.1.252 password default mode local speaker hold-time 0<br>dot1x system-auth-control<br>!<br>spanning-tree mode pvst<br>spanning-tree extend system-id<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>!<br>interface GigabitEthernet0\/0<br>switchport trunk encapsulation dot1q<br>switchport mode trunk<br>negotiation auto<br>!<br>interface GigabitEthernet0\/1<br>description mgmt node<br>switchport access vlan 10<br><\/p>\n\n\n\n<p>switchport mode access<br>negotiation auto<br>!<br>interface GigabitEthernet0\/2<br>description ise node<br>switchport access vlan 10<br>switchport mode access<br>negotiation auto<br>!<br>interface GigabitEthernet0\/3<br>description ise node<br>switchport access vlan 10<br>switchport mode access<br>negotiation auto<br>!<br>interface GigabitEthernet1\/0<br>description win10 node<br>switchport access vlan 100<br>switchport mode access<br>negotiation auto<br>authentication host-mode multi-auth<br>authentication port-control auto<br>mab<br>dot1x pae authenticator<br>dot1x timeout tx-period 10<br>spanning-tree portfast edge<br>spanning-tree bpdufilter enable<br>spanning-tree bpduguard enable<br>!<br>interface GigabitEthernet1\/1<br>description win10 node<br>switchport access vlan 100<br>switchport mode access<br>negotiation auto<br>authentication host-mode multi-auth<br>authentication port-control auto<br>mab<br>dot1x pae authenticator<br>dot1x timeout tx-period 10<br>spanning-tree portfast edge<br>spanning-tree bpdufilter enable<br>spanning-tree bpduguard enable<br>!<br>interface GigabitEthernet1\/2<br>negotiation auto<br><\/p>\n\n\n\n<p>!<br>interface GigabitEthernet1\/3<br>negotiation auto<br>!<br>interface Vlan10<br>ip address 10.1.1.253 255.255.255.0<br>!<br>ip forward-protocol nd<br>!<br>ip http server<br>ip http secure-server<br>!<br>ip ssh version 2<br>ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr<br>ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr<br>!<br>!<br>!<br>!<br>!<br>snmp-server community eve1 RO<br>snmp-server enable traps snmp linkdown linkup<br>!<br>radius-server attribute 6 on-for-login-auth<br>radius-server attribute 8 include-in-access-req<br>radius-server attribute 25 access-request include<br>radius-server dead-criteria time 30 tries 3<br>radius-server timeout 2<br>!<br>radius server ISE<br>address ipv4 10.1.1.200 auth-port 1812 acct-port 1813<br>pac key eve1<br>!<br>!<br>control-plane<br>username admin password cisco <br># not included in show running-config<br>line con 0<br>line aux 0<br>line vty 0 4<br>privilege level 15<br>transport input ssh<br>line vty 5 15<br>transport input ssh<br>!<br>!<br>cts credentials id SW02 password eve1 <br># not included in show running-config<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>end<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"888\" height=\"196\" src=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1.png\" alt=\"\" class=\"wp-image-489\" srcset=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1.png 888w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1-300x66.png 300w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-1-768x170.png 768w\" sizes=\"(max-width: 888px) 100vw, 888px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"897\" height=\"548\" src=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-2.png\" alt=\"\" class=\"wp-image-490\" srcset=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-2.png 897w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-2-300x183.png 300w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-2-768x469.png 768w\" sizes=\"(max-width: 897px) 100vw, 897px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"896\" height=\"289\" src=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-3.png\" alt=\"\" class=\"wp-image-491\" srcset=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-3.png 896w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-3-300x97.png 300w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-3-768x248.png 768w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"423\" height=\"305\" src=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-4.png\" alt=\"\" class=\"wp-image-492\" srcset=\"https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-4.png 423w, https:\/\/certcent.io\/wp-content\/uploads\/2025\/02\/image-4-300x216.png 300w\" sizes=\"(max-width: 423px) 100vw, 423px\" \/><\/figure>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Below is a sample from my Cisco switch configuration in eve-ng that works to connect a Cisco switch to an ISE server. My config doesn&#8217;t include the ASA router that assigns an IP dynamically based on the OU group e1\/0 and e1\/1 have Windows PCs that log with a student of staff, based on that&hellip; <a class=\"more-link\" href=\"https:\/\/certcent.io\/index.php\/2025\/01\/23\/ise-trustsec-lab\/\">Continue reading <span class=\"screen-reader-text\">ISE TrustSec Lab<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/posts\/477"}],"collection":[{"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/comments?post=477"}],"version-history":[{"count":10,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/posts\/477\/revisions"}],"predecessor-version":[{"id":494,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/posts\/477\/revisions\/494"}],"wp:attachment":[{"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/media?parent=477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/categories?post=477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certcent.io\/index.php\/wp-json\/wp\/v2\/tags?post=477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}