How to Configure Security Group Tags (SGTs)
If you are running a Cisco Identity Service Engine (ISE) and use security group tags for classifying traffic in a Cisco Trusted network, the CloudGen Firewall can be used to control the flow of information by syncing the required priviledges with the ISE servers.
The Security Group Tag feature only supports pxGrid 2.0, which in its turn requires ISE servers with version 2.4 or higher.
1. Prepare the Configuration on the ISE Server
To ensure that SGT authentication on the CloudGen Firewall works as expected, you must ensure that the ISE server is working as expected and configured to work in conjunction with the CGF.
Here are some basic steps to prepare the ISE server for its operation:
On the Cisco ISE server, go to Administration > System > Deployment > Edit Node > General Settings.
Enable the Policy Service, and within it, enable the SXP Service.
On the same page, enable the pxGrid service and save the settings.
Go to Administration > pxGrid Services > Client Management > Certificates and generate a single certificate (without a certificate signing request) using
BN-CGFas Common Name (CN).Note the certificate’s password.
Download the zip file to your computer, unzip it, and go to the folder with the unzipped files.
Use the password to decrypt the client key:
openssl rsa -in client_BN-CGF.key -out client_BN-CGF.decrypted.key -traditional -passin pass:
2. How to Configure Security Group Tags on the CloudGen Firewall
After finishing the previous steps on the ISE server, perform the following steps on the CloudGen Firewall.
Log into the firewall.
Go to CONFIGURATION > Config Tree > Infrastructure Services > Authentication Service > Security Group Tags.
Click Lock.
For Activate Scheme, select Yes.
For Cisco ISE pxGrid Nodes, click the green '+' to add an ISE pxGrid node.
The Cisco ISE pxGrid Nodes window is displayed.
Enter the name for your ISE pxGrid Node.
Click OK… .
The Cisco ISE pxGrid Nodes : <your pxGrid node> configuration window is displayed.
For Cisco ISE pxGrid Node, enter the name together with the domain as given in the root certificate from the ISE-Server which provides the pxGrid service.
For Root certificate, select the file
CertificateServicesEndpointSubCA-*.ceras root certificate.
Note: You can use either the client or the root certificate. However, you can use only the root certificate from the Certificate Store.
For Username, enter the user name for authentication to the pxGrid.
Option #1: Authenticate to the pxGrid node via certificate:
For Client key, select
client_BN-CGF.decrypted.keyfor the private key from the list.For For Client certificate, select
client_BN-CGF.cerfor the client certificate.
Option #2: Authenticate to the pxGrid node via username/password
For Password, enter the credentials for establishing the pxGrid connection.
Click OK.
Click Send Changes/Activate.
On the firewall, make sure that the logs (Box > Control > AuthService_sgt) show the expected activity and no warnings or errors.
3. Complete the Configuration on the ISE Server
On the ISE server, go to Administration > pxGrid Services > Client Management > Clients. Your user should be shown as "Pending". Select and approve it. Make sure that the Status column shows it as "Enabled".
On the firewall, make sure that the logs (Box > Control > AuthService_sgt) show the expected activity and no warnings or errors.