NetBox plugin for Cisco ISE integration - endpoint tracking, NAD management, and session visibility
Project description
NetBox Cisco ISE Plugin
A NetBox plugin that integrates Cisco Identity Services Engine (ISE) with NetBox, displaying endpoint details, network device (NAD) information, and active session data.
Features
Endpoint Integration
- Endpoint Details Tab: Adds a "Cisco ISE" tab to Device detail pages for endpoints
- MAC Address Lookup: Automatic lookup using device interface MAC addresses
- Endpoint Profile: Shows profiled device type and identity group
- Session Status: Displays active/inactive connection status
Network Access Device (NAD) Integration
- NAD Details Tab: Shows ISE registration status for network devices
- Authentication Settings: Displays RADIUS, TACACS+, and SNMP configuration
- TrustSec Status: Shows device TrustSec enrollment
- Device Groups: Lists assigned network device groups
Active Session Data
- Real-time Session: Shows active 802.1X/MAB session details
- Connection Info: NAS IP, port ID, VLAN assignment
- Authorization: Selected authorization profile and SGT
- Posture Status: Endpoint compliance posture state
General Features
- Configurable Device Mappings: Control which devices show the tab and lookup method
- API Caching: Reduces load on ISE with configurable cache timeout
- Settings Page: View configuration and test ISE connection
Requirements
- NetBox 4.0 or higher
- Cisco ISE 2.x or higher with ERS API enabled
- Python 3.10+
Installation
From PyPI (recommended)
pip install netbox-cisco-ise
From Source
git clone https://github.com/sieteunoseis/netbox-cisco-ise.git
cd netbox-cisco-ise
pip install -e .
Docker Installation
Add to your NetBox Docker requirements file:
# requirements-extra.txt
netbox-cisco-ise
Or for development:
# In docker-compose.override.yml, mount the plugin:
volumes:
- /path/to/netbox-cisco-ise:/opt/netbox/netbox/netbox_cisco_ise
Configuration
Add the plugin to your NetBox configuration:
# configuration.py
PLUGINS = [
'netbox_cisco_ise',
]
PLUGINS_CONFIG = {
'netbox_cisco_ise': {
# Required: ISE URL (ERS API)
'ise_url': 'https://ise.example.com',
# Required: ERS Admin credentials
'ise_username': 'ersadmin',
'ise_password': 'your-password',
# Optional settings
'timeout': 30, # API timeout in seconds (default: 30)
'cache_timeout': 60, # Cache duration in seconds (default: 60)
'verify_ssl': False, # Verify SSL certificates (default: False)
# Device mappings (REQUIRED) - Controls which devices show the Cisco ISE tab
# Each mapping specifies:
# - manufacturer: Regex pattern to match device manufacturer (slug or name)
# - device_type: Optional regex pattern to match device type (slug or model)
# - lookup: How to find the device in ISE:
# "nad" - Network Access Device lookup by IP/hostname (for switches, routers, WLCs)
# "endpoint" - Endpoint lookup by MAC address (for wireless clients, badges)
'device_mappings': [
# All Cisco devices - lookup as NADs
{'manufacturer': 'cisco', 'lookup': 'nad'},
# Vocera badges - lookup by MAC address as endpoints
{'manufacturer': 'vocera', 'lookup': 'endpoint'},
# Example: Specific device type only
# {'manufacturer': 'aruba', 'device_type': 'badge', 'lookup': 'endpoint'},
],
}
}
ISE ERS API Setup
- Enable ERS API in ISE: Administration > System > Settings > ERS Settings
- Create an ERS Admin user or use existing admin credentials
- Ensure the user has "ERS Admin" or "ERS Operator" privileges
Required ISE Permissions
| Permission | Used For |
|---|---|
| ERS Read | Endpoint and NAD queries |
| Monitoring API | Active session lookups |
Usage
Once installed and configured:
- Navigate to any Device in NetBox that matches your device_mappings
- Click the Cisco ISE tab
- View real-time endpoint or NAD details from ISE
Lookup Methods
| Lookup | Data Source | Used For |
|---|---|---|
nad |
IP address or hostname | Switches, routers, WLCs, APs |
endpoint |
Interface MAC address | Wireless clients, badges, phones |
What's Displayed
For Endpoints (lookup: endpoint)
| Field | Description |
|---|---|
| MAC Address | Endpoint MAC from ISE |
| Profile | Profiled endpoint type |
| Identity Group | Assigned identity group |
| Session Status | Connected/Disconnected |
| NAS IP | Authenticator IP address |
| Port | Switch port or AP name |
| VLAN | Assigned VLAN |
| Authorization | Applied authorization profile |
For NADs (lookup: nad)
| Field | Description |
|---|---|
| Name | Device name in ISE |
| IP Addresses | Registered management IPs |
| Profile | NAD profile name |
| Device Groups | Location, type, IPSEC groups |
| RADIUS | Shared secret configured |
| TACACS+ | TACACS+ settings |
| TrustSec | SGT enrollment status |
Troubleshooting
Endpoint not found
- Verify the device has an interface with a MAC address
- Check that the MAC format matches ISE (XX:XX:XX:XX:XX:XX)
- Confirm the endpoint exists in ISE endpoint database
NAD not found
- Verify the device has a primary IP or hostname in NetBox
- Check that the device is registered as a NAD in ISE
- Try both IP and hostname lookups
Connection errors
- Verify
ise_urlis accessible from NetBox - Confirm ERS API is enabled on ISE
- For self-signed certificates, set
verify_ssl: False
Authentication errors
- Verify the ERS Admin credentials
- Check user has ERS Admin or ERS Operator role
Development
Setup
git clone https://github.com/sieteunoseis/netbox-cisco-ise.git
cd netbox-cisco-ise
pip install -e ".[dev]"
Code Style
black netbox_cisco_ise/
isort netbox_cisco_ise/
flake8 netbox_cisco_ise/
API Reference
This plugin uses two ISE APIs:
- ERS API (
/ers/config/*): Configuration data - endpoints, NADs, profiles - Monitoring API (
/admin/API/mnt/*): Real-time session data
Changelog
See CHANGELOG.md for release history.
License
Apache License 2.0 - See LICENSE for details.
Contributing
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Submit a pull request
Support
If you find this plugin helpful, consider supporting development:
Related Projects
- netbox-catalyst-center - Catalyst Center integration for NetBox
- netbox-graylog - Display Graylog logs in NetBox
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file netbox_cisco_ise-0.1.11.tar.gz.
File metadata
- Download URL: netbox_cisco_ise-0.1.11.tar.gz
- Upload date:
- Size: 27.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
556b1806a972c8a37e6c6bf20ab79efa8bbc21b4f2a58baaee06ad0d7c11540c
|
|
| MD5 |
ca02e3ffa5f522877f0a9a41b3908126
|
|
| BLAKE2b-256 |
7760ccd5c3d30f977f3d6338c3208fe9964ed72eee47d8ef87164cbd4fe38db6
|
Provenance
The following attestation bundles were made for netbox_cisco_ise-0.1.11.tar.gz:
Publisher:
release.yml on sieteunoseis/netbox-cisco-ise
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
netbox_cisco_ise-0.1.11.tar.gz -
Subject digest:
556b1806a972c8a37e6c6bf20ab79efa8bbc21b4f2a58baaee06ad0d7c11540c - Sigstore transparency entry: 1440355453
- Sigstore integration time:
-
Permalink:
sieteunoseis/netbox-cisco-ise@8ee22f2b85a01f0bf4c5f2a388aca495be056df2 -
Branch / Tag:
refs/tags/v0.1.11 - Owner: https://github.com/sieteunoseis
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@8ee22f2b85a01f0bf4c5f2a388aca495be056df2 -
Trigger Event:
push
-
Statement type:
File details
Details for the file netbox_cisco_ise-0.1.11-py3-none-any.whl.
File metadata
- Download URL: netbox_cisco_ise-0.1.11-py3-none-any.whl
- Upload date:
- Size: 33.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
072765b73054a5eeb8f8a2366c194f0899597445f60dd5006babb27972bb6905
|
|
| MD5 |
8c98eb0e39d9182ae36d9abb0eb06d01
|
|
| BLAKE2b-256 |
83ad553f3c300736ae3b0f754a1b2c75ff4e0ad917e1d6c6f0c1ae94f986b6d1
|
Provenance
The following attestation bundles were made for netbox_cisco_ise-0.1.11-py3-none-any.whl:
Publisher:
release.yml on sieteunoseis/netbox-cisco-ise
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
netbox_cisco_ise-0.1.11-py3-none-any.whl -
Subject digest:
072765b73054a5eeb8f8a2366c194f0899597445f60dd5006babb27972bb6905 - Sigstore transparency entry: 1440355497
- Sigstore integration time:
-
Permalink:
sieteunoseis/netbox-cisco-ise@8ee22f2b85a01f0bf4c5f2a388aca495be056df2 -
Branch / Tag:
refs/tags/v0.1.11 - Owner: https://github.com/sieteunoseis
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@8ee22f2b85a01f0bf4c5f2a388aca495be056df2 -
Trigger Event:
push
-
Statement type: