Skip to main content

NetBox plugin for Cisco ISE integration - endpoint tracking, NAD management, and session visibility

Project description

NetBox Cisco ISE Plugin

NetBox Cisco ISE Plugin

A NetBox plugin that integrates Cisco Identity Services Engine (ISE) with NetBox, displaying endpoint details, network device (NAD) information, and active session data.

NetBox Version Python Version License CI PyPI

Features

Endpoint Integration

  • Endpoint Details Tab: Adds a "Cisco ISE" tab to Device detail pages for endpoints
  • MAC Address Lookup: Automatic lookup using device interface MAC addresses
  • Endpoint Profile: Shows profiled device type and identity group
  • Session Status: Displays active/inactive connection status

Network Access Device (NAD) Integration

  • NAD Details Tab: Shows ISE registration status for network devices
  • Authentication Settings: Displays RADIUS, TACACS+, and SNMP configuration
  • TrustSec Status: Shows device TrustSec enrollment
  • Device Groups: Lists assigned network device groups

Active Session Data

  • Real-time Session: Shows active 802.1X/MAB session details
  • Connection Info: NAS IP, port ID, VLAN assignment
  • Authorization: Selected authorization profile and SGT
  • Posture Status: Endpoint compliance posture state

General Features

  • Configurable Device Mappings: Control which devices show the tab and lookup method
  • API Caching: Reduces load on ISE with configurable cache timeout
  • Settings Page: View configuration and test ISE connection

Requirements

  • NetBox 4.0 or higher
  • Cisco ISE 2.x or higher with ERS API enabled
  • Python 3.10+

Installation

From PyPI (recommended)

pip install netbox-cisco-ise

From Source

git clone https://github.com/sieteunoseis/netbox-cisco-ise.git
cd netbox-cisco-ise
pip install -e .

Docker Installation

Add to your NetBox Docker requirements file:

# requirements-extra.txt
netbox-cisco-ise

Or for development:

# In docker-compose.override.yml, mount the plugin:
volumes:
  - /path/to/netbox-cisco-ise:/opt/netbox/netbox/netbox_cisco_ise

Configuration

Add the plugin to your NetBox configuration:

# configuration.py

PLUGINS = [
    'netbox_cisco_ise',
]

PLUGINS_CONFIG = {
    'netbox_cisco_ise': {
        # Required: ISE URL (ERS API)
        'ise_url': 'https://ise.example.com',

        # Required: ERS Admin credentials
        'ise_username': 'ersadmin',
        'ise_password': 'your-password',

        # Optional settings
        'timeout': 30,           # API timeout in seconds (default: 30)
        'cache_timeout': 60,     # Cache duration in seconds (default: 60)
        'verify_ssl': False,     # Verify SSL certificates (default: False)

        # Device mappings (REQUIRED) - Controls which devices show the Cisco ISE tab
        # Each mapping specifies:
        #   - manufacturer: Regex pattern to match device manufacturer (slug or name)
        #   - device_type: Optional regex pattern to match device type (slug or model)
        #   - lookup: How to find the device in ISE:
        #       "nad" - Network Access Device lookup by IP/hostname (for switches, routers, WLCs)
        #       "endpoint" - Endpoint lookup by MAC address (for wireless clients, badges)
        'device_mappings': [
            # All Cisco devices - lookup as NADs
            {'manufacturer': 'cisco', 'lookup': 'nad'},

            # Vocera badges - lookup by MAC address as endpoints
            {'manufacturer': 'vocera', 'lookup': 'endpoint'},

            # Example: Specific device type only
            # {'manufacturer': 'aruba', 'device_type': 'badge', 'lookup': 'endpoint'},
        ],
    }
}

ISE ERS API Setup

  1. Enable ERS API in ISE: Administration > System > Settings > ERS Settings
  2. Create an ERS Admin user or use existing admin credentials
  3. Ensure the user has "ERS Admin" or "ERS Operator" privileges

Required ISE Permissions

Permission Used For
ERS Read Endpoint and NAD queries
Monitoring API Active session lookups

Usage

Once installed and configured:

  1. Navigate to any Device in NetBox that matches your device_mappings
  2. Click the Cisco ISE tab
  3. View real-time endpoint or NAD details from ISE

Lookup Methods

Lookup Data Source Used For
nad IP address or hostname Switches, routers, WLCs, APs
endpoint Interface MAC address Wireless clients, badges, phones

What's Displayed

For Endpoints (lookup: endpoint)

Field Description
MAC Address Endpoint MAC from ISE
Profile Profiled endpoint type
Identity Group Assigned identity group
Session Status Connected/Disconnected
NAS IP Authenticator IP address
Port Switch port or AP name
VLAN Assigned VLAN
Authorization Applied authorization profile

For NADs (lookup: nad)

Field Description
Name Device name in ISE
IP Addresses Registered management IPs
Profile NAD profile name
Device Groups Location, type, IPSEC groups
RADIUS Shared secret configured
TACACS+ TACACS+ settings
TrustSec SGT enrollment status

Troubleshooting

Endpoint not found

  • Verify the device has an interface with a MAC address
  • Check that the MAC format matches ISE (XX:XX:XX:XX:XX:XX)
  • Confirm the endpoint exists in ISE endpoint database

NAD not found

  • Verify the device has a primary IP or hostname in NetBox
  • Check that the device is registered as a NAD in ISE
  • Try both IP and hostname lookups

Connection errors

  • Verify ise_url is accessible from NetBox
  • Confirm ERS API is enabled on ISE
  • For self-signed certificates, set verify_ssl: False

Authentication errors

  • Verify the ERS Admin credentials
  • Check user has ERS Admin or ERS Operator role

Development

Setup

git clone https://github.com/sieteunoseis/netbox-cisco-ise.git
cd netbox-cisco-ise
pip install -e ".[dev]"

Code Style

black netbox_cisco_ise/
isort netbox_cisco_ise/
flake8 netbox_cisco_ise/

API Reference

This plugin uses two ISE APIs:

  • ERS API (/ers/config/*): Configuration data - endpoints, NADs, profiles
  • Monitoring API (/admin/API/mnt/*): Real-time session data

Changelog

See CHANGELOG.md for release history.

License

Apache License 2.0 - See LICENSE for details.

Contributing

Contributions are welcome! Please:

  1. Fork the repository
  2. Create a feature branch
  3. Submit a pull request

Support

If you find this plugin helpful, consider supporting development:

Buy Me A Coffee

Related Projects

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

netbox_cisco_ise-0.1.8.tar.gz (26.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

netbox_cisco_ise-0.1.8-py3-none-any.whl (31.8 kB view details)

Uploaded Python 3

File details

Details for the file netbox_cisco_ise-0.1.8.tar.gz.

File metadata

  • Download URL: netbox_cisco_ise-0.1.8.tar.gz
  • Upload date:
  • Size: 26.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for netbox_cisco_ise-0.1.8.tar.gz
Algorithm Hash digest
SHA256 eb8428136f7768b317dd029e3b819890fc6d2e20c77d8277c6a5c1d245db73b7
MD5 2d0e4d1ccf59c9c41b7ebc778a9f4af9
BLAKE2b-256 51116b3b68a060ada964c993e58377bf2eadb399611aef3267f6c1afe76cc5ae

See more details on using hashes here.

Provenance

The following attestation bundles were made for netbox_cisco_ise-0.1.8.tar.gz:

Publisher: release.yml on sieteunoseis/netbox-cisco-ise

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file netbox_cisco_ise-0.1.8-py3-none-any.whl.

File metadata

File hashes

Hashes for netbox_cisco_ise-0.1.8-py3-none-any.whl
Algorithm Hash digest
SHA256 b27ea2e22f471084ca9af28d9402520aa66c749ec3edee6862a91a836bfbb256
MD5 f870cb1aa6dadff11aefc7bd53e0b4b4
BLAKE2b-256 4ad11ccc80128d0280f2ee93fb39af18f3bc26aee1f2f60191e05a4e7a955d8b

See more details on using hashes here.

Provenance

The following attestation bundles were made for netbox_cisco_ise-0.1.8-py3-none-any.whl:

Publisher: release.yml on sieteunoseis/netbox-cisco-ise

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page