Hi @AhmedAlRashed ,
That is a great question, and one I did not fully answer. In essence, you are asking about machine groups in AD. If you created one, I fear that the members retrieved would not match the domain/ma-c0-0a-dd-re-ss format that ISE sends, and the user would not match the group. We would need to test. I don't know what changes could be made so that the ISE user and AD group member match.
If you have Panorama, you could use the Plugin for Cisco TrustSec. ISE would have to assign SGTs in the policy set. It would then communicate these SGTs through pxGrid to Panorama. These SGTs could then be used to for Dynamic Address Groups. The theory is fantastic! The NGFW is able to use information from ISE for security policy. I have never used it. I saw a thread on Reddit from someone who has and they said (1) it can sometimes be 5-7 seconds slow, (2) sometimes does not catch every device, and (3) now means Panorama needs to be up during operational hours in order for the mappings to work. That's not my feedback. Again, this would need to be tested.
It would be nice if we could create static User-ID groups. We can create static User-ID mappings through the XML API.
If the devices have static IP addresses or DHCP reservations, you could create static address groups. I know that takes a lot of manual work.
Device-ID is another potential solution. It works best when the NGFW can observe the DHCP traffic. It can classify devices to be used in the security policy.
The last option is to integrate Device-ID with ISE through Cortex XSOAR, but that is expensive.
I would love to hear if anyone has solved this problem, or if they have good success with the TrustSec Plugin, or anything else. That is what this community is all about!
Thanks,
Tom
... View more