Skip to content

Ansible playbook for creating Security Group Tags (SGTs), Security Group Access Control Lists (SGACLs), and TrustSec Egress Policy Matrix Cell configurations

License

Notifications You must be signed in to change notification settings

grg1bbs/Ansible_ISE_TrustSec_Matrix

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ansible_ISE_TrustSec_Matrix

Ansible playbook for creating Security Group Tags (SGTs), Security Group Access Control Lists (SGACLs), and TrustSec Egress Policy Matrix Cell configurations

This playbook was validated using:

  • ISE 3.2 patch 4
  • Ansible 2.15.5
  • CiscoISESDK 2.1.2
  • ISE Ansible collection 2.6.1

ISE Pre-requisites

The following ISE configurations are required prior to running this playbook:

  1. An administrator account with the 'ERS Admin' role

TrustSec Policies and Policy Elements created

The following Policy Elements and Policy Sets are created by this playbook:

Policy Elements

  • New Security Group Tag (SGT) named "Shared_Services"
  • New Security Group ACLs (SGACLs)
    • DENY_IP_ANY (deny ip any any)
    • PERMIT_IP_ANY (permit ip any any)

Egress Policy Cells

Employees to Developers

  • Source SGT 'Employees' (default SGT) & Destination SGT 'Developers (default SGT)
  • SGACL 'DENY_IP_ANY' applied Employees to Shared_Services
  • Source SGT 'Employees' (default SGT) & Destination SGT 'Shared_Services'
  • SGACL 'PERMIT_IP_ANY' applied

Ansible Pre-requisites

Running this playbook requires Python and Ansible software installed. If you have any problems installing Python or Ansible, see Installing Ansible.

Using Ansible to interact with the Cisco ISE API also requires the Cisco ISE SDK and Ansible Collection. See Ansible Modules for Cisco ISE for more information.

Quick Start

  1. Clone this repository:

    git clone https://github.com/grg1bbs/Ansible_ISE_TrustSec_Matrix
  2. Edit the following files to suit your environment:

  • credentials.yaml
  • hosts
  1. Run the Ansible playbook

    ansible-playbook -i hosts cts-matrix.yaml

Notes

At this time, running the playbook subseqent times will result in a 400 error on the plays that create the Egress Policy Cell configurations. Issue #108 has been submitted to request a fix for this error.

Workarounds for this issue include:

  1. Delete the Egress Policy Cell configurations from the ISE GUI prior to running the playbook

  2. Insert the following play above the Egress Policy Cell plays to clear all cells

    #
    # Clear all Egress Matrix Cell Configurations
    #
    
      - name: Clear All Egress Policy Cells
        cisco.ise.egress_matrix_cell_clear_all:
          <<: *ise_login

About

Ansible playbook for creating Security Group Tags (SGTs), Security Group Access Control Lists (SGACLs), and TrustSec Egress Policy Matrix Cell configurations

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published