cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3436
Views
1
Helpful
0
Comments
thomas
Cisco Employee
Cisco Employee

November 2014

 

This document is old and designed for pxGrid 1.0. It will not be updated. The content can be modified to host and setup a virtual environment for the latest version of ISE running at minimum ISE 2.4+ and using the documentation and environment for pxGrid 2.0 content in devnet.

 

 

This document provides partners, Cisco field engineers and TME’s with a procedural document and test guide for accessing and testing pxGrid sample scripts within the pxGrid virtual environment. A Linux host and Cisco Office Extended Access Point (OEAP) are required on-premises. The Linux host will serve as the pxGrid client and connect the virtual ISE pxGrid server through a remote LAN port on the Cisco OEAP AP. Users can use this document to run the pxGrid sample scripts directly on their Linux host. Users can view the script results locally including user authentications, pxGrid operations, such as client registrations and session subscription to topics of information on ISE.

The pxGrid sample scripts and examples enable partners to become familiar with pxGrid operation. Java scripts expose the pxGrid APIs where developers can build on these scripts and create customized scripts for their environment.

 

Basic pxGrid operations include:

  • pxGrid client registration
  • Retrieval of all active sessions based on IP address or all active sessions from ISE published session directory
  • Downloadable user and identity groups
  • Retrieval of all endpoint profiles
  • Retrieval of all Trustsec Security Groups
  • Using Endpoint Protection Service (EPS) pxGrid API for quarantining actions for a given IP address
  • Using Endpoint Protection Service (EPS) pxGrid API for unquaranting actions for a given MAC address
  • Subscription to ISE session directory and changes in Trustsec Security Groups

    In addition posture, compliance and endpoint profile session attributes will be obtained by running 802.1X user authentications from a Window 7 VMware POD.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: