Cisco ISE network devices, add switches to ISE, add WLC to ISE, ISE network devices tutorial, ISE RADIUS clients, Cisco ISE Live Logs, ISE network device groups, ISE shared secret best practices, switch RADIUS config, WLC RADIUS configuration, ISE validation commands, EVE-NG ISE lab, VMware ESXi ISE lab, ISE device import, ISE SNMP config, ISE troubleshooting RADIUS, CCIE Security training, Sagar Dhawan Network Journey, ISE automation APIs, ISE policy enforcement

[Day 10] Cisco ISE Mastery Training: Adding Network Devices (Switches, WLCs) to ISE


Introduction

Network devices (switches, wireless controllers, routers, firewalls) are the RADIUS clients that ask Cisco ISE who can access the network. Adding them to ISE properly — with the right IPs, shared secrets, device groups and attributes — is essential for accurate policy enforcement, logging, and troubleshooting.

This lesson shows you the practical lab steps to register NADs in ISE, configure those devices to point at ISE, and validate authentication and accounting traffic so students and engineers can move from “device added” to “policies enforced” with confidence.


Problem Statement

Typical failures when integrating NADs with ISE:

  • RADIUS requests rejected because the NAD IP or shared secret doesn’t match ISE entry.
  • Device appears in ISE but no accounting / no Live Logs (ports/ACLs/firewall issues).
  • Multiple devices with inconsistent naming and secrets — hard to manage at scale.
  • WLCs misconfigured for WebAuth/EAP resulting in guest or 802.1X failures.

You’ll learn how to avoid those mistakes with a reproducible lab workflow and validation checklist.


Solution Overview

Step-by-step process covered here:

  1. Design naming & grouping convention for NADs.
  2. Add NADs in ISE (Administration → Network Resources → Network Devices).
  3. Configure shared secrets, RADIUS ports and device profiles.
  4. Configure switches/WLCs to use ISE for authentication/accounting.
  5. Validate using ISE Live Logs, device CLI (show authentication sessions, test aaa), and simple packet/trace techniques.

We’ll provide exact GUI paths, CLI examples for Cisco IOS switches and common WLCs, and the validation commands you must run.


Sample Lab Topology

Lab platform: VMware ESXi or EVE-NG

Components & example IPs

  • ISE (PAN+PSN): 10.10.10.5
  • Windows AD (optional): 10.10.10.10
  • Catalyst switch (IOSv-L2): 10.10.10.2
  • WLC (9800 or AireOS/virtual): 10.10.10.20
  • Windows 10 client (wired) & Wi-Fi laptop

Topology Layout:

Notes: Put ISE and NADs on a management network or ensure routing/DNS/NTP is in place prior to testing.


Step-by-Step GUI Configuration Guide (with CLI snippets & validation)

Pre-checks (do these on ISE console first)

ise/admin# ping 10.10.10.2          # ping the switch
ise/admin# ping 10.10.10.20         # ping the WLC
ise/admin# nslookup switch.lab 10.10.10.10   # verify DNS if used
ise/admin# show application status ise

All pings should succeed and ISE services should be Running.


A — Best practices before adding devices

  1. Naming convention (example): NAD-SW-<site>-<id> and NAD-WLC-<site>-<id>.
  2. Shared secret policy: 20+ characters, mixed chars; record secrets in a vault.
  3. Device groups: Create groups in ISE for easier policy targeting (e.g., Switches-Edge, WLC-Core).
  4. Ports: RADIUS auth = UDP 1812 (or 1645), accounting = UDP 1813 (or 1646). Use standard 1812/1813 unless legacy NAD requires otherwise.

B — Add a Catalyst Switch to ISE (GUI steps)

  1. Navigate: Administration → Network Resources → Network DevicesAdd.
    [Screenshot: ISE Add Network Device Screen]
  1. Fill the form (example values):
    • Name: NAD-SW-Lab-01
    • IP Address / Range: 10.10.10.2 (or prefix/mask)
    • Device Type: Switch (select vendor if available)
    • Location / Description: Lab core switch
    • Shared Secret: !My$ecureSecret2025! (enter & note)
    • Enabled Authentication Protocols: RADIUS (check)
    • Radius Port: 1812 (default)
    • Save.
      [Screenshot: Fill Network Device Form — Shared Secret Field]
  2. (Optional) Add SNMP credentials: SNMPv2/v3 under the device entry for profiling/monitoring.

ISE: Device Groups

  • On the same page, add the device to a Device Group (Switches-Lab) for policy scoping.

Validation in ISE (GUI)

  • After Save, the device should appear in the list.
  • Click the device to view details and confirm the shared secret is stored (ISE will not display the secret in cleartext after save — ensure you recorded it).

C — Configure the Switch (IOS) to use ISE (CLI)

Sample IOS configuration

conf t
! Define RADIUS server (IOSv / Catalyst)
radius server ISE
 address ipv4 10.10.10.5 auth-port 1812 acct-port 1813
 key !My$ecureSecret2025!

aaa new-model
aaa group server radius ISE-GROUP
 server name ISE
aaa authentication dot1x default group ISE-GROUP
aaa authorization network default group ISE-GROUP

dot1x system-auth-control

interface GigabitEthernet1/0/10
 switchport mode access
 switchport access vlan 10
 authentication port-control auto
 dot1x pae authenticator
 mab
 spanning-tree portfast
exit

Validation on switch (CLI):

show running-config | section radius
show aaa servers
show authentication sessions interface Gi1/0/10
  • show running-config | section radius should show the radius server ISE stanza.
  • show authentication sessions ... should reflect session state after client connection (Auth/Unauth).

Trigger a test RADIUS request (if supported):

test aaa group radius ISE-GROUP username student01 password Cisc0@123 new-code
  • Watch ISE Live Logs to confirm Access-Request / Access-Accept.

D — Add a WLC to ISE (GUI steps)

On ISE:

  1. Administration → Network Resources → Network Devices → Add.
    • Name: NAD-WLC-Lab-01
    • IP: 10.10.10.20
    • Device Type: Wireless-LAN-Controller or vendor Cisco WLC
    • Shared Secret: same pattern as switches.
    • Save.
      [Screenshot: Add WLC in ISE]
  1. Place WLC in device group WLC-Lab.

Validation in ISE (GUI): device appears under Network Devices list.


E — Configure WLC (GUI and CLI examples)

AireOS (5508 / 8.x) — GUI steps (recommended):

  • WLC GUI → Security → AAA → RADIUS → Authentication → Add new server:
    • IP: 10.10.10.5
    • Key: !My$ecureSecret2025!
    • Port: 1812
  • Also add Accounting same IP/secret under Accounting.
  • On the WLAN profile, under Security > Layer 2, select WPA2/Enterprise, and set the Authentication Server to the RADIUS you added.
    [Screenshot: WLC GUI RADIUS Add]

AireOS CLI example (sample)

config radius auth add 10.10.10.5 1812 !My$ecureSecret2025!
config radius acct add 10.10.10.5 1813 !My$ecureSecret2025!
config wlan security wpa akm 1 0 0  # example – set to 802.1X on GUI normally

(AireOS CLI syntax varies by code; prefer GUI for WLCs unless comfortable.)

Cisco 9800 (IOS-XE) sample CLI

config t
radius server ISE
 address ipv4 10.10.10.5 auth-port 1812 acct-port 1813
 key !My$ecureSecret2025!
aaa group server radius ISE-GROUP
 server name ISE
!
wlan lab-wlan
  auth open
  authentication server-group ISE-GROUP
  encryption gce aes

Validation on WLC:

  • For AireOS: show radius summary / show radius stats will show reachability.
  • For 9800: show radius servers / show wlan summary etc.

Trigger test: Connect a wireless client to the SSID and watch ISE Live Logs for authentication attempts.


F — Validation Steps (ISE GUI + CLI + device)

  1. Immediate ISE GUI check:
    • Administration → Network Resources → Network Devices → Ensure NAD is listed with correct IP and device group.
    • [Screenshot: Network Devices List with newly added NAD]
  1. Test basic connectivity: from ISE console:
ise/admin# ping 10.10.10.2    # switch
ise/admin# ping 10.10.10.20   # WLC
  1. Trigger an authentication on the NAD (connect a client or run test aaa on switch). Then on ISE GUI:
    • Operations → RADIUS → Live Logs — filter by NAD IP or username. You should see Access-RequestAccess-Accept/Reject.
  1. [Screenshot: ISE Live Logs showing an Access-Request from NAD-SW-Lab-01]
  2. Check switch session:
show authentication sessions interface Gi1/0/10

Expect AUTHZ/AUTHORIZED and assigned VLAN or dACL.

  1. If Accounting enabled, verify in ISE: Operations → RADIUS → Live Logs – accounting records should appear.
  2. If issues, capture a packet trace on NAD management interface or use tcpdump on ISE (lab only):
# On ISE (if allowed in your lab)
ise/admin# tcpdump -i eth0 port 1812 or port 1813 -w /tmp/radius.pcap

Open pcap in Wireshark, filter udp.port==1812.

Important: avoid tcpdump in production unless authorized.


FAQs

Q1: What is the minimum information required to add a network device in Cisco ISE?
A: At a minimum, you need:

  • Name (descriptive label for the device)
  • IP Address (or subnet range for multiple devices)
  • Device Type (optional but useful for categorization)
  • RADIUS Shared Secret (must match on the network device)
  • SNMP settings (optional, for profiling and CoA)
    Validation: After adding, use CLI on the device to test RADIUS connectivity with test aaa group radius.

Q2: What happens if the shared secret between ISE and the switch/WLC does not match?
A: Authentication will fail, and logs in Operations > RADIUS Live Logs will show Invalid shared secret.
CLI validation: On the network device, run debug radius authentication to confirm mismatches.


Q3: How do I handle a network with multiple IP addresses for a device?
A: You can add multiple IP addresses by:

  • Using a subnet definition in ISE (e.g., 192.168.10.0/24)
  • Or creating separate device entries for each IP if different secrets are used.
    Tip: Keep shared secrets consistent for ease of management.

Q4: Can I bulk-import network devices into Cisco ISE?
A: Yes.

  • Navigate to Administration > Network Resources > Network Devices
  • Use Export, fill in the CSV with required columns, then Import.
    Validation: After import, pick a random device and run a RADIUS test.

Q5: What device types should I define for better policy control?
A: Common types include:

  • Switch (Access Switch, Distribution Switch)
  • WLC (Wireless LAN Controller)
  • VPN Gateway (ASA, Firepower)
    These allow you to create condition-based policy rules targeting specific device types.

Q6: How do I verify that a newly added network device is communicating with ISE?
A:

  1. Attempt an 802.1X or MAB authentication from a client connected to the device.
  2. Check Operations > RADIUS Live Logs for authentication entries from the device’s IP.
    CLI validation: On the device, use show radius or show authentication sessions.

Q7: Is SNMP mandatory when adding a network device to ISE?
A: No, SNMP is optional, but it’s highly recommended for profiling and device discovery. Without SNMP, profiling will rely on other methods like DHCP or HTTP probes.


Q8: How should I set up network device groups (NDGs)?
A: Organize NDGs based on:

  • Location (e.g., HQ, Branch1, Branch2)
  • Device Type (Switch, WLC, VPN)
  • Function (Access, Core, Edge)
    Validation: When creating policies, use NDGs as conditions to avoid manual device selection.

Q9: What is the recommended RADIUS timeout for network devices connecting to ISE?
A: Typically 5 seconds with 3 retries.
For wireless deployments, a lower timeout (e.g., 2 seconds) can help speed up reauthentication, but avoid too low to prevent false failures.


Q10: How can I troubleshoot if a device fails to authenticate with ISE after being added?
A:

  • Confirm IP and shared secret match
  • Check the device’s RADIUS configuration (show run | i radius)
  • Ensure the device’s IP is not behind NAT
  • Review ISE Live Logs for error messages
    CLI check on switch/WLC:
test aaa group radius <username> <password> new-code
debug radius authentication

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes (Key takeaways)

  • Add NADs in ISE using the NAD’s RADIUS source IP and a strong shared secret.
  • Keep a consistent naming and grouping scheme to simplify policy targeting.
  • Validate immediately with Switch/WLC CLI tests and ISE Live Logs — the GUI Live Logs are the fastest indicator that RADIUS traffic arrived and how ISE evaluated it.
  • For scale, automate NAD provisioning via ISE APIs — manual entry does not scale.
  • Always record secrets and plan for rotation; never embed secrets in public training material.

Fast-Track to Cisco ISE Mastery Pro

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes.

Want to go from lab practice to CCIE-level mastery? I run a focused 4-month instructor-led CCIE Security & ISE Mastery program: live weekly labs in VMware ESXi / EVE-NG, graded homework, 1:1 doubt sessions, and a full CCIE Security syllabus (ISE deep dives, Firepower, VPN, advanced troubleshooting). Seats are limited to keep batches hands-on.

Join the training here and take your first step towards becoming a CCIE Security expert.
https://course.networkjourney.com/ccie-security/

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088