Day 79 – Cisco ISE Mastery Training: Context Visibility Dashboard

[Day 79] Cisco ISE Mastery Training: Context Visibility Dashboard


Table of Contents

Introduction

In the modern enterprise, visibility is not a “nice-to-have” — it’s the first line of defense. You can’t secure what you don’t know exists.
Cisco ISE’s Context Visibility Dashboard is your single pane of glass that consolidates endpoint identity, posture, profiling, authentication events, user sessions, and device compliance — in real time.

Think of it as the x-ray machine of your network. It not only shows what devices are connected but also who owns them, how they connected, where they connected, and what risk level they bring.

ISE Context Visibility directly impacts:

  • Security Operations (SOC): Instant endpoint discovery & forensics.
  • Network Engineers: Validate profiling & policy enforcement.
  • Compliance Teams: Audit reports & endpoint categorization.
  • TrustSec & pxGrid Integrations: Data feeds into Stealthwatch, Firepower, DNA-C, Splunk, etc.

Problem Statement

Without context visibility:

  • You see only IP addresses in logs, not device types, OS, or ownership.
  • Endpoint classification (printers, IoT, phones, laptops) is a blind spot.
  • Helpdesk cannot troubleshoot who is on which switch port / AP / SSID.
  • Security team cannot correlate NAC events with threat intelligence.
  • Lack of profiling = bad policy enforcement (e.g., IoT device mis-classified as laptop).

Challenge: Networks are dynamic. IoT, BYOD, and mobile endpoints connect constantly. Without visibility, policy enforcement collapses.


Solution Overview

ISE Context Visibility solves this by:

  • Collecting data from RADIUS accounting, DHCP, SNMP, NetFlow, HTTP probes, pxGrid.
  • Categorizing endpoints by device type, OS, vendor, profile, posture, SGT.
  • Allowing real-time filtering, grouping, and export of device data.
  • Giving role-based visibility (helpdesk vs admin).
  • Feeding data into TrustSec, Firepower, Stealthwatch, DNA-C via pxGrid.

It’s not just a dashboard — it’s a security intelligence fabric.


Sample Lab Topology

We’ll use EVE-NG Lab with VMware ISE nodes.

Lab Components:

  • Cisco ISE: 2 nodes (Admin/Policy + PSN).
  • Switch: Catalyst 9300 (TrustSec + 802.1X + SGT capable).
  • WLC: 9800-CL in EVE-NG for wireless endpoints.
  • Access Points: Simulated lightweight APs.
  • Endpoints:
    • Windows 10 laptop (corporate).
    • iPhone (BYOD).
    • HP Printer (IoT).
    • Ubuntu Linux (contractor).

Diagram (textual):


Step-by-Step GUI Configuration Guide

Step 1: Enable Probes

  1. Login to ISE Admin GUI.
  2. Navigate: Administration > System > Settings > Profiler.
  3. Enable required probes:
    • DHCP, RADIUS, HTTP, SNMP, NetFlow, SPAN.
    • [Screenshot: ISE Profiler Probes Settings]

CLI Validation:

ise/admin# show profiler status
ise/admin# show application status ise

Step 2: Access Context Visibility Dashboard

  1. Navigate: Context Visibility > Endpoints.
    • Default view = all active sessions.
    • [Screenshot: ISE Context Visibility Endpoints Dashboard]
  1. Validate endpoints discovered via profiling (Windows, iPhone, Printer).

Step 3: Apply Filters & Grouping

  1. Use Filters: by SSID, IP, MAC, OS, SGT.
    • Example: Filter → Device Type = Printer.
    • [Screenshot: Filter View Applied]
  2. Group by Device Manufacturer.
    • Helps identify IoT fleets.

Step 4: Drill into Endpoint Details

  1. Click on an endpoint → Session Details.
    • Username, IP, MAC, Device Profile, Posture, Switch/Port, Security Group.
    • [Screenshot: Endpoint Session Detail Page]

CLI Validation on switch:

show authentication sessions interface Gi1/0/3 details
show cts role-based sgt-map

Step 5: Use Context Visibility Sub-Tabs

  • Endpoints Tab → All active endpoints.
  • Users Tab → All authenticated users (from AD/LDAP).
  • Applications Tab → Detected application usage (via NetFlow probe).
  • SGT Tab → Mapping of endpoints to Security Groups.
  • Posture Tab → Compliant vs Non-Compliant endpoints.
  • Threat Tab → Events integrated from Firepower/AMP.

Step 6: Export Reports

  1. Click Export → CSV/PDF.
  2. Schedule periodic reports for compliance.

Step 7: Integration with pxGrid

  1. Navigate: Administration > pxGrid Services.
  2. Enable pxGrid for sharing Context Visibility with Firepower, Stealthwatch, DNA-C.

CLI Validation:

ise/admin# show running-config pxgrid

Step 8: Troubleshooting Context Visibility

  • If endpoints missing → check RADIUS accounting on switch:
aaa accounting dot1x default start-stop group radius
  • If DHCP profiling not working → ensure ip helper-address = ISE.
  • If SPAN feed → verify switch monitor session is configured.

CLI Validation Outputs

1. Switch-Side Validation (Catalyst 9300)

a) Check 802.1X Auth Session

Switch# show authentication sessions interface Gi1/0/3 details
            Interface:  GigabitEthernet1/0/3
          MAC Address:  00:1a:2b:3c:4d:5e
         IP Address:   10.10.10.55
          User-Name:   host/Win10-Laptop
          Status:      Authorized
          Domain:      DATA
         Oper host mode:    single-host
         Oper control dir:  both
         Session timeout:   1800s (local), Remaining: 1760s
      VLAN:          20
      ISE Security Group Tag: 10 (Employees)
      Server Policies:
        Vlan Group: VLAN20
        dACL: Permit_Employees
        SGT: Employees (10)

This confirms endpoint authenticated successfully, assigned VLAN, dACL, and SGT.


b) Validate CTS/SGT Mapping

Switch# show cts role-based sgt-map
CTS Security Group Tag Mapping Table
--------------------------------------
SGT   Source   IP
10    ISE      10.10.10.55
20    ISE      10.10.20.60
30    ISE      10.10.30.70

Confirms that ISE pushed SGT values to the switch.


c) Verify AAA Accounting → ISE

Switch# show radius statistics
Auth. Requests        : 110
Auth. Responses       : 110
Acct. Requests        : 105
Acct. Responses       : 105
Pending Transactions  : 0

Ensures RADIUS accounting packets (needed for Context Visibility) are reaching ISE.


2. Cisco ISE CLI Validation

a) Profiler Database Status

ise/admin# show profiler database status
Number of Endpoints in Database: 145
Number of Profiles: 82
Active Profiling Policies: 15
Last Profiler Sync: 0 seconds ago

Confirms profiler is active and endpoints are being categorized.


b) Endpoint Detail Lookup (MAC-based)

ise/admin# show endpoint 00:1a:2b:3c:4d:5e
Endpoint MAC Address: 00:1a:2b:3c:4d:5e
IP Address:           10.10.10.55
User Identity:        host/Win10-Laptop
Device Profile:       Microsoft-Workstation
OS:                   Windows 10
Security Group:       Employees (10)
Posture:              Compliant
Status:               Online

Matches GUI Context Visibility Endpoint Details view.


c) pxGrid Connection Status

ise/admin# show running-config pxgrid
pxGrid Enabled: Yes
pxGrid Clients: 
   Firepower-SMC (Connected)
   Stealthwatch (Connected)
   DNA-C (Connected)

pxGrid is sharing Context Visibility with other platforms.


d) Application Status (Profiler + pxGrid services)

ise/admin# show application status ise

ISE PROCESS NAME                       STATE           PID
----------------------------------------------------------------
Database Listener (oracle)             running         2653
Application Server (jboss)             running         4312
Profiler Database                      running         6221
pxGrid Infrastructure Service          running         7132
pxGrid Connection Manager              running         7244
AD Connector                           running         8122
M&T Session Database                   running         9250

Confirms Profiler & pxGrid are active (critical for Context Visibility).


e) Debugging Live Profiling (if needed)

ise/admin# debug profiler all
Profiler Debugging enabled
ISE-PROFILER: Received DHCP fingerprint from endpoint 00:1a:2b:3c:4d:5e
ISE-PROFILER: Classified as Microsoft-Workstation, Confidence=90%

Useful for troubleshooting why an endpoint is stuck in “Unknown”.


CLI + GUI Correlation Example

  • Switch show authentication sessions → Endpoint authorized.
  • Switch show cts role-based sgt-map → SGT mapping confirmed.
  • ISE show endpoint <MAC> → Same endpoint visible with OS, profile, and posture.
  • ISE Context Visibility GUI → Endpoint appears in Endpoints Tab, with same attributes.

This validates end-to-end data flow: Endpoint → Switch (RADIUS) → ISE (Profiler + DB) → GUI.


Troubleshooting Scenarios

  • Problem (what engineer sees)
  • Investigation (GUI + CLI validation)
  • Fix (step-by-step action)
  • Validation (how to prove it’s fixed)

Scenario 1: Endpoint showing as “Unknown OS”

Problem: ISE shows endpoint but OS field = Unknown.
Investigation:

  • GUI → Context Visibility → Endpoints → Attributes → check missing fields.
  • CLI on ISE → show profiler database status.
  • Switch CLI → confirm ip dhcp snooping + ip device tracking.
    Fix:
  • Enable DHCP probe in ISE (Administration > System > Settings > Profiler).
  • Configure switch:
ip dhcp snooping
ip device tracking
ip device tracking probe use-svi

Validation: Endpoint reauthenticates → OS appears (e.g., “Windows 11”).


Scenario 2: Endpoint not visible in Context Visibility

Problem: Authenticated device not seen in dashboard.
Investigation:

  • GUI → Operations → RADIUS → Live Logs (does auth entry exist?).
  • Switch CLI: show authentication sessions.
  • ISE CLI: show radius statistics.
    Fix:
  • Ensure RADIUS accounting enabled on switch:
aaa accounting dot1x default start-stop group radius

Validation: Device appears in Context Visibility after reauth.


Scenario 3: Endpoint offline in ISE but active on switch

Problem: ISE shows endpoint as offline while switch shows authenticated session.
Investigation:

  • Switch CLI → show authentication sessions interface Gi1/0/3.
  • ISE MnT logs → check if accounting stop sent prematurely.
    Fix:
  • Check switch timers:
dot1x timeout quiet-period 10
authentication timer reauthenticate server
  • Sync timers with ISE session timeout.
    Validation: Context Visibility shows endpoint as “Active”.

Scenario 4: Duplicate endpoint entries

Problem: Same MAC appears twice (wired + wireless).
Investigation:

  • GUI → Context Visibility → Endpoint history tab.
  • ISE CLI: application configure ise → purge policy.
    Fix:
  • Adjust purge policy → keep only latest session.
  • If dual-connect (laptop on wired + Wi-Fi), this is expected.
    Validation: Old/stale entries removed after purge.

Scenario 5: Endpoint profile keeps changing

Problem: ISE classifies endpoint as “Apple Device” then “Generic Smartphone”.
Investigation:

  • GUI → Work Centers > Profiler > Policy hits.
  • ISE CLI: debug profiler all.
    Fix:
  • Reorder profiling policies (put iPhone > Generic Smartphone).
  • Enable additional probes (HTTP, RADIUS).
    Validation: Profile stays consistent after reauth.

FAQs – Cisco ISE Context Visibility Dashboard

1. Q: My endpoint shows up in Context Visibility, but the OS and profile type are “Unknown”. Why?

A: This usually means profiling attributes are not reaching ISE. Common causes:

  • Switch/WLC not configured to forward DHCP/HTTP/NetFlow info to ISE.
  • RADIUS accounting disabled.
  • Profiler service not running (check with show application status ise).
    Validate:
  • CLI: ise/admin# show profiler database status
  • GUI: Go to Operations > RADIUS > Live Logs, ensure endpoint attributes are received.

2. Q: How often does the Context Visibility Dashboard refresh endpoint data?

A: By default, the dashboard reflects real-time RADIUS accounting updates. Device attributes update:

  • On initial authentication.
  • On reauthentication (timers, CoA).
  • When profiling probes send new info.
    CLI Validation: show endpoint <MAC> to see last updated timestamp.

3. Q: Can I customize the Context Visibility dashboard to only show wireless endpoints?

A: Yes.

  • GUI: Use the Filters option (e.g., “Connection Type = Wireless”).
  • You can also build saved filters to quickly pivot between Wired, Wireless, VPN, or device profiles.
    This helps in large networks where thousands of endpoints are connected.

4. Q: ISE is showing multiple profiles for the same endpoint (e.g., iPhone vs Generic Smartphone). Why?

A: Profiling is confidence-based. If attributes are incomplete, ISE may apply a fallback profile.

  • Adjust profiling policy order under Work Centers > Profiler > Profiling Policies.
  • Enable more probes (DHCP, SNMP, HTTP).
    CLI Debug:
ise/admin# debug profiler all

This shows which probe data influenced the classification.


5. Q: What’s the difference between Context Visibility and Live Logs?

A:

  • Live Logs → Shows authentication transactions (real-time AAA events).
  • Context Visibility → Aggregates endpoint identity, posture, device profile, SGT, and connection history.
    Think of Live Logs as “AAA transactions” and Context Visibility as the “endpoint’s passport”.

6. Q: How do I verify if my WLC is forwarding all endpoint info to ISE for visibility?

A:

  • On WLC, check RADIUS config (AAA server, accounting enabled).
  • CLI on WLC: show aaa servers to confirm packets sent.
  • On ISE, run show radius statistics to confirm accounting received.
    If data is missing, endpoints will authenticate but appear with incomplete attributes in Context Visibility.

7. Q: Why is an endpoint shown as “offline” in Context Visibility even though it’s connected?

A: Offline usually means:

  • No recent RADIUS accounting packets received.
  • Endpoint session timed out in ISE but not on switch.
    Troubleshooting:
  • Switch CLI: show authentication sessions interface Gi1/0/3
  • If active on switch, run resync by reauthenticating the endpoint.

8. Q: Can I export Context Visibility data for reporting?

A: Yes. You can:

  • Export endpoint inventory in CSV/Excel format from Context Visibility GUI.
  • Use pxGrid to share data with third-party tools like Cisco Stealthwatch or Splunk.
    CLI Check:
ise/admin# show running-config pxgrid

to confirm pxGrid enabled.


9. Q: How do I correlate SGTs (Security Group Tags) with endpoints in Context Visibility?

A:

  • GUI: In Context Visibility → Endpoint Details → look for Assigned Security Group.
  • CLI: On switch, run show cts role-based sgt-map.
    This correlation validates that ISE classification flows into TrustSec enforcement.

10. Q: Context Visibility shows duplicate entries for the same endpoint. What causes this?

A: Duplicates occur when:

  • Endpoint connects to both wired and wireless simultaneously.
  • IP changes but session MAC remains.
  • Multiple ISE nodes in deployment not fully synchronized.
    Fix:
  • Ensure ISE PAN/MnT synchronization.
  • Adjust session timeout/re-auth timers for consistency.
  • Use endpoint purge policies to clear stale sessions.

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Key Takeaway

Context Visibility is not just a dashboard — it’s the single source of truth for endpoint identity, posture, and SGT enforcement across wired, wireless, and VPN.
Mastering its GUI + CLI validation ensures you can troubleshoot quickly, prove compliance, and integrate ISE with SIEM/Firewalls.


Closing Notes

Cisco ISE Context Visibility is not just a dashboard — it’s your network microscope.
It gives security teams real-time awareness, engineers troubleshooting tools, and auditors compliance evidence.
Combined with TrustSec & pxGrid, it becomes the core intelligence fabric for your zero-trust network.


8. Upgrade Your Skills – Start Today

“For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes.”

Fast-Track to Cisco ISE Mastery Pro:
I run a focused 4-month instructor-led CCIE Security training that blends hands-on labs + enterprise case studies.
Course outline: NetworkJourney CCIE Security

If you want to go from ISE beginner → ISE pro, this is the direct path — secure your seat today.

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088