[Day 85] Cisco ISE Mastery Training: Threat Response Automation with pxGrid
Table of Contents
Introduction
“Today we wire real-time threat response: when FMC/FTD, Secure Endpoint (AMP), or Stealthwatch flags a compromised host, ISE auto-quarantines it over the network. We’ll use pxGrid for secure event and identity exchange, and ANC for enforcement (dACL / SGT / VLAN). You’ll leave with a repeatable runbook: detect → decide → quarantine → verify → rollback.”
You will implement three automation paths:
- FMC → ISE via pxGrid (RTC): IPS/malware events trigger ANC Quarantine.
- SecureX Orchestration → ISE ERS/ANC: vendor-neutral playbook (REST) using pxGrid context.
- Stealthwatch (SNA) → ISE via pxGrid: high Host Threat Score triggers ANC.
Outcomes we verify (live):
- pxGrid client trust, topic subscriptions (Sessions / TrustSec / ANC)
- Automatic ANC application to the endpoint
- Enforcement on switch/WLC/FTD
- Auditable logs across ISE/FMC/Stealthwatch/SecureX
- One-click rollback (Unquarantine)
Problem Statement (what breaks in real networks)
Manual containment is slow and inconsistent. Firewall teams see an IP, NAC teams see a MAC/user; signals are siloed. Threats move faster than tickets. You need cryptographically trusted, bidirectional, near-real-time automation to quarantine the right device, at the right time, with proof.
Solution Overview (pxGrid + ANC pipeline you’ll deploy)
Event source (FMC / AMP / Stealthwatch) → publishes or signals a compromise
→ pxGrid shares context (user, IP, MAC, SGT)
→ ISE evaluates Automation Rules (or receives ANC request)
→ ISE applies ANC policy (dACL / VLAN / SGT Quarantine)
→ Network (Catalyst/WLC/FTD) enforces
→ Logs confirm detection → action → effect
→ Operator unquarantines after remediation.
Sample Lab Topology (VMware/EVE-NG)
Platform: VMware ESXi/Workstation or EVE-NG
Nodes
- ISE 3.2/3.3 (PAN+MnT+PSN; pxGrid persona on PSN)
- FMC 7.x managing FTD 7.x (intrusion/malware events)
- Secure Endpoint (AMP) Cloud (policy & event source)
- Stealthwatch/Secure Network Analytics (optional)
- Catalyst 9300 (17.x) as access switch (802.1X/MAB/CoA/CTS)
- WLC 9800-CL (wireless validation)
- AD DS
- Endpoints: Win10/11, Linux
Topology Layout:

Pre-req checklist (must be green before automation):
- DNS A/PTR for ISE/FMC/FTD; NTP aligned everywhere
- ISE policy set authc/authz working (wired; wireless optional)
- pxGrid persona enabled + cert with pxGrid usage bound
- TCP 8910 open between FMC/Stealthwatch ↔ ISE
- FTD traffic path for enforcement validated
Step-by-Step GUI Configuration Guide (with CLI + screenshots)
Target versions used in examples: ISE 3.2/3.3, FMC/FTD 7.x
Replace FQDNs/IPs to match your lab.
Phase 0 — Quick health checks
ISE CLI
show ntp show application status ise | include pxGrid tail -n 50 /var/log/ise/pxgrid/pxgrid.log
FMC UI → System > Health > Monitor (FMC, FTD healthy)
Ping/TCP: FMC ↔ ISE: TCP 8910 open
Phase 1 — ISE: pxGrid & ANC foundation
- Enable pxGrid persona
GUI: Administration > System > Deployment > Node > Edit → check pxGrid (and Controller if applicable) → Save

- Bind pxGrid certificate
GUI: Administration > System > Certificates > System Certificates → Import/Bind cert with pxGrid Usage

- Enable pxGrid topics
GUI: Administration > pxGrid Services > Settings → enable Session Directory, TrustSec, ANC - Create ANC policies
GUI: Work Centers > Policy > Policy Elements > Results > ANC Policies- ANC-QUAR-VLAN (moves to VLAN 999)
- ANC-QUAR-dACL (downloadable ACL “deny-all-except-IT”)
- ANC-QUAR-SGT (assign SGT = Quarantine)

- Map ANC to Authorization (for CoA enforcement)
GUI: Policy > Policy Sets > (Your set) > Authorization- Top rule:
UseCase == ANC-Quarantine
→ Result = QUAR-(your method)
- Top rule:
ISE CLI (validate)
tail -f /var/log/ise/pxgrid/pxgrid.log | egrep -i "anc|publish|session"
Phase 2 — FMC: integrate with ISE (pxGrid + RTC)
- Trust ISE CA chain
FMC GUI: Objects > Object Management > PKI > Trusted CAs → Add (paste Base64 ISE CA chain) - Add ISE as Identity Source via pxGrid
FMC GUI: System > Integration > Identity Sources > Identity Services Engine → Add - Enable Rapid Threat Containment workflow (FMC)
FMC GUI: Policies > Correlation > Rule Management → Create- Condition: Intrusion Event High/Critical OR Malware Detected
FMC validation (event-to-action)
- Trigger a test intrusion malware event (EICAR or test IPS rule).
- FMC Analysis > Correlation > Events → action shows Quarantine Host in ISE
- ISE Operations > RADIUS > Live Logs → CoA and AuthZ = QUAR-xxx
Phase 3 — SecureX Orchestration (vendor-neutral playbook using ISE ERS/ANC)
Use this when a 3rd-party SIEM/XDR must trigger ISE. SecureX pulls pxGrid context (or ISE ERS lookup), then calls ISE ERS ANC.
- SecureX Orchestration: build flow
- Trigger: HTTPS webhook or email/SIEM event
- Step 1: Get session (ISE ERS:
/ers/config/endpoint?...
or pxGrid query) - Step 2: Parse MAC/IP, choose ANC policy
- Step 3: POST to ISE ERS:
/ers/config/ancendpoint/apply
with MAC + ANC policy - Step 4: Post back ticket/comment with result
Validation
- ISE Operations > Adaptive Network Control shows new ANC entry
Phase 4 — Stealthwatch (SNA) → ISE Quarantine via pxGrid
- Register Stealthwatch as pxGrid client (similar to FMC)
- Trust ISE CA, client cert on SNA appliance/Flow Collector
- SNA Policy: If Host Threat Score ≥ 90 or C2 communication
Validation:
- SNA event → ISE ANC entry → CoA → switch/WLC/FTD blockade.
Phase 5 — Enforcement & Telemetry Validation (end-to-end)
A) ISE confirms session & ANC
- GUI: Operations > Sessions → find endpoint (User, IP, MAC, SGT)
B) Switch (Catalyst 9300)
show authentication sessions interface Gi1/0/10 details show cts role-based sessions interface Gi1/0/10 show ip access-lists | include QUAR
Expect re-auth/CoA, SGT=Quarantine or dACL applied or VLAN change.
C) WLC 9800 (if wireless)
show wireless client mac <MAC> detail show wireless client summary | i <MAC>
Expect Quarantine policy/VLAN/ACL.
D) FTD (optional enforcement path)
> show users > show access-control-config > show conn address <endpoint_ip>
Expect identity/SGT recognized; connections blocked by Quarantine rule.
E) FMC Analytics
- Analysis > Connections → Rule Hit = Block_Quarantine
- Analysis > Correlation > Events → show Quarantine Host in ISE action
Phase 6 — Rollback & Graceful Unquarantine
ISE GUI: Operations > Adaptive Network Control → select endpoint → Remove ANC
ISE Live Logs: observe CoA → normal AuthZ
Switch/WLC CLI: dACL/SGT/VLAN reverted
FMC/FTD: traffic allowed; rule no longer hits.

Phase 7 — Troubleshooting quick hits (when automation doesn’t fire)
- No pxGrid connection:
- ISE:
show application status ise | include pxGrid
- pxgrid.log:
unknown_ca
,handshake
→ fix CA trust / FQDN SAN
- ISE:
- FMC correlation fired but no ANC:
- ISE pxGrid Clients → FMC must be Approved & Connected; ANC topic enabled
- FMC Action set to Quarantine in ISE (not Notify)
- ANC applied but no enforcement:
- Check ISE AuthZ rule for
UseCase == ANC-Quarantine
at top - Confirm CoA success in Live Logs
- Switch:
show auth sess …
confirms dACL/SGT/VLAN update
- Check ISE AuthZ rule for
- Slow or missed updates: fix NTP, reduce log noise, ensure multiple pxGrid nodes for scale.
Threat Response Automation with pxGrid
Add-On 1: Troubleshooting Workbook Section
1. pxGrid Connection Failure (FMC not registering with ISE)
- Symptom: FMC GUI shows
Connection Failed
, ISE pxGrid logs show:pxGrid: Node <FMC> not authorized, invalid certificate.
- Root Cause: FMC certificate not signed by trusted CA on ISE.
- Fix:
- Export FMC pxGrid certificate.
- Import into ISE (Administration → Certificates → Trusted Certificates → Import).
- Ensure “Trust for pxGrid” is enabled.
2. Threat Context Not Updating in FMC
- Symptom: FMC shows old or no ISE session information.
- Check Logs on ISE:
ise-admin-1/admin# show logging application pxgrid Error: Unable to publish context updates to subscriber
- Fix:
- Verify FMC is subscribed to correct ISE session directory topics.
- On ISE GUI: Administration → pxGrid Services → Client → FMC → Subscribe Topics → ise:session:updates.
3. Automation Playbook Not Triggering
- Symptom: No quarantine action triggered in ISE after FMC detects malware.
- Check in ISE Policy Logs:
Enforcement policy not matched for endpoint <MAC>.
- Fix:
- Verify FMC is sending Adaptive Network Control (ANC) requests to ISE.
- Confirm ISE has ANC policies configured under Policy → Policy Sets → ANC Rules.
4. pxGrid Node Shows “Pending” Forever
- Symptom: On ISE GUI → pxGrid Clients → FMC shows Pending.
- Fix:
- Approve manually: Administration → pxGrid Services → Clients → FMC → Approve.
- Ensure auto-approval is enabled if desired.
5. CLI Verification Checklist
- Check pxGrid services are running:
ise-admin-1/admin# show application status ise | include pxGrid pxGrid Infrastructure Server running pxGrid Publisher Subscriber running
- Check ANC policy hits in ISE:
ise-admin-1/admin# show logging application ise-psc.log | include ANC
- Check FMC API connectivity:
curl -k -u admin:<pwd> https://<FMC-IP>/api/fmc_platform/v1/info/serverversion
Add-On 2: Lab Validation Checklist
Before leaving lab, confirm these 10 validation points:
- pxGrid Services Running on all ISE nodes (
show application status ise
). - FMC Registered as pxGrid Client (ISE GUI → pxGrid Clients shows FMC → Approved).
- ISE Sessions Visible in FMC (Devices → ISE pxGrid tab).
- Malware Event on Endpoint Detected in FMC (Security → Events).
- FMC Sends ANC Quarantine Request (Monitor ISE live logs).
- ISE Enforcement Policy Matches (Policy → Live Logs → ANC applied).
- Endpoint Quarantined VLAN/SGT Applied (check switch CLI:
show authentication sessions interface X
). - Endpoint Connectivity Dropped/Restricted as per policy.
- ISE pxGrid Logs Show Success Publish/Subscribe.
- FMC → ISE Threat Automation Works in Both Directions (test unquarantine flow too).
Add-On 3: Instructor Talking Points
When teaching this Day 85 lecture, here’s how you can present live:
- Kickoff:
- “Team, today we are stepping into the SOC side of ISE — where NAC meets Threat Hunting. Imagine your firewall, AMP, and ISE talking in real-time. That’s what pxGrid gives you.”
- Engagement Question:
- “What happens when AMP detects malware on an endpoint? Without pxGrid, how do you isolate it? … Correct, manual work. With pxGrid, automation kicks in.”
- Demo Narration:
- “Watch this — I’ll simulate a malware detection in FMC. Notice how within seconds, ISE automatically applies ANC quarantine. No human touched the keyboard.”
- Knowledge Drop:
- “Remember: pxGrid is publish/subscribe. FMC subscribes to ISE’s live session data. ISE subscribes to FMC’s threat intel. That’s the beauty — both sides feed each other.”
- Wrap Up Message:
- “In the SOC, speed = security. Threat Response Automation with pxGrid reduces incident response time from hours to seconds. That’s the power of ISE in enterprise security.”
Troubleshooting:
Section 1 – Common Errors & Fixes by Integration
ISE ↔ FMC
- FMC not registering with ISE
- Error: “Invalid certificate” in ISE pxGrid logs.
- Fix: Import FMC cert into ISE (Trusted → tick
pxGrid
).
- ISE context not showing in FMC
- Error: No ISE sessions in FMC GUI.
- Fix: FMC must subscribe to
ise:session:updates
.
- Quarantine request not applied
- Error: ANC rule not triggered.
- Fix: Verify ANC policy in ISE + check FMC automation playbook.
ISE ↔ pxGrid
- pxGrid node stuck in PENDING
- Fix: Approve client manually (Admin → pxGrid Services).
- pxGrid Subscriber fails
- Error:
Error: Unable to publish context updates
- Fix: Verify topic subscription + restart pxGrid service.
- Error:
- pxGrid service down
- CLI:
show application status ise | include pxGrid
- Fix: Restart pxGrid Infrastructure.
- CLI:
ISE ↔ AMP/Threat Response Automation
- Threat not quarantining endpoint
- Fix: Confirm FMC → ISE ANC API call allowed.
- CLI:
show logging application ise-psc.log | include ANC
- Unquarantine not working
- Fix: Ensure “Revert Policy” exists in ISE.
Section 2 – CLI Verification Commands
On ISE
show application status ise | include pxGrid show logging application pxgrid show logging application ise-psc.log show authentication sessions interface Gi1/0/10
On Switch/WLC
show authentication sessions show access-session mac <endpoint-mac>
On FMC
curl -k -u admin:<pwd> https://<FMC-IP>/api/fmc_platform/v1/info/serverversion
Section 3 – Log Sample Library
Include real-world log snippets so students recognize them instantly:
- pxGrid Cert Error (ISE):
pxGrid: Node <FMC> not authorized, invalid certificate.
- ANC Success (ISE):
ANC applied on endpoint 00:11:22:33:44:55 → Policy: Quarantine
- FMC API Error:
401 Unauthorized – Token not valid for ANC requests
Section 4 – Validation Checklist
- ISE pxGrid services are running.
- All integration clients (FMC, AMP, Threat Response) show Approved in ISE GUI.
- ISE sessions appear in FMC dashboard.
- Threat events trigger ANC quarantine in ISE.
- Switch CLI shows endpoint quarantined VLAN/SGT.
- Unquarantine flow restores access.
Section 5 – Instructor Pro Tips
- Always start by checking cert trust → 80% issues come from missing trust.
- Use
show logging application pxgrid
as your first stop when integration fails. - In labs, simulate malware by forcing ANC from FMC to validate automation flow.
- Teach students “ISE ≠ NAC only” → it’s SOC automation engine with pxGrid.
FAQs – Threat Response Automation with pxGrid
1. What exactly is pxGrid Threat Response Automation, and why do we need it in a SOC environment?
- pxGrid allows ISE to share real-time session/context data with security platforms (like FMC, AMP, Threat Response, SIEMs).
- Threat Response Automation goes further — it lets security platforms trigger policy actions (e.g., ANC quarantine) back into ISE.
- Why important? Instead of waiting for a human to manually block/quarantine, pxGrid automation lets SOC tools cut down Mean Time To Respond (MTTR) from hours to seconds.
2. Which ISE licenses are required for Threat Response Automation with pxGrid?
- At minimum:
- Base license → For authentication.
- Plus license → For ANC (Adaptive Network Control).
- Apex license → Required for pxGrid services & integrations.
- Without Apex, pxGrid automation (ANC API calls from FMC/AMP) will not work.
3. How do I validate if pxGrid services are running properly in ISE?
- GUI → Administration → pxGrid Services → Deployment → Ensure node shows Online.
- CLI check:
show application status ise | include pxGrid
Expected output:pxGrid Infrastructure running pxGrid Publisher Subscriber running
4. How do I confirm that FMC or Threat Response is successfully integrated with ISE over pxGrid?
- GUI on ISE:
- Administration → pxGrid Services → Clients.
- Status should show Approved and Online for FMC.
- CLI check on FMC:
tail -f /var/log/messages | grep pxgrid
You should see pxGrid connection established logs.
5. How can I test ANC policy automation (quarantine) end-to-end?
- Ensure ANC policies exist in ISE (Work Centers → Policy → Policy Elements → Results → ANC Policies).
- Trigger test: From FMC, select endpoint → quarantine via ISE ANC API.
- Validate in ISE logs:
ANC applied on endpoint <MAC> → Policy: Quarantine
- Validate on switch CLI:
show authentication sessions interface Gi1/0/10
→ Should display Quarantine VLAN/SGT.
6. What are the most common certificate issues with pxGrid automation?
- FMC/Threat Response does not trust ISE pxGrid cert → must be imported into FMC.
- ISE does not trust FMC cert → must be imported into ISE (
Trusted for pxGrid
). - pxGrid clients stuck in PENDING → approve them manually in ISE GUI.
7. What happens if pxGrid services crash or are down — will automation still work?
- No. If pxGrid is down, FMC/AMP cannot push ANC actions.
- CLI fix:
application stop ise application start ise
- Always check disk/CPU memory, since pxGrid infra can crash on overloaded lab nodes.
8. Can I simulate malware detection to test automation without a real virus sample?
Yes, you don’t need a live virus:
- Use FMC → Create custom correlation policy (trigger when endpoint IP = X).
- Action → Push ANC “Quarantine” to ISE.
- Validate that the endpoint is quarantined.
This is safe and SOC teams often do it for tabletop exercises.
9. How do I troubleshoot if FMC sends the quarantine request but endpoint isn’t blocked?
- Check if ANC API call was successful:
- ISE CLI:
show logging application ise-psc.log | include ANC
→ Look for “ANC Request Received”.
- ISE CLI:
- Verify switch supports CoA (Change of Authorization). Without CoA, quarantine will not apply dynamically.
10. Can pxGrid automation also unquarantine endpoints automatically once threat is cleared?
- Yes.
- FMC/AMP/Threat Response can send an “Unquarantine” ANC request via pxGrid.
- Requirement:
- A Revert Policy must be preconfigured in ISE.
- Validation: Switch CLI should again show Authorized, normal VLAN.
YouTube Link
For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience
Closing Notes
- Automation = trust + telemetry + enforcement. Keep certificates/NTP/DNS immaculate.
- Always prove automation with a quarantine drill and rollback in your change window.
- Standardize your playbooks (FMC correlation, SecureX flow, SNA threshold) and add exclusions to prevent collateral damage.
- Log everything. Your audit trail is your confidence.
Upgrade Your Skills – Start Today
For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes.
Fast-Track to Cisco ISE Mastery Pro — (4-month live cohort).
- Full labs: Threat-Centric NAC, pxGrid 2.0, TrustSec/SGT, Wired/Wireless, Posture, FMC/SIEM/Stealthwatch/SecureX integrations
- Automation playbooks + troubleshooting
Course outline & enrollment: https://course.networkjourney.com/ccie-security/
Enroll Now & Future‑Proof Your Career
Email: info@networkjourney.com
WhatsApp / Call: +91 97395 21088