Day 9 – Cisco ISE Mastery Training: Creating Internal Users & Groups

[Day 9] Cisco ISE Mastery Training: Creating Internal Users & Groups

Introduction

Internal users and groups in Cisco ISE let you authenticate accounts that are maintained inside ISE itself rather than in Active Directory. This is vital for:

  • Quick lab testing where AD isn’t available.
  • Temporary accounts for contractors or lab students.
  • Emergency break-glass accounts if external identity stores are unreachable.
  • Guest onboarding workflows (short-lived accounts or sponsor-created accounts).

Today you’ll learn how to create internal users and groups, import users in bulk, add them to Identity Source Sequences and Authorization rules, and validate end-to-end authentication — all using GUI actions you can teach to students and CLI checks engineers use to confirm behavior.


Problem Statement

Real networks often need identity that’s fast to create, isolated from AD, and easy to manage for temporary users:

  • Relying 100% on AD creates dependency and slows onboarding for contractors or test accounts.
  • Guest or lab accounts shouldn’t clutter the enterprise directory.
  • During outages, having internal local fallback users can keep critical admin access alive.

We solve this by teaching how to properly configure Internal Users & Groups in ISE and how to use them safely and auditable in policies.


Solution Overview

This lesson covers:

  • Creating Internal Identity Groups (logical containers).
  • Creating Internal Users and assigning them to internal groups.
  • Bulk importing users (CSV) for classes/labs.
  • Using Identity Source Sequence to combine AD + Internal fallback.
  • Creating Authorization Profiles that reference internal groups.
  • Testing via 802.1X / RADIUS and validating in Live Logs and network device CLIs.

You’ll get a reproducible flow for labs and a safe pattern for production fallback accounts.


Sample Lab Topology

Platform: VMware ESXi or EVE-NG.

Components:

  • ISE VM (PAN+PSN)10.10.10.5
  • Optional Windows AD10.10.10.10 (used if you want hybrid AD+Internal tests)
  • Catalyst switch (IOSv-L2) — RADIUS client
  • WLC (optional) — for WebAuth/802.1X wireless tests
  • Windows 10 client (wired) — DHCP in test VLAN

IP plan (example): management 10.10.10.0/24 — ISE 10.10.10.5, AD 10.10.10.10, switch mgmt 10.10.10.2.

Topology Layout:

  [Win10 Client] -- [Switch / IOSv-L2] --+-- [ISE (10.10.10.5)]
                                        |
                                     [Windows AD/Optional]

Notes: Keep ISE and Switch on the same routable network; ensure DNS/NTP configured.


Step-by-Step GUI Configuration Guide (with validation steps)

Pre-checks (console / CLI on ISE)

Run these before you begin:

ise/admin# show application status ise
ise/admin# ping 10.10.10.1            # default gateway or switch mgmt
ise/admin# nslookup ise.lab.local 10.10.10.10   # verify DNS (if using AD DNS)

Expected: services Running, network reachable, DNS resolves.


Step 1 — Create Internal Identity Group (GUI)

  1. Login to ISE Admin UI: https://<ISE-IP>/admin.
    [Screenshot: ISE Admin Login Page]
  2. Go to: Administration → Identity Management → Groups (or Identities → Groups depending on version).
    [Screenshot: Administration → Identity Management → Groups]
  3. Click Add → Choose Internal Identity Group (or Internal tab) → Enter:
    • Group Name: Lab_Students
    • Description: Temporary lab student accounts
    • Save.
      [Screenshot: New Internal Identity Group Dialog]

Validation (GUI):

  • Search group: Administration → Identity Management → Groups → SearchLab_Students should appear.

Notes: Internal groups are static containers; you can use them for Authorization rules and to assign attributes.


Step 2 — Create a Single Internal User (GUI)

  1. Navigate: Administration → Identity Management → Identities → Users → Internal Users.
    [Screenshot: Administration → Identity Management → Identities → Internal Users]
  2. Click Add. Fill fields:
    • Username: student01
    • Password: StrongP@ss! (choose policy-compliant password)
    • Email (optional)
    • Status: Enabled
    • Assign to Group: add Lab_Students in the Groups field.
    • Set Change Password on Next Login if desired.
    • Save.
      [Screenshot: Add Internal User Form]

Validation (GUI):

  • After save, click Search and open the user record. Confirm Groups includes Lab_Students.

CLI validation (safe general checks):

ise/admin# show application status ise

(Internal user list is GUI-centric; use Operations → Identities → Search for user in GUI to confirm details.)


Step 3 — Bulk Import Internal Users (CSV) — useful for classroom

  1. Prepare CSV (example users.csv):
username,password,email,firstName,lastName,groups
student02,Stud!234,student02@lab.local,Student,Two,Lab_Students
student03,Stud!234,student03@lab.local,Student,Three,Lab_Students
  1. GUI: Administration → Identity Management → Identities → Users → Internal Users → Click Import (CSV).
    • Upload users.csv. Map CSV columns if prompted.
      [Screenshot: Internal Users → Import CSV]
  2. Confirm import summary and finish.

Validation (GUI):

  • Use Operations → Identities → Search and filter Type = Internal to verify imported accounts exist.

Tip: For large classrooms, import sets and schedule password resets on first login.


Step 4 — Create Authorization Profile (map group to result)

We’ll create a profile that grants VLAN 100 (lab VLAN) to users in Lab_Students.

  1. GUI: Policy → Policy Elements → Results → Authorization → Authorization ProfilesAdd.
    [Screenshot: Policy Elements → Authorization Profiles → Add]
  2. Name: Permit-Lab-Access-VLAN100
    • Access Type: Access-Accept
    • Common attributes: set VLAN ID = 100 or set downloadable ACL if preferred.
    • Save.

Validation: Profile appears in list. Note the exact profile name — you’ll reference it in the policy.


Step 5 — Create Identity Source Sequence (ensure internal lookup order)

  1. GUI: Administration → Identity Management → Identity Source SequencesAdd.
    • Name: LocalFirst
    • Order: Internal Users → Active Directory (if AD exists)
    • Save.
      [Screenshot: Identity Source Sequences]

Why: This makes ISE check internal users first, then AD — useful for lab fallback.

Validation (GUI): The sequence is selectable in Policy Sets authentication rules.


Step 6 — Update Policy Set to Use Internal Users (Authentication & Authorization)

  1. GUI: Policy → Policy Sets → open your Policy Set (e.g., Default or Lab_Policy).
    [Screenshot: Policy → Policy Sets]
  2. Authentication Policy:
    • Add rule: If Network Access Condition (e.g., Called-Station-Id or Wired) → Then use Identity Source Sequence = LocalFirst.
    • Ensure EAP/PEAP settings are correct if testing 802.1X.
  3. Authorization Policy:
    • Add rule: Condition: Identity GroupInternal:Lab_Students (or Authenticated Identity: Member Of → select Lab_Students)
    • Result: Permit-Lab-Access-VLAN100
    • Save policy.

Validation (GUI): Policy shows no syntax errors; you can click Test or run an authentication attempt.


Step 7 — Configure Switch (IOS) to use ISE & Enable 802.1X / MAB

On your Catalyst/IOSv-L2 switch, configure RADIUS and a test port:

conf t
radius server ISE
 address ipv4 10.10.10.5 auth-port 1812 acct-port 1813
 key cisco123
!
aaa new-model
aaa group server radius ISE-GROUP
 server name ISE
aaa authentication dot1x default group ISE-GROUP
aaa authorization network default group ISE-GROUP
!
interface GigabitEthernet1/0/5
 switchport mode access
 switchport access vlan 1
 authentication port-control auto
 dot1x pae authenticator
 mab
 spanning-tree portfast

Validation (Switch CLI):

  • show running-config | section radius — check server config.
  • show authentication sessions interface Gi1/0/5 — after client connects, should show auth status.
  • test aaa group radius ISE-GROUP username student01 password StrongP@ss new-code — (if IOS supports) to simulate auth.

Step 8 — Test End-to-End & Validate

1) Trigger authentication: Connect the Windows client (or have a test user connect) to port Gi1/0/5.

2) ISE Live Logs (GUI):

  • Go to Operations → RADIUS → Live Logs. Filter by username student01 or by Client IP/interface. You should see an Access-RequestAccess-Accept and authorization profile Permit-Lab-Access-VLAN100 applied.
    [Screenshot: Operations → RADIUS → Live Logs showing student01 Accept]

3) Switch CLI:

show authentication sessions interface Gi1/0/5

Expected: session shows AUTHZ and assigned VLAN or downloadable ACL applied.

4) Additional ISE checks (CLI):

ise/admin# show application status ise
ise/admin# show version

If auth fails: check Live Logs reason, confirm user password, confirm identity source sequence picks Internal, and re-run switch test.


Step 9 — Password Reset & Account Management (GUI)

  1. Reset password: Administration → Identity Management → Identities → Users → Internal Users → Search student01 → Edit → New Password → Save.
  2. Lock/Unlock account: Toggle Enabled/Disabled flag.

Validation: After reset, test login again; Live Logs should show new auth attempt.


Step 10 — Backup & Export Internal Users

ISE stores internal users in its internal DB. Use ISE backup to save configuration and users:

  1. Administration → System → Backup and Restore → Create a backup job (SFTP/FTP target).
  2. Export is the supported backup path; don’t rely on hypervisor snapshots for long term.

Validation: Confirm backup file exists on repository and contains user DB.


FAQs

1. Can I use internal users for both wired and wireless authentication?

Yes. Internal users work with any authentication method supported by ISE (802.1X, MAB, web authentication). As long as your Policy Set is configured to use the Internal Users identity source, both wired and wireless endpoints can authenticate against them.


2. How do I prioritize Internal Users over Active Directory accounts?

In the Identity Source Sequence, place Internal Users above AD.

  • Go to: Administration → Identity Management → Identity Source Sequences
  • Move Internal Users to the top.

3. Can I bulk-create Internal Users instead of adding them one by one?

Yes. ISE supports CSV import for mass user creation:

  • Menu: Users → Import
  • Prepare a CSV with username,password,description,group fields.
    This is useful in lab testing where you may need 20–50 accounts quickly.

4. How do I assign multiple groups to a single internal user?

In User Edit, you can select more than one User Identity Group.
ISE will match any of those groups when evaluating authorization rules.


5. Can Internal User Groups be used in Authorization Policies?

Absolutely. For example, your policy can say:

If User Identity Group = Lab-IT-Users → Assign VLAN 20.


6. How do I validate internal user authentication in ISE?

Use Operations → RADIUS → Live Logs to see successful or failed authentications. Look for:

  • User Name matches your test account
  • Identity Source = Internal Users
  • Authorization Result is as expected

7. Are internal user accounts replicated across ISE nodes?

Yes. In a multi-node deployment, the internal database replicates to all policy service nodes (PSNs), ensuring consistent authentication even if one node fails.


8. Can I set password expiry for internal accounts?

Yes. While creating/editing a user, set a password expiration date. This is helpful if you’re simulating real security policy requirements in your lab.


9. What’s the CLI method to test internal user authentication?

From a switch:

Switch# test aaa group radius <username> <password> legacy

From ISE CLI, you can’t directly authenticate a user, but you can check logs with:

ise/admin# show logging application ise-psc.log tail

10. Are internal users recommended in production?

They are not recommended for large-scale production use except for:

  • Emergency fallback accounts
  • Admin/service accounts for network devices
    Production should rely on AD, LDAP, or external identity stores for scalability.

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes (Key takeaways)

  • Internal users/groups are fast and flexible for labs, guests, and temporary break-glass accounts.
  • Always limit privileges for internal accounts and place them in dedicated groups used by narrow authorization rules.
  • Use Identity Source Sequence to prefer AD but fall back to Internal for emergency access.
  • Validate with Live Logs in the GUI and standard network CLI commands on switches (show authentication sessions ...) — those are your primary troubleshooting tools.
  • Backup ISE configuration regularly; internal users are part of the ISE DB and must be included in backups.

Call-to-Action

You’re building real, deployable NAC skills — but if you want mentored, job-focused training that turns lab practice into certification and career opportunities, join my live program.

I run a 4-month instructor-led CCIE Security & ISE Mastery program with live labs (VMware ESXi & EVE-NG), graded assignments, 1:1 doubt sessions, and exam-style scenarios.

What you get:

  • Weekly live sessions with hands-on lab walkthroughs (including user/group workflows).
  • Personalized lab review — submit your topology; get direct feedback.
  • Real exam prep and job-readiness coaching (interviews, resumes).

Limited seats to maintain high quality. Submit your details for a free eligibility & lab review call and we’ll recommend the best batch for you.

Reserve your free eligibility call & lab review:
https://course.networkjourney.com/ccie-security/

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088


Trainer Sagar Dhawan

Hi all,
Good to see you here.
I'm your Trainer for CCIE, CCNP, CCNA, Firewall batches and many more courses coming up!
Stay tuned for latest updates!
Keep me posted over Whatsapp/Email about your experience learning from us.
Thanks for being part of - "Network Journey - A journey towards packet-life!!!"