Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Cisco ISE APIs and Programmability

Researcher by Researcher
August 3, 2022
in Networking
0
Cisco ISE APIs and Programmability
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


I spent the first few years of my networking career avoiding scripting.  Even though I had studied programming in college, I liked getting my hands dirty with CLI and didn’t see the need to make life complicated by messing with code.  Then, when I came back to Cisco in 2015, I was assigned to work on programmability and I was forced to learn about APIs, Python, Ansible, and a host of other tools that network engineers often avoid.  I discovered that while network and security engineers don’t need to be coders, a solid understanding of scripting and automation is a necessity for us in this day and age.

Cisco Identity Services Engine has supported APIs since the 1.x days.  I recently sat down with Thomas Howard, a technical marketing engineer focused on ISE, to discuss the capabilities of ISE APIs, and how he uses them in today’s cloud-centric world.  Our conversation is a part of my Coffee with TMEs YouTube series.

Related articles

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
MX Linux makes sharing folders with Samba as simple as it gets

MX Linux makes sharing folders with Samba as simple as it gets

August 10, 2022
Cisco engineers Jeff McLaughlin and Thomas Howard discuss Identity Services Engine (ISE) in the cloud and APIs.
Figure 1. Cisco engineers Jeff McLaughlin and Thomas Howard discuss Identity Services Engine (ISE) in the cloud and APIs.

ISE has an API set called ERS, which stands for “Extensible RESTful Services”.  ERS APIs allow you to script some of the common functions of the ISE GUI;  for example, configuring network devices, users, and device groups.  I myself once used the ERS APIs in a Python script to read all of the configured SGTs (scalable group tags) from ISE.  ERS APIs have been with ISE for years, and are well known and well documented.

Modern ISE deployments pose new challenges that require additional automation.  For example, ISE can currently be deployed in AWS.  With ISE 3.2 (due for release soon), ISE can be deployed in Azure, GCP, and Oracle clouds as well.  Bringing up an ISE deployment in the cloud requires provisioning the VM, doing the initial setup of ISE, and connecting back to the on-prem environment.  In some cases, this might require interacting with multiple platforms and API systems!  In Thomas’ example, he needed to provision his AWS VPC, bring up a virtual Meraki MX for VPN connectivity, provision the VPN, communicate with the Meraki dashboard, and deploy his ISE instance.

If you’re afraid of learning Python, making direct REST API calls to multiple systems, and dealing with different API formats, Thomas says you can relax.  Ansible is a great provisioning solution that allows you to define all of the parameters for the different systems in an easy-to-read YAML format.  The Ansible modules will do the heavy lifting of calling the APIs appropriately.  You can still learn Python if you need to improve performance or parse operational data received from APIs, but for many, a tool like Ansible will be enough.

If you want to take the plunge into programmability and APIs, Cisco has many tools to offer.  For ISE, I recommend keeping tabs on our YouTube channel, which has tons of content on this and other ISE-related subjects.  For general programmability, Cisco DevNet has resources from examples and sample code to Learning Labs with sandboxes where you can experiment.  As always, the Cisco Live library has a number of great presentations.

Happy scripting!

Share:



Source link

Tags: APIsCiscoISEProgrammability
Share76Tweet47

Related Posts

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
0

Today’s hybrid work environments make it increasingly difficult to monitor, secure and optimize network connectivity and application performance. 40% of...

MX Linux makes sharing folders with Samba as simple as it gets

MX Linux makes sharing folders with Samba as simple as it gets

August 10, 2022
0

Jack Wallen shows you how easy it is to share directories to your local network through Samba with MX Linux....

To Upgrade, or Simply Renew? That is the Question.

To Upgrade, or Simply Renew? That is the Question.

August 9, 2022
0

Cisco DNA for SD-WAN and Routing subscription software has been around for the better part of three years now. If...

Cisco Wireless 3D Analyzer: High Level View on Latest Innovations

Cisco Wireless 3D Analyzer: High Level View on Latest Innovations

August 8, 2022
0

Wireless connections are ubiquitous and have become a part of our daily lives no differently than electricity. Planning, maintaining, and...

Cisco DNA Center Release 2.3.3 – What’s New?

Cisco DNA Center Release 2.3.3 – What’s New?

August 5, 2022
0

Ever have one of those days where you’ve almost reached the office and you realize you left your laptop at...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved