User Guide For Cisco Secure ACS To Cisco ISE Migration Tool, Release 2.3
User Guide For Cisco Secure ACS To Cisco ISE Migration Tool, Release 2.3
2.3
First Published: 2017-07-28
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2017 Cisco Systems, Inc. All rights reserved.
CONTENTS
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
iii
Contents
CHAPTER 5 Reports 21
Export Report 21
Policy Gap Analysis Report 22
Import Report 23
CHAPTER 6 Migrate from Earlier Releases of Cisco Secure ACS to Cisco ISE 25
Migrate from Earlier Releases of Cisco Secure ACS to Cisco ISE 25
Migrate from Cisco Secure ACS, Release 3.x 25
Migrate from Cisco Secure ACS, Release 4.x 26
Migrate from Cisco Secure ACS, Release 5.x 26
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
iv
Contents
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
v
Contents
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
vi
Preface
This guide describes the process for migrating data from a Cisco Secure Access Control Server (ACS) ,
Release 4.2 and 5.5 or later to Cisco Identity Services Engine (ISE), Release 2.3, using the Cisco Secure
ACS to Cisco ISE Migration Tool.
Note Not all Cisco Secure ACS data can be migrated to Cisco ISE due to the functional gap that is dynamically
changing with each Cisco Secure ACS or Cisco ISE release. The migration tool provides you a complete
list of unsupported objects.
Introduction
This document describes the data migration process from Cisco Secure Access Control System (ACS) Release
4.2 and 5.5 or later to Cisco ISE 2.3. There are several differences between Cisco Secure ACS and Cisco ISE
platforms. You should clearly understand the differences before attempting to migrate to Cisco ISE 2.3. This
document highlights these differences and provides guidance on how to migrate your ACS 4.2 and 5.5 or later
configuration to Cisco ISE 2.3. In addition to understanding the information in this document, Cisco
recommends that you perform a thorough evaluation of the Cisco Secure ACS 4.2 and 5.5 or later and Cisco
ISE platforms.
Audience
This guide is intended for customers who want to migrate from Cisco Secure ACS Platform to Cisco ISE
Platform.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
vii
Preface
Document Conventions
Document Conventions
This document uses the following conventions:
Convention Description
bold font Commands and keywords and user-entered text appear in bold
font.
Italic font Document titles, new or emphasized terms, and arguments for
which you supply values are in italic font.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Related Documentation
The below table lists the set of related technical documentation available on Cisco.com.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
viii
CHAPTER 1
Getting Started
This chapter provides detailed information about the Cisco Secure ACS to Cisco ISE Migration Tool that is
used for data migration from Cisco Secure ACS to Cisco ISE.
The migration tool migrates the configuration data from the following Cisco Secure ACS versions to Cisco
ISE 2.3:
• Cisco Secure ACS 5.5 or later—Select the ACS 5.x Supported Objects option in the migration tool
to migrate all data objects.
The migration tool migrates the data objects to Cisco ISE initially followed by the corresponding policy
configuration when you migrate the data objects from Cisco Secure ACS 5.5 or later.
• Cisco Secure ACS 4.2—Select the ACS 4.x Supported Objects option in the migration tool to migrate
data objects from Cisco Secure ACS 4.2.
The migration tool provides limited support for migration of data objects from Cisco Secure ACS 4.2.
The migration tool supports migration of a subset of data objects such as users and devices from Cisco
Secure ACS 4.2 to Cisco ISE2.3. You must manually create the required configuration objects and
relevant policy configurations after the completion of the migration process.
Migration Overview
The differences in Cisco Secure ACS 5.x and Cisco ISE platforms, operating systems, databases, and
information models, mandate a migration application that reads data from Cisco Secure ACS and creates the
corresponding data in Cisco ISE. The migration application is a utility that Cisco provides to extract the
configuration from Cisco Secure ACS and import it to Cisco ISE. The migration administrator can view the
current progress as well as the detailed logs related to the ACS configuration during the entire migration
process for troubleshooting purposes. Error messages are displayed for objects, attributes, and policies that
are not migrated. After migration, we strongly recommend you to verify the accuracy of the migrated
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
1
Getting Started
Data Migration from Cisco Secure ACS to Cisco ISE
configurations. Please ensure that you understand the semantics and structure of the policy sets in Cisco ISE
and verify them against the access policies in Cisco Secure ACS.
Note It is possible to leverage the migration application to extract data from Cisco Secure ACS even before
installing Cisco ISE. In this manner, the migration application can be leveraged to determine the readiness
for migration from Cisco Secure ACS to Cisco ISE.
Note The examples and screenshots provided in the ISE Community resources might be from earlier
releases of Cisco ISE. Check the GUI for newer or additional features and updates.
Note Due to the differences in the Cisco ISE and Cisco Secure ACS data related to the naming convention,
policy hierarchy, pre-defined objects, and so on, the migration tool may not support all objects. However,
it displays warnings and errors for objects that are not migrated to facilitate corrective measures.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
2
Getting Started
System Requirements
The Cisco Secure ACS, Release 4.2 and 5.5 or later and Cisco ISE, Release 2.3 applications may or may not
run on the same type of physical hardware. The migration tool uses the Cisco Secure ACS Programmatic
Interface (PI) and the Cisco ISE representational state transfer (REST) application programming interfaces
(APIs). The Cisco Secure ACS PI and the Cisco ISE REST APIs allow the Cisco Secure ACS and Cisco ISE
applications to run on supported hardware platforms or VMware servers. You cannot directly run the migration
tool on a Cisco Secure ACS appliance. The Cisco Secure ACS PI reads and returns the configuration data in
a normalized form. The Cisco ISE REST APIs perform validation and normalize the exported Cisco Secure
ACS data to persist it in a form usable by Cisco ISE software.
Note For information about the migration process from earlier releases of Cisco secure ACS to Cisco ISE 2.3,
see Migrate from Earlier Releases of Cisco Secure ACS to Cisco ISE, on page 25.
System Requirements
Table 1: System Requirements for the Migration Tool
Operating System The migration tool runs on Windows and Linux machines. The
machine should have Java version 1.8 or later, installed on it.
Platform Requirements
Cisco Secure ACS, Release 4.2 Ensure that you have configured the Cisco Secure ACS source machine
to have a single IP address.
Cisco Secure ACS, Release 5.5 or Ensure that you have configured the Cisco Secure ACS source machine
later to have a single IP address.
Cisco ISE, Release 2.3 Ensure that the Cisco ISE target machine has at least 2 GB of RAM.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
3
Getting Started
Migration Tool Enhancements
Platform Requirements
64-Bit Windows and Linux Install Java JRE, version 1.8 or higher 64 Bit. The migration tool will
not run if you do not install Java JRE on the migration machines.
32-Bit Windows and Linux Install Java JRE, version 1.8 or higher 32 Bit. The migration tool will
not run if you do not install Java JRE on the migration machines.
Note If you select the migration of ACS 4.x supported objects, consider the following:
• You must run the migration tool only on a ACS 4.x machine.
• You must run the migration tool from a VNC connected ACS 4.x machine.
Note Regardless of the selected TACACS or RADIUS migration option, the migration tool
migrates some TACACS and RADIUS objects to Cisco ISE.
When migration is performed in the existing Cisco ISE installation or from different deployment of
Cisco Secure ACS to the same Cisco ISE server,
◦The object is created if the object with same name does not exist in Cisco ISE.
◦The migration tool displays a warning message "object already exists/resource already exists" with
the details of the object name if the data object with same name exists in Cisco ISE.
◦Protocol settings are updated if the network device with the same name exists in Cisco ISE in case
of TACACS or RADIUS based migration.
• Selective object migration—The migration tool allows you to select the high-level configuration
components such as predefined reference data, global operations, dictionaries, external servers, users
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
4
Getting Started
Migration Tool Enhancements
and identity stores, devices, policy elements, and access policies, to be migrated from Cisco Secure ACS
to Cisco ISE. It is recommended to refer the object level dependency list before performing selective
object migration. Based on your requirement, you can migrate all the supported configuration components
or select some of the high-level configuration components from the list of configuration components.
This selective object migration can be performed based on the export and policy gap analysis reports.
Note You must select all the objects from the migrated objects list for the migration of access
policies to be successful. You can view the migrated policy sets for TACACS by
navigating to Workcenters > Device Administration > Device Admin Policy Sets in
the Cisco ISE GUI. You can view the migrated policy sets for RADIUS by navigating
to Policy > Policy Sets in the Cisco ISE GUI.
• Special characters in object names—If the name of the data objects in Cisco Secure ACS contains any
special characters which are not supported by Cisco ISE, the migration tool converts the unsupported
special characters to underscore (_) and migrates the data objects to Cisco ISE. The auto-converted data
objects are displayed as warnings in the export report. However, if LDAP and AD attributes, RSA, RSA
realm prompts, internal user, and all predefined reference data contain Cisco ISE unsupported special
characters, the export process fails.
• Migration of network devices with IP address ranges in all the octets—The migration tools enables
migration of network devices configured with IP address ranges in all the octets. The migration reports
the overlapping of IP address ranges in all the octets.
• Migration of policy rules with compound condition—The migration tool allows migration of authentication
and authorization (standard and exception) rules with compound conditions having AND and OR
operators.
• Migration of date and time conditions—The migration tool performs the migration of date and time
conditions by dividing the data object into multiple data objects if the days and time grid in ACS is
configured with different days and timings. You can view the migrated date and time policy conditions
by navigating to Policy > Policy Elements > Conditions > Time and Date.
• Enhanced help—In the migration tool UI, you can navigate to Help > Migration Tool Usage to view
the details of the options available in the migration tool.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
5
Getting Started
Migration Tool Enhancements
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
6
CHAPTER 2
Install the Migration Tool
This chapter provides guidelines on how to install the Cisco Secure ACS to Cisco ISE Migration Tool.
• Ensure that you can establish network connections between the source machine and the secure external
system.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
7
Install the Migration Tool
Security Considerations
Security Considerations
The export phase of the migration process creates a data file that is used as the input for the import process.
The content of the data file is encrypted and cannot be read directly.
You need to know the Cisco Secure ACS, Release 5.5 or later and Cisco ISE, Release 2.3 administrator
usernames and passwords to export the Cisco Secure ACS data and import it successfully into the Cisco ISE
appliance. You should use a reserved username so that records created by the import utility can be identified
in an audit log.
You must enter the hostname of the primary Cisco Secure ACS server and the Cisco ISE server, along with
the administrator credentials. After you have been authenticated, the migration tool proceeds to migrate the
full set of configured data items in a form similar to an upgrade. Make sure that you have enabled the PI
interface on the ACS server and the ACS migration interface on the ISE server before running the migration
tool.
Note It is recommended to provide the hostname of the ACS 4.2 machine in the ACS4 Hostname field.
Step 1 Go to the Download Software web page. You may need to provide login credentials.
You can also view the download link for the migration tool in the Prepare section in the Cisco ISE GUI by navigating
to the Work Centers > Device Administration > Overview page.
Step 2 Navigate to Products > Security > Access Control and Policy > Cisco Identity Services Engine > Cisco Identity
Services Engine Software.
Step 3 In the left pane, choose the version.
The Download Software page displays the list of software available for the selected version.
Step 4 Click Download corresponding to the migration tool software package to download the ACS-MigrationApplication-2.3.zip
file.
Step 5 Extract the contents of the .zip file. The extracted contents of the .zip file creates a directory structure that holds the
config.bat and migration.bat files.
Step 6 Edit the config.bat file to set the initial amount of memory allocated for the java Heap Sizes.
Step 7 Click Save.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
8
Install the Migration Tool
Initialize the Migration Tool
Note Migration can be performed on a fresh Cisco ISE setup or an existing Cisco ISE setup. If the object already
exists in Cisco ISE, you will receive a warning message and the objects will be skipped for migration, or
else, the object will be created in Cisco ISE.
Step 3 In the pop-up window, click Yes to display the list of unsupported and partially supported objects and object-level
migration dependencies.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
9
Install the Migration Tool
Initialize the Migration Tool
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
10
CHAPTER 3
Plan Your Migration
This chapter provides necessary information to plan your migration. Planning your migration carefully can
ensure that your migration proceeds smoothly and it decreases any risk of migration failure.
• Prerequisites, page 11
• Data Migration Time Estimate, page 13
• Preparation for Migration from Cisco Secure ACS, Release 5.5 or later, page 13
• Policy Services Migration Guidelines, page 13
• Cisco Secure ACS Policy Rules Migration Guidelines, page 14
Prerequisites
This section provides information on the prerequisites to perform the migration process.
Step 1 Enable the migration interface on the Cisco Secure ACS machine by entering the following command in the Cisco Secure
ACS CLI:
acs config-web-interface migration enable
Step 2 Enable the migration interface on the Cisco ISE server by performing the following tasks:
a) In the Cisco ISE CLI, enter application configure ise.
b) Enter 11 to enable/disable ACS Migration.
c) Enter Y.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
11
Plan Your Migration
Enable Trusted Certificates in the Migration Tool
Note Disable the migration interface on the Cisco Secure ACS machine using the following command: acs
config-web-interface migration disable, after the migration process is completed.
Note Disable the migration interface on the Cisco ISE server after the migration process is completed.
Note It is not necessary to add the Cisco Secure ACS CA certificate or Cisco Secure ACS management certificate
to export the data objects from ACS if you select the migration of ACS 4.x supported objects.
To enable the import of data from the migration tool to the Cisco ISE server, you can either trust the Cisco
ISE CA certificate or the Cisco ISE management certificate.
To enable the trusted certificates in the migration tool:
• In Cisco Secure ACS, ensure that the server certificate is in the System Administration > Configuration
> Local Server Certificates > Local Certificates page. The Common Name (CN attribute in the Subject
field) or DNS Name (in the Subject Alternative Name field) in the certificate is used in the ACS5
Credentials dialog box to establish the connection and export data from Cisco Secure ACS.
• In Cisco ISE, ensure that the server certificate is in the Administration > System > Certificates >
Certificate Management > System Certificates page. The Common Name (CN attribute in the Subject
field) or DNS Name (in the Subject Alternative Name field) is used in the ISE Credentials dialog box
to establish the connection and import data from the migration tool to Cisco ISE.
Step 1 In the Cisco Secure ACS to Cisco ISE Migration Tool window, click Settings > Trusted Certificates > Add to include
the Cisco Secure ACS and Cisco ISE certificates to enable trusted communication.
You can view or delete the certificate in the migration tool.
Step 2 In the Open dialog box, choose the folder containing the trusted root certificate and click Open to add the selected Cisco
ISE certificate to the migration tool.
Step 3 Repeat the previous step to add the Cisco Secure ACS certificate.
Note Ensure that the Cisco Secure ACS and Cisco ISE hostnames are resolvable to IP addresses.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
12
Plan Your Migration
Data Migration Time Estimate
Note The service that is the result of the SSP default rule becomes the default policy set in Cisco ISE, Release
2.3. For all the policy sets created in the migration process, the first matching policy set is the matching
type.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
13
Plan Your Migration
Cisco Secure ACS Policy Rules Migration Guidelines
◦that requests a service, which contains a Group Mapping policy, it is not migrated to Cisco ISE.
(Cisco ISE does not support Group Mapping Policy).
If a particular access service contains group mapping, the migration tool displays it as a warning
in the policy gap analysis report and migrates the authorization rules related to that access service.
◦that requests a service and its identity policy contains rules, which result in RADIUS Identity
Server, it is not migrated to Cisco ISE. (Cisco ISE differs to use RADIUS Identity Servers for
authentication).
◦that requests a service, which has policies that use attributes or policy elements that are not supported
by Cisco ISE, it is not migrated to Cisco ISE.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
14
CHAPTER 4
Migrate Data from Cisco Secure ACS to Cisco
ISE
This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or later data into Cisco ISE,
Release 2.3 system using the migration tool.
Step 1 In the Cisco Secure ACS to Cisco ISE Migration Tool window, click Settings to display the list of data objects available
for migration.
Step 2 (Optional) You are not required to configure the dependency handling in order to perform migration. Check the check
boxes of the data objects you want to export in case their dependency data is missed and click Save.
Step 3 In the Cisco Secure ACS to Cisco ISE Migration Tool window, click Migration and then click Export From ACS.
Step 4 Enter the Cisco Secure ACS host name, user name, and password and click Connect in the ACS5 Credentials window.
If you choose the migration of ACS 4.x supported objects, you must enter the hostname of the ACS 4.x machine in the
ACS4 Hostname field and click Connect in the ACS4 Host Information window.
You can monitor the migration process in the Cisco Secure ACS to Cisco ISE Migration Tool window, which displays
the current count of successful object exports and lists any objects that triggered warnings or errors.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
15
Migrate Data from Cisco Secure ACS to Cisco ISE
Password Compliance during Export
To get more information about a warning or an error that occurred during the export process, click any underlined numbers
in the Warnings or Errors column on the Migrations tab. The Object Errors and Warnings Details window displays the
result of a warning or an error during export. It provides the object group, the type, and the date and time of a warning
or an error.
Step 5 Scroll to display the details of the selected object error, and then click Close.
Step 6 When the data export process is completed, the Cisco Secure ACS to Cisco ISE Migration Tool window displays the
status of export that Exporting finished.
Step 7 Click Export Report(s) to view the contents of the export report. Each export report contains header information with
the operation type, date and time, and system IP address or host name. Each object group details the types and related
information. Reports end with a summary of the start and end date, the time, and the duration of the operation.
Step 8 To analyze the policy gap between Cisco Secure ACS and Cisco ISE, click Policy Gap Analysis Report.
Note The migration tool maintains a cache for the exported objects and retrieves them for subsequent exports.
Note You will receive only specific error messages applicable for the set password from the
list of error messages.
• Password hash
If you enable password hash for internal user in Cisco Secure ACS and try to export the internal user,
the migration tool displays the following error message:
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
16
Migrate Data from Cisco Secure ACS to Cisco ISE
Import Data in to Cisco ISE
user: Failed to Export because its configured with Password Hash which is not supported by ISE, disable
this configuration in ACS and export again.
Step 1 In the Cisco Secure ACS to Cisco ISE Migration Tool window, click Import To ISE.
Step 2 Click OK when you are prompted to add attributes to the LDAP identity stores before they are imported into Cisco ISE.
Step 3 From the LDAP Identity Store drop-down list, choose the identity store to which you want to add attributes, and click
Add Attribute.
Step 4 Enter a name in the Attribute Name field, choose an attribute type from the Attribute Type drop-down list, enter a
value in the Default Value field, and click Save & Exit.
Step 5 After adding attributes, click Import To ISE, enter the Cisco ISE Fully Qualified Domain Name (FQDN), username,
and password in the ISE Credentials window and click Connect. The migration tool ensures that this matches the FQDN
in the SSL certificate.
Step 6 When the data import process is completed, the Cisco Secure ACS to Cisco ISE Migration Tool window displays the
status of import as Importing finished.
Step 7 To view a complete report on the imported data, click Import Report(s).
Step 8 To get more information about a warning or an error that occurred during the import process, click any underlined
numbers in the Warnings or Errors column on the Migrations tab.
Step 9 To analyze the policy gap between Cisco Secure ACS and Cisco ISE, click Policy Gap Analysis Report.
Step 10 Click View Log Console to display the real-time view of the export or import operations.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
17
Migrate Data from Cisco Secure ACS to Cisco ISE
Migrate Data from a Single Cisco Secure ACS Appliance
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
18
Migrate Data from Cisco Secure ACS to Cisco ISE
Migrate Data from a Distributed Environment
If you are running Cisco Secure ACS in a distributed environment, you must:
Step 1 Back up the primary Cisco Secure ACS appliance and restore it on the migration machine.
Step 2 Run the migration tool against the primary Cisco Secure ACS appliance.
Figure 1: Cisco Secure ACS and Cisco ISE Installed on Different Appliances
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
19
Migrate Data from Cisco Secure ACS to Cisco ISE
Migrate Data from a Distributed Environment
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
20
CHAPTER 5
Reports
The migration tool generates reports for export, import, and policy gap analysis during data migration.
If you decide to share the report files with anyone, or want to save them to another location, you can find
the following files in the Reports folder of the migration tool directory:
• import_report.txt
• export_report.txt
• policy_gap_report.txt
Export Report
This report indicates specific information or errors that are encountered during the export of data from the
Cisco Secure ACS database. It contains a data analysis section at the end of the report, which describes the
functional gap between Cisco Secure ACS and Cisco ISE. The export report also includes error information
for exported objects that will not be imported.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
21
Reports
Policy Gap Analysis Report
Table 3: Cisco Secure ACS to Cisco ISE Migration Tool Export Report
Information Lists the data objects that are not exported as they are
predefined in Cisco ISE.
Warning Lists the data objects that were exported but might
require some additional configuration in Cisco ISE
after migration.
Lists the data objects for which the naming conversion
is done by the migration tool.
Error Lists the data objects that are not exported due to
limitation in the configured name or attribute type that
is not supported in Cisco ISE.
Lists the data objects that are not exported as they are
not supported in Cisco ISE.
Note After exporting the data, you should analyze the export report and the policy gap report, fix the listed
errors in the ACS configuration and address the warnings and other issues. After addressing the errors or
warnings, perform the export process again. For information on exporting data from Cisco Secure ACS,
see Export Data from Cisco Secure ACS, on page 15.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
22
Reports
Import Report
Import Report
This report indicates specific information or errors that are encountered during the import of data into the
Cisco ISE appliance.
Table 4: Cisco Secure ACS to Cisco ISE Migration Tool Import Report
Warning Lists the data objects that were imported but might
require some additional configuration in Cisco ISE
after migration.
Lists the data object which already exists in Cisco ISE
if migration is performed on existing Cisco ISE
installation.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
23
Reports
Import Report
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
24
CHAPTER 6
Migrate from Earlier Releases of Cisco Secure
ACS to Cisco ISE
This chapter provides detailed information on migrating data from earlier releases of Cisco Secure ACS to
Cisco ISE.
• Migrate from Earlier Releases of Cisco Secure ACS to Cisco ISE, page 25
Step 1 Check the upgrade path for Cisco Secure ACS, Release 3.x, as described in the Installation Guide for Cisco Secure ACS
Solution Engine 4.2.
Step 2 Upgrade your Cisco Secure ACS, Release 3.x server to a migration-supported version of the Cisco Secure ACS, Release
4.x. For example, upgrade to one of the following Cisco Secure ACS 4.2.0.124, or Cisco Secure ACS 4.2.1 releases.
Step 3 After the upgrade, follow the steps that describe migrating from Cisco Secure ACS, Release 4.x .
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
25
Migrate from Earlier Releases of Cisco Secure ACS to Cisco ISE
Migrate from Cisco Secure ACS, Release 4.x
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
26
CHAPTER 7
Policy Elements
This chapter provides information on the policy elements in Cisco ISE and Cisco Secure ACS.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
27
Policy Elements
Policy Models
Policy Models
Cisco Secure ACS and Cisco ISE have both simple and rule-based authentication paradigms, but Cisco Secure
ACS and Cisco ISE are based on different policy models and that makes migrating policies from Cisco Secure
ACS to Cisco ISE a bit complex.
Cisco Secure ACS policy hierarchy starts with the Service selection rule that redirects the authentication
requests to the access services. The access services consist of identity and authorization policies that authenticate
the user against internal or external identity stores and authorize the users based on the conditions defined.
Authentication and authorization polices are migrated from Cisco Secure ACS, Release 5.5 or later to Cisco
ISE, Release 2.3. Cisco ISE supports the Policy Set, which is similar to the Service Selection Policy (SSP) in
Cisco Secure ACS.
Cisco Secure ACS Service Selection Policy and Cisco ISE Policy Set
Cisco Secure ACS Service Selection Policy (SSP) distributes requests to the appropriate services based on
SSP rules whereas Cisco ISE policy set holds a rule, which contains entry criteria to the policy set. The order
of the policy set is in the same order as the entry rules, which is similar to the order of the SSP rules.
Several SSP rules may request the same service or reuse of service in Cisco Secure ACS. However, each
policy set carries its own entry condition, therefore, you cannot reuse the policy set in Cisco ISE. If you want
to migrate a single service that is requested by several SSP rules, you must create multiple policy sets that are
copies of that service, which means that you must create a policy set in Cisco ISE for each SSP rule that
requests the same service in Cisco Secure ACS.
You can define SSP rules as disabled or monitored in Cisco Secure ACS, and the equivalent entry rules of a
policy set are always enabled in Cisco ISE. If SSP rules are disabled or monitored in Cisco Secure ACS, the
policy services that are requested by SSP rules cannot be migrated to Cisco ISE.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
28
Policy Elements
Cisco Secure ACS Policy Access Service and Cisco ISE Policy Set
Cisco Secure ACS Policy Access Service and Cisco ISE Policy Set
You can define a policy service without requesting that service, which means that you can define a policy
service inactive by a rule in the SSP in Cisco Secure ACS. Cisco Secure ACS, Release 5.5 or later has an
out-of-the-box DenyAccess service, which has neither policies nor allowed protocols for the default SSP rule
in Cisco Secure ACS, which automatically denies all requests. There is no equivalent policy set for Cisco
ISE. But, you cannot have a policy set without an entry rule, which refers to the policy set in Cisco ISE.
Allowed protocols are attached to the entire service (not a specific policy) that is not conditioned (except the
condition in the SSP that points to the entire service) in Cisco Secure ACS, Release 5.5 or later. Allowed
protocols refers only to the authentication policies as a result of a conditioned outer rule in Cisco ISE.
Identity policy is a flat list of rules that results in identity source (identity source and identity store sequence)
in Cisco Secure ACS, Release 5.5 or later.
Both Cisco Secure ACS, Release 5.5 or later and Cisco ISE, Release 2.3, include an optional exception policy
attached to each authorization policy. Cisco ISE, Release 2.3 provides an optional Global Exception Policy
in addition to the exception policy that affects all authorization policies. There is no equivalent policy to that
of Global Exception Policy in Cisco Secure ACS, Release 5.5 or later. The local exception policy is processed
first followed by the Global Exception Policy and authorization policy for authorization.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
29
Policy Elements
FIPS Support for ISE 802.1X Services
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
30
CHAPTER 8
Troubleshoot the Migration Tool
• Unable to Start the Migration Tool, page 31
• Troubleshoot Connection Issues in the Migration Tool, page 31
• Error Messages Displayed in Logs, page 32
• Default Folders, Files, and Reports are Not Created, page 33
• Migration Export Phase is Very Slow , page 33
• Report Issues to Cisco TAC, page 34
Action
Verify that Java JRE, Version 1.8 or later, is installed on the migration machine and that it is correctly
configured in the system path and classpath.
Error Message
The following error message: "UnknownHostException: hostname" is displayed if the Cisco Secure ACS or
ISE host name is not resolvable.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
31
Troubleshoot the Migration Tool
Error Messages Displayed in Logs
Action
• Ensure that the Cisco Secure ACS or ISE hostname is resolvable from the client machine where you run
the migration tool.
• Check the DNS configuration and connectivity.
Error Message
The following error message: "hostname in certificate didn't match: <hostname> != </hostname_in_certificate>"
is displayed if the Cisco Secure ACS or Cisco ISE hostname entered in the migration tool does not match the
name in the certificate.
Action
Ensure that the certificate's Common Name in the Subject field or DNS name in Subject Alternate Name field
in Cisco Secure ACS and Cisco ISE matches the Hostname provided in the migration tool.
Error Message
The following error message: "SSLHandshakeException: unable to find valid certification path to requested
target" is displayed if the Cisco Secure ACS and ISE certificates are not trusted by the migration tool.
Action
Ensure that Cisco Secure ACS and Cisco ISE certificates are trusted by adding the required certificates in the
Settings > Trusted Certificates page in the Cisco Secure ACS to Cisco ISE Migration Tool.
Action
• Make sure that the migration application machine is connected to the network and configured correctly.
• Make sure that the Cisco ISE appliance is connected to the network and that it is configured correctly.
• Make sure that the Cisco ISE appliance and the migration machine are able to connect to each other
over the network.
• Make sure that the hostname (if any) used in the Cisco ISE primary node is resolvable within the DNS
when the migration tool connects to Cisco ISE.
• Make sure that the Cisco ISE appliance is up and running.
• Make sure that the Cisco ISE application server service is up and running.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
32
Troubleshoot the Migration Tool
I/O Exception Error
Action
• Make sure that the Cisco ISE application server service is up and running.
• Make sure that the Cisco ISE web server thresholds have not been exceeded or that there are no memory
exceptions.
• Make sure that the Cisco ISE appliance CPU consumption is not 100 percent and that the CPU is active.
Action
Increase the Java heap size to at least 1 GB.
Action
Make sure the user has file-system writing privileges and that there is enough disk space.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
33
Troubleshoot the Migration Tool
Report Issues to Cisco TAC
Action
Restart the Cisco Secure ACS appliance before starting the migration process to free up memory space.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
34
CHAPTER 9
Frequently Asked Questions
• Frequently Asked Questions, page 35
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
35
Frequently Asked Questions
Frequently Asked Questions
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
36
APPENDIX A
Data Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not
migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
37
Data Structure Mapping
Migrated Data Objects
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
38
Data Structure Mapping
Partially Migrated Data Objects
• TACACS+ Profiles
• Downloadable access control lists (DACLs)
• Identity (authentication) policies
• Authentication, Authorization, and Authorization exception polices for TACACS+ (for policy objects)
• Date and time conditions
• TACACS+ Command Sets
• Authorization exception policies (for network access)
• Service selection policies (for network access)
• RADIUS proxy service
• TACACS+ proxy service
• User password complexity
• Identity sequence and RSA prompts
• UTF-8 data
• EAP authentication protocol—PEAP-TLS
• User check attributes
• Dial-in attributes
• Crypto binding attributes
• Weak ciphers support for allowed protocols
• Identity sequence advanced option
• Additional attributes available in policy conditions—AuthenticationIdentityStore
• Additional string operators—Start with, Ends with, Contains, Not contains
• RADIUS identity server attributes
• Length included flag (L-bit) in EAP-MD5, EAP-TLS, LEAP, PEAP and EAP-FAST authentication
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
39
Data Structure Mapping
Data Objects Not Migrated
Description Migrates as is
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
40
Data Structure Mapping
NDG Types Mapping
CTS Migrates as is
Model name This property is available only in Cisco ISE (and its value is
the default, which is “unknown”).
Software version This property is available only in Cisco ISE (and its value is
the default, which is “unknown”).
Description Description
Note Cisco Secure ACS, Release 5.5 or later can support more than one network device group (NDG) with the
same name. Cisco ISE, Release 2.3 does not support this naming scheme. Therefore, only the first NDG
type with any defined name is migrated.
Description Description
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
41
Data Structure Mapping
Default Network Devices Mapping
TACACS+ Draft Compliant Single Connect Support TACACS+ Draft Compliance Single Connect Support
Description Description
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
42
Data Structure Mapping
User Mapping
Note Cisco ISE, Release 2.3 contains user and endpoint identity groups. Identity groups in Cisco Secure ACS,
Release 5.5 or later are migrated to Cisco ISE, Release 2.3 as user and endpoint identity groups because
a user needs to be assigned to a user identity group and an endpoint needs to be assigned to an endpoint
identity group.
User Mapping
Cisco Secure ACS Properties Cisco ISE Properties
Name Name
Description Description
Status No need to migrate this property. (This property does not exist in Cisco
ISE)
Password Password
User attributes list User attributes are imported from the Cisco ISE and are associated with
users
Description Migrates as is
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
43
Data Structure Mapping
LDAP Mapping
Authentication state This is a property available only in Cisco ISE (and its value is a fixed value,
“Authenticated”).
Class name This is a property available only in Cisco ISE (and its value is a fixed value,
“TBD”).
Endpoint policy This is a property available only in Cisco ISE (and its value is a fixed value,
“Unknown”).
Matched policy This is a property available only in Cisco ISE (and its value is a fixed value,
“Unknown”).
Matched value This is a property available only in Cisco ISE (and its value is a fixed value, “0”).
NAS IP address This is a property available only in Cisco ISE (and its value is a fixed value,
“0.0.0.0”).
OUI This is a property available only in Cisco ISE (and its value is a fixed value,
“TBD”).
Posture status This is a property available only in Cisco ISE (and its value is a fixed value,
“Unknown”).
Static assignment This is a property available only in Cisco ISE (and its value is a fixed value,
“False”).
LDAP Mapping
Cisco Secure ACS Properties Cisco ISE Properties
Name Name
Description Description
Directory attributes Migration is done manually (using the Cisco Secure ACS to Cisco ISE
migration tool).
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
44
Data Structure Mapping
Active Directory Mapping
Note Only the LDAP configuration defined for the primary ACS instance is migrated.
Password Migrates as is
Groups Migrates as is
Description Description
Principle user name (X.509 attribute) Principle user name (X.509 attribute).
Binary certificate comparison with certificate Binary certificate comparison with certificate from LDAP or
from LDAP or AD AD.
AD or LDAP name for certificate fetching AD or LDAP name for certificate fetching.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
45
Data Structure Mapping
Identity Store Sequences Mapping
Description Description
Advanced options > if access on current Do not access other stores in the sequence and set the
IDStore fails than break sequence “AuthenticationStatus” attribute to “ProcessError.”
Advanced options > if access on current Treated as “User Not Found” and proceed to the next store in
IDStore fails then continue to next the sequence.
Attribute retrieval only > exit sequence and Not supported (should be ignored)
treat as “User Not Found”
Description Description
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
46
Data Structure Mapping
Command Sets Attributes Mapping
Description Description
Access Control List (Static and Dynamic) Access Control List (Static and Dynamic)
Auto Command (Static and Dynamic) Auto Command (Static and Dynamic)
Idle Time (Static and Dynamic) Idle Time (Static and Dynamic)
Custom Attributes
Attribute Name
Description Description
Permit any command that is not in the table Permit any command that is not listed below
below
Grant (Permit, Deny, Deny Always) Grant (Permit, Deny, Deny Always)
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
47
Data Structure Mapping
Downloadable ACL Mapping
Arguments Arguments
Description Description
Description Description
Vendor ID Vendor ID
Note The migration tool supports migration of vendor and its attributes based on the ID of the vendor and its
attributes.
If the vendor name is user-defined in Cisco Secure ACS and predefined in Cisco ISE and their IDs are
different, the export process succeeds but the import process fails. If the vendor name is predefined in
Cisco Secure ACS and Cisco ISE and their IDs are same, you will receive a warning message. If the
vendor name is user-defined in Cisco Secure ACS and predefined in Cisco ISE and their IDs are same,
the export process fails.
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
48
Data Structure Mapping
RADIUS Dictionary (Attributes) Mapping
Description Description
Attribute ID No specific property associated with this because this value is entered
only as part of the NDG hierarchy name (NDG type is the prefix for
this object name).
Note Only the user-defined RADIUS attributes that are not part of a Cisco Secure ACS, Release 5.5 or later
installation are required to be migrated.
Description Description
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
49
Data Structure Mapping
Identity Attributes Dictionary Mapping
Name Migrates as is
No such property Dictionary (Set with the value “InternalUser” if it is a user identity
attribute, or “InternalEndpoint” if it is a host identity attribute.)
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
50
Data Structure Mapping
External TACACS+ Server Mapping
Description Description
IP address Host IP
Description Description
Always access primary appliance first Always access primary appliance first
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
51
Data Structure Mapping
RSA Mapping
Advanced > treat reject as authentication Advanced > treat reject as authentication flag fail.
flag fail
Advanced > treat rejects as user not found Advanced > treat rejects as user not found flag.
flag
Advanced > enable identity caching and Advanced > enable identity caching and aging value.
aging value
Directory attributes Authorization > attribute name (In cases where the dictionary
attribute lists in Cisco Secure ACS includes the attribute
“CiscoSecure-Group-Id,” it is migrated to this attribute;
otherwise, the default value is “CiscoSecure-Group-Id”.)
RSA Mapping
Cisco Secure ACS Properties Cisco ISE Properties
Name Name is always RSA
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
52
Data Structure Mapping
RSA Prompts Mapping
Server TO Server TO
Treat rejects as user not found Treat rejects as user not found
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
53
Data Structure Mapping
RSA Prompts Mapping
User Guide for Cisco Secure ACS to Cisco ISE Migration Tool, Release 2.3
54