<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Group Tag from Cisco ISE not assigned to Access Role in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277311#M105530</link>
    <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;Customer has a R82 environment with a internal cluster and would like to use Security Group Tags from Cisco ISE to create access rules.&lt;BR /&gt;&lt;BR /&gt;We have configured an Identity Collector and configured Cisco ISE as the identity source. All statuses are OK.&lt;BR /&gt;The Identity Collector is showing log-on and log-off events from this identity source.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Following the documentation, we have configured an Identity Tag with the identifier field as an exact match with the SGT's name and used this Identity Tag in an Access Role. We have found an article mentioning a SGT_ prefix is needed when naming the Access Role where the part after the prefix must match the SGT's name. Created an access rule with this role and pushed policy.&lt;BR /&gt;&lt;BR /&gt;When running the 'pdp monitor ip x.x.x.x' command, we can see the security gateway has learned the object and the SGT is shown in the output. But the Access Role remains empty so the access rule is not hit.&lt;BR /&gt;&lt;BR /&gt;Disconnecting the device from the network shows a log-off event in SmartLog and connecting the device to the network shows a log-on event in SmartLog with the correct SGT name, but without a Access Role assigned.&lt;BR /&gt;&lt;BR /&gt;The configuration we have created is done by putting information from different documents and SK articles together.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What am I missing here?&lt;BR /&gt;&lt;BR /&gt;Has anyone has configured this before?&lt;BR /&gt;&lt;BR /&gt;Tips and tricks would be appreciated.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Martijn&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 May 2026 09:19:58 GMT</pubDate>
    <dc:creator>Martijn</dc:creator>
    <dc:date>2026-05-22T09:19:58Z</dc:date>
    <item>
      <title>Security Group Tag from Cisco ISE not assigned to Access Role</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277311#M105530</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;Customer has a R82 environment with a internal cluster and would like to use Security Group Tags from Cisco ISE to create access rules.&lt;BR /&gt;&lt;BR /&gt;We have configured an Identity Collector and configured Cisco ISE as the identity source. All statuses are OK.&lt;BR /&gt;The Identity Collector is showing log-on and log-off events from this identity source.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Following the documentation, we have configured an Identity Tag with the identifier field as an exact match with the SGT's name and used this Identity Tag in an Access Role. We have found an article mentioning a SGT_ prefix is needed when naming the Access Role where the part after the prefix must match the SGT's name. Created an access rule with this role and pushed policy.&lt;BR /&gt;&lt;BR /&gt;When running the 'pdp monitor ip x.x.x.x' command, we can see the security gateway has learned the object and the SGT is shown in the output. But the Access Role remains empty so the access rule is not hit.&lt;BR /&gt;&lt;BR /&gt;Disconnecting the device from the network shows a log-off event in SmartLog and connecting the device to the network shows a log-on event in SmartLog with the correct SGT name, but without a Access Role assigned.&lt;BR /&gt;&lt;BR /&gt;The configuration we have created is done by putting information from different documents and SK articles together.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What am I missing here?&lt;BR /&gt;&lt;BR /&gt;Has anyone has configured this before?&lt;BR /&gt;&lt;BR /&gt;Tips and tricks would be appreciated.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Martijn&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2026 09:19:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277311#M105530</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2026-05-22T09:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Group Tag from Cisco ISE not assigned to Access Role</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277315#M105531</link>
      <description>&lt;P&gt;Apply some caution here but it's worth reviewing the following as relevant to this environment:&lt;/P&gt;
&lt;P&gt;pdp idc groups_consolidation status | enable | disabled&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2026 11:31:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277315#M105531</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-05-22T11:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Security Group Tag from Cisco ISE not assigned to Access Role</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277316#M105532</link>
      <description>&lt;P&gt;Chris,&lt;BR /&gt;&lt;BR /&gt;We also checked this one and the setting was enabled.&lt;BR /&gt;&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2026 11:35:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277316#M105532</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2026-05-22T11:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security Group Tag from Cisco ISE not assigned to Access Role</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277317#M105533</link>
      <description>&lt;P&gt;Don't know the specifics of this environment but I've disabled it in the past for other SGT based deployments.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2026 11:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Group-Tag-from-Cisco-ISE-not-assigned-to-Access-Role/m-p/277317#M105533</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-05-22T11:43:25Z</dc:date>
    </item>
  </channel>
</rss>

