Autotransition from Custom SGTs to ISE SGTs
If you create rules that match custom SGTs, then configure ISE/ISE-PIC as an identity source, the system:
-
Disables Security Group Tag options in the object manager. Although the system retains existing SGT objects, you cannot modify them or add new ones.
-
Retains existing rules with custom SGT conditions. However, these rules do not match traffic. You also cannot add additional custom SGT criteria to existing rules, or create new rules with custom SGT conditions.
If you configure ISE, Cisco recommends that you delete or disable existing rules with custom SGT conditions. Instead, use ISE attribute conditions to match traffic with SGT attributes.