INNOVEXUS
Integration · Cisco

Innovexus + Cisco.Catalyst, Nexus, ASA, IOS-XR — agentless PAM across the Cisco fleet.

Cisco devices are the backbone of most enterprise networks, and the largest single source of privileged-access workflows. Innovexus brokers SSH, Telnet, and console sessions to every Cisco platform that exposes a CLI — no agent installs on the device, no Cisco-side software changes beyond standard AAA configuration. Sessions are recorded, credentials rotate on schedule, configurations are baselined and diffed.

§ 01 / Supported devices and OS

Cisco platforms supported.

Innovexus is agentless from the Cisco device perspective — we connect via standard SSH (preferred), Telnet (where SSH is unavailable), and serial-over-IP for console. Anything that authenticates against TACACS+, RADIUS, or local AAA is in scope.

Device family
OS / platform
Examples
Notes
Catalyst switches
IOS / IOS-XE
Catalyst 9000, 3650/3850, 2960, IE3000/4000/5000
Full session recording, vault, rotation, drift detection
Nexus switches
NX-OS
Nexus 9000, 7000, 5000, 3000
Includes VDC-aware role mapping; works in standalone and ACI fabric
Carrier / SP routers
IOS-XR
ASR 9000, NCS 5000/5500, NCS 540
XR config groups and admin-plane separation respected
Enterprise routers
IOS / IOS-XE
ASR 1000, ISR 4000, Catalyst 8000
Full feature parity with Catalyst switches
Firewalls
ASA / FTD (Firepower)
ASA 5500-X, FPR 1000/2100/4100/9300, ASAv
CLI access; FMC integration via REST API on Enterprise tier
Wireless controllers
AireOS / IOS-XE
WLC 9800, 5500, 8500, vWLC
9800 series treated as IOS-XE; AireOS via SSH
Cloud-managed
Meraki Dashboard
MS / MX / MR / MV
API-based credential and admin user management; no SSH session model on Meraki
Voice / collaboration
CUCM, IOS Gateways
CUCM 12.x, ISR-based gateways
CLI access for IOS gateways; CUCM admin via web SSO
§ 02 / How the integration works

Cisco-specific setup, in plain language.

Most Cisco fleets are running through Innovexus within 1–2 business days. The integration uses standard AAA primitives — there is nothing Cisco-side that the platform requires you to change beyond what your existing operations team already manages.

  1. 01

    Vault existing credentials

    Pull the current local admin credential from one device per group (most fleets have 1–3 distinct credentials, not one per device). Vault them. The Innovexus pod is now the source of truth for those credentials going forward.

  2. 02

    Allowlist the Innovexus pod

    Add the per-tenant pod's outbound IP to your management ACLs as an authorised SSH source. Existing TACACS+ / RADIUS continues to handle AAA at the device level; Innovexus is added as the brokered-session source, not a replacement for AAA.

  3. 03

    Inventory and group

    Import device inventory from your existing source (NetBox, ServiceNow, CSV). Group devices by class — perimeter, core, distribution, edge, OOB — so polling cadence and severity rules can be set per group.

  4. 04

    Configure session recording and drift

    Session recording starts at session open by default. Configuration drift collection runs on a schedule (default 4 hours, configurable per device class). The first collection establishes the baseline; subsequent collections diff against it.

  5. 05

    Engineers connect through the pod

    Engineers log into Innovexus with their FIDO2 hardware key, see only the devices their role permits, click into a session. The pod opens SSH to the Cisco device using the vaulted credential. Recording, audit, and command-level accounting all happen automatically.

§ 03 / What you get

What you get once integrated.

/ 01

Full session recording across IOS / NX-OS / IOS-XR

Every SSH, Telnet, and console session captured frame-perfect. Searchable text across all sessions. Cryptographically signed audit. Compliant with SOC 2 CC7.2, NERC CIP-007-6 R5.7, and IEC 62443-3-3 FR 2.10.

/ 02

Atomic credential rotation

Local admin credentials, TACACS+ shared secrets, and RADIUS keys rotate on schedule (default daily) without service interruption. The pod pushes the new secret to the device and the AAA server simultaneously.

/ 03

IP-locked pod sessions

Cisco devices accept management connections only from the Innovexus pod's allowlisted IP. Lost laptops or compromised engineer endpoints cannot connect directly — the pod is the only authorised path.

/ 04

Configuration drift detection

Continuous baseline collection across the fleet. Drift detected outside an approved Innovexus session fires an alert. Approved-change baseline promotion via the brokered-session workflow.

/ 05

NOC + SOC bundled

Same console, same audit trail. Network monitoring (link state, device health, configuration drift) and security operations (threat detection, anomaly alerting, compliance evidence) run alongside PAM at one tier price.

/ 06

Co-existence with Cisco ISE

ISE remains the AAA decision point at the device level. Innovexus adds the brokered-session layer above it: hardware-rooted identity, full session video, atomic credential lifecycle, and unified audit. The two are designed to run together.

Cisco integration · FAQ

Common questions about Innovexus and Cisco

Direct, sourced answers about how Innovexus integrates with this vendor's platforms.

01

Does Innovexus require an agent on Cisco devices?

No. The integration is agentless. The Innovexus pod is an authorised SSH/Telnet/console source from the device perspective — no software installs on IOS, NX-OS, IOS-XR, or any Cisco platform. This matters because most network operators cannot install third-party agents on production Cisco gear without violating vendor support agreements.

02

Does Innovexus replace Cisco ISE?

No. Cisco ISE handles the AAA decision (which user, which command, which device); Innovexus handles the brokered-session layer (who authenticated at the platform, full session recording, credential lifecycle, audit). Most environments run both: ISE for AAA at the device level, Innovexus for hardware-rooted identity, full session evidence, and credential vaulting at the platform level.

03

How does this work with Cisco DNA Center (DNAC)?

DNAC is a Cisco-only network management platform with its own credential management and assurance layer. Innovexus and DNAC are complementary: DNAC orchestrates Cisco-specific workflows (SD-Access, Catalyst Center provisioning, network assurance), while Innovexus handles privileged human and vendor access across multi-vendor environments. Many teams run DNAC for Cisco automation and Innovexus for the unified PAM/NOC/SOC layer that includes non-Cisco devices.

04

Can Innovexus handle Cisco Meraki devices?

Yes, with caveats. Meraki devices are managed through the Meraki Dashboard via API — there's no traditional SSH session to broker. Innovexus integrates with the Meraki API for credential rotation (admin user passwords, API keys), inventory sync, and audit forwarding. Session recording in the SSH/CLI sense doesn't apply to Meraki because Meraki doesn't expose a CLI session to record. We treat Meraki integration as a different integration class and document it separately.

05

Does Innovexus support TACACS+ shared-secret rotation on Cisco devices?

Yes. The TACACS+ shared secret is vaulted in Innovexus and rotated on schedule (default daily). Rotation is atomic across the device and the TACACS+ server (Cisco ISE supports secondary-key windows during rotation, so existing sessions stay open). See our dedicated solution page on TACACS+ credential vault for the full workflow.

06

What about Cisco IOS-XR admin-plane separation?

IOS-XR's admin-plane / SDR separation is respected. Innovexus authenticates with appropriate role mapping per VRF or per SDR, and brokered sessions land in the correct admin-plane context based on the engineer's assigned role. Configuration drift collection runs against the active config in the appropriate context.

07

Are FMC and ASDM (Firepower / ASA management) supported?

CLI access to ASA, FTD, and Firepower devices via SSH is a first-class integration with full feature parity. FMC web administration is supported via SAML SSO — engineers authenticate to FMC through the Innovexus identity layer. ASDM (the Java-based GUI) is end-of-life from Cisco and Innovexus does not specifically support it; SSH and FMC are the recommended paths.

Cisco fleet ready for unified PAM in days.

FROM $199 / MO5-DAY FREE TRIAL

Provision a per-tenant pod, vault credentials for one device class, allowlist the pod IP. The first session is recorded within an hour. Trial is 5 days, no card required, runs against your real fleet.