<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Distributed Deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967358#M38302</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have a primary and secondary HQ in the UK and then large branch offices in the US and Europe. Total users is ~ 2500&lt;/P&gt;
&lt;P&gt;What we are looking to do is deploy a primary admin, monitoring and policy services node in HQ1, a secondary admin, monitoring and policy services node in HQ2 and then policy services node in the US and Europe. Is this deployment supported? I have read the documentation for distributed deployments and it suggests having seperate policy services nodes for all sites, however, I'm not sure if this is required in all scenarios such as ours.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone please assist&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 07:04:54 GMT</pubDate>
    <dc:creator>de1denta</dc:creator>
    <dc:date>2019-03-11T07:04:54Z</dc:date>
    <item>
      <title>ISE Distributed Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967358#M38302</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We have a primary and secondary HQ in the UK and then large branch offices in the US and Europe. Total users is ~ 2500&lt;/P&gt;
&lt;P&gt;What we are looking to do is deploy a primary admin, monitoring and policy services node in HQ1, a secondary admin, monitoring and policy services node in HQ2 and then policy services node in the US and Europe. Is this deployment supported? I have read the documentation for distributed deployments and it suggests having seperate policy services nodes for all sites, however, I'm not sure if this is required in all scenarios such as ours.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone please assist&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967358#M38302</guid>
      <dc:creator>de1denta</dc:creator>
      <dc:date>2019-03-11T07:04:54Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967359#M38303</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We recommend that you make all PSNs in the same local network part of the same node group. PSNs need not be part of a load-balanced cluster to join the same node group. However, each local PSN in a load-balanced cluster should typically be part of the same node group.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For reference :&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011.html#ID513&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: rate if it helps!!!!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2016 13:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967359#M38303</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2016-09-16T13:26:34Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967360#M38304</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks for the reply. I'm only looking to deploy a single PSN in each location so I dont think I need to create node groups, correct?&lt;/P&gt;
&lt;P&gt;I just need to confirm for the HQ sites if we can have single VMs running the Admin/Monitoring/PSN services (HQ1 primary and HQ2 secondary) and then just PSN nodes in the US and European regions?&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 09:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967360#M38304</guid>
      <dc:creator>de1denta</dc:creator>
      <dc:date>2016-09-19T09:40:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967361#M38305</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ideally setup should work in WAN link. Just ensure network settings and less latency in the environment.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Please rate as correct if it helps!!!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 15:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967361#M38305</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2016-09-19T15:18:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967362#M38306</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Officially, a distributed deployment with more than two PSNs (residing on the same servers as the primary and secondary PAN/MNT roles) is not a supported design. With only 2500 users, you likely do not need 4 PSNs anyway. I would recommend just having your two PAN/MNT servers, and deploying a VM PSN in the US and Europe as you intend today. The PSN roles on the PAN/MNTs are not necessary unless they are going to be at a location that may need a local PSN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So, if you're only looking at needing 2 PSNs, I would have four total servers: 2xPAN/MNT, and 2xPSN (1 in US, 1 in Europe).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Take a look at BRKSEC-3699 on&amp;nbsp;Cisco Live 365. It gives a great overview of the recommended designs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=90923&amp;amp;backBtn=true&lt;/P&gt;
&lt;P&gt;HTH,&lt;/P&gt;
&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 16:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967362#M38306</guid>
      <dc:creator>Ryan Wolfe</dc:creator>
      <dc:date>2016-09-19T16:59:14Z</dc:date>
    </item>
    <item>
      <title>Hi Will, I like to do the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967363#M38307</link>
      <description>&lt;P&gt;Hi Will, I like to do the same as you described. Have you already changed to this distributed deployment? Does it work?&lt;/P&gt;
&lt;P&gt;Are there needed additional licenses?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BR Marcus&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 15:57:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/2967363#M38307</guid>
      <dc:creator>Marcus Hunold</dc:creator>
      <dc:date>2016-10-27T15:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/4617357#M574947</link>
      <description>&lt;P&gt;In a distributed deployment, in case of hardware refresh:&lt;/P&gt;
&lt;P&gt;Replacing the nodes with from 3655 (old) to 3595 (new) with same IP address and hostnames (FQDNs)&lt;/P&gt;
&lt;P&gt;1. Configure first the 3595s in an offline environment with the same IP addresses as the nodes to be replaced.&lt;/P&gt;
&lt;P&gt;2. Generate the CSRs of the 3595s and have them sign those certificates.&lt;/P&gt;
&lt;P&gt;3. Bind the signed certificate to the CSRs of the 3595s.&lt;/P&gt;
&lt;P&gt;4. De-register 3655 secondary node, then take it out of the network.&lt;/P&gt;
&lt;P&gt;5. Register the configured 3595 as the secondary node (PAN, MNT, PSN).&lt;/P&gt;
&lt;P&gt;6. Have your AD admin join the node to the Active Directory domain.&lt;/P&gt;
&lt;P&gt;7. Promote the 3595 secondary node as the new Primary Node.&lt;/P&gt;
&lt;P&gt;8. De-register the 3655 primary node, then take it out of the network.&lt;/P&gt;
&lt;P&gt;9. Register the other prepared 3595 as the secondary node (PSN).&lt;/P&gt;
&lt;P&gt;10. Have your AD admin join the node to the Active Directory domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding TACACS+ network device administration:&lt;/P&gt;
&lt;P&gt;a. There are 2 TACACS+ servers configured on IOS devices (router, switch etc...).&lt;/P&gt;
&lt;P&gt;b. Each TACACS+ server has different key hash on running-config on IOS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is all information is propagated from PRI -&amp;gt; SEC ISE node, including both TACACS+ keys for network device administration?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 08:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-distributed-deployment/m-p/4617357#M574947</guid>
      <dc:creator>b.haxhiaj</dc:creator>
      <dc:date>2022-05-25T08:48:36Z</dc:date>
    </item>
  </channel>
</rss>

