<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Multiple deployment (3595 and 3615) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932837#M441028</link>
    <description>&lt;P&gt;Yes. I using ISE 2.4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;</description>
    <pubDate>Tue, 01 Oct 2019 01:43:01 GMT</pubDate>
    <dc:creator>likewinered</dc:creator>
    <dc:date>2019-10-01T01:43:01Z</dc:date>
    <item>
      <title>ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3930651#M441022</link>
      <description>&lt;P&gt;Hello Experts!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm currently using three 3595 ISEs.&lt;/P&gt;
&lt;P&gt;I want to add another 3615 here as a PSN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently information&lt;/P&gt;
&lt;P&gt;ISE1 : PAN(Primary) + MNT(Secondary) + PSN&lt;/P&gt;
&lt;P&gt;ISE2 : PAN(Secondary) + MNT (Primary) + PSN&lt;/P&gt;
&lt;P&gt;ISE3 : PSN (Health-Check node)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there problem to use?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 23:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3930651#M441022</guid>
      <dc:creator>likewinered</dc:creator>
      <dc:date>2020-03-13T23:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931211#M441023</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/302443"&gt;@likewinered&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not a problem - you are using ISE 2.4 on the existing network?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When registering a node, the new (soon to be added) node needs to have the same software and patch level as the rest of the deployment&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 05:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931211#M441023</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-09-27T05:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931645#M441024</link>
      <description>This is not a supported or tested deployment model.  It would probably work, but it introduces new items that should be covered.&lt;BR /&gt;&lt;BR /&gt;1. If the third psn is only there for the sole purpose of being a healthcheck node, then when ISE automatically fails over, the still working PAN (which is also acting as your only working PSN at that time) will go down.  You will cause an unplanned authentication outage as services restart.   &lt;BR /&gt;&lt;BR /&gt;2. Running more than two nodes in a deployment where all three personas are running on the PAN/MNT nodes, violates the tested and supported standalone/hybrid deployment models. If you have more than two nodes, then the first two nodes should only host the PAN/MNT roles, and you dedicate PSNs to authentication duty.  So adding one more node shouldn't be done, you should add two more to include HA  in conjunction with the restructuring of roles to a hybrid deployment. &lt;BR /&gt;2x PSN/MNT nodes (no other personas should run on these)&lt;BR /&gt;2x Dedicated PSN nodes to provide HA&lt;BR /&gt;&lt;BR /&gt;3. Even though this works, and ISE won't stop you from deploying a standalone deployment then adding a third node, you shouldn't do it.  If you open up a TAC case, there is a high probability that TAC will ask for it to be corrected to a tested/supported model.</description>
      <pubDate>Fri, 27 Sep 2019 18:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931645#M441024</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-09-27T18:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931834#M441025</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; - I don't believe &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/302443"&gt;@likewinered&lt;/a&gt; intention was to run three PAN/MnT combos - there is no way to even try to select such a function.&amp;nbsp; What they were asking was whether adding a PSN to a deployment consisting of two PAN+MnT+PSN would be a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The official Cisco deployment guide says this is not allowed and the "next steps" for customers who wish to expand by ONE PSN from a 2 node all-in-one system, is to buy &lt;STRONG&gt;three more nodes&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;Existing Deployment:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;FONT color="#3366FF"&gt;PAN+MnT+PSN&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#3366FF"&gt;PAN+MnT+PSN&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;to&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;FONT color="#3366FF"&gt;PAN+MnT&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#3366FF"&gt;PAN+MnT&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;PSN&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;PSN&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;PSN&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This is the official stannce but I know customers who are simply adding a third node for simple stuff like Guest Portals. Why would anyone in their right mind buy three ISE nodes just so that their system can add one more PSN for Guest Portal functionality? The load will be negligible and Cisco should be more clear on the technical reasons why this is a bad idea. I think it's a great idea. If a TAC engineer can prove to me that I have broken the system by doing this then I will concede that it's wrong. Of course I would never want to have a two node system hammering away at 40,000 concurrent sessions and then dare to add another PSN to that. That would probably end badly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ISE Deployment "models" are very rigid and not everyone wants to split off their PSN from the PAN/MnT, or even go fully distributed. Sometimes the PSN is just there for fallback in emergency and may do very little work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have seen a fair bit of "creative deployments" in the field that don't fit the Cisco model and they work very well. The TAC have even supported them, and since the issues we were having were not related to scale-out or load, the TAC didn't object.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess my point is simply that in a world of infinite resources (hardware/VM/money) just do what Cisco tells you - but these rigid guidelines are not founded on a lot of technical argumentation, other than "not tested by Cisco". But that is no good reason not to run such a setup, if, as I say, the load is minimal. I could imagine 6 PSN's each doing around 500 concurrent sessions all linked to a PAN+MnT+PSN combo would still perform better than a PAN+MnT+PSN combo doing 40,000 concurrent sessions. Therefore it's not the number of PSN's that kills a system.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Sep 2019 09:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3931834#M441025</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-09-28T09:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932622#M441026</link>
      <description>At the end of the day it is untested and you are assuming the risk if you go down that path, so it really shouldn't be recommend here. There should be more push back to the BU if there is an untested deployment model people are asking for. At the end of the day it's rigid because that provides known working deployment models that can be supported by TAC.</description>
      <pubDate>Mon, 30 Sep 2019 16:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932622#M441026</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-09-30T16:30:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932710#M441027</link>
      <description>&lt;P&gt;Just to chime in here.&amp;nbsp; We have had customers for years running the 3 node deployment where they needed an extra PSN for various reasons.&amp;nbsp; There is no &lt;STRONG&gt;technical&lt;/STRONG&gt; reason to not do this.&amp;nbsp; It works just fine.&amp;nbsp; The only reason, as has been said, is it is not a supported model by Cisco.&amp;nbsp; I don't recommend a deployment model outside of the 3 supported models, but technically it works just fine.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 19:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932710#M441027</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-09-30T19:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932837#M441028</link>
      <description>&lt;P&gt;Yes. I using ISE 2.4.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 01:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932837#M441028</guid>
      <dc:creator>likewinered</dc:creator>
      <dc:date>2019-10-01T01:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Multiple deployment (3595 and 3615)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932842#M441029</link>
      <description>&lt;P&gt;Thank you everyone!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think my explanation is a bit lacking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the composition I want to use.&lt;BR /&gt;ISE1: PAN + MNT + PSN&lt;BR /&gt;ISE2: PAN + MNT + PSN&lt;BR /&gt;ISE3: PSN (Health check node)&lt;BR /&gt;ISE4 (New 3615): PSN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bottom line is that although this configuration is not recommended by Cisco, it does not seem technically problematic.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 01:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-multiple-deployment-3595-and-3615/m-p/3932842#M441029</guid>
      <dc:creator>likewinered</dc:creator>
      <dc:date>2019-10-01T01:51:42Z</dc:date>
    </item>
  </channel>
</rss>

