<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE node registration fails in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958734#M455642</link>
    <description>&lt;P&gt;The new nodes that are being added must be on the same version and patch level.&amp;nbsp; Then, the certificates need to be trusted both ways.&amp;nbsp; You can export the system certificates from the new nodes and import those into the existing deployment admin as a trusted certificate.&amp;nbsp; Then take the Root and Intermediate CA certificates that signed the existing deployment nodes' certificates and put those on the new nodes in the trusted certificates store.&amp;nbsp; If all of that is good and still failing, then make sure DNS entries are created for the new nodes and the existing deployment nodes.&amp;nbsp; Both forward and reverse lookup records.&amp;nbsp; You can test by doing an nslookup from the CLI of the new nodes and the existing Primary Admin.&amp;nbsp; For both the FQDN and the IP address.&lt;/P&gt;</description>
    <pubDate>Thu, 14 Nov 2019 17:04:29 GMT</pubDate>
    <dc:creator>Colby LeMaire</dc:creator>
    <dc:date>2019-11-14T17:04:29Z</dc:date>
    <item>
      <title>ISE node registration fails</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958726#M455639</link>
      <description>&lt;P&gt;I have a problem with registering a new ISE node to an existing ISE cluster that contains 4 nodes, so I have 4 nodes and I need to add 2 more nodes to them, all nodes are running version 2.4 patch10 and the certificates are trusted, however, I get this error&amp;nbsp;&lt;SPAN&gt;"Registration failed"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 16:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958726#M455639</guid>
      <dc:creator>MohamedSamer47595</dc:creator>
      <dc:date>2019-11-14T16:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node registration fails</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958734#M455642</link>
      <description>&lt;P&gt;The new nodes that are being added must be on the same version and patch level.&amp;nbsp; Then, the certificates need to be trusted both ways.&amp;nbsp; You can export the system certificates from the new nodes and import those into the existing deployment admin as a trusted certificate.&amp;nbsp; Then take the Root and Intermediate CA certificates that signed the existing deployment nodes' certificates and put those on the new nodes in the trusted certificates store.&amp;nbsp; If all of that is good and still failing, then make sure DNS entries are created for the new nodes and the existing deployment nodes.&amp;nbsp; Both forward and reverse lookup records.&amp;nbsp; You can test by doing an nslookup from the CLI of the new nodes and the existing Primary Admin.&amp;nbsp; For both the FQDN and the IP address.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 17:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958734#M455642</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-11-14T17:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node registration fails</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958736#M455644</link>
      <description>&lt;P&gt;Theres quite a bit of information needed to help here.&lt;/P&gt;&lt;P&gt;Is the new PSN across a WAN from the PAN?&lt;/P&gt;&lt;P&gt;Is it behind a firewall from the PAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To start, you need to ensure you have the following ports open bi-directionally between your nodes:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class="p"&gt;HTTPS (SOAP): TCP/443&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;Data synchronization/ Replication (JGroups): TCP/12001 (Global)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p"&gt;ISE Messaging Service: SSL: TCP/8671&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_0110.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_0110.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure you are using the same NTP server and that DNS (FQDN and short name) are resolvable on both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If youre across a WAN, be sure to check your bandwidth:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-latency-and-bandwidth-calculators/ta-p/3641112" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/ise-latency-and-bandwidth-calculators/ta-p/3641112&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all of that checks out, I would suggest to open a ticket with TAC to look into the registration logs.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 17:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-registration-fails/m-p/3958736#M455644</guid>
      <dc:creator>JohnNewman7082</dc:creator>
      <dc:date>2019-11-14T17:05:59Z</dc:date>
    </item>
  </channel>
</rss>

