<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE high level design in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900086#M470917</link>
    <description>&lt;P&gt;1- None. if you run PAN+ MnT+ PSN in same appliance. you cannot add more PSNs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have a setup like node 1- PAN+MnT , node 2- PSN, in this case you can add 5 PSNs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2- For 20 dedicated PSNs , you need a distributed deployment with personas running on seperate Nodes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the sizing of the deployment depends on the number of concurrent sessions in teh deployment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest starting with ciscoLive session&amp;nbsp;&amp;nbsp;BRKSEC-3432 from SanDiego 2019 to understand teh best practices&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Nidhi&amp;nbsp;&lt;/P&gt;
&lt;DIV class="session-title"&gt;
&lt;DIV class="title-text"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="session-actions"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Tue, 30 Jul 2019 14:58:26 GMT</pubDate>
    <dc:creator>Nidhi</dc:creator>
    <dc:date>2019-07-30T14:58:26Z</dc:date>
    <item>
      <title>ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900077#M470915</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Hi Expert,&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;I am seeking the best practice of ISE design.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;1. From ISE design guide, the maximum number of PSN nodes are 5 when PAN&amp;amp;MnT is on a single node and PSN is on dedicated node.&amp;nbsp; How about if PSN role is on the primary/secondary PAN&amp;amp;MnT node in the distributed deployment, how many dedicate PSN nodes could have in this kind of cube? Is it possible to design like&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node1: Pri PAN&amp;amp;MnT+PSN&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node2: Sec PAN&amp;amp;MnT+PSN&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node3-7: 5 dedicated PSNs&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;OR&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node1: Pri PAN&amp;amp;MnT+PSN&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node2: Sec PAN&amp;amp;MnT+PSN&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Node3-5: 3 dedicated PSNs&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;2. I have a customer that there are 20 PSN nodes needed in one distributed deployment. So from design guide, we need separate PAN and MNT on dedicated ise nodes and could have up to 50 dedicated PSNs supported. Which appliance or equivalent VM should I choose for PAN and MNT node if&amp;nbsp; I only need 20 dedicated PSNs? I only see 3595 and 3695 as PAN in the guide. What is the recommendation of appliance&amp;nbsp; or equivalent VM of PAN/MNT in a separate PAN, MnT and PSN nodes design if the number of PSNs node is not near 50?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 14:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900077#M470915</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2019-07-30T14:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900086#M470917</link>
      <description>&lt;P&gt;1- None. if you run PAN+ MnT+ PSN in same appliance. you cannot add more PSNs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have a setup like node 1- PAN+MnT , node 2- PSN, in this case you can add 5 PSNs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2- For 20 dedicated PSNs , you need a distributed deployment with personas running on seperate Nodes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the sizing of the deployment depends on the number of concurrent sessions in teh deployment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest starting with ciscoLive session&amp;nbsp;&amp;nbsp;BRKSEC-3432 from SanDiego 2019 to understand teh best practices&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Nidhi&amp;nbsp;&lt;/P&gt;
&lt;DIV class="session-title"&gt;
&lt;DIV class="title-text"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="session-actions"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 Jul 2019 14:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900086#M470917</guid>
      <dc:creator>Nidhi</dc:creator>
      <dc:date>2019-07-30T14:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900090#M470918</link>
      <description>&lt;P&gt;There are only 4 supported ISE deployment models:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Stand alone node running all personas.&lt;/LI&gt;
&lt;LI&gt;Two node deployment running all personas.&lt;/LI&gt;
&lt;LI&gt;4-7 node deployment where the PAN/M&amp;amp;Ts are running on two nodes (no PSN functionality) and 2-5 PSNs.&lt;/LI&gt;
&lt;LI&gt;6-54 node deployment.&amp;nbsp; Two dedicated PANs, two dedicated M&amp;amp;Ts and up to 50 PSNs based on your needs.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Once you move to #3 or #4 you cannot run PSN functionality on the PAN/M&amp;amp;Ts and still be running a supported model.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 15:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900090#M470918</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-07-30T15:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900420#M471007</link>
      <description>&lt;P&gt;Thanks, Paul.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But how about my second question? Design guide only mentioned separate PAN and MnT on 3695 and 3595 could support up to 50 dedicated PSNs. Does it mean only 3595 and 3695 are supported in this kind of design? Or if we only need 10 or 20 dedicated PSNs, we could use 3615 or 3655 as PAN and MNT?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 03:08:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900420#M471007</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2019-07-31T03:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900422#M471008</link>
      <description>&lt;P&gt;Thanks, Nidhi.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I went through&amp;nbsp;&lt;SPAN&gt;BRKSEC-3432 and no answer was found for my second question. I just wanted to confirm that whether we have to choose 3595 and 3695 as PAN and MnT when we only need maybe 10 or 20 dedicated PSNs.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 03:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900422#M471008</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2019-07-31T03:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900424#M471009</link>
      <description>You can choose the 3595, 3655, or 3695 templates/appliances, all three would be suitable for admin nodes in a dedicated deployment.  The 3695 for admin nodes is geared towards 2,000,000 active endpoint deployments, both the 3595 and 3655 are supported for deployment of up to 50 PSN's and 500k active endpoints.</description>
      <pubDate>Wed, 31 Jul 2019 03:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900424#M471009</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-07-31T03:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900436#M471010</link>
      <description>&lt;P&gt;Thank, Damien.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found this in 2.6 installation guide.&lt;/P&gt;
&lt;P&gt;But it is not the same for 2.4 which mentioned 3695 PAN supports maximum of 500K, not 2,000,000 like 2.6.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also hope the team could update&amp;nbsp;&lt;SPAN&gt;ISE Performance &amp;amp; Scale page soon to clear the confusion when making ISE design.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148#toc-hId-1418220509" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148#toc-hId-1418220509&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 04:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900436#M471010</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2019-07-31T04:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900465#M471072</link>
      <description>&lt;P&gt;Of course it will work. From my point of view, there's no hard enforcement for these type of stuff.&lt;/P&gt;&lt;P&gt;The only thing which is enforced from my point of view is, that there are max. 2 PAN and 2 MNT nodes and that's it.&lt;/P&gt;&lt;P&gt;I guess even the max. sessions outlined in these papers are no hard limit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The values are the validated and supported scenarios by Cisco.&lt;/P&gt;&lt;P&gt;The problem is, that there are no estimations of how many sessions, PSN nodes and endpoints are supported on a full distributed deployment using small appliances.&lt;/P&gt;&lt;P&gt;Again: I'm pretty sure it will work (heck, it works with tiny dimensioned VMs in my lab &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ). However if there are no reliable scale numbers and there is no support by Cisco I would only use the outlined designs from the Cisco documentation.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 05:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900465#M471072</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2019-07-31T05:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE high level design</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900483#M471073</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Nidhi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1- Actually, we could do this without any warnings. All of PSNs are working. Are there any problems?&lt;/P&gt;&lt;P&gt;I think this deployment can be used for use case that dedicated PSNs are primary role and the PSNs of&amp;nbsp;&lt;SPAN&gt;PAN+ MnT+ PSN&amp;nbsp;node are backup role&lt;/SPAN&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3PSN.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/42210iDF4FA4B545430422/image-size/large?v=v2&amp;amp;px=999" role="button" title="3PSN.png" alt="3PSN.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- Does ISE deployment type depends on the number of PSN nodes rather than the number of RADIUS sessions？&lt;/P&gt;&lt;P&gt;How about the case below：&lt;/P&gt;&lt;P&gt;If our customer has total 10 x locations(2 x DC and 8 x remote offices).&lt;BR /&gt;They would like to &lt;FONT color="#FF0000"&gt;deploy ISE at each site&lt;/FONT&gt;，and the latency between DCs and remote sites is lower than 100ms.&lt;/P&gt;&lt;P&gt;They only have around 50-100 user sessions at each site, &lt;FONT color="#FF0000"&gt;total 1000 sessions&lt;/FONT&gt;.&lt;BR /&gt;What deployment type will you propose and why ? Please take more attention to the total sessions in this case is only 1000.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 06:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-high-level-design/m-p/3900483#M471073</guid>
      <dc:creator>chenwujun</dc:creator>
      <dc:date>2019-07-31T06:42:50Z</dc:date>
    </item>
  </channel>
</rss>

