<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Passive ID load in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3888521#M471568</link>
    <description>Hi,&lt;BR /&gt;Can you please clarify the question?  ISE-PIC can support up to 300K user to IP mappings with the proper licensing.  The same is true with ISE and base licensing.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim</description>
    <pubDate>Thu, 11 Jul 2019 14:35:32 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2019-07-11T14:35:32Z</dc:date>
    <item>
      <title>ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3888511#M471563</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our customer would like to see the Passive ID service generated load on ISE-PIC for apps. 10,000 users on: &amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Active Directory&lt;/P&gt;
&lt;P&gt;- ISE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Network Traffic&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do we have any&amp;nbsp;tangible information regarding this question?&lt;/P&gt;
&lt;P&gt;Thank You!&lt;/P&gt;
&lt;P&gt;Best regards, Gyorgy&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 14:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3888511#M471563</guid>
      <dc:creator>gacs</dc:creator>
      <dc:date>2019-07-11T14:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3888521#M471568</link>
      <description>Hi,&lt;BR /&gt;Can you please clarify the question?  ISE-PIC can support up to 300K user to IP mappings with the proper licensing.  The same is true with ISE and base licensing.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim</description>
      <pubDate>Thu, 11 Jul 2019 14:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3888521#M471568</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2019-07-11T14:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3889230#M471569</link>
      <description>&lt;P&gt;Hi Tim,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you! This part is clear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our customer would like to see if they deploy the Passive ID service, what it means in additional load point of view on:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Active Directory (CPU usage, for example)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- ISE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Network traffic (additional kbps caused by this Passive ID)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding ISE: &amp;nbsp;Since ISE was tested for the specified concurrent endpoints including this service as well, the load is&amp;nbsp;negligible.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;Best regards, Gyorgy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 13:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3889230#M471569</guid>
      <dc:creator>gacs</dc:creator>
      <dc:date>2019-07-12T13:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3889236#M471572</link>
      <description>All of those parameters are completely dependent on the customer’s environment. Number of endpoints, number of domain controllers, user events logged, number of applications that request for TGTs etc. No deployment is identical when it comes to passive-ID. Only way to know is by implementing and testing it.&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Jul 2019 13:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3889236#M471572</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2019-07-12T13:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3890520#M471576</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately it is not a technical answer what we could accept from Cisco. We would like to understand what could cause an extra load to the domain controllers. What and it works under the hood. And also we would like to understand how this equation works. If the load comes what we should suggest to the customer?&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;- add new domain controllers to their system?&lt;/P&gt;&lt;P&gt;- migrate the domain controller to a specific level or patch it?&lt;/P&gt;&lt;P&gt;- any good suggestion?&lt;/P&gt;&lt;P&gt;Testing and just failing and leaving is not an option. Sorry.&lt;/P&gt;&lt;P&gt;Our second issue is after we joined the ISE to the AD and then selected the domain controller,&amp;nbsp; what is the minimum privilege what required for the domain user to access WMI? Domain admin of course working fine how ever customers does not provide this kind of privilege in their production environment. We have not found any detail about the WMI admin user privileges in AD? Please share these information with us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Gabor&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 19:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3890520#M471576</guid>
      <dc:creator>gbercsenyi</dc:creator>
      <dc:date>2019-07-15T19:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Passive ID load</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3890727#M471581</link>
      <description>&lt;P&gt;On your second inquiry, please see&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_01110.html#concept_532EEE150EE045DBA642649930F7528C" target="_blank"&gt;Required Permissions when AD User not in Domain Admin Group&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regarding loads on the domain controllers, here is from our engineering team:&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#3366FF"&gt;&lt;EM&gt;CPU load on Domain controller is proportional to filters that are used on domain controller by subscribed clients. ISE is currently uses very lightweight and optimized filters, so the average additional load that is usually seen on customer's domain controllers is 5-10%.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Do note the known issues -- CSCvh86466 and, if using PIC agent, CSCvm83091&lt;/P&gt;
&lt;P&gt;In case of significant high load on domain controllers after the integration, please do work Microsoft and Cisco TAC. &lt;A href="https://blogs.technet.microsoft.com/supportingwindows/tag/wmiseries/" target="_blank"&gt;WMIseries&lt;/A&gt;&amp;nbsp;might be of interest. Potentially, forward the security events to a member server and monitor on the member server instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 03:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passive-id-load/m-p/3890727#M471581</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-16T03:09:22Z</dc:date>
    </item>
  </channel>
</rss>

