<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Primary/Secondary ISE deployments and Certs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3871395#M472400</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321173"&gt;@Steven Williams&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks kosher to me.&amp;nbsp; When you say "take my primary offline", how exactly do you do that?&amp;nbsp; I wonder whether the NAS still thinks ISE is alive because it's replying to Radius/TACACS traffic for some reason (or maybe it uses another type of keepalive).&amp;nbsp; But even then, if you literally power it off and the NAS still doesn't use the Secondary (without you promoting the Secondary) then I think there is a problem with your ISE server.&amp;nbsp; You don't need to promote an ISE node in order for its Policy/TACACS services to run.&amp;nbsp; Promotion is just about the PAN and MnT roles.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 02:55:07 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2019-06-12T02:55:07Z</dc:date>
    <item>
      <title>Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3869624#M472390</link>
      <description>&lt;P&gt;I have an active/passive ISE deployment. Two nodes in two separate locations and two separate Domain Forests.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am making certs for tacacs password reset and client provisioning portal. I am making cname dns records for these but only pointing them to the primary ISE server that is active. In the event of a failure I need to go into secondary and force it to become active, but its name is not the same as what the cname records are so if I put in two cnames (same cname value) pointing to two different ISE nodes (one active and one passive) how will clients get redirected? Will the passive node not respond?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 17:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3869624#M472390</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-06-07T17:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870004#M472392</link>
      <description>&lt;P&gt;So if you have&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CNAME&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;portal.mycompany.com -&amp;gt; A-Record&amp;nbsp; ise01.mycompany.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;-&amp;gt; A-Record&amp;nbsp; ise02.mycompany.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then your OS will have two IP addresses against the DNS query of portal.mycompany.com - if the OS can build a TCP connection using the first IP address (ise01) then that's what it will do.&amp;nbsp; If however, the tcp connection doesn't get an ACK, then the OS will try the second IP address (ise02).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if I fully understand your dilemma though . .. because, if your ISE nodes are running as PSN's (Policy Service enabled) then they are both considered active for hosting portals - there is no difference or hierarchy there.&amp;nbsp; The Active/Passive only applies to the PAN (Admin) persona.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2019 13:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870004#M472392</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-09T13:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870079#M472394</link>
      <description>&lt;P&gt;Both nodes are not serving portals. I only have two ISE nodes so active/passive. But if they are both in different domains and once i activate the standby in a failed scenario it will be a different DNS name and IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 00:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870079#M472394</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-06-10T00:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870083#M472396</link>
      <description>From an administration and monitoring persona perspective there exists the concept of active/passive.  But what Arne was getting at is that if you have policy services enabled on both nodes, then both are active for authentication.  Even if admin and MNT are enabled on the same node as policy service, those roles will have primary/secondary, but PSN has no concept of that. &lt;BR /&gt;&lt;BR /&gt;You can join ISE to up to 50 domains simultaneously?  Have you considered joining them to both?</description>
      <pubDate>Mon, 10 Jun 2019 01:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870083#M472396</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-06-10T01:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870262#M472397</link>
      <description>I guess I am lost because if I take my primary node offline and DO NOT force the secondary to become primary all my TACACS sessions and RADIUS sessions fail. So that tells me its not accepting these requests.</description>
      <pubDate>Mon, 10 Jun 2019 12:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870262#M472397</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-06-10T12:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870857#M472398</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321173"&gt;@Steven Williams&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;something doesn’t add up here. If these two nodes are in a deployment and both of them have Policy a services and Device Admin enabled then there is no difference between these two nodes. Maybe the sync is broken? I am would get a tac case to have a look at this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The NAS is always responsible for AAA failover (tacacs and radius). And that means that both ISE nodes should have identical programming to respond to NAS requests.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 09:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870857#M472398</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-11T09:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870949#M472399</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-06-11 at 7.39.13 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/38383iAE15764C16FBB51B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-06-11 at 7.39.13 AM.png" alt="Screen Shot 2019-06-11 at 7.39.13 AM.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-06-11 at 7.37.51 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/38384iC2D1A1C6B84017AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-06-11 at 7.37.51 AM.png" alt="Screen Shot 2019-06-11 at 7.37.51 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 12:42:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3870949#M472399</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-06-11T12:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3871395#M472400</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321173"&gt;@Steven Williams&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks kosher to me.&amp;nbsp; When you say "take my primary offline", how exactly do you do that?&amp;nbsp; I wonder whether the NAS still thinks ISE is alive because it's replying to Radius/TACACS traffic for some reason (or maybe it uses another type of keepalive).&amp;nbsp; But even then, if you literally power it off and the NAS still doesn't use the Secondary (without you promoting the Secondary) then I think there is a problem with your ISE server.&amp;nbsp; You don't need to promote an ISE node in order for its Policy/TACACS services to run.&amp;nbsp; Promotion is just about the PAN and MnT roles.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 02:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3871395#M472400</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-12T02:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Primary/Secondary ISE deployments and Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3871851#M472401</link>
      <description>Historically this is a real pain in the butt for me.  If the node or load balancer performs a TCP handshake then the NAD believes the TACACS server is online.  Even if the TCP handshake ends in a RST flag, the NAD never fails over to the configured secondary IP.  &lt;BR /&gt;&lt;BR /&gt;RADIUS does things differently though so I'm on board with Arne here, something fishy if you can't authenticate against the secondary at any time, both nodes up or not.</description>
      <pubDate>Wed, 12 Jun 2019 15:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/primary-secondary-ise-deployments-and-certs/m-p/3871851#M472401</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-06-12T15:15:17Z</dc:date>
    </item>
  </channel>
</rss>

