<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Converting from 34xx appliances to VM in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3868972#M472431</link>
    <description>&lt;P&gt;Environment is running an ISE cluster with four 34xx appliances:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Active/Standby PAN &amp;amp; MnT&lt;/P&gt;
&lt;P&gt;- 2 x PSN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer would like to consolidate into two appliances based on their concurrent session count and also migrate to VM since appliances due to EoS/EoL announcements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Questions:&lt;/P&gt;
&lt;P&gt;1. Do we support running active on VM and standby on physical appliance for short/medium term? Does the VM need specific requirements?&lt;/P&gt;
&lt;P&gt;2. When we take the current standby appliance out of cluster, then integrate VM, and do database sync...is there anything, such as certificates, that need to manually configured on standby VM?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2019 15:39:26 GMT</pubDate>
    <dc:creator>gjw_csco</dc:creator>
    <dc:date>2019-06-06T15:39:26Z</dc:date>
    <item>
      <title>Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3868972#M472431</link>
      <description>&lt;P&gt;Environment is running an ISE cluster with four 34xx appliances:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Active/Standby PAN &amp;amp; MnT&lt;/P&gt;
&lt;P&gt;- 2 x PSN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer would like to consolidate into two appliances based on their concurrent session count and also migrate to VM since appliances due to EoS/EoL announcements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Questions:&lt;/P&gt;
&lt;P&gt;1. Do we support running active on VM and standby on physical appliance for short/medium term? Does the VM need specific requirements?&lt;/P&gt;
&lt;P&gt;2. When we take the current standby appliance out of cluster, then integrate VM, and do database sync...is there anything, such as certificates, that need to manually configured on standby VM?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 15:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3868972#M472431</guid>
      <dc:creator>gjw_csco</dc:creator>
      <dc:date>2019-06-06T15:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3869361#M472433</link>
      <description>For 1st question, yes the VM has specific requirements based on the sizing&lt;BR /&gt;(ideally you use an OVA template). See below.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_01.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_01.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For 2nd question, when you deregister a node from the cluster, its local&lt;BR /&gt;certificates disappear and you need to import the new ones related to the&lt;BR /&gt;VM after it joins the cluster. The only certificates which gets replicated&lt;BR /&gt;are wildcard certs.&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Jun 2019 09:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3869361#M472433</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-06-07T09:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3869614#M472434</link>
      <description>Are they planning to upgrade the deployment at the same time, or would they prefer to remain on the version they are on now? we can help you with the process either way but it will differ.</description>
      <pubDate>Fri, 07 Jun 2019 16:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3869614#M472434</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-06-07T16:39:29Z</dc:date>
    </item>
    <item>
      <title>Re: Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870084#M472435</link>
      <description>&lt;P&gt;They already upgraded to 2.4.x and then realized the 34xx appliances were not supported, so now they're working towards getting things migrated to VM's.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 01:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870084#M472435</guid>
      <dc:creator>gjw_csco</dc:creator>
      <dc:date>2019-06-10T01:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870089#M472499</link>
      <description>Pretty straight forward process and there are quite a few way to do it, you won't have issues joining VM's to a physical node deployment. Also, because NADs are probably configured for PSN IP's, I would try to put both new standalone VM's on those IP's.  It would look something like this.&lt;BR /&gt;&lt;BR /&gt;1. Deregister a PSN and shut it down.&lt;BR /&gt;2. Deregister secondary PAN and shut it down.&lt;BR /&gt;3. Deploy a new 2.4 OVA, ideally 600GB+ since it will also host MNT serivces.&lt;BR /&gt;4. Run the setup and reuse the shut down PSN hostname/IP (or change DNS).&lt;BR /&gt;5. Install certificates if you use common certs across the nodes today.&lt;BR /&gt;6. Patch it to the same as the current PAN/deployment.&lt;BR /&gt;7. Register it to the deployment selecting admin, mnt, and policy services roles.&lt;BR /&gt;8. Promote this new node to primary MNT and primary admin.&lt;BR /&gt;9. Deregister and shut down appliance admin node and PSN. &lt;BR /&gt;10. Deploy a new 2.4 OVA, again ideally 600+ GB.&lt;BR /&gt;11. Install certs, patch, and register.&lt;BR /&gt;&lt;BR /&gt;At this point you will have two VM nodes left running PAN, MNT and PSN services.  This certainly isn't the only way, but viable if you have two radius servers configured on each NAD.  Probably wise to expand upon my high level task list to include more specifics if presenting it to a client to do. An alternative to save some single point of failure time is to pre deploy the new 2.4 VM's and stage them at the setup script. If you don't want to reuse IP's, you could deploy the OVA's, join the nodes with new IP's and hostnames, then decommission the four old nodes.  &lt;BR /&gt;</description>
      <pubDate>Mon, 10 Jun 2019 01:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870089#M472499</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-06-10T01:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Converting from 34xx appliances to VM</title>
      <link>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870174#M472500</link>
      <description>&lt;P&gt;Damien is correct , there are many ways you can achieve upgrades and really depends on your existing environment and requirements&lt;/P&gt;
&lt;P&gt;Another doc that may be useful and give you some ideas is :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-upgrades-best-practices/ta-p/3656934#toc-hId--718381845" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-upgrades-best-practices/ta-p/3656934#toc-hId--718381845&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2019 08:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/converting-from-34xx-appliances-to-vm/m-p/3870174#M472500</guid>
      <dc:creator>ldanny</dc:creator>
      <dc:date>2019-06-10T08:24:39Z</dc:date>
    </item>
  </channel>
</rss>

