<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch Config with two Load Balancer in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816688#M484456</link>
    <description>&lt;P&gt;Your config looks good for what you want to do, we use similar for our customers with load balancers.&amp;nbsp; The load balancer is going to the piece where the complicated pieces happen.&amp;nbsp;Load balancing large environments works great, I wouldn't shy away from the set up and testing, in the long run it will be much easier with configs.&amp;nbsp;&amp;nbsp;&lt;SPAN style="font-family: inherit;"&gt;Start here with the load balancer guides.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-p/3648759" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-p/3648759&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing to note about your config, you have to make sure you use reverse NAT for your UDP 1700 COAs as well as for the RADIUS/TACACS communication.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using an F5 and plan to also use your VIPs for TACACS, check out my F5 TACACS amendment here&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/how-to-tacacs-failover-with-f5-big-ip-virtual-servers/ba-p/3796384" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/how-to-tacacs-failover-with-f5-big-ip-virtual-servers/ba-p/3796384&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are going to be using the netscaler guide and also leveraging TrustSec (or SDA) then you need to read my amendment around CTS request persistence too.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/radius-persistence-with-load-balanced-ise/td-p/3694180" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/radius-persistence-with-load-balanced-ise/td-p/3694180&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Mar 2019 07:43:43 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-03-09T07:43:43Z</dc:date>
    <item>
      <title>Switch Config with two Load Balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3815778#M484453</link>
      <description>&lt;P&gt;I'm looking for a little help with Switch Configuration for ISE with 2 Data Centers each with a Load Balancer and 15 PSN's at each site. We'd like to point the NAD's to the LB's and from there the LB will distribute to the PSN's but having a little issue with what that will look like in the Switch template? Any tips?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;! Define the RADIUS servers and RADIUS group&lt;BR /&gt;radius server DC1-LB-VIP&lt;BR /&gt;address ipv4 10.1.1.1 auth-port 1812 acct-port 1813&lt;BR /&gt;automate-tester username ise-check probe-on&lt;BR /&gt;key &amp;lt;password&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;radius server DC2-LB-VIP&lt;BR /&gt;address ipv4 10.2.2.2 auth-port 1812 acct-port 1813&lt;BR /&gt;automate-tester username ise-check probe-on&lt;BR /&gt;key &amp;lt;password&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa group server radius ISE-RADIUS&lt;BR /&gt;server name DC1-LB-VIP&lt;BR /&gt;server name DC2-LB-VIP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa server radius dynamic-author&lt;BR /&gt;client 10.1.1.1 server-key &amp;lt;password&amp;gt;&lt;BR /&gt;client 10.2.2.2 server-key &amp;lt;password&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2019 17:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3815778#M484453</guid>
      <dc:creator>mitchp75</dc:creator>
      <dc:date>2019-03-07T17:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Config with two Load Balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816257#M484454</link>
      <description>&lt;P&gt;With your current config its basically active / standby, DC1-LB-VIP will always be hit if available, and DC2-LB-VIP is the backup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given you're using a named group, its just one command you need to add, though this may not be valid for all platforms.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To give you an example on 16.6.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;aaa group server radius ISE-RADIUS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;server name DC1-LB-VIP&lt;BR /&gt;server name DC2-LB-VIP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;load-balance&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;method&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;least-outstanding&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_rad/configuration/xe-16-6/sec-usr-rad-xe-16-6-book/sec-rad-load-bal.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_rad/configuration/xe-16-6/sec-usr-rad-xe-16-6-book/sec-rad-load-bal.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW if you can get access to some of the Cisco Live sessions for ISE, there is some really good content, and there is definitely coverage of load balancing in great detail, enjoy!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 12:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816257#M484454</guid>
      <dc:creator>ITCOMMS</dc:creator>
      <dc:date>2019-03-08T12:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Config with two Load Balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816259#M484455</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which Load-balancing device you have?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If F5, there is a very detailed how-to document called:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How-To-95-Cisco_and_F5_Deployment_Guide-ISE_Load_Balancing_Using_BIG-IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check it on internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also loab-balancing command under the radius-server is not advisable.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please rate if this is helpfull.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 12:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816259#M484455</guid>
      <dc:creator>bern81</dc:creator>
      <dc:date>2019-03-08T12:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Config with two Load Balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816688#M484456</link>
      <description>&lt;P&gt;Your config looks good for what you want to do, we use similar for our customers with load balancers.&amp;nbsp; The load balancer is going to the piece where the complicated pieces happen.&amp;nbsp;Load balancing large environments works great, I wouldn't shy away from the set up and testing, in the long run it will be much easier with configs.&amp;nbsp;&amp;nbsp;&lt;SPAN style="font-family: inherit;"&gt;Start here with the load balancer guides.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-p/3648759" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-load-balancing/ta-p/3648759&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One thing to note about your config, you have to make sure you use reverse NAT for your UDP 1700 COAs as well as for the RADIUS/TACACS communication.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using an F5 and plan to also use your VIPs for TACACS, check out my F5 TACACS amendment here&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/how-to-tacacs-failover-with-f5-big-ip-virtual-servers/ba-p/3796384" target="_blank"&gt;https://community.cisco.com/t5/security-blogs/how-to-tacacs-failover-with-f5-big-ip-virtual-servers/ba-p/3796384&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are going to be using the netscaler guide and also leveraging TrustSec (or SDA) then you need to read my amendment around CTS request persistence too.&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/radius-persistence-with-load-balanced-ise/td-p/3694180" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/radius-persistence-with-load-balanced-ise/td-p/3694180&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 07:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/switch-config-with-two-load-balancer/m-p/3816688#M484456</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-09T07:43:43Z</dc:date>
    </item>
  </channel>
</rss>

